John Page (aka hyp3rlinx)
88 exploits
Active since Oct 2017
Sophos Endpoint Protection 10.7 - Info Disclosure
CVSS 7.8
Trend Micro OfficeScan <11.0 SP1 - Privilege Escalation
CVSS 4.4
Trend Micro OfficeScan 11.0/XG (12.0) - Image File Execution Bypass
Trend Micro Maximum Security 2019 - Privilege Escalation
Trend Micro Maximum Security 2019 - Arbitrary Code Execution
Weblogexpert Weblog Expert - Incorrect Permission Assignment
CVSS 7.8
Sophos Endpoint Protection - Security Feature Bypass
CVSS 5.5
Avaya IP Office < 10.1.1 - Memory Corruption
CVSS 9.6
Windows TCPIP Finger Command - C2 Channel and Bypassing Security Software
Microsoft Windows .Group File - Code Execution
Windows NTLM - Path Traversal
CVSS 6.5
Microsoft Baseline Security Analyzer 2.3 - XML External Entity Injection
Microsoft Enterprise Mode Site List Manager - XML External Entity Injection
Microsoft Game Definition File Editor 6.3.9600 - XML External Entity Injection
Microsoft Internet Explorer / ActiveX Control - Security Bypass
Microsoft Internet Explorer 11 - XML External Entity Injection
Microsoft SQL Server Management Studio <18.0 - Info Disclosure
CVSS 5.5
Microsoft SQL Server Management Studio <18.0 - Info Disclosure
CVSS 5.5
Microsoft SQL Server Management Studio <18 - Info Disclosure
CVSS 5.5
Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
Microsoft Windows - Contact File Format Arbitary Code Execution (Metasploit)
Microsoft Windows - XRM-MS File NTLM Information Disclosure Spoofing
Microsoft Windows .Reg File - Dialog Spoof / Mitigation Bypass
Microsoft Windows cmd.exe - Stack Buffer Overflow
Microsoft Windows CONTACT - HTML Injection / Remote Code Execution