OpenEMR 5.0.1 allows an authenticated attacker to upload and execute malicious php codes.
☆14Jan 20, 2021Updated 5 years ago
Alternatives and similar repositories for OpenEMR_Vulnerabilities
Users that are interested in OpenEMR_Vulnerabilities are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- Demonstrating ICMP, SYN, Xmas flood attacks to analyze results.☆12Mar 13, 2021Updated 5 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 4 years ago
- I use all of scripts in this repository daily and schedule them to control my systems. Also, it includes all of my penetration tests scri…☆30Jun 26, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 6 years ago
- Blockchain server, mining server and proof-of-work, python power☆13Dec 5, 2019Updated 6 years ago
- ☆11Sep 1, 2022Updated 3 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆20Aug 29, 2022Updated 3 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- Python 2. düzey bütün konular hdrip 480p avi☆17Aug 2, 2018Updated 7 years ago
- ARP Poisoning Tool, it creates entries on target's ARP Table. The things which you need only are Destination IP and MAC address.☆48Jan 17, 2020Updated 6 years ago
- pfSense 5651 Kanununa Uygun Log İmzalama☆22Jul 12, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- pFuzz helps us to bypass web application firewall by using different methods at the same time.☆161Jan 9, 2021Updated 5 years ago
- SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.☆19Jan 9, 2020Updated 6 years ago
- ☆45Oct 28, 2021Updated 4 years ago
- A tasty cross-platform tool from Blacksea to debug shellcode!☆93Jul 15, 2023Updated 2 years ago
- This is a branch of the sysbench project, including changes from the MariaDB project☆11Sep 14, 2017Updated 8 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆32Oct 11, 2020Updated 5 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆92Jan 16, 2026Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Sample code for "Reflections on trusting trust" by Ken Thompson☆13May 19, 2018Updated 7 years ago
- Nuclei documentation☆86Aug 18, 2023Updated 2 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 5 years ago
- A lightweight Python module to interact with the MITRE ATT&CK® Enterprise dataset. Built for speed with minimal dependencies. Read the do…☆11Nov 24, 2025Updated 5 months ago
- ☆12Feb 18, 2022Updated 4 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 10 years ago
- ☆10Jun 9, 2021Updated 4 years ago
- Birthplace of go pledge(2) support (deprecated, read-only mirror)☆20Sep 2, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CTF challenges that I created☆19Dec 26, 2021Updated 4 years ago
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- Unbounded cache model for online language modeling with open vocabulary☆11Feb 15, 2019Updated 7 years ago
- Standalone Java implementation of the RFC-9285 Base45 Standard.☆13Jul 14, 2023Updated 2 years ago
- HTTP Header Analysis Vulnerability Tool☆14May 6, 2022Updated 3 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Get all possible href | src | url from target url or domain☆40Aug 5, 2020Updated 5 years ago