diff --git a/2004/CVE-2004-1235/README.md b/2004/CVE-2004-1235/README.md index b07238f..fbdc110 100644 --- a/2004/CVE-2004-1235/README.md +++ b/2004/CVE-2004-1235/README.md @@ -3,7 +3,7 @@ CVE-2004-1235 Vulnerability reference: - * [CVE-2004-1235](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1235) + * [CVE-2004-1235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1235) * [exp-db](https://www.exploit-db.com/exploits/744/) ## Kernels diff --git a/2005/CVE-2005-0736/README.md b/2005/CVE-2005-0736/README.md index 69952ed..e30c4cb 100644 --- a/2005/CVE-2005-0736/README.md +++ b/2005/CVE-2005-0736/README.md @@ -3,7 +3,7 @@ CVE-2005-0736 Vulnerability reference: - * [CVE-2005-0736](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-0736) + * [CVE-2005-0736](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-0736) * [exp-db](https://www.exploit-db.com/exploits/1397/) ## Kernels diff --git a/2005/CVE-2005-1263/README.md b/2005/CVE-2005-1263/README.md index 1ed06d0..464fd8b 100644 --- a/2005/CVE-2005-1263/README.md +++ b/2005/CVE-2005-1263/README.md @@ -8,7 +8,7 @@ leading to a buffer overflow. ``` Vulnerability reference: - * [CVE-2005-1263](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1263) + * [CVE-2005-1263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1263) * [exp-db](https://www.exploit-db.com/exploits/25647/) ## Kernels diff --git a/2006/CVE-2006-2451/README.md b/2006/CVE-2006-2451/README.md index aff8ffa..b90b2cc 100644 --- a/2006/CVE-2006-2451/README.md +++ b/2006/CVE-2006-2451/README.md @@ -3,7 +3,7 @@ CVE-2006-2451 Vulnerability reference: - * [CVE-2006-2451](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2451) + * [CVE-2006-2451](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2451) * [exp-db](http://www.exploit-db.com/exploits/2031/) ## Kernels diff --git a/2006/CVE-2006-3626/README.md b/2006/CVE-2006-3626/README.md index ae66835..356213d 100644 --- a/2006/CVE-2006-3626/README.md +++ b/2006/CVE-2006-3626/README.md @@ -3,7 +3,7 @@ CVE-2006-3626 Vulnerability reference: - * [CVE-2006-3626](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3626) + * [CVE-2006-3626](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3626) * [exp-db](https://www.exploit-db.com/exploits/2013/) ## Kernels diff --git a/2008/CVE-2008-0600/README.md b/2008/CVE-2008-0600/README.md index 4da8000..0e61af6 100644 --- a/2008/CVE-2008-0600/README.md +++ b/2008/CVE-2008-0600/README.md @@ -3,7 +3,7 @@ CVE-2008-0600 Vulnerability reference: - * [CVE-2008-0600](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0600) + * [CVE-2008-0600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0600) * [exp-db](https://www.exploit-db.com/exploits/5093/) ## Kernels diff --git a/2008/CVE-2008-0900/README.md b/2008/CVE-2008-0900/README.md index d24bf0e..40813b8 100644 --- a/2008/CVE-2008-0900/README.md +++ b/2008/CVE-2008-0900/README.md @@ -3,7 +3,7 @@ CVE-2008-0900 Vulnerability reference: - * [CVE-2008-0900](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0900) + * [CVE-2008-0900](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0900) * [exp-db](https://www.exploit-db.com/exploits/5092/) ## Kernels diff --git a/2008/CVE-2008-4210/README.md b/2008/CVE-2008-4210/README.md index 9420dbe..18cb90a 100644 --- a/2008/CVE-2008-4210/README.md +++ b/2008/CVE-2008-4210/README.md @@ -3,7 +3,7 @@ CVE-2008-4210 Vulnerability reference: - * [CVE-2008-4210](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4210) + * [CVE-2008-4210](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4210) * [exp-db](https://www.exploit-db.com/exploits/6851/) ## Kernels diff --git a/2009/CVE-2009-1185/README.md b/2009/CVE-2009-1185/README.md index 12eda24..c9593d3 100644 --- a/2009/CVE-2009-1185/README.md +++ b/2009/CVE-2009-1185/README.md @@ -3,7 +3,7 @@ CVE-2009-1185 Vulnerability reference: - * [CVE-2009-1185](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1185) + * [CVE-2009-1185](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1185) * [exp-db](https://www.exploit-db.com/exploits/8478/) ## Kernels diff --git a/2009/CVE-2009-1337/README.md b/2009/CVE-2009-1337/README.md index c03fedd..e7369fa 100644 --- a/2009/CVE-2009-1337/README.md +++ b/2009/CVE-2009-1337/README.md @@ -3,7 +3,7 @@ CVE-2009-1337 Vulnerability reference: - * [CVE-2009-1337](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1337) + * [CVE-2009-1337](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1337) * [exp-db](https://www.exploit-db.com/exploits/8369/) ## Kernels diff --git a/2009/CVE-2009-2692/README.md b/2009/CVE-2009-2692/README.md index a381c96..b4f900d 100644 --- a/2009/CVE-2009-2692/README.md +++ b/2009/CVE-2009-2692/README.md @@ -3,7 +3,7 @@ CVE-2009-2692 Vulnerability reference: - * [CVE-2009-2692](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2692) + * [CVE-2009-2692](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2692) * [exp-db](https://www.exploit-db.com/exploits/9435/) * [exp-db](https://www.exploit-db.com/exploits/9436/) diff --git a/2009/CVE-2009-2698/README.md b/2009/CVE-2009-2698/README.md index 956ac9c..f55142e 100644 --- a/2009/CVE-2009-2698/README.md +++ b/2009/CVE-2009-2698/README.md @@ -3,7 +3,7 @@ CVE-2009-2698 Vulnerability reference: - * [CVE-2009-2698](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2698) + * [CVE-2009-2698](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2698) ## Kernels ``` diff --git a/2009/CVE-2009-3547/README.md b/2009/CVE-2009-3547/README.md index 36789df..4cf0346 100644 --- a/2009/CVE-2009-3547/README.md +++ b/2009/CVE-2009-3547/README.md @@ -3,7 +3,7 @@ CVE-2009-3547 Vulnerability reference: - * [CVE-2009-3547](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2009-3547) + * [CVE-2009-3547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-3547) ## Kernels ``` diff --git a/2010/CVE-2010-0415/README.md b/2010/CVE-2010-0415/README.md index 8a61d6a..2f81d02 100644 --- a/2010/CVE-2010-0415/README.md +++ b/2010/CVE-2010-0415/README.md @@ -3,7 +3,7 @@ CVE-2010-0415 Vulnerability reference: - * [CVE-2010-0415](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0415) + * [CVE-2010-0415](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0415) ## Kernels ``` diff --git a/2010/CVE-2010-1146/README.md b/2010/CVE-2010-1146/README.md index 0148ac4..011144f 100644 --- a/2010/CVE-2010-1146/README.md +++ b/2010/CVE-2010-1146/README.md @@ -3,7 +3,7 @@ CVE-2010-1146 Vulnerability reference: - * [CVE-2010-1146](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1146) + * [CVE-2010-1146](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1146) * [exp-db](https://www.exploit-db.com/exploits/12130/) ## Kernels diff --git a/2010/CVE-2010-2959/README.md b/2010/CVE-2010-2959/README.md index 3622802..92fa89a 100644 --- a/2010/CVE-2010-2959/README.md +++ b/2010/CVE-2010-2959/README.md @@ -3,7 +3,7 @@ CVE-2010-2959 Vulnerability reference: - * [CVE-2010-2959](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2959) + * [CVE-2010-2959](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2959) * [exp-db](http://www.exploit-db.com/exploits/14814/) ## Kernels diff --git a/2010/CVE-2010-3081/README.md b/2010/CVE-2010-3081/README.md index 553b431..f643e4d 100644 --- a/2010/CVE-2010-3081/README.md +++ b/2010/CVE-2010-3081/README.md @@ -3,7 +3,7 @@ CVE-2010-3081 Vulnerability reference: - * [CVE-2010-3081](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3081) + * [CVE-2010-3081](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3081) * [exp-db](https://www.exploit-db.com/exploits/15024/) ## Kernels diff --git