what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 150 of 338 RSS Feed

Files from hyp3rlinx

Email addressprivate
Websitehyp3rlinx.altervista.org
First Active2015-04-28
Last Active2024-02-19
View User Profile
MistServer 2.12 Cross Site Scripting
Posted Dec 1, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

MistServer version 2.12 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2017-16884
SHA-256 | 7e1d760031b967b3ff9794c2ea823970ed269df7706f78a82ecac79f44240d6a
Symantec Endpoint Protection 12.1.6 Tamper Protection Bypass
Posted Nov 12, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Symantec Endpoint Protection version 12.1.6 suffers from a tamper protection bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2017-6331
SHA-256 | fb2bdba6aaf5eaee7b0bcd2b259b1c8a74c039dc66fcf7b2c9ba691f4e274fa7
Mako Server 2.5 Command Injection
Posted Nov 8, 2017
Authored by hyp3rlinx | Site metasploit.com

This Metasploit module exploits a vulnerability found in Mako Server version 2.5. It's possible to inject arbitrary OS commands in the Mako Server tutorial page through a PUT request to save.lsp. Attacker input will be saved on the victims machine and can be executed by sending a GET request to manage.lsp.

tags | exploit, arbitrary
SHA-256 | 9653fa3b7a40469f97c0d038e59615a70577ff258af1a5831bce426a139bea21
Avaya IP Office (IPO) 10.1 Soft Console Remote Buffer Overflow
Posted Nov 5, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Avaya IP Office (IPO) versions 9.1.0 through 10.1 suffer from a soft console remote buffer overflow vulnerability.

tags | exploit, remote, overflow
advisories | CVE-2017-11309
SHA-256 | 11dd9b6695c54b23357d7ff81eab9a8ad0242b41b72044b3f70f760a0111e12e
Avaya IP Office (IPO) 10.1 Active-X Buffer Overflow
Posted Nov 5, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Avaya IP Office (IPO) versions 9.1.0 through 10.1 suffer from an active-x buffer overflow vulnerability.

tags | exploit, overflow, activex
advisories | CVE-2017-12969
SHA-256 | 7a763fcbbba221c4d0f3a6119bfab51308deda0cbd736da60d91585f0d089872
Microsoft Windows GDFMaker 6.3.9600.16384 XXE Injection
Posted Oct 18, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Windows Game Definition File Editor (GDFMaker) version 6.3.9600.16384 suffers from an XML external entity injection vulnerability.

tags | exploit, xxe
systems | windows
SHA-256 | 10f87d3d1b9071caa4665070b4aa0e2d5a5dea176d6602bf53f8a85c7ceff9c0
Webmin 1.850 SSRF / CSRF / Cross Site Scripting / Command Execution
Posted Oct 16, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Webmin version 1.850 suffers from server side request forgery, cross site request forgery, and cross site scripting vulnerabilities, the last of which can lead to remote command execution.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2017-15646, CVE-2017-15645, CVE-2017-15644
SHA-256 | d11573ef8f901da4b1c7a343b9844592c00e8cb689d9d4a889cdc4549e895f61
TrendMicro OfficeScan 11.0 / XG (12.0) Memory Corruption
Posted Oct 1, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a memory corruption vulnerability.

tags | exploit
advisories | CVE-2017-14089
SHA-256 | a3e63e809dd2f77a9acd338ac38043b79c71b205a4ebbe5fafecd0186aff1ce4
TrendMicro OfficeScan 11.0 / XG (12.0) Host Header Injection
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a host header injection vulnerability.

tags | exploit
advisories | CVE-2017-14087
SHA-256 | ca851dfdc30f3ca29be4beb58fda82f5431c4b58b939a638be47b4f47458dc25
TrendMicro OfficeScan 11.0 / XG (12.0) Server-Side Request Forgery
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a server-side request forgery vulnerability.

tags | exploit
SHA-256 | b78a20a2c968c75631e6990a1f7e972c823b375e7d86ef59f2be61b0a46109c1
TrendMicro OfficeScan 11.0 / XG (12.0) Information Disclosure
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from NT domain and PHP information disclosure vulnerabilities.

tags | exploit, php, vulnerability, info disclosure
advisories | CVE-2017-14085
SHA-256 | cbc24777efe60d495308e8e83b6aab3977c7f4ca4be577179c3bb0fd8a7ebf53
TrendMicro OfficeScan 11.0 / XG (12.0) Auth Start Code Execution
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from Start Remote Process code execution and denial of service vulnerabilities.

