[webapps] Horilla v1.3 - RCE
ATT&CK techniques detected
T1190Exploit Public-Facing Application
91%
"[ webapps ] horilla v1. 3 - rce horilla v1. 3 - rce # exploit title : horilla v1. 3 - rce # date : 2025 - 05 - 29 # exploit author : raghad abdallah al - syouf # version : < = 1. 3 # tested on : ubuntu / docker # cve : cve - 2025 - 48868 description : this script exploits the aut…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
85%
"url http : / / 127. 0. 0. 1 : 8000 - - user admin - - pass admin - - lhost 192. 168. 1. 100 - - lport 4444 " " " import requests import time import sys import argparse from bs4 import beautifulsoup import urllib3 import random import string from datetime import datetime urllib3. …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
58%
"software v1. 3. exploit by : nakleh said zeidan ' ) parser. add _ argument ( ' - - url ', required = true, help = ' target url, e. g. http : / / localhost : 8000 ' ) parser. add _ argument ( ' - - user ', required = true, help = ' username for login ' ) parser. add _ argument ( '…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Horilla v1.3 - RCE