msf >use exploits/
use exploit/aix/rpc_cmsd_opcode21
use exploit/aix/rpc_ttdbserverd_realpath
use exploit/android/browser/samsung_knox_smdm_url
use exploit/android/browser/webview_addjavascriptinterface
use exploit/android/fileformat/adobe_reader_pdf_js_interface
use exploit/android/local/futex_requeue
use exploit/apple_ios/browser/safari_libtiff
use exploit/apple_ios/email/mobilemail_libtiff
use exploit/apple_ios/ssh/cydia_default_ssh
use exploit/bsdi/softcart/mercantec_softcart
use exploit/dialup/multi/login/manyargs
use exploit/firefox/local/exec_shellcode
use exploit/freebsd/ftp/proftp_telnet_iac
use exploit/freebsd/local/mmap
use exploit/freebsd/misc/citrix_netscaler_soap_bof
use exploit/freebsd/samba/trans2open
use exploit/freebsd/tacacs/xtacacsd_report
use exploit/freebsd/telnet/telnet_encrypt_keyid
use exploit/hpux/lpd/cleanup_exec
use exploit/irix/lpd/tagprinter_exec
use exploit/linux/antivirus/escan_password_exec
use exploit/linux/browser/adobe_flashplayer_aslaunch
use exploit/linux/ftp/proftp_sreplace
use exploit/linux/ftp/proftp_telnet_iac
use exploit/linux/games/ut2004_secure
use exploit/linux/http/alcatel_omnipcx_mastercgi_exec
use exploit/linux/http/alienvault_sqli_exec
use exploit/linux/http/astium_sqli_upload
use exploit/linux/http/belkin_login_bof
use exploit/linux/http/centreon_sqli_exec
use exploit/linux/http/cfme_manageiq_evm_upload_exec
use exploit/linux/http/ddwrt_cgibin_exec
use exploit/linux/http/dlink_authentication_cgi_bof
use exploit/linux/http/dlink_command_php_exec_noauth
use exploit/linux/http/dlink_diagnostic_exec_noauth
use exploit/linux/http/dlink_dir300_exec_telnet
use exploit/linux/http/dlink_dir605l_captcha_bof
use exploit/linux/http/dlink_dir615_up_exec
use exploit/linux/http/dlink_dspw215_info_cgi_bof
use exploit/linux/http/dlink_hedwig_cgi_bof
use exploit/linux/http/dlink_hnap_bof
use exploit/linux/http/dlink_upnp_exec_noauth
use exploit/linux/http/dolibarr_cmd_exec
use exploit/linux/http/dreambox_openpli_shell
use exploit/linux/http/esva_exec
use exploit/linux/http/f5_icontrol_exec
use exploit/linux/http/foreman_openstack_satellite_code_exec
use exploit/linux/http/fritzbox_echo_exec
use exploit/linux/http/gitlist_exec
use exploit/linux/http/gpsd_format_string
use exploit/linux/http/hp_system_management
use exploit/linux/http/kloxo_sqli
use exploit/linux/http/lifesize_uvc_ping_rce
use exploit/linux/http/linksys_apply_cgi
use exploit/linux/http/linksys_e1500_apply_exec
use exploit/linux/http/linksys_themoon_exec
use exploit/linux/http/linksys_wrt110_cmd_exec
use exploit/linux/http/linksys_wrt160nv2_apply_exec
use exploit/linux/http/linksys_wrt54gl_apply_exec
use exploit/linux/http/multi_ncc_ping_exec
use exploit/linux/http/mutiny_frontend_upload
use exploit/linux/http/netgear_dgn1000b_setup_exec
use exploit/linux/http/netgear_dgn2200b_pppoe_exec
use exploit/linux/http/netgear_readynas_exec
use exploit/linux/http/nginx_chunked_size
use exploit/linux/http/openfiler_networkcard_exec
use exploit/linux/http/pandora_fms_exec
use exploit/linux/http/pandora_fms_sqli
use exploit/linux/http/peercast_url
use exploit/linux/http/pineapp_ldapsyncnow_exec
use exploit/linux/http/pineapp_livelog_exec
use exploit/linux/http/pineapp_test_li_conn_exec
use exploit/linux/http/piranha_passwd_exec
use exploit/linux/http/raidsonic_nas_ib5220_exec_noauth
use exploit/linux/http/railo_cfml_rfi
use exploit/linux/http/seagate_nas_php_exec_noauth
use exploit/linux/http/smt_ipmi_close_window_bof
use exploit/linux/http/sophos_wpa_iface_exec
use exploit/linux/http/sophos_wpa_sblistpack_exec
use exploit/linux/http/symantec_web_gateway_exec
use exploit/linux/http/symantec_web_gateway_file_upload
use exploit/linux/http/symantec_web_gateway_lfi
use exploit/linux/http/symantec_web_gateway_pbcontrol
use exploit/linux/http/symantec_web_gateway_restore
use exploit/linux/http/synology_dsm_sliceupload_exec_noauth
use exploit/linux/http/vap2500_tools_command_exec
use exploit/linux/http/vcms_upload
use exploit/linux/http/wanem_exec
use exploit/linux/http/webcalendar_settings_exec
use exploit/linux/http/webid_converter
use exploit/linux/http/zabbix_sqli
use exploit/linux/http/zen_load_balancer_exec
