Key Information from the Webpage Screenshot about the Vulnerability: Title: OpenEMR 5.0.2.1 - Remote Code Execution Edb-ID: 49784 Author: HATO0 Type: WEBAPPS Platform: PHP Vulnerable App: OpenEMR Date: 2021-04-21 Exploit Details: Description: The exploit targets OpenEMR v5.0.2.1 CMS and allows remote code execution. Target: Requires the URL of the server where the exploit will be executed. Requirements: - Python libraries: argparse, http.server, socketserver, requests, termcolor, json. - Options for specifying directory, remote host, port, virtual host, local host, reverse shell IP and port, web server port. References: Blog post on the vulnerability: SonarSource Video tutorial: YouTube