Quentin Kaiser
16 exploits
Active since Jan 2017
Pulse Secure Desktop Client <9.0R5, <9.1R4 - Info Disclosure
CVSS 3.3
UBI Reader <0.8.0 - Path Traversal
CVSS 5.4
sviehb jefferson <0.4 - Path Traversal
CVSS 5.0
Nostromo nhttpd <1.9.6 - RCE
CVSS 9.8
Crestron Airmedia <1.6.0, <2.7.0 - RCE
CVSS 7.2
Cisco Rv110w Firmware < 1.2.2.1 - Out-of-Bounds Write
CVSS 9.8
Trend Micro Smart Protection Server <3.0.1330 - Command Injection
CVSS 8.8
Nostromo nhttpd <1.9.6 - RCE
CVSS 9.8
Eclipse Equinoxe OSGi Console - Command Execution (Metasploit)
Crestron Airmedia <1.6.0, <2.7.0 - RCE
CVSS 7.2
Hashicorp Consul - Remote Command Execution via Services API (Metasploit)
Hashicorp Consul - Remote Command Execution via Services API (Metasploit)
Hashicorp Consul - Remote Command Execution via Rexec (Metasploit)
Hashicorp Consul - Remote Command Execution via Rexec (Metasploit)
Cisco Rv110w Firmware < 1.2.2.1 - Out-of-Bounds Write
CVSS 9.8
Cisco Rv110w Firmware < 1.2.2.1 - Out-of-Bounds Write
CVSS 9.8