use exploit/linux/http/zenoss_showdaemonxmlconfig_exec
use exploit/linux/ids/alienvault_centerd_soap_exec
use exploit/linux/ids/snortbopre
use exploit/linux/imap/imap_uw_lsub
use exploit/linux/local/desktop_privilege_escalation
use exploit/linux/local/hp_smhstart
use exploit/linux/local/kloxo_lxsuexec
use exploit/linux/local/pkexec
use exploit/linux/local/sophos_wpa_clear_keys
use exploit/linux/local/udev_netlink
use exploit/linux/local/vmware_mount
use exploit/linux/local/zpanel_zsudo
use exploit/linux/misc/accellion_fta_mpipe2
use exploit/linux/misc/drb_remote_codeexec
use exploit/linux/misc/gld_postfix
use exploit/linux/misc/hikvision_rtsp_bof
use exploit/linux/misc/hp_data_protector_cmd_exec
use exploit/linux/misc/hp_nnmi_pmd_bof
use exploit/linux/misc/hp_vsa_login_bof
use exploit/linux/misc/hplip_hpssd_exec
use exploit/linux/misc/ib_inet_connect
use exploit/linux/misc/ib_jrd8_create_database
use exploit/linux/misc/ib_open_marker_file
use exploit/linux/misc/ib_pwd_db_aliased
use exploit/linux/misc/lprng_format_string
use exploit/linux/misc/mongod_native_helper
use exploit/linux/misc/nagios_nrpe_arguments
use exploit/linux/misc/netsupport_manager_agent
use exploit/linux/misc/novell_edirectory_ncp_bof
use exploit/linux/misc/sercomm_exec
use exploit/linux/misc/zabbix_server_exec
use exploit/linux/mysql/mysql_yassl_getname
use exploit/linux/mysql/mysql_yassl_hello
use exploit/linux/pop3/cyrus_pop3d_popsubfolders
use exploit/linux/postgres/postgres_payload
use exploit/linux/pptp/poptop_negative_read
use exploit/linux/proxy/squid_ntlm_authenticate
use exploit/linux/samba/chain_reply
use exploit/linux/samba/lsa_transnames_heap
use exploit/linux/samba/setinfopolicy_heap
use exploit/linux/samba/trans2open
use exploit/linux/smtp/exim4_dovecot_exec
use exploit/linux/smtp/exim_gethostbyname_bof
use exploit/linux/ssh/ceragon_fibeair_known_privkey
use exploit/linux/ssh/f5_bigip_known_privkey
use exploit/linux/ssh/loadbalancerorg_enterprise_known_privkey
use exploit/linux/ssh/quantum_dxi_known_privkey
use exploit/linux/ssh/quantum_vmpro_backdoor
use exploit/linux/ssh/symantec_smg_ssh
use exploit/linux/telnet/telnet_encrypt_keyid
use exploit/linux/upnp/dlink_upnp_msearch_exec
use exploit/linux/upnp/miniupnpd_soap_bof
use exploit/multi/browser/firefox_escape_retval
use exploit/multi/browser/firefox_proto_crmfrequest
use exploit/multi/browser/firefox_proxy_prototype
use exploit/multi/browser/firefox_queryinterface
use exploit/multi/browser/firefox_svg_plugin
use exploit/multi/browser/firefox_tostring_console_injection
use exploit/multi/browser/firefox_xpi_bootstrapped_addon
use exploit/multi/browser/itms_overflow
use exploit/multi/browser/java_atomicreferencearray
use exploit/multi/browser/java_calendar_deserialize
use exploit/multi/browser/java_getsoundbank_bof
use exploit/multi/browser/java_jre17_driver_manager
use exploit/multi/browser/java_jre17_exec
use exploit/multi/browser/java_jre17_glassfish_averagerangestatisticimpl
use exploit/multi/browser/java_jre17_jaxws
use exploit/multi/browser/java_jre17_jmxbean
use exploit/multi/browser/java_jre17_jmxbean_2
use exploit/multi/browser/java_jre17_method_handle
use exploit/multi/browser/java_jre17_provider_skeleton
use exploit/multi/browser/java_jre17_reflection_types
use exploit/multi/browser/java_rhino
use exploit/multi/browser/java_rmi_connection_impl
use exploit/multi/browser/java_setdifficm_bof
use exploit/multi/browser/java_signed_applet
use exploit/multi/browser/java_storeimagearray
use exploit/multi/browser/java_trusted_chain
use exploit/multi/browser/java_verifier_field_access
use exploit/multi/browser/mozilla_compareto
use exploit/multi/browser/mozilla_navigatorjava
use exploit/multi/browser/opera_configoverwrite
use exploit/multi/browser/opera_historysearch
use exploit/multi/browser/qtjava_pointer
use exploit/multi/elasticsearch/script_mvel_rce
use exploit/multi/elasticsearch/search_groovy_script
use exploit/multi/fileformat/adobe_u3d_meshcont
use exploit/multi/fileformat/js_unpacker_eval_injection
use exploit/multi/fileformat/maple_maplet
use exploit/multi/fileformat/nodejs_js_yaml_load_code_exec
use exploit/multi/fileformat/peazip_command_injection
use exploit/multi/ftp/pureftpd_bash_env_exec
