KevinRandall1337

5 exploits Active since Mar 2018
CVE-2018-5708 GITHUB HIGH NO CODE
D-Link DIR-601 B1 2.02NA - Info Disclosure
An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator's panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is displayed in XML.
CVSS 8.0
CVE-2019-10009 GITHUB MEDIUM NO CODE
Titan FTP Server 2019 Build 3505 - Path Traversal
A Directory Traversal issue was discovered in the Web GUI in Titan FTP Server 2019 Build 3505. When an authenticated user attempts to preview an uploaded file (through PreviewHandler.ashx) by using a \..\..\ technique, arbitrary files can be loaded in the server response outside the root directory.
CVSS 6.5
CVE-2019-16758 GITHUB HIGH NO CODE
Lexmark Services Monitor <2.27.4.0.39 - Path Traversal
In Lexmark Services Monitor 2.27.4.0.39 (running on TCP port 2070), a remote attacker can use a directory traversal technique using /../../../ or ..%2F..%2F..%2F to obtain local files on the host operating system.
CVSS 7.5
CVE-2019-9648 GITHUB MEDIUM NO CODE
Core FTP <2.0 Build 674 - Path Traversal
An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. A directory traversal vulnerability exists using the SIZE command along with a \..\..\ substring, allowing an attacker to enumerate file existence based on the returned information.
CVSS 5.3
CVE-2019-9649 GITHUB MEDIUM NO CODE
Core FTP <2.0 Build 674 - Info Disclosure
An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. Using the MDTM FTP command, a remote attacker can use a directory traversal technique (..\..\) to browse outside the root directory to determine the existence of a file on the operating system, and its last modified date.
CVSS 5.3