From cf9fbcb5de57839eacf559287298fcdad5fd1aae Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Mon, 6 Jul 2020 05:02:10 +0000 Subject: [PATCH] DB: 2020-07-06 2 changes to exploits/shellcodes WhatsApp Remote Code Execution - Paper --- exploits/android/webapps/48632.txt | 1 - files_exploits.csv | 1 - 2 files changed, 2 deletions(-) delete mode 100644 exploits/android/webapps/48632.txt diff --git a/exploits/android/webapps/48632.txt b/exploits/android/webapps/48632.txt deleted file mode 100644 index 56a6051ca..000000000 --- a/exploits/android/webapps/48632.txt +++ /dev/null @@ -1 +0,0 @@ -1 \ No newline at end of file diff --git a/files_exploits.csv b/files_exploits.csv index 9fd535871..75073592b 100644 --- a/files_exploits.csv +++ b/files_exploits.csv @@ -42887,6 +42887,5 @@ id,file,description,date,author,type,platform,port 48629,exploits/php/webapps/48629.txt,"e-learning Php Script 0.1.0 - 'search' SQL Injection",2020-07-01,KeopssGroup0day_Inc,webapps,php, 48630,exploits/php/webapps/48630.txt,"PHP-Fusion 9.03.60 - PHP Object Injection",2020-07-01,coiffeur,webapps,php, 48631,exploits/php/webapps/48631.txt,"Online Shopping Portal 3.1 - Authentication Bypass",2020-07-01,"Ümit Yalçın",webapps,php, -48632,exploits/android/webapps/48632.txt,"WhatsApp Remote Code Execution - Paper",2020-07-02,"ashu Jaiswal",webapps,android, 48633,exploits/php/webapps/48633.py,"ZenTao Pro 8.8.2 - Command Injection",2020-07-02,"Daniel Monzón",webapps,php, 48634,exploits/multiple/webapps/48634.txt,"OCS Inventory NG 2.7 - Remote Code Execution",2020-07-02,Askar,webapps,multiple,