use exploit/multi/ftp/wuftpd_site_exec_format
use exploit/multi/gdb/gdb_server_exec
use exploit/multi/handler
use exploit/multi/http/activecollab_chat
use exploit/multi/http/ajaxplorer_checkinstall_exec
use exploit/multi/http/apache_mod_cgi_bash_env_exec
use exploit/multi/http/apache_roller_ognl_injection
use exploit/multi/http/apprain_upload_exec
use exploit/multi/http/auxilium_upload_exec
use exploit/multi/http/axis2_deployer
use exploit/multi/http/cisco_dcnm_upload
use exploit/multi/http/coldfusion_rds
use exploit/multi/http/cups_bash_env_exec
use exploit/multi/http/cuteflow_upload_exec
use exploit/multi/http/dexter_casinoloader_exec
use exploit/multi/http/drupal_drupageddon
use exploit/multi/http/eventlog_file_upload
use exploit/multi/http/extplorer_upload_exec
use exploit/multi/http/familycms_less_exec
use exploit/multi/http/freenas_exec_raw
use exploit/multi/http/gestioip_exec
use exploit/multi/http/git_client_command_exec
use exploit/multi/http/gitlab_shell_exec
use exploit/multi/http/gitorious_graph
use exploit/multi/http/glassfish_deployer
use exploit/multi/http/glossword_upload_exec
use exploit/multi/http/glpi_install_rce
use exploit/multi/http/horde_href_backdoor
use exploit/multi/http/hp_sitescope_issuesiebelcmd
use exploit/multi/http/hp_sitescope_uploadfileshandler
use exploit/multi/http/hp_sys_mgmt_exec
use exploit/multi/http/hyperic_hq_script_console
use exploit/multi/http/ispconfig_php_exec
use exploit/multi/http/jboss_bshdeployer
use exploit/multi/http/jboss_deploymentfilerepository
use exploit/multi/http/jboss_invoke_deploy
use exploit/multi/http/jboss_maindeployer
use exploit/multi/http/jboss_seam_upload_exec
use exploit/multi/http/jenkins_script_console
use exploit/multi/http/kordil_edms_upload_exec
use exploit/multi/http/lcms_php_exec
use exploit/multi/http/log1cms_ajax_create_folder
use exploit/multi/http/manage_engine_dc_pmp_sqli
use exploit/multi/http/manageengine_auth_upload
use exploit/multi/http/manageengine_search_sqli
use exploit/multi/http/mantisbt_php_exec
use exploit/multi/http/mediawiki_thumb
use exploit/multi/http/mobilecartly_upload_exec
use exploit/multi/http/moodle_cmd_exec
use exploit/multi/http/movabletype_upgrade_exec
use exploit/multi/http/mutiny_subnetmask_exec
use exploit/multi/http/nas4free_php_exec
use exploit/multi/http/netwin_surgeftp_exec
use exploit/multi/http/op5_license
use exploit/multi/http/op5_welcome
use exploit/multi/http/openfire_auth_bypass
use exploit/multi/http/openmediavault_cmd_exec
use exploit/multi/http/openx_backdoor_php
use exploit/multi/http/opmanager_socialit_file_upload
use exploit/multi/http/oracle_reports_rce
use exploit/multi/http/pandora_upload_exec
use exploit/multi/http/php_cgi_arg_injection
use exploit/multi/http/php_volunteer_upload_exec
use exploit/multi/http/phpldapadmin_query_engine
use exploit/multi/http/phpmoadmin_exec
use exploit/multi/http/phpmyadmin_3522_backdoor
use exploit/multi/http/phpscheduleit_start_date
use exploit/multi/http/phptax_exec
use exploit/multi/http/phpwiki_ploticus_exec
use exploit/multi/http/plone_popen2
use exploit/multi/http/pmwiki_pagelist
use exploit/multi/http/polarcms_upload_exec
use exploit/multi/http/processmaker_exec
use exploit/multi/http/qdpm_upload_exec
use exploit/multi/http/rails_json_yaml_code_exec
use exploit/multi/http/rails_secret_deserialization
use exploit/multi/http/rails_xml_yaml_code_exec
use exploit/multi/http/rocket_servergraph_file_requestor_rce
use exploit/multi/http/sflog_upload_exec
use exploit/multi/http/sit_file_upload
use exploit/multi/http/snortreport_exec
use exploit/multi/http/solarwinds_store_manager_auth_filter
use exploit/multi/http/sonicwall_gms_upload
use exploit/multi/http/splunk_mappy_exec
use exploit/multi/http/splunk_upload_app_exec
use exploit/multi/http/spree_search_exec
use exploit/multi/http/spree_searchlogic_exec
use exploit/multi/http/struts_code_exec
use exploit/multi/http/struts_code_exec_classloader
use exploit/multi/http/struts_code_exec_exception_delegator
use exploit/multi/http/struts_code_exec_parameters
use exploit/multi/http/struts_default_action_mapper
use exploit/multi/http/struts_dev_mode
use exploit/multi/http/struts_include_params
