Email address | private |
---|---|
First Active | 2012-08-03 |
Last Active | 2016-09-07 |
FreePBX versions prior to 13.0.154 suffer from a remote command execution vulnerability.
319c000813d183950d7b33d2c579b62062547a307f38619721fde20f435e3458
Freepbx version 13.0.35 suffers from a remote SQL injection vulnerability.
f71cd00e2fd0cddbaa2279de836b448a9e77c13832747b5c8571efd07ff97030
Multiple ATCOM PBX systems suffer from an authentication bypass vulnerability.
8dfb3eca25689e91bfe4c801bf3df1163e8c3c7334d4429d6b0549a9c76936a3
This Metasploit module exploits a vulnerability found in FreePBX version 2.9, 2.10, and 2.11. It's possible to inject arbitrary PHP functions and commands in the "/admin/config.php" parameters "function" and "args".
1c02024d4a3f7042c08772f0fe212d3e817f272a686805a55db99a37717d3b29
Trixbox Pro suffers from a remote command execution vulnerability.
16c4989fd587dda06942b413211a881e0f52e9cf1be3fd56030a2eb7f44eab75
FreePBX versions before 2.3 suffer from a remote command execution vulnerability.
1b6ab5d6eea2edb5fba249fb2cfe50bfe3208ae7e99bf070ba3cfb23ec2b8e63
FreePBX 2.x suffers from a remote PHP code execution vulnerability due to a poor file validation methodology.
20c5cc704d10be24460de25cdb7eff337ee9976184e28a9640960869ae57d7d7
iScripts Support Desk version 4.1 suffers from local file disclosure, PHP info disclosure, and remote SQL injection vulnerabilities.
ffcd1cb4640b8a69da7b59123a421f1bc5a47d487d99e0d730b4d3d634ddabf1
iScripts Multicart suffers from multiple remote SQL injection vulnerabilities.
70d732cc05fd6cb35c128c592c7f8553d02c84c790c21194ec060a28e875d4cb
BuxAlert PTC remote SQL injection exploit.
fbd5da25bbec72925f7c66ded242e6c814ba92d70712e3aca5b01fb09b153928
Traidnt Upload 3 add administrator exploit that leverages cookie manipulation.
71cb85b322354b0b3edf1cefc39569e8aaab5712f81d8c66d63f919e11968d8b
iScripts AutoHoster suffers from file disclosure, PHP code injection, file disclosure, and remote SQL injection vulnerabilities.
e688d35feae61acb5dcdfa1966f1c4b19724883860f61ef17d40a6500a340e63
Hloun Support Management System version 3.0 suffers from authentication bypass and remote SQL injection vulnerabilities.
4036c3b54a9386a38fb0387988ef8098b48eb2d63998f2fa2f7cfbf8ad120412
Voipnow versions prior to 2.4 suffer from a local file inclusion vulnerability.
5f8b1e30f3b26f1cabfeb8f86d5e39caef2af77ca0acaaf3655a8471c3848751
Elastix versions prior to 2.4 php code injection exploit.
ce6fb46f23d7953423aa20792ce1ddf8ea18fa14c699cbeb5f77d90e4edbdf0d
4psa VoipNow versions prior to 2.3 suffer from a remote command execution vulnerability.
9889092cc05ca0c360d1c888ac5dd274723646a753d62f1ba64b7fd58a84be33
Power Bulletin Board versions prior to 2.1.4 authentication bypass and add administrator exploit.
029b52340f5c1e7a0fdaa00422646752976486d49f4a8818ec05d4afbc957dd2
Am4ss versions 1.2 and below suffer from a remote PHP code injection vulnerability.
14691d46558a43db63b5ae8d7df76e0c095c233b3ef1a03c99e9e84d0f602415