hyp3rlinx

260 exploits Active since Jun 2015
CVE-2024-51463 EXPLOITDB MEDIUM text WRITEUP
I - SSRF
IBM i 7.3, 7.4, and 7.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.
CVSS 5.4
CVE-2024-51464 EXPLOITDB MEDIUM text WRITEUP
IBM i <7.6 - Auth Bypass
IBM i 7.3, 7.4, and 7.5 is vulnerable to bypassing Navigator for i interface restrictions. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to remotely perform operations that the user is not allowed to perform when using Navigator for i.
CVSS 4.3
EIP-2026-104275 EXPLOITDB text WRITEUP
Hawkeye-G 3.0.1.4912 - Persistent Cross-Site Scripting / Information Leakage
CVE-2015-2878 EXPLOITDB HIGH text WORKING POC
Hexis HawkEye G 3.0.1.4912 - CSRF
Multiple cross-site request forgery (CSRF) vulnerabilities in Hexis HawkEye G 3.0.1.4912 allow remote attackers to hijack the authentication of administrators for requests that (1) add arbitrary accounts via the name parameter to interface/rest/accounts/json; turn off the (2) Url matching, (3) DNS Inject, or (4) IP Redirect Sensor in a request to interface/rest/dpi/setEnabled/1; or (5) perform whitelisting of malware MD5 hash IDs via the id parameter to interface/rest/md5-threats/whitelist.
CVSS 8.8
EIP-2026-104241 EXPLOITDB text WORKING POC
Ericom Access Server x64 9.2.0 - Server-Side Request Forgery
EIP-2026-103921 EXPLOITDB python WORKING POC
HFS Http File Server 2.3m Build 300 - Buffer Overflow (PoC)
EIP-2026-104225 EXPLOITDB text WORKING POC
dotDefender Firewall 5.00.12865/5.13-13282 - Cross-Site Request Forgery
CVE-2020-7030 EXPLOITDB MEDIUM text WRITEUP
Avaya IP Office < 10.1.0.7 - Information Disclosure
A sensitive information disclosure vulnerability was discovered in the web interface component of IP Office that may potentially allow a local user to gain unauthorized access to the component. Affected versions of IP Office include: 9.x, 10.0 through 10.1.0.7 and 11.0 though 11.0.4.3.
CVSS 5.5
CVE-2017-10974 EXPLOITDB HIGH text WORKING POC
Yaws - Path Traversal
Yaws 1.91 allows Unauthenticated Remote File Disclosure via HTTP Directory Traversal with /%5C../ to port 8080. NOTE: this CVE is only about use of an initial /%5C sequence to defeat traversal protection mechanisms; the initial /%5C sequence was apparently not discussed in earlier research on this product.
CVSS 7.5
CVE-2024-25735 EXPLOITDB CRITICAL text WORKING POC
WyreStorm Apollo VX20 - Information Disclosure
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can discover cleartext passwords via a SoftAP /device/config GET request.
CVSS 9.1
CVE-2024-25734 EXPLOITDB HIGH text WRITEUP
Wyrestorm Apollo Vx20 Firmware < 1.3.58 - Information Disclosure
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. The TELNET service prompts for a password only after a valid username is entered, which might make it easier for remote attackers to enumerate user accounts.
CVSS 7.5
EIP-2026-104109 EXPLOITDB text WORKING POC
Trend Micro Deep Discovery Inspector IDS - Security Bypass
CVE-2024-25736 EXPLOITDB HIGH text WORKING POC
Wyrestorm Apollo Vx20 Firmware < 1.3.58 - Improper Access Control
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can restart the device via a /device/reboot GET request.
CVSS 7.5
CVE-2017-5473 EXPLOITDB HIGH text WORKING POC
Ntopng < 2.4 - CSRF
Cross-site request forgery (CSRF) vulnerability in ntopng through 2.4 allows remote attackers to hijack the authentication of arbitrary users, as demonstrated by admin/add_user.lua, admin/change_user_prefs.lua, admin/delete_user.lua, and admin/password_reset.lua.