use exploit/multi/http/stunshell_eval
use exploit/multi/http/stunshell_exec
use exploit/multi/http/sun_jsws_dav_options
use exploit/multi/http/testlink_upload_exec
use exploit/multi/http/tomcat_mgr_deploy
use exploit/multi/http/tomcat_mgr_upload
use exploit/multi/http/traq_plugin_exec
use exploit/multi/http/uptime_file_upload
use exploit/multi/http/v0pcr3w_exec
use exploit/multi/http/vbseo_proc_deutf
use exploit/multi/http/visual_mining_netcharts_upload
use exploit/multi/http/vtiger_install_rce
use exploit/multi/http/vtiger_php_exec
use exploit/multi/http/vtiger_soap_upload
use exploit/multi/http/webpagetest_upload_exec
use exploit/multi/http/wikka_spam_exec
use exploit/multi/http/x7chat2_php_exec
use exploit/multi/http/zabbix_script_exec
use exploit/multi/http/zenworks_control_center_upload
use exploit/multi/ids/snort_dce_rpc
use exploit/multi/misc/batik_svg_java
use exploit/multi/misc/hp_data_protector_exec_integutil
use exploit/multi/misc/indesign_server_soap
use exploit/multi/misc/java_jdwp_debugger
use exploit/multi/misc/java_jmx_server
use exploit/multi/misc/java_rmi_server
use exploit/multi/misc/openview_omniback_exec
use exploit/multi/misc/pbot_exec
use exploit/multi/misc/persistent_hpca_radexec_exec
use exploit/multi/misc/ra1nx_pubcall_exec
use exploit/multi/misc/veritas_netbackup_cmdexec
use exploit/multi/misc/wireshark_lwres_getaddrbyname
use exploit/multi/misc/wireshark_lwres_getaddrbyname_loop
use exploit/multi/misc/zend_java_bridge
use exploit/multi/ntp/ntp_overflow
use exploit/multi/php/php_unserialize_zval_cookie
use exploit/multi/realserver/describe
use exploit/multi/samba/nttrans
use exploit/multi/samba/usermap_script
use exploit/multi/sap/sap_mgmt_con_osexec_payload
use exploit/multi/sap/sap_soap_rfc_sxpg_call_system_exec
use exploit/multi/sap/sap_soap_rfc_sxpg_command_exec
use exploit/multi/script/web_delivery
use exploit/multi/ssh/sshexec
use exploit/multi/svn/svnserve_date
use exploit/multi/upnp/libupnp_ssdp_overflow
use exploit/multi//tincd_bof
use exploit/multi/wyse/hagent_untrusted_hsdata
use exploit/netware/smb/lsass_cifs
use exploit/netware/sunrpc/pkernel_callit
use exploit/osx/afp/loginext
use exploit/osx/arkeia/type77
use exploit/osx/browser/mozilla_mchannel
use exploit/osx/browser/safari_file_policy
use exploit/osx/browser/safari_metadata_archive
use exploit/osx/browser/safari_user_assisted_download_launch
use exploit/osx/browser/software_update
use exploit/osx/email/mailapp_image_exec
use exploit/osx/ftp/webstar_ftp_user
use exploit/osx/http/evocam_webserver
use exploit/osx/local/iokit_keyboard_root
use exploit/osx/local/nfs_mount_root
use exploit/osx/local/persistence
use exploit/osx/local/rootpipe
use exploit/osx/local/setuid_tunnelblick
use exploit/osx/local/setuid_viscosity
use exploit/osx/local/sudo_password_bypass
use exploit/osx/local/vmware_bash_function_root
use exploit/osx/mdns/upnp_location
use exploit/osx/misc/ufo_ai
use exploit/osx/rtsp/quicktime_rtsp_content_type
use exploit/osx/samba/lsa_transnames_heap
use exploit/solaris/dtspcd/heap_noir
use exploit/solaris/lpd/sendmail_exec
use exploit/solaris/samba/lsa_transnames_heap
use exploit/solaris/samba/trans2open
use exploit/solaris/sunrpc/sadmind_adm_build_path
use exploit/solaris/sunrpc/sadmind_exec
use exploit/solaris/sunrpc/ypupdated_exec
use exploit/solaris/telnet/fuser
use exploit/solaris/telnet/ttyprompt
use exploit/unix/dhcp/bash_environment
use exploit/unix/ftp/proftpd_133c_backdoor
use exploit/unix/ftp/vsftpd_234_backdoor
use exploit/unix/http/contentkeeperweb_mimencode
use exploit/unix/http/ctek_skyrouter
use exploit/unix/http/freepbx_callmenum
use exploit/unix/http/lifesize_room
use exploit/unix/http/twiki_debug_plugins
use exploit/unix/http/vmturbo_vmtadmin_exec_noauth
use exploit/unix/irc/unreal_ircd_3281_backdoor
use exploit/unix/local/setuid_nmap
use exploit/unix/misc/distcc_exec
use exploit/unix/misc/qnx_qconn_exec
use exploit/unix/misc/spamassassin_exec
use exploit/unix/misc/xerox_mfp
use exploit/unix/misc/zabbix_agent_exec
use exploit/unix/smtp/clamav_milter_blackhole
use exploit/unix/smtp/exim4_string_format
use exploit/unix/ssh/array_vxag_vapv_privkey_privesc
use exploit/unix/ssh/tectia_passwd_changereq
