Start of the compatibility docs
git-svn-id: file:///home/svn/framework3/trunk@4168 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
2c9cd3560e
commit
0e3053c0fd
|
@ -0,0 +1,5 @@
|
|||
This directory contains 2.7 -> 3.0 compatibility information.
|
||||
|
||||
|
||||
Exploit Modules: exploits.txt
|
||||
Payload Modules: payloads.txt
|
|
@ -0,0 +1,163 @@
|
|||
Unfinished modules
|
||||
==================
|
||||
|
||||
arkeia_agent_access
|
||||
awstats_configdir_exec
|
||||
badblue_ext_overflow
|
||||
bakbone_netvault_heap
|
||||
barracuda_img_exec
|
||||
blackice_pam_icq
|
||||
bomberclone_overflow_win32
|
||||
cacti_graphimage_exec
|
||||
calicclnt_getconfig
|
||||
calicserv_getconfig
|
||||
exchange2000_xexch50
|
||||
freeftpd_key_exchange
|
||||
gnu_mailutils_imap4d
|
||||
google_proxystylesheet_exec
|
||||
hpux_ftpd_preauth_list
|
||||
ie_createobject
|
||||
ie_createtextrange
|
||||
ie_iscomponentinstalled
|
||||
iis_source_dumper
|
||||
lyris_attachment_mssql
|
||||
mailenable_auth_header
|
||||
mcafee_epolicy_source
|
||||
mercantec_softcart
|
||||
mercur_imap_select_overflow
|
||||
ms05_030_nntp
|
||||
openview_connectednodes_exec
|
||||
openview_omniback
|
||||
pajax_remote_exec
|
||||
php_wordpress_lastpost
|
||||
phpbb_highlight
|
||||
phpnuke_search_module
|
||||
poptop_negative_read
|
||||
privatewire_gateway_win32
|
||||
putty_ssh
|
||||
realvnc_41_bypass
|
||||
realvnc_client
|
||||
samba_trans2open
|
||||
sambar6_search_results
|
||||
seattlelab_mail_55
|
||||
securecrt_ssh1
|
||||
smb_sniffer
|
||||
solaris_kcms_readfile
|
||||
solaris_snmpxdmid
|
||||
sphpblog_file_upload
|
||||
squid_ntlm_authenticate
|
||||
svnserve_date
|
||||
sybase_easerver
|
||||
sygate_policy_manager
|
||||
ultravnc_client
|
||||
uow_imap4_copy
|
||||
uow_imap4_lsub
|
||||
warftpd_165_pass
|
||||
wmailserver_smtp
|
||||
wzdftpd_sitem
|
||||
|
||||
|
||||
Completed modules
|
||||
=================
|
||||
|
||||
afp_loginext exploit/osx/afp/loginext
|
||||
aim_goaway exploit/windows/browser/aim_goaway
|
||||
altn_webadmin exploit/windows/http/altn_webadmin
|
||||
apache_chunked_win32 exploit/windows/http/apache_chunked
|
||||
arkeia_type77_macos exploit/osx/arkeia/type77
|
||||
arkeia_type77_win32 exploit/windows/arkeia/type77
|
||||
backupexec_agent exploit/windows/backupexec/remote_agent
|
||||
backupexec_dump auxiliary/admin/backupexec/dump
|
||||
backupexec_ns exploit/windows/backupexec/name_service
|
||||
backupexec_registry auxiliary/admin/backupexec/registry
|
||||
bluecoat_winproxy exploit/windows/proxy/bluecoat_winproxy_host
|
||||
cabrightstor_disco exploit/windows/brightstor/discovery_udp
|
||||
cabrightstor_disco_servicepc exploit/windows/brightstor/discovery_tcp
|
||||
cabrightstor_sqlagent exploit/windows/brightstor/sql_agent
|
||||
cabrightstor_uniagent exploit/windows/brightstor/universal_agent
|
||||
cacam_logsecurity_win32 exploit/windows/unicenter/cam_log_security
|
||||
cesarftp_mkd exploit/windows/ftp/cesarftp_mkd
|
||||
distcc_exec exploit/unix/misc/distcc_exec
|
||||
edirectory_imonitor exploit/windows/http/edirectory_imonitor
|
||||
edirectory_imonitor2 exploit/windows/http/edirectory_host
|
||||
eiq_license exploit/windows/misc/eiqnetworks_esa
|
||||
eudora_imap exploit/windows/imap/eudora_list
|
||||
firefox_queryinterface_linux exploit/multi/browser/firefox_queryinterface
|
||||
firefox_queryinterface_osx exploit/multi/browser/firefox_queryinterface
|
||||
freeftpd_user exploit/windows/ftp/freeftpd_user
|
||||
freesshd_key_exchange exploit/windows/ssh/freesshd_key_exchange
|
||||
futuresoft_tftpd exploit/windows/tftp/futuresoft_transfermode
|
||||
globalscapeftp_user_input exploit/windows/ftp/globalscapeftp_input
|
||||
hpux_lpd_exec exploit/hpux/lpd/cleanup_exec
|
||||
ia_webmail exploit/windows/http/ia_webmail
|
||||
icecast_header exploit/windows/http/icecast_header
|
||||
ie_objecttype exploit/windows/browser/ms03_020_ie_objecttype
|
||||
ie_vml_rectfill exploit/windows/browser/ms06_055_vml_method
|
||||
ie_webview_setslice exploit/windows/browser/webview_setslice
|
||||
ie_xp_pfv_metafile exploit/windows/browser/ms06_001_wmf_setabortproc
|
||||
iis40_htr exploit/windows/iis/ms02_018_htr
|
