OpenEMR <= 5.0.1 - (Authenticated) Remote Code Execution
-
Updated
Jun 24, 2021 - Ruby
OpenEMR <= 5.0.1 - (Authenticated) Remote Code Execution
CVE-2022-47986: Python, Ruby, NMAP and Metasploit modules to exploit the vulnerability.
Multiple exploits for Monitorr
These Nmap, Python and Ruby scripts detects and exploits CVE-2021-42013 with RCE and local file disclosure.
These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.
Ruby Deserialization Payload Generator
OpenEMR < 5.0.1.4 - (Authenticated) File upload - Remote command execution
CMSUno 1.6.1 <= 1.6.2 - Remote Code Execution (Authenticated)
OpenNetAdmin 8.5.14 <= 18.1.1 - Remote Command Execution
Fuel CMS 1.4 - Remote Code Execution
iTop < 2.7.6 - (Authenticated) Remote command execution
MSF moudle DotNetNuke GetShell & execute exploit
Black Hat Ruby book | Lab files | Buy the book https://www.amazon.com/dp/B08JHSF6GT
Add a description, image, and links to the rce topic page so that developers can more easily learn about it.
To associate your repository with the rce topic, visit your repo's landing page and select "manage topics."