a/2010/CVE-2010-3437/README.md b/2010/CVE-2010-3437/README.md index 4fbdd50..7aa614f 100644 --- a/2010/CVE-2010-3437/README.md +++ b/2010/CVE-2010-3437/README.md @@ -3,7 +3,7 @@ CVE-2010-3437 Vulnerability reference: - * [CVE-2010-3437](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3437) + * [CVE-2010-3437](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3437) * [exp-db](https://www.exploit-db.com/exploits/15150/) ## Kernels diff --git a/2010/CVE-2010-3904/README.md b/2010/CVE-2010-3904/README.md index ab666fb..e524732 100644 --- a/2010/CVE-2010-3904/README.md +++ b/2010/CVE-2010-3904/README.md @@ -3,7 +3,7 @@ CVE-2010-3904 Vulnerability reference: - * [CVE-2010-3904](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3904) + * [CVE-2010-3904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3904) * [exp-db](http://www.exploit-db.com/exploits/15285/) ## Kernels diff --git a/2010/CVE-2010-4073/README.md b/2010/CVE-2010-4073/README.md index eb4435c..1785c1f 100644 --- a/2010/CVE-2010-4073/README.md +++ b/2010/CVE-2010-4073/README.md @@ -3,7 +3,7 @@ CVE-2010-4073 Vulnerability reference: - * [CVE-2010-4073](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4073) + * [CVE-2010-4073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4073) * [exp-db](https://www.exploit-db.com/exploits/17787/) ## Kernels diff --git a/2010/CVE-2010-4258/README.md b/2010/CVE-2010-4258/README.md index b2c3923..41f52f2 100644 --- a/2010/CVE-2010-4258/README.md +++ b/2010/CVE-2010-4258/README.md @@ -3,7 +3,7 @@ CVE-2010-4258 Vulnerability reference: - * [CVE-2010-4258](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4258) + * [CVE-2010-4258](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4258) * [exp-db](https://www.exploit-db.com/exploits/15704/) ## Kernels diff --git a/2012/CVE-2012-0056/README.md b/2012/CVE-2012-0056/README.md index ccd5850..01e2bfe 100644 --- a/2012/CVE-2012-0056/README.md +++ b/2012/CVE-2012-0056/README.md @@ -3,7 +3,7 @@ CVE-2012-0056 Vulnerability reference: - * [CVE-2012-0056](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0056) + * [CVE-2012-0056](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0056) * [exp-db](http://www.exploit-db.com/exploits/18411/) ## Kernels diff --git a/2012/CVE-2012-3524/README.md b/2012/CVE-2012-3524/README.md index 88f8d65..ac7969c 100644 --- a/2012/CVE-2012-3524/README.md +++ b/2012/CVE-2012-3524/README.md @@ -9,7 +9,7 @@ not in libdbus itself: "we do not support use of libdbus in setuid binaries that Vulnerability reference: - * [CVE-2012-3524](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524) + * [CVE-2012-3524](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524) * [exp-db](https://www.exploit-db.com/exploits/21323/) ## libdbus diff --git a/2013/CVE-2013-0268/README.md b/2013/CVE-2013-0268/README.md index 7a65675..ec898a9 100644 --- a/2013/CVE-2013-0268/README.md +++ b/2013/CVE-2013-0268/README.md @@ -3,7 +3,7 @@ CVE-2013-0268 Vulnerability reference: - * [CVE-2013-0268](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0268) + * [CVE-2013-0268](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0268) * [exp-db](https://www.exploit-db.com/exploits/27297/) ## Kernels diff --git a/2013/CVE-2013-2094/README.md b/2013/CVE-2013-2094/README.md index be3f08c..03a82c7 100644 --- a/2013/CVE-2013-2094/README.md +++ b/2013/CVE-2013-2094/README.md @@ -3,7 +3,7 @@ CVE-2013-2094 Vulnerability reference: - * [CVE-2013-2094](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2094) + * [CVE-2013-2094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2094) ## Kernels ``` diff --git a/2014/CVE-2014-0038/README.md b/2014/CVE-2014-0038/README.md index 1b50250..a24db4b 100644 --- a/2014/CVE-2014-0038/README.md +++ b/2014/CVE-2014-0038/README.md @@ -3,7 +3,7 @@ CVE-2014-0038 