Files
metasploit-gs/dev/porting/stalled.txt
T
HD Moore c22ba98ad6 Exploit porting queue
git-svn-id: file:///home/svn/incoming/trunk@3110 4d416f70-5f16-0410-b530-b9f4589650da
2005-11-26 00:00:09 +00:00

33 lines
760 B
Plaintext

The following exploits require some form of TCPServer mixin that
does not change their stance to Passive:
backupexec_dump.rb
calicclnt_getconfig.rb
google_proxystylesheet_exec.rb
hpux_ftpd_preauth_list.rb
ie_javaprxy.rb
smb_sniffer.rb
The following exploits require the cmd payloads to be completed:
awstats_configdir_exec.rb
barracuda_img_exec.rb
cacti_graphimage_exec.rb
cvstrac_exec.rb
distcc_exec.rb
google_proxystylesheet_exec.rb
hpux_lpd_exec.rb
irix_lpsched_exec.rb
local_shell.rb
openview_connectednodes_exec.rb
openview_omniback.rb
payload_handler.rb
php_vbulletin_template.rb
php_wordpress_lastpost.rb
php_xmlrpc_eval.rb
phpbb_highlight.rb
solaris_lpd_exec.rb
solaris_sadmind_exec.rb
solaris_ttyprompt.rb
wzdftpd_site.rb