use exploit/unix/webapp/actualanalyzer_ant_cookie_exec
use exploit/unix/webapp/arkeia_upload_exec
use exploit/unix/webapp/awstats_configdir_exec
use exploit/unix/webapp/awstats_migrate_exec
use exploit/unix/webapp/awstatstotals_multisort
use exploit/unix/webapp/barracuda_img_exec
use exploit/unix/webapp/base_qry_common
use exploit/unix/webapp/basilic_diff_exec
use exploit/unix/webapp/cacti_graphimage_exec
use exploit/unix/webapp/cakephp_cache_corruption
use exploit/unix/webapp/carberp_backdoor_exec
use exploit/unix/webapp/citrix_access_gateway_exec
use exploit/unix/webapp/clipbucket_upload_exec
use exploit/unix/webapp/coppermine_piceditor
use exploit/unix/webapp/datalife_preview_exec
use exploit/unix/webapp/dogfood_spell_exec
use exploit/unix/webapp/egallery_upload_exec
use exploit/unix/webapp/flashchat_upload_exec
use exploit/unix/webapp/foswiki_maketext
use exploit/unix/webapp/freepbx_config_exec
use exploit/unix/webapp/generic_exec
use exploit/unix/webapp/google_proxystylesheet_exec
use exploit/unix/webapp/graphite_pickle_exec
use exploit/unix/webapp/guestbook_ssi_exec
use exploit/unix/webapp/hastymail_exec
use exploit/unix/webapp/havalite_upload_exec
use exploit/unix/webapp/horde_unserialize_exec
use exploit/unix/webapp/hybridauth_install_php_exec
use exploit/unix/webapp/instantcms_exec
use exploit/unix/webapp/invision_pboard_unserialize_exec
use exploit/unix/webapp/joomla_akeeba_unserialize
use exploit/unix/webapp/joomla_comjce_imgmanager
use exploit/unix/webapp/joomla_media_upload_exec
use exploit/unix/webapp/joomla_tinybrowser
use exploit/unix/webapp/kimai_sqli
use exploit/unix/webapp/libretto_upload_exec
use exploit/unix/webapp/maarch_letterbox_file_upload
use exploit/unix/webapp/mambo_cache_lite
use exploit/unix/webapp/mitel_awc_exec
use exploit/unix/webapp/moinmoin_twikidraw
use exploit/unix/webapp/mybb_backdoor
use exploit/unix/webapp/nagios3_history_cgi
use exploit/unix/webapp/nagios3_statuswml_ping
use exploit/unix/webapp/nagios_graph_explorer
use exploit/unix/webapp/narcissus_backend_exec
use exploit/unix/webapp/open_flash_chart_upload_exec
use exploit/unix/webapp/openemr_sqli_privesc_upload
use exploit/unix/webapp/openemr_upload_exec
use exploit/unix/webapp/opensis_modname_exec
use exploit/unix/webapp/openview_connectednodes_exec
use exploit/unix/webapp/openx_banner_edit
use exploit/unix/webapp/oracle_vm_agent_utl
use exploit/unix/webapp/oscommerce_filemanager
use exploit/unix/webapp/pajax_remote_exec
use exploit/unix/webapp/php_charts_exec
use exploit/unix/webapp/php_eval
use exploit/unix/webapp/php_include
use exploit/unix/webapp/php_vbulletin_template
use exploit/unix/webapp/php_wordpress_foxypress
use exploit/unix/webapp/php_wordpress_infusionsoft
use exploit/unix/webapp/php_wordpress_lastpost
use exploit/unix/webapp/php_wordpress_optimizepress
use exploit/unix/webapp/php_wordpress_total_cache
use exploit/unix/webapp/php_xmlrpc_eval
use exploit/unix/webapp/phpbb_highlight
use exploit/unix/webapp/phpmyadmin_config
use exploit/unix/webapp/projectpier_upload_exec
use exploit/unix/webapp/projectsend_upload_exec
use exploit/unix/webapp/qtss_parse_xml_exec
use exploit/unix/webapp/redmine_scm_exec
use exploit/unix/webapp/seportal_sqli_exec
use exploit/unix/webapp/skybluecanvas_exec
use exploit/unix/webapp/sphpblog_file_upload
use exploit/unix/webapp/spip_connect_exec
use exploit/unix/webapp/squash_yaml_exec
use exploit/unix/webapp/squirrelmail_pgp_plugin
use exploit/unix/webapp/sugarcrm_unserialize_exec
use exploit/unix/webapp/tikiwiki_graph_formula_exec
use exploit/unix/webapp/tikiwiki_jhot_exec
use exploit/unix/webapp/tikiwiki_unserialize_exec
use exploit/unix/webapp/trixbox_langchoice
use exploit/unix/webapp/tuleap_unserialize_exec
use exploit/unix/webapp/twiki_history
use exploit/unix/webapp/twiki_maketext
use exploit/unix/webapp/twiki_search
use exploit/unix/webapp/vbulletin_vote_sqli_exec
use exploit/unix/webapp/vicidial_manager_send_cmd_exec
use exploit/unix/webapp/webmin_show_cgi_exec
use exploit/unix/webapp/webtester_exec
use exploit/unix/webapp/wp_admin_shell_upload
use exploit/unix/webapp/wp_advanced_custom_fields_exec
use exploit/unix/webapp/wp_asset_manager_upload_exec