Vulnerability reference: - * [CVE-2014-0038](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0038) + * [CVE-2014-0038](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0038) * [exp-db](https://www.exploit-db.com/exploits/31347/) * [exp-db](https://www.exploit-db.com/exploits/31346/) diff --git a/2014/CVE-2014-0196/README.md b/2014/CVE-2014-0196/README.md index 4b2934c..1edd53b 100644 --- a/2014/CVE-2014-0196/README.md +++ b/2014/CVE-2014-0196/README.md @@ -3,7 +3,7 @@ CVE-2014-0196 Vulnerability reference: - * [CVE-2014-0196](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0196) + * [CVE-2014-0196](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0196) * [exp-db](https://www.exploit-db.com/exploits/33516/) ## Kernels ``` diff --git a/2014/CVE-2014-4014/README.md b/2014/CVE-2014-4014/README.md index 30332e2..1b480ff 100644 --- a/2014/CVE-2014-4014/README.md +++ b/2014/CVE-2014-4014/README.md @@ -7,7 +7,7 @@ as demonstrated by setting the setgid bit on a file with group ownership of root Vulnerability reference: - * [CVE-2014-4014](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4014) + * [CVE-2014-4014](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4014) * [exp-db](https://www.exploit-db.com/exploits/33824/) ## Kernels diff --git a/2014/CVE-2014-4699/README.md b/2014/CVE-2014-4699/README.md index e0b727f..993a61a 100644 --- a/2014/CVE-2014-4699/README.md +++ b/2014/CVE-2014-4699/README.md @@ -3,7 +3,7 @@ CVE-2014-4699 Vulnerability reference: - * [CVE-2014-4699](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699) + * [CVE-2014-4699](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699) * [exp-db](https://www.exploit-db.com/exploits/34134/) ## Kernels diff --git a/2014/CVE-2014-5284/README.md b/2014/CVE-2014-5284/README.md index 6139748..2817db2 100644 --- a/2014/CVE-2014-5284/README.md +++ b/2014/CVE-2014-5284/README.md @@ -3,7 +3,7 @@ CVE-2014-5284 Vulnerability reference: - * [CVE-2014-5284](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5284) + * [CVE-2014-5284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5284) * [exp-db](https://www.exploit-db.com/exploits/35234/) diff --git a/2015/CVE-2015-7547/README.md b/2015/CVE-2015-7547/README.md index f85b6fb..4bd8114 100644 --- a/2015/CVE-2015-7547/README.md +++ b/2015/CVE-2015-7547/README.md @@ -3,7 +3,7 @@ CVE-2015-7547 Vulnerability reference: - * [CVE-2015-7547](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547) + * [CVE-2015-7547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547) * [exp-db](https://www.exploit-db.com/exploits/39454/) ## Glibc diff --git a/2016/CVE-2016-0728/README.md b/2016/CVE-2016-0728/README.md index 82c5e14..bb9ef67 100644 --- a/2016/CVE-2016-0728/README.md +++ b/2016/CVE-2016-0728/README.md @@ -3,7 +3,7 @@ CVE-2016-0728 Vulnerability reference: - * [CVE-2016-0728](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0728) + * [CVE-2016-0728](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0728) ## Kernels ``` diff --git a/2016/CVE-2016-2384/README.md b/2016/CVE-2016-2384/README.md index 8316f41..d6a84aa 100755 --- a/2016/CVE-2016-2384/README.md +++ b/2016/CVE-2016-2384/README.md @@ -1,7 +1,7 @@ CVE-2016-2384 ============= -- [CVE-2016-2384](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384) +- [CVE-2016-2384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384) This is a proof-of-concept exploit for the vulnerability in the usb-midi Linux kernel driver ([CVE-2016-2384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384)). Requires physical access to the machine. diff --git a/2016/CVE-2016-5195/README.md b/2016/CVE-2016-5195/README.md index 2777306..d6c7c6b 100644 --- a/2016/CVE-2016-5195/README.md +++ b/2016/CVE-2016-5195/README.md @@ -15,7 +15,7 @@ All code, images and documentation