what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files from Kevin Randall

Email addresskrandall2013 at gmail.com
First Active2018-04-01
Last Active2022-04-11
Razer Sila 2.0.418 Command Injection
Posted Apr 11, 2022
Authored by Kevin Randall

Razer Sila versions 2.0.441_api through 2.0.418 suffer from a command injection vulnerability.

tags | exploit
SHA-256 | 8d4dce671307b0506af35d07cd539a18cb3de819355fd82c5a8446f004bff643
Razer Sila 2.0.418 Local File Inclusion
Posted Apr 11, 2022
Authored by Kevin Randall

Razer Sila versions 2.0.441_api through 2.0.418 suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 6363e3e4801fa8c1578d66fb8a359d85cf16f7ebcee3a51f79ee9dadf54e6098
QSC Q-SYS Core Manager 8.2.1 Directory Traversal
Posted Oct 26, 2020
Authored by Kevin Randall

QSC Q-SYS Core Manager version 8.2.1 suffers from a TFTP related directory traversal vulnerability.

tags | advisory, file inclusion
advisories | CVE-2020-24990
SHA-256 | 76bf0314b2878aee4c5683f5b47353493f1439a510c2c3ba7b37d2f9048e5adb
Netgear R6400 Remote Code Execution
Posted Dec 17, 2019
Authored by Kevin Randall

Netgear R6400 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
advisories | CVE-2016-6277
SHA-256 | dc37f508765fd18731309c947c77f4cb7d01525cccdea9c0cc47571fdcb7f589
Lexmark Services Monitor 2.27.4.0.39 Directory Traversal
Posted Nov 18, 2019
Authored by Kevin Randall

Lexmark Services Monitor version 2.27.4.0.39 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2019-16758
SHA-256 | c53c0302aae4b649e7aeba4f2bef26ca8ef3a1e6b142720e59503967cffecdfd
CoreFTP Server MDTM Directory Traversal
Posted Aug 23, 2019
Authored by Kevin Randall | Site metasploit.com

An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. Using the MDTM FTP command, a remote attacker can use a directory traversal (..\..\) to browse outside the root directory to determine the existence of a file on the operating system, and the last modified date.

tags | exploit, remote, root, file inclusion
advisories | CVE-2019-9649
SHA-256 | 02a55797ad317b26e2c3f852933ef7c93cfeefe8fa481fb85daa30044a0ac1f7
CoreFTP Server SIZE Directory Traversal
Posted Aug 23, 2019
Authored by Kevin Randall | Site metasploit.com

An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. A directory traversal vulnerability exists using the SIZE command along with a \..\..\ substring, allowing an attacker to enumerate file existence based on the returned information.

tags | exploit, file inclusion
advisories | CVE-2019-9648
SHA-256 | 55d5c601f24989f0cd87c1d30f3e4d2e24da10d2ffdf9b41b6aeffd9d3a3e8cc
DVD X Player 5.5 Pro Local Buffer Overflow
Posted Jun 4, 2019
Authored by Kevin Randall

DVD X Player version 5.5 Pro suffers from a local buffer overflow vulnerability.

tags | exploit, overflow, local
SHA-256 | 025358a4ff28df7e6401821b90e6962f2406b70bbc38f1a90b7b40ea467f4502
Freefloat FTP Server 1.0 STOR Buffer Overflow
Posted Apr 30, 2019
Authored by Kevin Randall

Freefloat FTP Server version 1.0 suffers from a STOR remote buffer overflow vulnerability.

tags | exploit, remote, overflow
SHA-256 | 5ace81317af651efd44942f8b4bda80940a213f47e4a743b250a8d4ae5cfb76f
Freefloat FTP Server 1.0 SIZE Buffer Overflow
Posted Apr 30, 2019
Authored by Kevin Randall

Freefloat FTP Server version 1.0 suffers from a SIZE remote buffer overflow vulnerability.

tags | exploit, remote, overflow
SHA-256 | 583fd9120564a7a4274686a33c4957d70e7f4225537eb7b6cd60ae7f8a6491b4
Titan FTP Server 2019 Build 3505 Directory Traversal
Posted Mar 27, 2019
Authored by Kevin Randall

Titan FTP Server 2019 build 3505 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2019-10009
SHA-256 | 8e3e98d88206deab4585f5cf3c2e19aaef14d402496a5f04fa0479e7b564ef81
CoreFTP Server FTP / SFTP Server 2 Build 674 MDTM Directory Traversal
Posted Mar 11, 2019
Authored by Kevin Randall

CoreFTP Server FTP and SFTP Server version 2 build 674 suffer from a directory traversal vulnerability. By utilizing a directory traversal along with the FTP MDTM command, an attacker can browse outside the root directory to determine if a file exists based on return file size along with the date the file was last modified by using a ..\..\ technique.

tags | exploit, root
advisories | CVE-2019-9649
SHA-256 | 3fc201ddb80ecf5d371328f76f120d416014c22afdf01a082fc0fd2b76a60e8a
CoreFTP Server FTP / SFTP Server 2 Build 674 SIZE Directory Traversal
Posted Mar 11, 2019
Authored by Kevin Randall

CoreFTP Server FTP and SFTP Server version 2 build 674 suffer from a directory traversal vulnerability. By utilizing a directory traversal along with the FTP SIZE command, an attacker can browse outside the root directory to determine if a file exists based on return file size by using a ..\..\ technique.

tags | exploit, root, file inclusion
advisories | CVE-2019-9648
SHA-256 | 37bbdbe7891d4945d5ffae270f56ee38468766fc65923b032489c8574e7b1953
D-Link DIR-601 2.02NA Privilege Escalation
Posted Aug 28, 2018
Authored by Kevin Randall

D-Link DIR-601 version 2.02NA suffers from a privilege escalation vulnerability.

tags | advisory
advisories | CVE-2018-12710
SHA-256 | 33474835141701c30736e8087db9ef916d7adae2878081c9250a53fa48299500
D-Link DIR-890L A2 Improper Access Control
Posted Jul 2, 2018
Authored by Kevin Randall

An issue was discovered on D-Link DIR-890L A2 devices. Due to the predictability of the /docs/captcha_(number).jpeg URI, being local to the network, but unauthenticated to the administrator's panel, an attacker can disclose the CAPTCHAs used by the access point and can elect to load the CAPTCHA of their choosing, leading to unauthorized login attempts to the access point.

tags | advisory, local, bypass
advisories | CVE-2018-12103
SHA-256 | 8acb847f07e8c2e49d3d517591f2ed4886971da5555d91abe3f74c0cef383bfe
D-Link DIR-601 Admin Password Disclosure
Posted Apr 1, 2018
Authored by Kevin Randall

D-Link DIR-601 suffers from an administrative password disclosure vulnerability.

tags | exploit, info disclosure
advisories | CVE-2018-5708
SHA-256 | cf50539f5e3dfb67788edd38d8ba3c2387b46ed16ea384404df01adc959569b7
Page 1 of 1
Back1Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    15 Files
  • 28
    Jun 28th
    14 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close