John Page (aka hyp3rlinx)
88 exploits
Active since Oct 2017
Microsoft Windows CONTACT - Remote Code Execution
Microsoft Windows Defender - Detection Mitigation Bypass TrojanWin32Powessere.G
Microsoft Windows Defender - Detections Bypass
Microsoft Windows Defender / Trojan.Win32/Powessere.G - Detection Mitigation Bypass
Microsoft Windows NTFS - Privileged File Access Enumeration
Microsoft Windows VCF - Remote Code Execution
HP System Event Utility <1.4.33 - RCE
CVSS 7.8
Enhanced Mitigation Experience Toolkit (EMET) - XML External Entity Injection
Segger Embos/ip FTP Server - Improper Input Validation
CVSS 7.5
Weblogexpert Weblog Expert - Resource Allocation Without Limits
CVSS 7.5
Trend Micro OfficeScan <11.0 - Memory Corruption
CVSS 9.8
Softros Network Time System - Improper Input Validation
CVSS 7.5
Microsoft Windows PowerShell - Unsanitized Filename Command Execution
Microsoft Windows - '.reg' File / Dialog Box Message Spoofing
Microsoft Compiled HTML Help / Uncompiled .chm File - XML External Entity Injection
Microsoft Internet Explorer 11.371.16299.0 (Windows 10) - Denial Of Service
Hosting Controller HC10 10.14 - DoS
CVSS 7.5
Avaya IP Office Contact Center - Memory Corruption
CVSS 8.8
Advantig Dualdesk - Improper Input Validation
CVSS 7.5
Cisco Advanced Malware Protection For Endpoints - Denial of Service
CVSS 5.5
BarcodeWiz ActiveX Control < 6.7 - Buffer Overflow (PoC)
Abyss Web Server < 2.11.6 - Heap Memory Corruption
Trend Micro OfficeScan <11.0 - Info Disclosure
CVSS 5.3
Trend Micro OfficeScan 11.0/XG (12.0) - Server Side Request Forgery
Trend Micro OfficeScan 11.0 - Info Disclosure
CVSS 7.5