Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
6.5
CVSSv2
CVE-2013-3629
Published: 07/02/2020 Updated: 10/02/2020
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
Subscribe to Ispconfig
Vulnerability Summary
ISPConfig 3.0.5.2 has Arbitrary PHP Code Execution
Vulnerability Trend
Vulnerable Product
Search on Vulmon
Subscribe to Product
ispconfig ispconfig 3.0.5.2
Exploits
Exploit DB: ISPConfig - (Authenticated) Arbitrary PHP Code Execution (Metasploit)
## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit4 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'IS ...
References
NVD-CWE-Other
http://www.exploit-db.com/exploits/29322
https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats
http://www.securityfocus.com/bid/63455
https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one
https://nvd.nist.gov
https://www.exploit-db.com/exploits/29322/
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started