metasploit-framework/modules/exploits
HD Moore ea204ee0ff API change for the HTML mixin, the send_response method is no longer overloaded, instead exploits must call send_response_html to enable HTML evasion. The old method caused problems when a exploit needed HTML and non-HTML response capabilities
git-svn-id: file:///home/svn/framework3/trunk@4173 4d416f70-5f16-0410-b530-b9f4589650da
2006-12-10 03:26:53 +00:00
..
hpux/lpd Another port 2006-01-16 04:02:38 +00:00
irix/lpd Reference updates 2006-11-28 17:18:43 +00:00
linux Reference updates 2006-11-28 17:18:43 +00:00
multi API change for the HTML mixin, the send_response method is no longer overloaded, instead exploits must call send_response_html to enable HTML evasion. The old method caused problems when a exploit needed HTML and non-HTML response capabilities 2006-12-10 03:26:53 +00:00
osx Reference updates 2006-11-28 17:18:43 +00:00
private API change for the HTML mixin, the send_response method is no longer overloaded, instead exploits must call send_response_html to enable HTML evasion. The old method caused problems when a exploit needed HTML and non-HTML response capabilities 2006-12-10 03:26:53 +00:00
solaris Reference updates 2006-11-28 17:18:43 +00:00
test updated target name 2006-10-17 01:59:09 +00:00
unix Reference updates 2006-11-28 17:18:43 +00:00
windows API change for the HTML mixin, the send_response method is no longer overloaded, instead exploits must call send_response_html to enable HTML evasion. The old method caused problems when a exploit needed HTML and non-HTML response capabilities 2006-12-10 03:26:53 +00:00