DB: 2020-07-06

2 changes to exploits/shellcodes

WhatsApp Remote Code Execution - Paper
This commit is contained in:
Offensive Security 2020-07-06 05:02:10 +00:00
parent d6a1f63996
commit cf9fbcb5de
2 changed files with 0 additions and 2 deletions

View file

@ -1 +0,0 @@
1

View file

@ -42887,6 +42887,5 @@ id,file,description,date,author,type,platform,port
48629,exploits/php/webapps/48629.txt,"e-learning Php Script 0.1.0 - 'search' SQL Injection",2020-07-01,KeopssGroup0day_Inc,webapps,php,
48630,exploits/php/webapps/48630.txt,"PHP-Fusion 9.03.60 - PHP Object Injection",2020-07-01,coiffeur,webapps,php,
48631,exploits/php/webapps/48631.txt,"Online Shopping Portal 3.1 - Authentication Bypass",2020-07-01,"Ümit Yalçın",webapps,php,
48632,exploits/android/webapps/48632.txt,"WhatsApp Remote Code Execution - Paper",2020-07-02,"ashu Jaiswal",webapps,android,
48633,exploits/php/webapps/48633.py,"ZenTao Pro 8.8.2 - Command Injection",2020-07-02,"Daniel Monzón",webapps,php,
48634,exploits/multiple/webapps/48634.txt,"OCS Inventory NG 2.7 - Remote Code Execution",2020-07-02,Askar,webapps,multiple,

Can't render this file because it is too large.