tags | exploit, remote, denial of service, vulnerability, code execution
advisories | CVE-2017-14086
SHA-256 | 6de08e124c8b1a0239b20e4fa1c2cbdf3e13a51ade31822cc0daeada5571141c
TrendMicro OfficeScan 11.0 / XG (12.0) Man-In-The-Middle
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a curl man-in-the-middle remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2017-14084
SHA-256 | a951ff568b5eb974a3fcb41787cccb1e6f0712ff17d8f8b55fbbe1162c616bf1
TrendMicro OfficeScan 11.0 / XG (12.0) XG Image File Execution Bypass
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from an XG image file execution bypass vulnerability.

tags | exploit, bypass
SHA-256 | 39feeb31db761809500aabac33bb9d824e3646b7a52d3c8c0735f44deefaf200
TrendMicro OfficeScan 11.0 / XG (12.0) Encryption Key Disclosure
Posted Sep 29, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

TrendMicro OfficeScan versions 11.0 and XG (12.0) suffer from a pre-authentication encryption key disclosure vulnerability.

tags | exploit
advisories | CVE-2017-14083
SHA-256 | 0300820dbf3c570f226bdcebb695752c98f73528c93322e27eaac142ce6d9feb
Mako Server SSRF / Disclosure / Code Execution
Posted Sep 15, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Mako Web Server suffers from file disclosure, remote command execution, and server-side request forgery vulnerabilities.

tags | exploit, remote, web, vulnerability
SHA-256 | 7772922a708fb50556c43e97af1adc13ce64566e4a2386554f32c4bb9f13fc20
Mongoose Web Server 6.5 CSRF / Command Execution
Posted Sep 5, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Mongoose Web Server version 6.5 suffers from cross site request forgery and remote command execution vulnerabilities.

tags | exploit, remote, web, vulnerability, csrf
advisories | CVE-2017-11567
SHA-256 | af456e0cd4668089706869d568399d104a8362a32934e00fb6ba9bc503227ed0
Apache2Triad 1.5.4 CSRF / XSS / Session Fixation
Posted Aug 21, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Apache2Triad version 1.5.4 suffers from session fixation, cross site request forgery, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2017-12965, CVE-2017-12970, CVE-2017-12971
SHA-256 | 8b8eebdfe33ae61532f0ab8b2beb38d3db0a8fc43dcbd93aa095cacc5a57b08e
Yaws 1.91 Unauthenticated Remote File Disclosure
Posted Jul 7, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Yaws version 1.91 suffers from an unauthenticated remote file disclosure vulnerability.

tags | exploit, remote
SHA-256 | 75629368ff456f6677d01b2c26f455cf606a3403736db99f79919f9e33af3230
Firefox 54.0.1 Denial Of Service
Posted Jul 7, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Firefox version 54.0.1 suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 3644ea8959431b6023ecedbd76add9ecd1247d5501ecede377afba4f441df58e
MySQL G0ld Brute Forcing Utility
Posted Jun 20, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

MySQL G0ld is a program that issues brute force attacks against a MySQL Server using a supplied wordlist.

tags | tool, cracker
systems | windows
SHA-256 | 299eef0e652415b8c1f3b2d435260b6ddfbe06b4ae900d2b7804cb6a236d4c68
BIND 9.10.5 Unquoted Service Path Privilege Escalation
Posted Jun 5, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

BIND version 9.10.5 for x86 and x64 on Windows suffers from an unquoted service path vulnerability that can allow for privilege escalation.

tags | exploit, x86
systems | windows
advisories | CVE-2017-3141
SHA-256 | 39bb02902250325dc8dcc1576f0306ade384ae1bdc0f1e5e1451e7fa784c9075
Subsonic 6.1.1 Persistent XSS
Posted Jun 3, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Remote attackers can abuse the "Subscribe to Podcast" feature of Subsonic 6.1.1 to store persistent XSS payloadsif an authenticated user clicks a malicious link or visits an attacker controlled webpage.

tags | exploit, remote, csrf
advisories | CVE-2017-9414
SHA-256 | ccbff854c80967e2cd461d551d2bbb45860d52ba6f9974d2d72d5544d987a48b
Subsonic 6.1.1 XML External Entity Attack
Posted Jun 3, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Subsonic 6.1.1 import playlist feature is susceptible to an XML External Entity attack via import of a malicious .XSPF playlist file.

tags | exploit, xxe
advisories | CVE-2017-9355
SHA-256 | 1785d67006592ca1aebed74e108868e2aadc2c36f565e3ed4e6a0527106e6ae0
Subsonic 6.1.1 Server Side Request Forgery
Posted Jun 3, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Remote attackers can abuse the Podcast feature of subsonic to launch Server Side Request Forgery attacks from the subsonic server if an authenticated user clicks a malicious link or visits an attacker controlled webpage.

tags | exploit, remote, csrf
advisories | CVE-2017-9413
SHA-256 | 4f9d59342482e64d296984fe2885074b7464963e5822f6ca6a1b83f9436de530
Page 6 of 14
Back45678Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close