Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
8.8
CVSSv3
CVE-2013-3629
Published: 07/02/2020 Updated: 10/02/2020
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Vulnerability Summary
ISPConfig 3.0.5.2 has Arbitrary PHP Code Execution
Subscribe to Ispconfig
Vulnerability Trend
Vulnerable Product
Search on Vulmon
Subscribe to Product
ispconfig ispconfig 3.0.5.2
Exploits
Exploit DB: ISPConfig - (Authenticated) Arbitrary PHP Code Execution (Metasploit)
## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit4 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'IS ...
References
NVD-CWE-Other
http://www.exploit-db.com/exploits/29322
https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats
http://www.securityfocus.com/bid/63455
https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one
https://nvd.nist.gov
https://www.exploit-db.com/exploits/29322/
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started