exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 338 RSS Feed

Files from hyp3rlinx

Email addressprivate
Websitehyp3rlinx.altervista.org
First Active2015-04-28
Last Active2024-02-19
View User Profile
Ericom Access Server 9.2.0 Server-Side Request Forgery
Posted Aug 22, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Ericom Access Server allows attackers to initiate SSRF requests making outbound connections to arbitrary hosts and TCP ports. Attackers, who can reach the AccessNow server can target internal systems that are behind firewalls that are typically not accessible. This can also be used to target third-party systems from the AccessNow server itself. Version 9.2.0 is affected.

tags | exploit, arbitrary, tcp
advisories | CVE-2020-24548
SHA-256 | be074654b32c8f5acc5a65ebfb2346bf9d5c96f828c3e11ce96a91c39d1bafef
Microsoft Windows MSHTA.EXE .HTA File XML Injection
Posted Jul 6, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Windows mshta.exe allows processing of XML external entities which can result in local data-theft and or program reconnaissance upon opening specially crafted HTA files.

tags | exploit, local
systems | windows
SHA-256 | c2f70b789eac66e7e0227b39147f2ee878460b9df5a5059f2aa17a51234cda97
HFS Http File Server 2.3m Build 300 Buffer Overflow
Posted Jun 8, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

HFS Http File Server version 2.3m build 300 suffers from a remote buffer overflow vulnerability that can lead to a denial of service.

tags | exploit, remote, web, denial of service, overflow
advisories | CVE-2020-13432
SHA-256 | c7ab5ba2d2663b28ffedb5d9db2e23328041d24057b118524685224b0d480c62
WinGate 9.4.1.5998 Insecure Permissions / Privilege Escalation
Posted Jun 5, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

WinGate version 9.4.1.5998 suffers from an insecure permissions vulnerability that allows for privilege escalation.

tags | exploit
advisories | CVE-2020-13866
SHA-256 | 2b5dfe00be1334114c04e743db783c3a3f1ad2d5004db2216f1ead8c50be8631
Avaya IP Office 11 Insecure Transit / Password Disclosure
Posted Jun 5, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Avaya IP Office versions 9.1.8.0 through 11 suffer from an insecure transit vulnerability that allows for password disclosure.

tags | exploit
advisories | CVE-2020-7030
SHA-256 | feed9ac59fa8c29769c827c9ab64c5533cc3930d33aaf789ed75c1605b9ace7e
CloudMe 1.11.2 SEH / DEP / ASLR Buffer Overflow
Posted May 20, 2020
Authored by hyp3rlinx, Xenofon Vassilakopoulos

CloudMe version 1.11.2 SEH / DEP / ASLR buffer overflow exploit. The original discovery of this vulnerability was by hyp3rlinx.

tags | exploit, overflow
SHA-256 | f9b36ce85715513e6297fe5545cc87bca3c5904d7f17206e43521ab4744650b8
CloudMe 1.11.2 Buffer Overflow
Posted Apr 27, 2020
Authored by hyp3rlinx, Andy Bowden

CloudMe version 1.11.2 buffer overflow proof of concept exploit. Original vulnerability discovered by hyp3rlinx.

tags | exploit, overflow, proof of concept
advisories | CVE-2018-6892
SHA-256 | ed65bed8b662b7e2d11fe184fc29b26b92fddd08fc3a706685a4125ca60acc16
Neowise CarbonFTP 1.4 Insecure Proprietary Password Encryption
Posted Apr 21, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Neowise CarbonFTP version 1.4 suffers from an insecure proprietary password encryption implementation. Second version of this exploit that is updated to work with Python 3.

tags | exploit, python
advisories | CVE-2020-6857
SHA-256 | 85cb5f2e3f8cc5c5c6046d113ad20c3b308549088088cf06664f3bfe93538150
netABuse Insufficient Windows Authentication Logic Scanner
Posted Apr 9, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw.

tags | exploit, tool
systems | windows
SHA-256 | 0c7c190bc3e955ffedd16a90504abb79b5245412afb286a43ee38af4ebf3a6c4
Microsoft Windows Net Use Insufficent Authentication
Posted Apr 6, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

The Windows "net use" network logon type-3 command does not prompt for authentication when the built-in Administrator account is enabled and both remote and originating systems suffer from password reuse. This also works as "standard" user but unfortunately we do not gain high integrity privileges. However, it opens the door and increases the attack surface if the box we laterally move to has other vulnerabilities present.

tags | exploit, remote, vulnerability
systems | windows
SHA-256 | 951dfb35f9a363b5e914b804355769c12f596ba4c1d0f4de84c1869765e684c7
Recon Informer
Posted Mar 30, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Recon-Informer is a basic real-time anti-reconnaissance detection tool for offensive security systems, useful for penetration testers. It runs on Windows/Linux and leverages scapy.

tags | tool
systems | linux, windows, unix
SHA-256 | 146ce8d8d2242cab323c77d566f77441925783b4b3a014f6c04050d000ff0ae7
HP System Event Utility Local Privilege Escalation
Posted Feb 12, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

The HP System Event service "HPMSGSVC.exe" will load an arbitrary EXE and execute it with SYSTEM integrity. HPMSGSVC.exe runs a background process that delivers push notifications. The problem is that the HP Message Service will load and execute any arbitrary executable named "Program.exe" if it is found in the user's c:\ drive.

tags | exploit, arbitrary
advisories | CVE-2019-18915
SHA-256 | bb1d3051684f78e6f20b0e7c0fac35b0688b7e5e924cc09e9446024ad1d60e8b
NTCrackPipe 2.0
Posted Feb 12, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

NTCrackPipe is a basic local Windows account cracking tool.