CVSS 8.8
EIP-2026-103180 EXPLOITDB ruby WORKING POC
op5 7.1.9 - Configuration Command Execution (Metasploit)
CVE-2016-4314 EXPLOITDB MEDIUM text WORKING POC
WSO2 Carbon 4.4.5 - Path Traversal
Directory traversal vulnerability in the LogViewer Admin Service in WSO2 Carbon 4.4.5 allows remote authenticated administrators to read arbitrary files via a .. (dot dot) in the logFile parameter to downloadgz-ajaxprocessor.jsp.
CVSS 4.9
CVE-2015-7347 EXPLOITDB MEDIUM text WORKING POC
Zcms - XSS
Cross-site scripting (XSS) vulnerability in ZCMS JavaServer Pages Content Management System 1.1.
CVSS 4.8
CVE-2016-4312 EXPLOITDB HIGH text WORKING POC
WSO2 Identity Server <5.1.0 - SSRF
XML external entity (XXE) vulnerability in the XACML flow feature in WSO2 Identity Server 5.1.0 before WSO2-CARBON-PATCH-4.4.0-0231 allows remote authenticated users with access to XACML features to read arbitrary files, cause a denial of service, conduct server-side request forgery (SSRF) attacks, or have unspecified other impact via a crafted XACML request to entitlement/eval-policy-submit.jsp. NOTE: this issue can be combined with CVE-2016-4311 to exploit the vulnerability without credentials.
CVSS 7.5
CVE-2016-4316 EXPLOITDB MEDIUM text WORKING POC
WSO2 Carbon 4.4.5 - XSS
Multiple cross-site scripting (XSS) vulnerabilities in WSO2 Carbon 4.4.5 allow remote attackers to inject arbitrary web script or HTML via the (1) setName parameter to identity-mgt/challenges-mgt.jsp; the (2) webappType or (3) httpPort parameter to webapp-list/webapp_info.jsp; the (4) dsName or (5) description parameter to ndatasource/newdatasource.jsp; the (6) phase parameter to viewflows/handlers.jsp; or the (7) url parameter to ndatasource/validateconnection-ajaxprocessor.jsp.
CVSS 6.1
CVE-2016-4315 EXPLOITDB MEDIUM text WORKING POC
WSO2 Carbon 4.4.5 - CSRF
Cross-site request forgery (CSRF) vulnerability in WSO2 Carbon 4.4.5 allows remote attackers to hijack the authentication of privileged users for requests that shutdown a server via a shutdown action to server-admin/proxy_ajaxprocessor.jsp.
CVSS 5.7
CVE-2015-6945 EXPLOITDB text WORKING POC
Jsp/mysql Administrador Web - XSS
Cross-site scripting (XSS) vulnerability in JSP/MySQL Administrador Web 1 allows remote attackers to inject arbitrary web script or HTML via the bd parameter to sys/sys/listaBD2.jsp.
EIP-2026-102519 EXPLOITDB text WRITEUP
Openfire 3.10.2 - Unrestricted Arbitrary File Upload
EIP-2026-102518 EXPLOITDB text WRITEUP
Openfire 3.10.2 - Remote File Inclusion
CVE-2015-7707 EXPLOITDB text WORKING POC
Ignite Realtime Openfire 3.10.2 - Privilege Escalation
Ignite Realtime Openfire 3.10.2 allows remote authenticated users to gain administrator access via the isadmin parameter to user-edit-form.jsp.
CVE-2015-6972 EXPLOITDB text WRITEUP
Igniterealtime Openfire - XSS
Multiple cross-site scripting (XSS) vulnerabilities in Ignite Realtime Openfire 3.10.2 allow remote attackers to inject arbitrary web script or HTML via the (1) groupchatName parameter to plugins/clientcontrol/create-bookmark.jsp; the (2) urlName parameter to plugins/clientcontrol/create-bookmark.jsp; the (3) hostname parameter to server-session-details.jsp; or the (4) search parameter to group-summary.jsp.