Updated exploit mappings

git-svn-id: file:///home/svn/framework3/trunk@4258 4d416f70-5f16-0410-b530-b9f4589650da
unstable
HD Moore 2007-01-05 04:28:45 +00:00
parent de5c27e39f
commit 8f06dd38e8
1 changed files with 6 additions and 6 deletions

View File

@ -2,10 +2,7 @@ Unfinished modules
================== ==================
arkeia_agent_access arkeia_agent_access
awstats_configdir_exec
barracuda_img_exec
blackice_pam_icq blackice_pam_icq
cacti_graphimage_exec
calicclnt_getconfig calicclnt_getconfig
calicserv_getconfig calicserv_getconfig
exchange2000_xexch50 exchange2000_xexch50
@ -17,8 +14,6 @@ Unfinished modules
lyris_attachment_mssql lyris_attachment_mssql
mailenable_auth_header mailenable_auth_header
mcafee_epolicy_source mcafee_epolicy_source
openview_connectednodes_exec
openview_omniback
pajax_remote_exec pajax_remote_exec
php_wordpress_lastpost php_wordpress_lastpost
phpbb_highlight phpbb_highlight
@ -50,6 +45,8 @@ Completed modules
apache_chunked_win32 exploit/windows/http/apache_chunked apache_chunked_win32 exploit/windows/http/apache_chunked
arkeia_type77_macos exploit/osx/arkeia/type77 arkeia_type77_macos exploit/osx/arkeia/type77
arkeia_type77_win32 exploit/windows/arkeia/type77 arkeia_type77_win32 exploit/windows/arkeia/type77
awstats_configdir_exec exploit/unix/webapp/awstats_configdir_exec
barracuda_img_exec exploit/unix/webapp/barracuda_img_exec
backupexec_agent exploit/windows/backupexec/remote_agent backupexec_agent exploit/windows/backupexec/remote_agent
backupexec_dump auxiliary/admin/backupexec/dump backupexec_dump auxiliary/admin/backupexec/dump
backupexec_ns exploit/windows/backupexec/name_service backupexec_ns exploit/windows/backupexec/name_service
@ -63,6 +60,7 @@ Completed modules
cabrightstor_sqlagent exploit/windows/brightstor/sql_agent cabrightstor_sqlagent exploit/windows/brightstor/sql_agent
cabrightstor_uniagent exploit/windows/brightstor/universal_agent cabrightstor_uniagent exploit/windows/brightstor/universal_agent
cacam_logsecurity_win32 exploit/windows/unicenter/cam_log_security cacam_logsecurity_win32 exploit/windows/unicenter/cam_log_security
cacti_graphimage_exec exploit/unix/webapp/cacti_graphimage_exec
cesarftp_mkd exploit/windows/ftp/cesarftp_mkd cesarftp_mkd exploit/windows/ftp/cesarftp_mkd
distcc_exec exploit/unix/misc/distcc_exec distcc_exec exploit/unix/misc/distcc_exec
edirectory_imonitor exploit/windows/http/edirectory_imonitor edirectory_imonitor exploit/windows/http/edirectory_imonitor
@ -116,6 +114,8 @@ Completed modules
netterm_netftpd_user_overflow exploit/windows/ftp/netterm_netftpd_user netterm_netftpd_user_overflow exploit/windows/ftp/netterm_netftpd_user
niprint_lpd exploit/windows/lpd/niprint niprint_lpd exploit/windows/lpd/niprint
novell_messenger_acceptlang exploit/windows/http/novell_messenger_acceptlang novell_messenger_acceptlang exploit/windows/http/novell_messenger_acceptlang
openview_connectednodes_exec exploit/unix/webapp/openview_connectednodes_exec
openview_omniback_exec exploit/unix/misc/openview_omniback_exec
oracle9i_xdb_ftp exploit/windows/ftp/oracle9i_xdb_ftp_unlock oracle9i_xdb_ftp exploit/windows/ftp/oracle9i_xdb_ftp_unlock
oracle9i_xdb_ftp_pass exploit/windows/ftp/oracle9i_xdb_ftp_pass oracle9i_xdb_ftp_pass exploit/windows/ftp/oracle9i_xdb_ftp_pass
oracle9i_xdb_http exploit/windows/http/oracle9i_xdb_pass oracle9i_xdb_http exploit/windows/http/oracle9i_xdb_pass