Changes: This version checks for account lockouts.
tags | tool, local, cracker
systems | windows
SHA-256 | 369ffc766bb6af146aedb08cf5932e5a672718d60587bd5577a06c772171cd8f
Neowise CarbonFTP 1.4 Insecure Proprietary Password Encryption
Posted Jan 20, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Neowise CarbonFTP version 1.4 suffers from an insecure proprietary password encryption implementation.

tags | exploit
advisories | CVE-2020-6857
SHA-256 | 860427dfdb6db41fffd3c10a92aede4d5de72be4b33b6d78f1ca5d953c68d971
Trend Micro Security (Consumer) Arbitrary Code Execution
Posted Jan 17, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Trend Micro Security can potentially allow an attacker to use a malicious program to escalate privileges to SYSTEM integrity and obtain persistence on a vulnerable system.

tags | exploit
advisories | CVE-2019-20357
SHA-256 | e85735c3e297446cefa2f372abec28e211d0a44ffa2d1cc7c2afff07bd24cd6b
Trend Micro Security 2019 Security Bypass Protected Service Tampering
Posted Jan 17, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Trend Micro Maximum Security is vulnerable to arbitrary code execution as it allows for creation of registry key to target a process running as SYSTEM. This can allow a malware to gain elevated privileges to take over and shutdown services that require SYSTEM privileges like Trend Micros "Asmp" service "coreServiceShell.exe" which does not allow Administrators to tamper with them. This could allow an attacker or malware to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. Note administrator privileges are required to exploit this vulnerability.

tags | exploit, arbitrary, registry, code execution
advisories | CVE-2019-19697
SHA-256 | 2bef0a7498592f26d2748979ed451cc8771185733de0a4a4c86834cf8e60b081
Microsoft Windows VCF Denial Of Service
Posted Jan 4, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Windows VCF cards do not properly sanitize email addresses allowing for HTML injection. A corrupt VCF card can cause all the users currently opened files and applications to be closed and their session to be terminated without requiring any accompanying attacker supplied code.

tags | exploit
systems | windows
SHA-256 | 23613acde96bc092834f853c7d6e424e24e1583a58842d20b61e423112829027
Microsoft Windows .Group File URL Field Code Execution
Posted Jan 1, 2020
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Windows suffers from a .group file code execution vulnerability that leverages the URL field.

tags | exploit, code execution
systems | windows
SHA-256 | 0cc8cf1ee01183130f5056a2c6b4777780caa9886d84996afb3457a57d7d5962
Microsoft Windows Media Center XML Injection
Posted Dec 4, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Windows Media Center suffers from an XML external entity injection vulnerability. This vulnerability was originally released back on December 4, 2016, yet remains unfixed.

tags | exploit
systems | windows
SHA-256 | 71f1d0e6eb8642b53c59fcde6fde7854e016c87218d242fece55f62a8f552da6
Microsoft Visual Studio 2008 Express IDE XML Injection
Posted Dec 2, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Visual Studio 2008 Express IDE suffers from an XML external entity injection vulnerability.

tags | exploit
SHA-256 | 2b347e3e3aa8c05872e5d91abda3e6e4738812564cc798a749efdc8982d35ec9
Microsoft Excel 2016 1901 Import Error XML Injection
Posted Nov 30, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Excel 2016 version 1901 suffers from an XML external entity injection vulnerability.

tags | exploit
SHA-256 | e44c33d8e03b25f973e061cc13989210104717a2cc6f7198f78cc1802ddf7ede
Max Secure Anti Virus Plus 19.0.4.020 Insecure Permissions
Posted Nov 30, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Max Secure Anti Virus Plus version 19.0.4.020 suffers from an insecure permission vulnerability.

tags | exploit, virus
advisories | CVE-2019-19382
SHA-256 | 76f4e179622075025b7eb99563a43f43d4f74eb445470abbb8a207a9f416a093
Xinet Elegant 6 Asset Library Web Interface 6.1.655 SQL Injection
Posted Nov 30, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

NAPC Xinet (interface) Elegant 6 Asset Library version 6.1.655 allows pre-authentication error-based SQL injection via the /elegant6/login LoginForm[username] field when double quotes are used.

tags | exploit, sql injection
advisories | CVE-2019-19245
SHA-256 | 861555c2816d3e8545ed29c5458dbc9afd6526714f4d2b3d853f8b78e2022d5d
ScanGuard Antivirus Insecure Permissions
Posted Nov 13, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Scanguard versions through 2019-11-12 on Windows has insecure permissions for the installation directory, leading to privilege escalation via a trojan horse executable file.

tags | exploit, trojan
systems | windows
advisories | CVE-2019-18895
SHA-256 | 12643e28158492899f52e92bbc5e77ba369893a4dd0a17e789ee127277138b91
Trend Micro Anti-Threat Toolkit (ATTK) 1.62.0.1218 Remote Code Execution
Posted Oct 20, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below suffer from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2019-9491
SHA-256 | 038bb3d0ceff9e12031ec2a31746a5ecf155f068a1c05d9fed3e640cb91241c8
Page 2 of 14
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close