Hi5 brute forcing utility that takes in a wordlist and is written in Python.
20cf2a5a5f41c4cfd2d4f019909b942f71a216d787588a10944ce5e0148869dd
Some Hikvision Hybrid SAN products were vulnerable to multiple remote code execution (command injection) vulnerabilities, including reflected cross site scripting, Ruby code injection, classic and blind SQL injection resulting in remote code execution that allows an adversary to execute arbitrary operating system commands and more. However, an adversary must be on the same network to leverage this vulnerability to execute arbitrary commands.
9ef9e4e937841d3becdae9ba498b3199c7ac7dfcaea39831e8e5a468cd2d8f10
Hirschmann (Belden) BAT-C2 version 8.8.1.0R8 suffers from a remote authenticated command injection vulnerability.
902fa02d042cb42bf90b944d2600703447b836b6f9b4d286e2b0bca32793a471
Hospital Information System version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
fe66c661132cc964be237a78b59c37dd33812105a69f943e40034432ba9e37b1
HighCMS/HighPortal version 12.x appears to suffer from a remote SQL injection vulnerability.
11e531f865e4da1f04161aa0a4cb5e11bbe807e029d3818481e6c9fa1d18a1e6
Hikvision IP Camera has a backdoor where a magic string allows instant access regardless of authentication.
5f6dfb93637a2bf560169ca8d350af523d2b8bf97671349af8d90046510d15a5
This Metasploit module exploits an unauthenticated command injection in a variety of Hikvision IP cameras (CVE-2021-36260). The module inserts a command into an XML payload used with an HTTP PUT request sent to the /SDK/webLanguage endpoint, resulting in command execution as the root user. This module specifically attempts to exploit the blind variant of the attack. The module was successfully tested against an HWI-B120-D/W using firmware V5.5.101 build 200408. It was also tested against an unaffected DS-2CD2142FWD-I using firmware V5.5.0 build 170725. Please see the Hikvision advisory for a full list of affected products.
7bd3dd72f17285cba701691f5d8795c84e79f211db3e6ea8a840141f658935a5
Hikvision Web Server Build 210702 suffers from a command injection vulnerability.
6f3b4e5a9c425280adc8f7457f3b39a4875de53beec44c5e9cbfa151788ff314
Hi-Rez Studios version 5.1.6.3 suffers from an unquoted service path vulnerability.
de7c9809806942e28452d915a3d476ac59b3bc5a2c3b9401c1b037a98d6d2218
HiSilicon Video Encoder suffers from an unauthenticated RTSP buffer overflow vulnerability that can cause a denial of service condition.
054f4279dcc34fbe0b4cdad449a92669a39411bc6a4b267d596b6a41acf1b278
HiSilicon Video Encoder allows for full administrative access via a backdoor password. Versions affected are vendor specific.
dad3b25e442de546e872a7c92c276c593c79415ddcc20135aeba9dd94bdd1c02
HiSilicon Video Encoder suffers from a remote code execution vulnerability via an unauthenticated upload of malicious firmware. Versions affected are vendor specific.
384e22525b81d6f4822dbfd6fa1cdc9aecf7027e3c101cb17860228413f1a996
HiSilicon Video Encoder suffers from a remote command injection vulnerability. Versions affected are vendor specific.
aafacb19bd515d145364bc7d88da7249a61ab2490442a5ff54b6a6e8292dab6d
HiSilicon DVR/NVR with hi3520d firmware suffers from having a remote backdoor account vulnerability.
fb9c5743e89b20410d85556efda5278324665de203fa6f5a86bdf0bf1d11edd2
Hisilicon Hi3518 HD camera remote configuration disclosure exploit.
d8bd68d08d946df40f1b009e653a325e057d986782a9ab30f2c776b69da79d00
This is a tool that generates a Linux kernel module for custom rules with Netfilter hooking to block ports, run in hidden mode, perform rootkit functions, etc.
d0dc6f8136db21f01228d49ad0aaf1fb756fbd13cbc46d39483563c187f9fd7c
HID ActivID ActivClient version 7.1.0.202 appears to include the JasPer library for parsing JPEG 2000 facial images that may be present on PIV cards. It suffers from multiple denial of service conditions.
47c4613810ea8b2e7bc632eee27806dd5a0491ef7e14a343a6f8613b2e8ece1a
HID ActivID ActivClient version 7.1.0.202 may not enforce upper bounds on the size of data received from a smart card, which can lead to attacks such as memory exhaustion, or serve as a heap spraying primitive for other attacks against the software, albeit slowly.
8f152ff2c4f8e62b07f2d5b2c106633d4aa5a263ab60b54c6da64427b460e860
HighPortal version 12.5 suffers from a cross site scripting vulnerability.
dc3438488946e0c9472997dfce4da1dfe5cae5b34fbf0e8e172de192753810ae
This Metasploit module exploits an unauthenticated remote command execution vulnerability in the discoveryd service exposed by HID VertX and Edge door controllers. This Metasploit module was tested successfully on a HID Edge model EH400 with firmware version 2.3.1.603 (Build 04/23/2012).
8275f8758f70a2b7dda2edcb091aa489d7febf1014d2edabac321e0b6df40de0
A lack of validation on cookie values allows you to login as any user on hik-connect.com and ezvizlife.com.
640d9d5b8ed635a745527703397776a5bb9f02ecdcb9b198beddb96116636e81
Hikvision IP Camera versions 5.2.0 through 5.3.9 (builds 140721 up until 170109) suffer from an access control bypass vulnerability.
7af92b119967a688ba007849fccd93f43c5fcb2a0a609765db006f3999450a9f
Hipchat for Mac desktop client versions prior to 4.30 suffer from a remote code execution vulnerability.
8d4ee003b008842df1a8bbe4503c53d309960157148ffac1215331883d3d8291
Hipchat Data Center and Hipchat Server suffer from server-side request forgery and remote code execution vulnerabilities.
85ff28883c85d9d50aed28fb22e57f0ab765ebcb2f08baf9a4d008871ee54eb5
HikVision Wi-Fi IP cameras come with a default SSID "davinci", with a setting of no WiFi encryption or authentication. Depending on the firmware version, there is no configuration option within the camera to turn off Wi-Fi. If a camera is deployed via wired ethernet, then the WiFi settings won't be adjusted, and a rogue AP with the SSID "davinci" can be associated to the camera to provide a new attack vector via WiFi to a wired network camera. Tested on firmware versions 5.3.0, 5.4.0, and 5.4.5 and model number DS-2CD2432F-IW.
f5308846195618c1d90deb701b32687a1044057024da5ebb8faa201a03647d06
Hikvision IP Cameras suffers from multiple access bypass vulnerabilities.
cabfbe910089852487e71438083c32d73028cf30f8bde18c0de76568a7647b30