use exploit/unix/webapp/wp_creativecontactform_file_upload
use exploit/unix/webapp/wp_downloadmanager_upload
use exploit/unix/webapp/wp_easycart_unrestricted_file_upload
use exploit/unix/webapp/wp_foxypress_upload
use exploit/unix/webapp/wp_google_document_embedder_exec
use exploit/unix/webapp/wp_holding_pattern_file_upload
use exploit/unix/webapp/wp_infusionsoft_upload
use exploit/unix/webapp/wp_lastpost_exec
use exploit/unix/webapp/wp_nmediawebsite_file_upload
use exploit/unix/webapp/wp_optimizepress_upload
use exploit/unix/webapp/wp_photo_gallery_unrestricted_file_upload
use exploit/unix/webapp/wp_pixabay_images_upload
use exploit/unix/webapp/wp_platform_exec
use exploit/unix/webapp/wp_property_upload_exec
use exploit/unix/webapp/wp_symposium_shell_upload
use exploit/unix/webapp/wp_total_cache_exec
use exploit/unix/webapp/wp_worktheflow_upload
use exploit/unix/webapp/wp_wptouch_file_upload
use exploit/unix/webapp/wp_wysija_newsletters_upload
use exploit/unix/webapp/xoda_file_upload
use exploit/unix/webapp/zeroshell_exec
use exploit/unix/webapp/zimbra_lfi
use exploit/unix/webapp/zoneminder_packagecontrol_exec
use exploit/unix/webapp/zpanel_username_exec
use exploit/windows/antivirus/ams_hndlrsvc
use exploit/windows/antivirus/ams_xfr
use exploit/windows/antivirus/symantec_endpoint_manager_rce
use exploit/windows/antivirus/symantec_iao
use exploit/windows/antivirus/symantec_rtvscan
use exploit/windows/antivirus/trendmicro_serverprotect
use exploit/windows/antivirus/trendmicro_serverprotect_createbinding
use exploit/windows/antivirus/trendmicro_serverprotect_earthagent
use exploit/windows/arkeia/type77
use exploit/windows/backdoor/energizer_duo_payload
use exploit/windows/backupexec/name_service
use exploit/windows/backupexec/remote_agent
use exploit/windows/brightstor/ca_arcserve_342
use exploit/windows/brightstor/discovery_tcp
use exploit/windows/brightstor/discovery_udp
use exploit/windows/brightstor/etrust_itm_alert
use exploit/windows/brightstor/hsmserver
use exploit/windows/brightstor/lgserver
use exploit/windows/brightstor/lgserver_multi
use exploit/windows/brightstor/lgserver_rxrlogin
use exploit/windows/brightstor/lgserver_rxssetdatagrowthscheduleandfilter
use exploit/windows/brightstor/lgserver_rxsuselicenseini
use exploit/windows/brightstor/license_gcr
use exploit/windows/brightstor/mediasrv_sunrpc
use exploit/windows/brightstor/message_engine
use exploit/windows/brightstor/message_engine_72
use exploit/windows/brightstor/message_engine_heap
use exploit/windows/brightstor/sql_agent
use exploit/windows/brightstor/tape_engine
use exploit/windows/brightstor/tape_engine_0x8a
use exploit/windows/brightstor/universal_agent
use exploit/windows/browser/adobe_cooltype_sing
use exploit/windows/browser/adobe_flash_avm2
use exploit/windows/browser/adobe_flash_casi32_int_overflow
use exploit/windows/browser/adobe_flash_copy_pixels_to_byte_array
use exploit/windows/browser/adobe_flash_filters_type_confusion
use exploit/windows/browser/adobe_flash_mp4_cprt
use exploit/windows/browser/adobe_flash_otf_font
use exploit/windows/browser/adobe_flash_pcre
use exploit/windows/browser/adobe_flash_pixel_bender_bof
use exploit/windows/browser/adobe_flash_regex_value
use exploit/windows/browser/adobe_flash_rtmp
use exploit/windows/browser/adobe_flash_sps
use exploit/windows/browser/adobe_flash_uncompress_zlib_uaf
use exploit/windows/browser/adobe_flash_worker_byte_array_uaf
use exploit/windows/browser/adobe_flashplayer_arrayindexing
use exploit/windows/browser/adobe_flashplayer_avm
use exploit/windows/browser/adobe_flashplayer_flash10o
use exploit/windows/browser/adobe_flashplayer_newfunction
use exploit/windows/browser/adobe_flatedecode_predictor02
use exploit/windows/browser/adobe_geticon
use exploit/windows/browser/adobe_jbig2decode
use exploit/windows/browser/adobe_media_newplayer
use exploit/windows/browser/adobe_shockwave_rcsl_corruption
use exploit/windows/browser/adobe_toolbutton
use exploit/windows/browser/advantech_webaccess_dvs_getcolor
use exploit/windows/browser/aim_goaway
use exploit/windows/browser/aladdin_choosefilepath_bof
use exploit/windows/browser/amaya_bdo
use exploit/windows/browser/aol_ampx_convertfile
