hyp3rlinx

260 exploits Active since Jun 2015
CVE-2018-12589 EXPLOITDB HIGH c WORKING POC
Polaris Office 2017 8.1 - RCE
Polaris Office 2017 8.1 allows attackers to execute arbitrary code via a Trojan horse puiframeworkproresenu.dll file in the current working directory.
CVSS 7.8
EIP-2026-119076 EXPLOITDB text WORKING POC
Rapid PHP Editor 14.1 - Remote Command Execution
CVE-2017-14084 EXPLOITDB HIGH text WRITEUP
Trend Micro OfficeScan <11.0 - RCE
A potential Man-in-the-Middle (MitM) attack vulnerability in Trend Micro OfficeScan 11.0 and XG may allow attackers to execute arbitrary code on vulnerable installations.
CVSS 8.1
CVE-2017-9024 EXPLOITDB HIGH text WORKING POC
Secure Bytes SCA 3.0 - Path Traversal
Secure Bytes Cisco Configuration Manager, as bundled in Secure Bytes Secure Cisco Auditor (SCA) 3.0, has a Directory Traversal issue in its TFTP Server, allowing attackers to read arbitrary files via ../ sequences in a pathname.
CVSS 7.5
CVE-2017-6805 EXPLOITDB MEDIUM text WORKING POC
MobaXterm Personal Edition 9.4 - Path Traversal
Directory traversal vulnerability in the TFTP server in MobaXterm Personal Edition 9.4 allows remote attackers to read arbitrary files via a .. (dot dot) in a GET command.
CVSS 5.3
CVE-2017-11567 EXPLOITDB HIGH text WORKING POC
Mongoose Web Server <6.9 - CSRF
Cross-site request forgery (CSRF) vulnerability in Mongoose Web Server before 6.9 allows remote attackers to hijack the authentication of users for requests that modify Mongoose.conf via a request to __mg_admin?save. NOTE: this issue can be leveraged to execute arbitrary code remotely.
CVSS 8.8
EIP-2026-118871 EXPLOITDB text WORKING POC
Microsoft Windows - 'dnslint.exe' Drive-By Download
EIP-2026-118783 EXPLOITDB text WORKING POC
Microsoft DirectX SDK - 'Xact.exe' Remote Code Execution
EIP-2026-118755 EXPLOITDB text WORKING POC
Mako Web Server 2.5 - Multiple Vulnerabilities
CVE-2019-13577 EXPLOITDB CRITICAL text WORKING POC
MAPLE WBT SNMP Admin <2.0.195.15 - Buffer Overflow
SnmpAdm.exe in MAPLE WBT SNMP Administrator v2.0.195.15 has an Unauthenticated Remote Buffer Overflow via a long string to the CE Remote feature listening on Port 987.
CVSS 9.8
EIP-2026-118885 EXPLOITDB text WORKING POC
Microsoft Windows PowerShell ISE - Remote Code Execution
CVE-2018-6892 EXPLOITDB CRITICAL ruby WORKING POC
Cloudme Sync < 1.10.9 - Memory Corruption
An issue was discovered in CloudMe before 1.11.0. An unauthenticated remote attacker that can connect to the "CloudMe Sync" client application listening on port 8888 can send a malicious payload causing a buffer overflow condition. This will result in an attacker controlling the program's execution flow and allowing arbitrary code execution.
CVSS 9.8
CVE-2018-6892 EXPLOITDB CRITICAL python WORKING POC
Cloudme Sync < 1.10.9 - Memory Corruption
An issue was discovered in CloudMe before 1.11.0. An unauthenticated remote attacker that can connect to the "CloudMe Sync" client application listening on port 8888 can send a malicious payload causing a buffer overflow condition. This will result in an attacker controlling the program's execution flow and allowing arbitrary code execution.
CVSS 9.8
EIP-2026-118450 EXPLOITDB text WORKING POC
DzSoft PHP Editor 4.2.7 - File Enumeration
CVE-2018-4863 EXPLOITDB MEDIUM text WORKING POC
Sophos Endpoint Protection - Security Feature Bypass
Sophos Endpoint Protection 10.7 allows local users to bypass an intended tamper protection mechanism by deleting the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Sophos Endpoint Defense\ registry key.
CVSS 5.5
CVE-2018-9233 EXPLOITDB HIGH text WRITEUP
Sophos Endpoint Protection 10.7 - Info Disclosure
Sophos Endpoint Protection 10.7 uses an unsalted SHA-1 hash for password storage in %PROGRAMDATA%\Sophos\Sophos Anti-Virus\Config\machine.xml, which makes it easier for attackers to determine a cleartext password, and subsequently choose unsafe malware settings, via rainbow tables or other approaches.
CVSS 7.8
CVE-2017-9355 EXPLOITDB HIGH text WORKING POC
Subsonic 6.1.1 - SSRF
XML external entity (XXE) vulnerability in the import playlist feature in Subsonic 6.1.1 might allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted XSPF playlist file.
CVSS 7.4
EIP-2026-117899 EXPLOITDB text WORKING POC
ScanGuard Antivirus 2020 - Insecure Folder Permissions
CVE-2017-11309 EXPLOITDB CRITICAL text WORKING POC
Avaya IP Office < 10.1.1 - Memory Corruption
Buffer overflow in the SoftConsole client in Avaya IP Office before 10.1.1 allows remote servers to execute arbitrary code via a long response.
CVSS 9.6
CVE-2017-6331 EXPLOITDB HIGH c WORKING POC
Symantec Endpoint Protection <SEP 14 RU1 - Privilege Escalation
Prior to SEP 14 RU1 Symantec Endpoint Protection product can encounter an issue of Tamper-Protection Bypass, which is a type of attack that bypasses the real time protection for the application that is run on servers and clients.
CVSS 7.1
EIP-2026-118197 EXPLOITDB text WORKING POC
Zend Studio IDE 13.5.1 - Insecure File Permissions Privilege Escalation
CVE-2022-47529 EXPLOITDB MEDIUM text WORKING POC
RSA NetWitness <12.2 - Privilege Escalation
Insecure Win32 memory objects in Endpoint Windows Agents in RSA NetWitness Platform before 12.2 allow local and admin Windows user accounts to modify the endpoint agent service configuration: to either disable it completely or run user-supplied code or commands, thereby bypassing tamper-protection features via ACL modification.
CVSS 6.7
EIP-2026-118027 EXPLOITDB text WRITEUP
Trend Micro OfficeScan 11.0/XG (12.0) - Image File Execution Bypass
CVE-2018-10507 EXPLOITDB MEDIUM text WRITEUP
Trend Micro OfficeScan <11.0 SP1 - Privilege Escalation
A vulnerability in Trend Micro OfficeScan 11.0 SP1 and XG could allow a attacker to take a series of steps to bypass or render the OfficeScan Unauthorized Change Prevention inoperable on vulnerable installations. An attacker must already have administrator privileges in order to exploit this vulnerability.
CVSS 4.4
CVE-2018-7581 EXPLOITDB HIGH text WRITEUP
Weblogexpert Weblog Expert - Incorrect Permission Assignment
\ProgramData\WebLog Expert\WebServer\WebServer.cfg in WebLog Expert Web Server Enterprise 9.4 has weak permissions (BUILTIN\Users:(ID)C), which allows local users to set a cleartext password and login as admin.
CVSS 7.8