[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Elastix PBX 2.x.x Remote Command Execution 0day Exploit

[ 0Day-ID-22610 ]
Full title
Elastix PBX 2.x.x Remote Command Execution 0day Exploit [ Highlight ]
Highlight - is paid service, that can help to get more visitors to your material.

Price: 10
Date add
Category
Platform
Verified
Price
 
0.032 BTC

 
3 000 USD
Risk
[
Security Risk Critical
]
Rel. releases
Description
This vulnerability in Elastix 2.x.x for remote command execution to escalate your privileges to root on most systems in Elastix.
A remote command execution vulnerability exists in Elastix PBX all version 2.x.x and versions of FreePBX 2.5, 2.6, 2.7, 2.8, 2.9, 2.10.
Other Information
Abuses
0
Comments
6
Views
30 874
We DO NOT use Telegram or any messengers / social networks! We DO NOT use Telegram or any messengers / social networks! Please, beware of scammers!
Please login or register to buy exploit.
OR
Buy incognito
3
1
Verified by 0day Admin
Verified by 0day Admin
This material is checked by Administration and absolutely workable.
Learn more about    GOLD:
0day.today Gold is the currency of 0day.today project and is denoted on this site as such image: . It used for paying for the services, buying exploits, earning money, etc
We accept:
BitCoin (BTC)
You can pay us via BTC
LiteCoin (LTC)
You can pay us via LTC
Ethereum (ETH)
You can pay us via ETH

Author
BL
29
Exploits
33
Readers
6
[ Comments: 6 ]
Terms of use of comments:
  • Users are forbidden to exchange personal contact details
  • Haggle on other sites\projects is forbidden
  • Reselling is forbidden
Punishment: permanent block of user account with all Gold.

You cannot add comment because comments is blocked.