DB: 2020-07-06
2 changes to exploits/shellcodes WhatsApp Remote Code Execution - Paper
This commit is contained in:
parent
d6a1f63996
commit
cf9fbcb5de
2 changed files with 0 additions and 2 deletions
|
@ -1 +0,0 @@
|
|||
1
|
|
@ -42887,6 +42887,5 @@ id,file,description,date,author,type,platform,port
|
|||
48629,exploits/php/webapps/48629.txt,"e-learning Php Script 0.1.0 - 'search' SQL Injection",2020-07-01,KeopssGroup0day_Inc,webapps,php,
|
||||
48630,exploits/php/webapps/48630.txt,"PHP-Fusion 9.03.60 - PHP Object Injection",2020-07-01,coiffeur,webapps,php,
|
||||
48631,exploits/php/webapps/48631.txt,"Online Shopping Portal 3.1 - Authentication Bypass",2020-07-01,"Ümit Yalçın",webapps,php,
|
||||
48632,exploits/android/webapps/48632.txt,"WhatsApp Remote Code Execution - Paper",2020-07-02,"ashu Jaiswal",webapps,android,
|
||||
48633,exploits/php/webapps/48633.py,"ZenTao Pro 8.8.2 - Command Injection",2020-07-02,"Daniel Monzón",webapps,php,
|
||||
48634,exploits/multiple/webapps/48634.txt,"OCS Inventory NG 2.7 - Remote Code Execution",2020-07-02,Askar,webapps,multiple,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue