hyp3rlinx

260 exploits Active since Jun 2015
EIP-2026-117564 EXPLOITDB text WORKING POC
Microsoft Windows Defender - Detection Mitigation Bypass TrojanWin32Powessere.G
EIP-2026-117544 EXPLOITDB text WORKING POC
Microsoft Windows - XRM-MS File NTLM Information Disclosure Spoofing
EIP-2026-117545 EXPLOITDB text WRITEUP
Microsoft Windows .Group File - Code Execution
EIP-2026-117565 EXPLOITDB text WORKING POC
Microsoft Windows Defender - Detections Bypass
EIP-2026-117546 EXPLOITDB text WRITEUP
Microsoft Windows .Reg File - Dialog Spoof / Mitigation Bypass
EIP-2026-117502 EXPLOITDB text WORKING POC
Microsoft MSINFO32.EXE 6.1.7601 - '.NFO' XML External Entity Injection
EIP-2026-117507 EXPLOITDB text WORKING POC
Microsoft PowerShell - XML External Entity Injection
EIP-2026-117500 EXPLOITDB text WORKING POC
Microsoft Internet Explorer 11 - XML External Entity Injection
CVE-2018-8527 EXPLOITDB MEDIUM text WORKING POC
Microsoft SQL Server Management Studio <18.0 - Info Disclosure
An information disclosure vulnerability exists in Microsoft SQL Server Management Studio (SSMS) when parsing a malicious XEL file containing a reference to an external entity, aka "SQL Server Management Studio Information Disclosure Vulnerability." This affects SQL Server Management Studio 17.9, SQL Server Management Studio 18.0. This CVE ID is unique from CVE-2018-8532, CVE-2018-8533.
CVSS 5.5
EIP-2026-117439 EXPLOITDB python WORKING POC
MakeSFX.exe 1.44 - Local Stack Buffer Overflow
EIP-2026-117491 EXPLOITDB text WORKING POC
Microsoft Game Definition File Editor 6.3.9600 - XML External Entity Injection
CVE-2018-8532 EXPLOITDB MEDIUM text WORKING POC
Microsoft SQL Server Management Studio <18.0 - Info Disclosure
An information disclosure vulnerability exists in Microsoft SQL Server Management Studio (SSMS) when parsing a malicious XMLA file containing a reference to an external entity, aka "SQL Server Management Studio Information Disclosure Vulnerability." This affects SQL Server Management Studio 17.9, SQL Server Management Studio 18.0. This CVE ID is unique from CVE-2018-8527, CVE-2018-8533.
CVSS 5.5
EIP-2026-117566 EXPLOITDB text WORKING POC
Microsoft Windows Defender / Trojan.Win32/Powessere.G - Detection Mitigation Bypass
EIP-2026-117497 EXPLOITDB text WORKING POC
Microsoft Internet Explorer / ActiveX Control - Security Bypass
EIP-2026-116896 EXPLOITDB python WORKING POC
Blat 2.7.6 SMTP / NNTP Mailer - Local Buffer Overflow
EIP-2026-116937 EXPLOITDB text WORKING POC
CAM UnZip 5.1 - .'ZIP' File Directory Traversal
CVE-2017-3141 EXPLOITDB HIGH text WRITEUP
ISC Bind < 9.2.9 - Privilege Escalation
The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1.
CVSS 7.2
CVE-2016-8742 EXPLOITDB HIGH text WRITEUP
Apache CouchDB <2.0.0 - Privilege Escalation
The Windows installer that the Apache CouchDB team provides was vulnerable to local privilege escalation. All files in the install inherit the file permissions of the parent directory and therefore a non-privileged user can substitute any executable for the nssm.exe service launcher, or CouchDB batch or binary files. A subsequent service or server restart will then run that binary with administrator privilege. This issue affected CouchDB 2.0.0 (Windows platform only) and was addressed in CouchDB 2.0.0.1.
CVSS 7.8
CVE-2018-10655 EXPLOITDB HIGH text WORKING POC
DeviceLock Plug and Play Auditor <5.72 - Buffer Overflow
DLPnpAuditor.exe in DeviceLock Plug and Play Auditor (freeware) 5.72 has a Unicode Buffer Overflow (SEH).
CVSS 7.8
EIP-2026-117283 EXPLOITDB text WRITEUP
HP TouchSmart Calendar 4.1.4245 - Insecure File Permissions Privilege Escalation
CVE-2015-7422 EXPLOITDB MEDIUM text WORKING POC
IBM i Access 7.1 - DoS
Buffer overflow in IBM i Access 7.1 on Windows allows local users to cause a denial of service (application crash) via unspecified vectors.
CVSS 5.5
CVE-2019-18915 EXPLOITDB HIGH text WRITEUP
HP System Event Utility <1.4.33 - RCE
A potential security vulnerability has been identified with certain versions of HP System Event Utility prior to version 1.4.33. This vulnerability may allow a local attacker to execute arbitrary code via an HP System Event Utility system service.
CVSS 7.8
EIP-2026-117316 EXPLOITDB python WORKING POC
IKEView R60 - Local Buffer Overflow (SEH)
EIP-2026-117130 EXPLOITDB text WORKING POC
Enhanced Mitigation Experience Toolkit (EMET) - XML External Entity Injection
EIP-2026-117217 EXPLOITDB python WORKING POC
FTPShell Client 5.24 - Local Buffer Overflow