*Description:* URL: localhost/ Affected Component: */?n0ipr0csn0ipr0cs=1* *Vulnerability Type:* Cross Site Scripting https://cwe.mitre.org/data/definitions/79.html *Vendor of Product: * Flexense DiskPulse *Version: * from v10.4 to v10.7. *Attack Type: * Remote *Impact: * This attack allows an attacker code execution. The vulnerability affects the confidentiality of personal data, possible theft of confidential information, for example credentials of session, cookie information, personal information, or a possible loss of control of the PC. *About:* DiskPulse is a real-time disk change monitoring solution allowing one to monitor one or more disks or directories, save reports and disk change monitoring statistics, export detected changes to a centralized SQL database, execute custom commands and send E-Mail notifications when unauthorized changes are detected in critical system files. *Credits:* This vulnerability have been discovered by Francisco Javier Santiago VA!zquez aka "n0ipr0cs" https://es.linkedin.com/in/francisco-javier-santiago-v%C3%A1zquez-1b654050 https://twitter.com/n0ipr0cs *Disclosure Timeline:* April 07, 2018: Vulnerability acquired by Francisco Javier Santiago VA!zquez. aka "n0ipr0cs". April 07, 2018: Responsible disclosure to Flexense Security Team. April 18, 2018: Second Message Responsible disclosure to Flexense Security Team. April 26, 2018: The vulnerability has been fixed.The new product version (v10.8) fixes a number of bugs and security vulnerabilities, this include CVE-2018-10563 April 30, 2018: Disclosure of vulnerability. *Link:* http://blog.n0ipr0cs.io/post/2018/04/29/XSS-Flexense-DiskBoss-Enterprise-all-versions F. Javier Santiago VA!zquez about.me/javiersantiagovazquez