0x4148

13 exploits Active since May 2015
EIP-2026-113140 EXPLOITDB text WRITEUP
VoipSwitch - 'user.php' Local File Inclusion
EIP-2026-112572 EXPLOITDB text WORKING POC
tcPbX - 'tcpbx_lang' Local File Inclusion
EIP-2026-111939 EXPLOITDB php WORKING POC
Schoolhos CMS 2.29 - Remote Code Execution / SQL Injection
EIP-2026-107233 EXPLOITDB text WORKING POC
FreePBX 13.0.35 - Remote Command Execution
EIP-2026-106252 EXPLOITDB text WORKING POC
CS-Cart 4.3.10 - XML External Entity Injection
EIP-2026-105598 EXPLOITDB python WORKING POC
Boonex Dolphin 7.3.2 - Authentication Bypass / Remote Code Execution
EIP-2026-104877 EXPLOITDB text WORKING POC
A2billing 2.x - SQL Injection
EIP-2026-104727 EXPLOITDB ruby WORKING POC
FreePBX < 13.0.188 - Remote Command Execution (Metasploit)
EIP-2026-104842 EXPLOITDB text WORKING POC
4Images 1.7.13 - SQL Injection
EIP-2026-104876 EXPLOITDB text WORKING POC
A2billing 2.x - Backup File Download / Remote Code Execution
EIP-2026-101842 EXPLOITDB text WORKING POC
MediaAccess TG788vn - File Disclosure
CVE-2014-9727 EXPLOITDB text WORKING POC
AVM Fritz!Box - RCE
AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm.
EIP-2026-100948 EXPLOITDB text WORKING POC
ZYCOO IP Phone System - Remote Command Execution