655
VMScore

CVE-2013-3628

Published: 07/02/2020 Updated: 10/02/2020
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Zabbix 2.0.9 has an Arbitrary Command Execution Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zabbix zabbix 2.0.9

Exploits

# # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit4 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info={}) super(update_info(info, 'Name' =& ...

Github Repositories

Zabbox_WriteUp Starting with NMAP : Nmap done: 1 IP address (1 host up) scanned in 043 seconds root@kali:~/CTF# nmap -p- 10102875 -sV Starting Nmap 780 ( nmaporg ) at 2021-12-13 09:40 UTC Nmap scan report for ip-10-10-28-75eu-west-1computeinternal (10102875) Host is up (000048s latency) Not shown: 65528 closed ports PORT STATE SERVICE VERS