John Page (aka hyp3rlinx)

88 exploits Active since Oct 2017
CVE-2017-14087 EXPLOITDB HIGH text WRITEUP
Trend Micro OfficeScan XG 12.0 - Host Header Injection
A Host Header Injection vulnerability in Trend Micro OfficeScan XG (12.0) may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages.
CVSS 7.5
CVE-2017-17055 EXPLOITDB CRITICAL text WORKING POC
Artica Web Proxy <3.06.112911 - XSS
Artica Web Proxy before 3.06.112911 allows remote attackers to execute arbitrary code as root by conducting a cross-site scripting (XSS) attack involving the username-form-id parameter to freeradius.users.php.
CVSS 9.0
EIP-2026-104959 EXPLOITDB text WORKING POC
Adminer 4.3.1 - Server-Side Request Forgery
CVE-2024-51463 EXPLOITDB MEDIUM text WRITEUP
I - SSRF
IBM i 7.3, 7.4, and 7.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.
CVSS 5.4
CVE-2017-16884 EXPLOITDB MEDIUM text WORKING POC
MistServer <2.13 - XSS
Cross-site scripting (XSS) vulnerability in MistServer before 2.13 allows remote attackers to inject arbitrary web script or HTML via vectors related to failed authentication requests alerts.
CVSS 6.1
CVE-2024-51464 EXPLOITDB MEDIUM text WRITEUP
IBM i <7.6 - Auth Bypass
IBM i 7.3, 7.4, and 7.5 is vulnerable to bypassing Navigator for i interface restrictions. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to remotely perform operations that the user is not allowed to perform when using Navigator for i.
CVSS 4.3
CVE-2024-25734 EXPLOITDB HIGH text WRITEUP
Wyrestorm Apollo Vx20 Firmware < 1.3.58 - Information Disclosure
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. The TELNET service prompts for a password only after a valid username is entered, which might make it easier for remote attackers to enumerate user accounts.
CVSS 7.5
CVE-2024-25735 EXPLOITDB CRITICAL text WORKING POC
WyreStorm Apollo VX20 - Information Disclosure
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can discover cleartext passwords via a SoftAP /device/config GET request.
CVSS 9.1
EIP-2026-104109 EXPLOITDB text WORKING POC
Trend Micro Deep Discovery Inspector IDS - Security Bypass
CVE-2024-25736 EXPLOITDB HIGH text WORKING POC
Wyrestorm Apollo Vx20 Firmware < 1.3.58 - Improper Access Control
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can restart the device via a /device/reboot GET request.
CVSS 7.5
CVE-2017-10273 EXPLOITDB MEDIUM text WRITEUP
Oracle Jdeveloper - Path Traversal
Vulnerability in the Oracle JDeveloper component of Oracle Fusion Middleware (subcomponent: Deployment). Supported versions that are affected are 11.1.1.7.0, 11.1.1.7.1, 11.1.1.9.0, 11.1.2.4.0, 12.1.3.0.0 and 12.2.1.2.0. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle JDeveloper executes to compromise Oracle JDeveloper. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle JDeveloper, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle JDeveloper accessible data as well as unauthorized read access to a subset of Oracle JDeveloper accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle JDeveloper. CVSS 3.0 Base Score 4.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:L).
CVSS 4.7
EIP-2026-101616 EXPLOITDB text WORKING POC
D-LINK Central WifiManager CWM-100 - Server-Side Request Forgery
CVE-2017-15646 EXPLOITDB MEDIUM text WORKING POC
Webmin < 1.850 - XSS
Webmin before 1.860 has XSS with resultant remote code execution. Under the 'Others/File Manager' menu, there is a 'Download from remote URL' option to download a file from a remote server. After setting up a malicious server, one can wait for a file download request and then send an XSS payload that will lead to Remote Code Execution, as demonstrated by an OS command in the value attribute of a name='cmd' input element.
CVSS 6.1