appsec.fyi · Sources

exploit-db.com

6 curated AppSec resources from exploit-db.com across 4 topics on appsec.fyi.

exploit-db.com

Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2026-04-19.

Date Added Resource Excerpt
2026-04-19 2026Deserialization Vulnerability — Exploit-DB PaperDeserDeserialization Vulnerability — Exploit-DB Paper
2026-04-17 2026Atlassian Confluence Widget Connector Macro SSTI (ExploitDB)SSTIAtlassian Confluence Widget Connector Macro SSTI (ExploitDB)
2026-04-16 2026Exploiting XXE via File Uploads (SVG, XLSX, DOCX)XXEExploiting XXE via File Uploads (SVG, XLSX, DOCX)
2026-04-10 2026Exploit-DB: Twig 2.4.4 Server Side Template InjectionSSTIExploit-DB: Twig 2.4.4 Server Side Template Injection
2025-08-14 2025Vulnerability analysis, Security Papers, Exploit Tutorials - Part 12975SQLiThe content discusses vulnerability analysis, security papers, and exploit tutorials in Part 12975. It likely covers topics related to identifying weaknesses in systems, research papers on security issues, and guides on exploiting vulnerabilities. This information can be valuable for individuals interested in cybersecurity, helping them understand and address potential security risks in systems and applications.
2016-04-20 2016Vulnerability analysis, Security Papers, Exploit Tutorials - Part 12975SQLiThe content discusses vulnerability analysis, security papers, and exploit tutorials in Part 12975. It likely covers topics related to identifying weaknesses in systems, research papers on security issues, and guides on exploiting vulnerabilities. This information can be valuable for individuals interested in cybersecurity, as it may provide insights into the latest vulnerabilities, security trends, and techniques for exploiting or mitigating security risks.