||||
iis50_printer_overflow exploit/windows/iis/ms01_023_printer
|
||||
iis50_webdav_ntdll exploit/windows/iis/ms03_007_ntdll_webdav
|
||||
iis_fp30reg_chunked exploit/windows/isapi/fp30reg_chunked
|
||||
iis_nsiislog_post exploit/windows/isapi/nsiislog_post
|
||||
iis_w3who_overflow exploit/windows/isapi/w3who_query
|
||||
imail_imap_delete exploit/windows/imap/imail_delete
|
||||
imail_ldap exploit/windows/ldap/imail_thc
|
||||
irix_lpsched_exec exploit/irix/lpd/tagprinter_exec
|
||||
kerio_auth exploit/windows/firewall/kerio_auth
|
||||
lsass_ms04_011 exploit/windows/smb/ms04_011_lsass
|
||||
mailenable_imap exploit/windows/imap/mailenable_status
|
||||
mailenable_imap_w3c exploit/windows/imap/mailenable_w3c_select
|
||||
maxdb_webdbm_get_overflow exploit/windows/http/maxdb_webdbm_get_overflow
|
||||
mdaemon_imap_cram_md5 exploit/windows/imap/mdaemon_cram_md5
|
||||
mercury_imap exploit/windows/imap/mercury_rename
|
||||
minishare_get_overflow exploit/windows/http/minishare_get_overflow
|
||||
mozilla_compareto exploit/multi/browser/mozilla_compareto
|
||||
ms05_039_pnp exploit/windows/smb/ms05_039_pnp
|
||||
msasn1_ms04_007_killbill exploit/windows/smb/ms04_007_killbill
|
||||
msmq_deleteobject_ms05_017 exploit/windows/dcerpc/ms05_017_msmq
|
||||
msrpc_dcom_ms03_026 exploit/windows/dcerpc/ms03_026_dcom
|
||||
mssql2000_preauthentication exploit/windows/mssql/ms02_056_hello
|
||||
mssql2000_resolution exploit/windows/mssql/ms02_039_slammer
|
||||
netapi_ms06_040 exploit/windows/smb/ms06_040_netapi
|
||||
netterm_netftpd_user_overflow exploit/windows/ftp/netterm_netftpd_user
|
||||
niprint_lpd exploit/windows/lpd/niprint
|
||||
novell_messenger_acceptlang exploit/windows/http/novell_messenger_acceptlang
|
||||
oracle9i_xdb_ftp exploit/windows/ftp/oracle9i_xdb_ftp_unlock
|
||||
oracle9i_xdb_ftp_pass exploit/windows/ftp/oracle9i_xdb_ftp_pass
|
||||
oracle9i_xdb_http exploit/windows/http/oracle9i_xdb_pass
|
||||
payload_handler exploit/multi/handler
|
||||
peercast_url_linux exploit/linux/http/peercast_url
|
||||
peercast_url_win32 exploit/windows/http/peercast_url.
|
||||
php_vbulletin_template exploit/unix/http/php_vbulletin_template
|
||||
php_xmlrpc_eval exploit/unix/http/php_xmlrpc_eval
|
||||
realserver_describe_linux exploit/multi/realserver/describe
|
||||
rras_ms06_025 exploit/windows/smb/ms06_025_rras
|
||||
rras_ms06_025_rasman exploit/windows/smb/ms06_025_rasmans_reg
|
||||
rsa_iiswebagent_redirect exploit/windows/isapi/rsa_webagent_redirect
|
||||
safari_safefiles_exec exploit/osx/browser/safari_metadata_archive
|
||||
samba_nttrans exploit/multi/samba/nttrans
|
||||
samba_trans2open_osx exploit/osx/samba/trans2open
|
||||
samba_trans2open_solsparc exploit/solaris/samba/trans2open
|
||||
sentinel_lm7_overflow exploit/windows/license/sentinel_lm7_udp
|
||||
servu_mdtm_overflow exploit/windows/ftp/servu_mdtm
|
||||
shixxnote_font exploit/windows/misc/shixxnote_font
|
||||
shoutcast_format_win32 exploit/windows/http/shoutcast_format
|
||||
slimftpd_list_concat exploit/windows/ftp/slimftpd_list_concat
|
||||
solaris_dtspcd_noir exploit/solaris/dtspcd/heap_noir
|
||||
solaris_lpd_exec exploit/solaris/lpd/sendmail_exec
|
||||
solaris_lpd_unlink auxiliary/dos/solaris/lpd/cascade_delete
|
||||
solaris_sadmind_exec exploit/solaris/sunrpc/solaris_sadmind_exec
|
||||
solaris_ttyprompt exploit/solaris/telnet/ttyprompt
|
||||
tftpd32_long_filename exploit/windows/tftp/tftpd32_long_filename
|
||||
trackercam_phparg_overflow exploit/windows/http/trackercam_phparg_overflow
|
||||
ut2004_secure_linux exploit/linux/games/ut2004_secure
|
||||
ut2004_secure_win32 exploit/windows/games/ut2004_secure
|
||||
warftpd_165_user exploit/windows/ftp/warftpd_165_user
|
||||
webstar_ftp_user exploit/osx/ftp/webstar_ftp_user
|
||||
winamp_playlist_unc exploit/windows/browser/winamp_playlist_unc
|
||||
windows_ssl_pct exploit/windows/ssl/ms04_011_pct
|
||||
wins_ms04_045 exploit/windows/wins/ms04_045_wins
|
||||
wsftp_server_503_mkd exploit/windows/ftp/wsftp_server_503_mkd
|
||||
ypops_smtp exploit/windows/smtp/ypops_overflow1
|
||||
zenworks_desktop_agent exploit/windows/novell/zenworks_desktop_agent
|
Loading…
Reference in New Issue