use exploit/windows/browser/aol_icq_downloadagent
use exploit/windows/browser/apple_itunes_playlist
use exploit/windows/browser/apple_quicktime_marshaled_punk
use exploit/windows/browser/apple_quicktime_mime_type
use exploit/windows/browser/apple_quicktime_rdrf
use exploit/windows/browser/apple_quicktime_rtsp
use exploit/windows/browser/apple_quicktime_smil_debug
use exploit/windows/browser/apple_quicktime_texml_font_table
use exploit/windows/browser/ask_shortformat
use exploit/windows/browser/asus_net4switch_ipswcom
use exploit/windows/browser/athocgov_completeinstallation
use exploit/windows/browser/autodesk_idrop
use exploit/windows/browser/aventail_epi_activex
use exploit/windows/browser/awingsoft_web3d_bof
use exploit/windows/browser/awingsoft_winds3d_sceneurl
use exploit/windows/browser/baofeng_storm_onbeforevideodownload
use exploit/windows/browser/barcode_ax49
use exploit/windows/browser/blackice_downloadimagefileurl
use exploit/windows/browser/c6_messenger_downloaderactivex
use exploit/windows/browser/ca_brightstor_addcolumn
use exploit/windows/browser/chilkat_crypt_writefile
use exploit/windows/browser/cisco_anyconnect_exec
use exploit/windows/browser/cisco_playerpt_setsource
use exploit/windows/browser/cisco_playerpt_setsource_surl
use exploit/windows/browser/citrix_gateway_actx
use exploit/windows/browser/clear_quest_cqole
use exploit/windows/browser/communicrypt_mail_activex
use exploit/windows/browser/creative_software_cachefolder
use exploit/windows/browser/crystal_reports_printcontrol
use exploit/windows/browser/dell_webcam_crazytalk
use exploit/windows/browser/dxstudio_player_exec
use exploit/windows/browser/ea_checkrequirements
use exploit/windows/browser/ebook_flipviewer_fviewerloading
use exploit/windows/browser/enjoysapgui_comp_download
use exploit/windows/browser/enjoysapgui_preparetoposthtml
use exploit/windows/browser/facebook_extractiptc
use exploit/windows/browser/foxit_reader_plugin_url_bof
use exploit/windows/browser/getgodm_http_response_bof
use exploit/windows/browser/gom_openurl
use exploit/windows/browser/greendam_url
use exploit/windows/browser/honeywell_hscremotedeploy_exec
use exploit/windows/browser/honeywell_tema_exec
use exploit/windows/browser/hp_alm_xgo_setshapenodetype_exec
use exploit/windows/browser/hp_easy_printer_care_xmlcachemgr
use exploit/windows/browser/hp_easy_printer_care_xmlsimpleaccessor
use exploit/windows/browser/hp_loadrunner_addfolder
use exploit/windows/browser/hp_loadrunner_writefilebinary
use exploit/windows/browser/hp_loadrunner_writefilestring
use exploit/windows/browser/hpmqc_progcolor
use exploit/windows/browser/hyleos_chemviewx_activex
use exploit/windows/browser/ibm_spss_c1sizer
use exploit/windows/browser/ibm_tivoli_pme_activex_bof
use exploit/windows/browser/ibmegath_getxmlvalue
use exploit/windows/browser/ibmlotusdomino_dwa_uploadmodule
use exploit/windows/browser/ie_cbutton_uaf
use exploit/windows/browser/ie_cgenericelement_uaf
use exploit/windows/browser/ie_createobject
use exploit/windows/browser/ie_execcommand_uaf
use exploit/windows/browser/ie_iscomponentinstalled
use exploit/windows/browser/ie_setmousecapture_uaf
use exploit/windows/browser/ie_unsafe_scripting
use exploit/windows/browser/imgeviewer_tifmergemultifiles
use exploit/windows/browser/indusoft_issymbol_internationalseparator
use exploit/windows/browser/inotes_dwa85w_bof
use exploit/windows/browser/intrust_annotatex_add
use exploit/windows/browser/java_basicservice_impl
use exploit/windows/browser/java_cmm
use exploit/windows/browser/java_codebase_trust
use exploit/windows/browser/java_docbase_bof
use exploit/windows/browser/java_mixer_sequencer
use exploit/windows/browser/java_ws_arginject_altjvm
use exploit/windows/browser/java_ws_double_quote
use exploit/windows/browser/java_ws_vmargs
use exploit/windows/browser/juniper_ssl_ive_setupdll
use exploit/windows/browser/kazaa_altnet_heap
use exploit/windows/browser/keyhelp_launchtripane_exec
use exploit/windows/browser/logitechvideocall_start
use exploit/windows/browser/lpviewer_url
use exploit/windows/browser/macrovision_downloadandexecute
use exploit/windows/browser/macrovision_unsafe
use exploit/windows/browser/malwarebytes_update_exec
