Updated exploit mappings
git-svn-id: file:///home/svn/framework3/trunk@4258 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
de5c27e39f
commit
8f06dd38e8
|
@ -2,10 +2,7 @@ Unfinished modules
|
|||
==================
|
||||
|
||||
arkeia_agent_access
|
||||
awstats_configdir_exec
|
||||
barracuda_img_exec
|
||||
blackice_pam_icq
|
||||
cacti_graphimage_exec
|
||||
calicclnt_getconfig
|
||||
calicserv_getconfig
|
||||
exchange2000_xexch50
|
||||
|
@ -17,8 +14,6 @@ Unfinished modules
|
|||
lyris_attachment_mssql
|
||||
mailenable_auth_header
|
||||
mcafee_epolicy_source
|
||||
openview_connectednodes_exec
|
||||
openview_omniback
|
||||
pajax_remote_exec
|
||||
php_wordpress_lastpost
|
||||
phpbb_highlight
|
||||
|
@ -50,6 +45,8 @@ Completed modules
|
|||
apache_chunked_win32 exploit/windows/http/apache_chunked
|
||||
arkeia_type77_macos exploit/osx/arkeia/type77
|
||||
arkeia_type77_win32 exploit/windows/arkeia/type77
|
||||
awstats_configdir_exec exploit/unix/webapp/awstats_configdir_exec
|
||||
barracuda_img_exec exploit/unix/webapp/barracuda_img_exec
|
||||
backupexec_agent exploit/windows/backupexec/remote_agent
|
||||
backupexec_dump auxiliary/admin/backupexec/dump
|
||||
backupexec_ns exploit/windows/backupexec/name_service
|
||||
|
@ -63,6 +60,7 @@ Completed modules
|
|||
cabrightstor_sqlagent exploit/windows/brightstor/sql_agent
|
||||
cabrightstor_uniagent exploit/windows/brightstor/universal_agent
|
||||
cacam_logsecurity_win32 exploit/windows/unicenter/cam_log_security
|
||||
cacti_graphimage_exec exploit/unix/webapp/cacti_graphimage_exec
|
||||
cesarftp_mkd exploit/windows/ftp/cesarftp_mkd
|
||||
distcc_exec exploit/unix/misc/distcc_exec
|
||||
edirectory_imonitor exploit/windows/http/edirectory_imonitor
|
||||
|
@ -116,6 +114,8 @@ Completed modules
|
|||
netterm_netftpd_user_overflow exploit/windows/ftp/netterm_netftpd_user
|
||||
niprint_lpd exploit/windows/lpd/niprint
|
||||
novell_messenger_acceptlang exploit/windows/http/novell_messenger_acceptlang
|
||||
openview_connectednodes_exec exploit/unix/webapp/openview_connectednodes_exec
|
||||
openview_omniback_exec exploit/unix/misc/openview_omniback_exec
|
||||
oracle9i_xdb_ftp exploit/windows/ftp/oracle9i_xdb_ftp_unlock
|
||||
oracle9i_xdb_ftp_pass exploit/windows/ftp/oracle9i_xdb_ftp_pass
|
||||
oracle9i_xdb_http exploit/windows/http/oracle9i_xdb_pass
|
||||
|
|
Loading…
Reference in New Issue