### [CVE-2018-10077](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10077) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description XML external entity (XXE) vulnerability in Geist WatchDog Console 3.2.2 allows remote authenticated administrators to read arbitrary files via crafted XML data. ### POC #### Reference - http://packetstormsecurity.com/files/147253/Geist-WatchDog-Console-3.2.2-XSS-XML-Injection-Insecure-Permissions.html - https://www.exploit-db.com/exploits/44493/ #### Github - https://github.com/ARPSyndicate/cvemon