in this page and the website is in the public ``` Vulnerability reference: - * [CVE-2016-5195](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-5195) + * [CVE-2016-5195](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-5195) * [Table of PoCs](https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs) * [exp-db](https://www.exploit-db.com/exploits/40616/) diff --git a/2016/CVE-2016-9793/README.md b/2016/CVE-2016-9793/README.md index 4a60209..ee48914 100755 --- a/2016/CVE-2016-9793/README.md +++ b/2016/CVE-2016-9793/README.md @@ -1,9 +1,9 @@ CVE-2016-9793 ============= -- [CVE-2016-9793](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793) +- [CVE-2016-9793](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793) -This is a proof-of-concept local root exploit for the vulnerability in the SO\_SNDBUFFORCE and SO\_RCVBUFFORCE socket options implementation [CVE-2016-9793](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793). +This is a proof-of-concept local root exploit for the vulnerability in the SO\_SNDBUFFORCE and SO\_RCVBUFFORCE socket options implementation [CVE-2016-9793](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793). Requires CAP\_NET\_ADMIN capability. Timeline: diff --git a/2017/CVE-2017-5123/README.md b/2017/CVE-2017-5123/README.md index 41e389e..dca3ba8 100644 --- a/2017/CVE-2017-5123/README.md +++ b/2017/CVE-2017-5123/README.md @@ -3,7 +3,7 @@ CVE-2017-5123 Vulnerability reference: - * [CVE-2017-5123](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5123) + * [CVE-2017-5123](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5123) ## Kernels ``` diff --git a/2017/CVE-2017-6074/README.md b/2017/CVE-2017-6074/README.md index 604db43..a501b11 100755 --- a/2017/CVE-2017-6074/README.md +++ b/2017/CVE-2017-6074/README.md @@ -1,9 +1,9 @@ CVE-2017-6074 ============= -- [CVE-2017-6074](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074) +- [CVE-2017-6074](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074) -This is a proof-of-concept local root exploit for the vulnerability in the DCCP protocol implementation [CVE-2017-6074](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6074). +This is a proof-of-concept local root exploit for the vulnerability in the DCCP protocol implementation [CVE-2017-6074](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6074). Includes a semireliable SMEP/SMAP bypass (the kernel might crash shorty after the exploit succeds). Some details: http://www.openwall.com/lists/oss-security/2017/02/26/2 diff --git a/2017/CVE-2017-7308/README.md b/2017/CVE-2017-7308/README.md index ecad8b1..3726220 100755 --- a/2017/CVE-2017-7308/README.md +++ b/2017/CVE-2017-7308/README.md @@ -1,8 +1,8 @@ CVE-2017-7308 ============= -- [CVE-2017-7308](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308) +- [CVE-2017-7308](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308) -This is a proof-of-concept local root exploit for the vulnerability in the AF\_PACKET sockets implementation [CVE-2017-7308](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6074). +This is a proof-of-concept local root exploit for the vulnerability in the AF\_PACKET sockets implementation [CVE-2017-7308](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6074). Details are here: https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html diff --git a/2017/CVE-2017-7494/README.md b/2017/CVE-2017-7494/README.md index 5bc445b..296a39b 100644 --- a/2017/CVE-2017-7494/README.md +++ b/2017/CVE-2017-7494/README.md @@ -3,7 +3,7 @@ CVE-2017-7494 Vulnerability reference: - * [CVE-2016-0728](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7494) + * [CVE-2016-0728](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7494) * [exp-db](https://www.exploit-db.com/exploits/42060/) ## Samba