Disclosure Date: 2025-12-24
CVE ID: CVE-2025-69516
Reporter(s): Gabriel Gomes, João Lobo Procopio, Anderson Vilela Moraes
Vendor: AmidaWare Inc.
Product / Component: Tactical RMM
Version(s) Affected: 1.3.1 and previous versions.
CWE: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine
Attack Vector: Remote
Privileges Required: authenticated user
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import re | |
| import requests | |
| requisicao = requests.get(input('enter the entire website link: ')) | |
| padrao = re.findall(r'[\w\.]+@[\w-]+\.[\w\.-]+', requisicao.text) | |
| if padrao: | |
| print (padrao) | |
| else: | |
| print ('emails not found ') |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import urllib | |
| import urllib.request | |
| from time import sleep | |
| try: | |
| print ('Se vc estiver sem conexão o site não estará acessivel') | |
| sleep(1) | |
| site = urllib.request.urlopen(input('Digite o link do site com http Ex(https://www.youtube.com/): ')) |