[FD] Eclipse BIRT Report Viewer <= 4.5.0 XSS

2016-01-27 Thread graphx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 #Title: Eclipse Birt Report Viewer v4.5.0 and below Persistent XSS #Vendor homepage: http://www.eclipse.org #Exploit Author: Multiple parties reported to vendor. (first in 2008!) #Vulnerability: Presistent XSS when viewing report with malicious code

[FD] Eclipse BIRT Viewer <= v4.5.0 Persistent XSS

2016-01-27 Thread graphx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 #Title: Eclipse Birt Report Viewer <= v4.5.0 Persistent XSS #Vendor homepage: http://www.eclipse.org #Discovered by: Multiple parties reported to vendor. (first in 2008!) #Vulnerability: Presistent XSS when viewing report containing javascript Desc

[FD] Eclipse BIRT report viewer <= 4.5.0 Persistent XSS

2016-01-27 Thread graphx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 #Title: Eclipse Birt Report Viewer v4.5.0 and below Persistent XSS #Vendor homepage: http://www.eclipse.org #Exploit Author: Multiple parties reported to vendor. (first in 2008!) #Vulnerability: Presistent XSS when viewing report with malicious code

[FD] ZyXel WAP3205 V1 Multiple Persistent and Reflected XSS

2016-01-27 Thread graphx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 #Vendor: ZyXel WAP3205 - version 1 (Product is EOL and no patch forthcoming) #Firmware version: V1.00(BFR.6) - V1.00(BFR.8)C0 #Exploit Author: Nicholas Lehman @GraphX #Vulnerability: Multiple persistent and reflected XSS vulnerabilities

[FD] ManageEngine Eventlog Analyzer v4-v10 Privilege Esacalation

2016-02-03 Thread graphx
# Exploit Title: ManageEngine Eventlog Analyzer Privilege Escalation # Exploit Author: @GraphX # Vendor Homepage:http://www.manageengine.com # Version: 4.0 - 10 1. Description: The manageengine eventlog analyzer fails to properly verify user privileges when making changes via the

[FD] ASUS RT-N56U Persistent XSS

2016-02-03 Thread graphx
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 # Exploit Title: ASUS RT-N56U Persistent XSS # Date: 2/2/2016 # Exploit Author: @GraphX # Vendor Homepage: http://asus.com/ # Version: 3.0.0.4.374_239 1 Description: It is possible for an authenticated attacker to bypass input sanitation in the