-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
#Title: Eclipse Birt Report Viewer v4.5.0 and below Persistent XSS
#Vendor homepage: http://www.eclipse.org
#Exploit Author: Multiple parties reported to vendor. (first in 2008!)
#Vulnerability: Presistent XSS when viewing report with malicious code
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
#Title: Eclipse Birt Report Viewer <= v4.5.0 Persistent XSS
#Vendor homepage: http://www.eclipse.org
#Discovered by: Multiple parties reported to vendor. (first in 2008!)
#Vulnerability: Presistent XSS when viewing report containing javascript
Desc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
#Title: Eclipse Birt Report Viewer v4.5.0 and below Persistent XSS
#Vendor homepage: http://www.eclipse.org
#Exploit Author: Multiple parties reported to vendor. (first in 2008!)
#Vulnerability: Presistent XSS when viewing report with malicious code
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
#Vendor: ZyXel WAP3205 - version 1 (Product is EOL and no patch
forthcoming)
#Firmware version: V1.00(BFR.6) - V1.00(BFR.8)C0
#Exploit Author: Nicholas Lehman @GraphX
#Vulnerability: Multiple persistent and reflected XSS vulnerabilities
# Exploit Title: ManageEngine Eventlog Analyzer Privilege Escalation
# Exploit Author: @GraphX
# Vendor Homepage:http://www.manageengine.com
# Version: 4.0 - 10
1. Description:
The manageengine eventlog analyzer fails to properly verify user
privileges when making changes via the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
# Exploit Title: ASUS RT-N56U Persistent XSS
# Date: 2/2/2016
# Exploit Author: @GraphX
# Vendor Homepage: http://asus.com/
# Version: 3.0.0.4.374_239
1 Description:
It is possible for an authenticated attacker to bypass input sanitation in
the