https://github.com/twseptian/rce-authenticated-from-exploit-db
RCE Authenticated from From Exploit-DB
https://github.com/twseptian/rce-authenticated-from-exploit-db
rce remote-code-execution
Last synced: about 2 months ago
JSON representation
RCE Authenticated from From Exploit-DB
- Host: GitHub
- URL: https://github.com/twseptian/rce-authenticated-from-exploit-db
- Owner: twseptian
- Created: 2022-02-11T15:58:27.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2022-02-12T04:39:24.000Z (over 3 years ago)
- Last Synced: 2025-05-15T01:40:04.932Z (5 months ago)
- Topics: rce, remote-code-execution
- Language: Python
- Homepage:
- Size: 32.2 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# RCE-Authenticated-from-From-Exploit-DB
This exploit is used for Remote Code Execution (RCE) vulnerability with Authenticated access login method on some web applications that have been reported in Exploit-DB. Here are some vulnerabilities from the exploit-DB archive:
1. Home Owners Collection Management System 1.0 - Remote Code Execution (RCE) (Authenticated) - https://www.exploit-db.com/exploits/50731
2. Exam Reviewer Management System 1.0 - Remote Code Execution (RCE) (Authenticated) - https://www.exploit-db.com/exploits/50726
3. etc....usage : `python3 rce-auth.py -t http://192.168.114.135/erms/ -u admin -p admin123`
