+
+
+
\ No newline at end of file
diff --git a/platforms/multiple/dos/43175.html b/platforms/multiple/dos/43175.html
new file mode 100644
index 000000000..88d1ce7fd
--- /dev/null
+++ b/platforms/multiple/dos/43175.html
@@ -0,0 +1,214 @@
+
+
+
+
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/platforms/multiple/dos/43176.html b/platforms/multiple/dos/43176.html
new file mode 100644
index 000000000..6a14e8e83
--- /dev/null
+++ b/platforms/multiple/dos/43176.html
@@ -0,0 +1,194 @@
+
+
+
+
+
\ No newline at end of file
diff --git a/platforms/sco/local/23141.sh b/platforms/sco/local/23141.sh
index 52bbf9a9f..d18958f78 100755
--- a/platforms/sco/local/23141.sh
+++ b/platforms/sco/local/23141.sh
@@ -1,6 +1,8 @@
-source: http://www.securityfocus.com/bid/8616/info
-
-It has been reported that SCO OpenServer Internet Manager 'mana' process is prone to an authentication bypass issue. The issue is reported to occur as a local user is able to export the REMOTE_ADDR environment variable and set its value to 127.0.0.1. This would cause the mana process to execute the file menu.mana with administrative privileges without proper authentication. Normally executing mana would require proper credentials.
+#!/bin/sh
+#source: http://www.securityfocus.com/bid/8616/info
+#
+#It has been reported that SCO OpenServer Internet Manager 'mana' process is prone to an authentication bypass issue. The issue is reported to occur as a local user is able to export the REMOTE_ADDR environment variable and set its value to 127.0.0.1. This would cause the mana process to execute the file menu.mana with administrative privileges without proper authentication. Normally executing mana would require proper credentials.
+#
#!/bin/sh
#
diff --git a/platforms/solaris/local/15245.txt b/platforms/solaris/dos/15245.txt
similarity index 100%
rename from platforms/solaris/local/15245.txt
rename to platforms/solaris/dos/15245.txt
diff --git a/platforms/solaris/local/19161.txt b/platforms/solaris/dos/19161.txt
similarity index 100%
rename from platforms/solaris/local/19161.txt
rename to platforms/solaris/dos/19161.txt
diff --git a/platforms/windows/local/403.c b/platforms/windows/dos/403.c
similarity index 100%
rename from platforms/windows/local/403.c
rename to platforms/windows/dos/403.c
diff --git a/platforms/windows/remote/9815.py b/platforms/windows/dos/9815.py
similarity index 100%
rename from platforms/windows/remote/9815.py
rename to platforms/windows/dos/9815.py
diff --git a/platforms/windows/remote/9817.py b/platforms/windows/dos/9817.py
similarity index 100%
rename from platforms/windows/remote/9817.py
rename to platforms/windows/dos/9817.py
diff --git a/platforms/windows/dos/11987.txt b/platforms/windows/local/11987.txt
similarity index 100%
rename from platforms/windows/dos/11987.txt
rename to platforms/windows/local/11987.txt
diff --git a/platforms/windows/local/12012.txt b/platforms/windows/local/12012.txt
index 859b4f78a..c873af431 100644
--- a/platforms/windows/local/12012.txt
+++ b/platforms/windows/local/12012.txt
@@ -1,8 +1,7 @@
# Exploit Title: Free MP3 CD Ripper 2.6 0 day
# Date: 30/03/2010
# Author: Richard leahy
-# Reference:
-# http://www.exploit-db.com/exploits/11975
+# Reference: http://www.exploit-db.com/exploits/11975/
# Software Link: http://www.soft32.com/Download/Free/Free_MP3_CD_Ripper/4-250188-1.html
# Version: 2.6
# Tested on: Windows Xp Sp2
diff --git a/platforms/windows/local/19220.c b/platforms/windows/local/19220.c
index 468c9dba0..8dfb1f1f4 100644
--- a/platforms/windows/local/19220.c
+++ b/platforms/windows/local/19220.c
@@ -1,8 +1,10 @@
+/*
source: http://www.securityfocus.com/bid/275/info
A vulnerability in ColdFusion allows pages encrypted with the CFCRYPT.EXE utility to be decrypted.
ColdFusion supports the ability to "encrypt" the CFML templates in an application or component, using the CFCRYPT.EXE utility, so they can be redistributed or sold without exposing the source code to casual viewing. A program that decrypts ColdFusion's encryption has been discovered. This will in effect make the source code for all this propietary CFML applications available to those with access to their encrypted form.
+*/
/* CFDECRYPT: Decrypt Cold Fusion templates encrypted with CFCRYPT
Matt Chapman
diff --git a/platforms/windows/remote/2821.c b/platforms/windows/local/2821.c
similarity index 100%
rename from platforms/windows/remote/2821.c
rename to platforms/windows/local/2821.c
diff --git a/platforms/windows/remote/11420.py b/platforms/windows/remote/11420.py
index 6fc257e38..d8fd1f366 100755
--- a/platforms/windows/remote/11420.py
+++ b/platforms/windows/remote/11420.py
@@ -3,8 +3,7 @@
#
#Written by: Lincoln
#Originally discovered by: loneferret
-#Reference:
-#http://www.exploit-db.com/exploits/11391
+#Reference: http://www.exploit-db.com/exploits/11391/
#Tested on: XPSP2
#root@box:~# ./ftpd.py 192.168.139.130
#
diff --git a/platforms/windows/remote/17977.txt b/platforms/windows/remote/17977.txt
index 69e083a1d..614674636 100644
--- a/platforms/windows/remote/17977.txt
+++ b/platforms/windows/remote/17977.txt
@@ -12,8 +12,7 @@ FILES:
SSL SUPPORT FOR THE REMOTE EXPLOITS
* synscan-modded.tar
- THE SYNSCAN IS MODDED FOR SCANNING JBOSS (X-Powered-By TAG) ON
-PORT 8080 ONLY.
+ THE SYNSCAN IS MODDED FOR SCANNING JBOSS (X-Powered-By TAG) ON PORT 8080 ONLY.
* pnscan-1.11.tar.gz
ORIGINAL PARALLEL NETWORK SCANNER (NO CREDITS HERE)
diff --git a/platforms/windows/remote/20459.html b/platforms/windows/remote/20459.html
index 234a0b8cb..a682e24f7 100644
--- a/platforms/windows/remote/20459.html
+++ b/platforms/windows/remote/20459.html
@@ -1,3 +1,4 @@
+
diff --git a/platforms/windows/remote/28225.c b/platforms/windows/remote/28225.c
index 05eee436b..5109e858b 100644
--- a/platforms/windows/remote/28225.c
+++ b/platforms/windows/remote/28225.c
@@ -1,3 +1,4 @@
+/*
source: http://www.securityfocus.com/bid/18993/info
Microsoft PowerPoint is prone to multiple remote vulnerabilities.
@@ -5,10 +6,9 @@ Microsoft PowerPoint is prone to multiple remote vulnerabilities.
Three proof-of-concept exploit files designed to trigger vulnerabilities in PowerPoint have been released.
It is currently unknown if these three exploit files pertain to newly discovered, unpublished vulnerabilities or if they exploit previously disclosed issues. These issues may allow remote attackers to cause crashes or to execute arbitrary machine code in the context of the affected application, but this has not been confirmed.
-
-This BID will be updated and potentially split into individual records as further analysis is completed.
-
+
Microsoft PowerPoint 2003 is vulnerable to these issues; other versions may also be affected.
+*/
/*-----------------------------------------------------------------------------------------
* MS Power Point Unspecified vulnerability POC