use exploit/windows/browser/maxthon_history_xcs
use exploit/windows/browser/mcafee_mcsubmgr_vsprintf
use exploit/windows/browser/mcafee_mvt_exec
use exploit/windows/browser/mcafeevisualtrace_tracetarget
use exploit/windows/browser/mirc_irc_url
use exploit/windows/browser/mozilla_attribchildremoved
use exploit/windows/browser/mozilla_firefox_onreadystatechange
use exploit/windows/browser/mozilla_firefox_xmlserializer
use exploit/windows/browser/mozilla_interleaved_write
use exploit/windows/browser/mozilla_mchannel
use exploit/windows/browser/mozilla_nssvgvalue
use exploit/windows/browser/mozilla_nstreerange
use exploit/windows/browser/mozilla_reduceright
use exploit/windows/browser/ms03_020_ie_objecttype
use exploit/windows/browser/ms06_001_wmf_setabortproc
use exploit/windows/browser/ms06_013_createtextrange
use exploit/windows/browser/ms06_055_vml_method
use exploit/windows/browser/ms06_057_webview_setslice
use exploit/windows/browser/ms06_067_keyframe
use exploit/windows/browser/ms06_071_xml_core
use exploit/windows/browser/ms07_017_ani_loadimage_chunksize
use exploit/windows/browser/ms08_041_snapshotviewer
use exploit/windows/browser/ms08_053_mediaencoder
use exploit/windows/browser/ms08_070_visual_studio_msmask
use exploit/windows/browser/ms08_078_xml_corruption
use exploit/windows/browser/ms09_002_memory_corruption
use exploit/windows/browser/ms09_043_owc_htmlurl
use exploit/windows/browser/ms09_043_owc_msdso
use exploit/windows/browser/ms09_072_style_object
use exploit/windows/browser/ms10_002_aurora
use exploit/windows/browser/ms10_002_ie_object
use exploit/windows/browser/ms10_018_ie_behaviors
use exploit/windows/browser/ms10_018_ie_tabular_activex
use exploit/windows/browser/ms10_022_ie_vbscript_winhlp32
use exploit/windows/browser/ms10_026_avi_nsamplespersec
use exploit/windows/browser/ms10_042_helpctr_xss_cmd_exec
use exploit/windows/browser/ms10_046_shortcut_icon_dllloader
use exploit/windows/browser/ms10_090_ie_css_clip
use exploit/windows/browser/ms11_003_ie_css_import
use exploit/windows/browser/ms11_050_mshtml_cobjectelement
use exploit/windows/browser/ms11_081_option
use exploit/windows/browser/ms11_093_ole32
use exploit/windows/browser/ms12_004_midi
use exploit/windows/browser/ms12_037_ie_colspan
use exploit/windows/browser/ms12_037_same_id
use exploit/windows/browser/ms13_009_ie_slayoutrun_uaf
use exploit/windows/browser/ms13_022_silverlight_script_object
use exploit/windows/browser/ms13_037_svg_dashstyle
use exploit/windows/browser/ms13_055_canchor
use exploit/windows/browser/ms13_059_cflatmarkuppointer
use exploit/windows/browser/ms13_069_caret
use exploit/windows/browser/ms13_080_cdisplaypointer
use exploit/windows/browser/ms13_090_cardspacesigninhelper
use exploit/windows/browser/ms14_012_cmarkup_uaf
use exploit/windows/browser/ms14_012_textrange
use exploit/windows/browser/ms14_064_ole_code_execution
use exploit/windows/browser/msvidctl_mpeg2
use exploit/windows/browser/mswhale_checkforupdates
use exploit/windows/browser/msxml_get_definition_code_exec
use exploit/windows/browser/nctaudiofile2_setformatlikesample
use exploit/windows/browser/nis2004_antispam
use exploit/windows/browser/nis2004_get
use exploit/windows/browser/notes_handler_cmdinject
use exploit/windows/browser/novell_groupwise_gwcls1_actvx
use exploit/windows/browser/novelliprint_datetime
use exploit/windows/browser/novelliprint_executerequest
use exploit/windows/browser/novelliprint_executerequest_dbg
use exploit/windows/browser/novelliprint_getdriversettings
use exploit/windows/browser/novelliprint_getdriversettings_2
use exploit/windows/browser/novelliprint_target_frame
use exploit/windows/browser/ntr_activex_check_bof
use exploit/windows/browser/ntr_activex_stopmodule
use exploit/windows/browser/oracle_autovue_setmarkupmode
use exploit/windows/browser/oracle_dc_submittoexpress
use exploit/windows/browser/oracle_webcenter_checkoutandopen
use exploit/windows/browser/orbit_connecting
use exploit/windows/browser/ovftool_format_string
use exploit/windows/browser/pcvue_func
use exploit/windows/browser/persits_xupload_traversal
use exploit/windows/browser/quickr_qp2_bof
use exploit/windows/browser/real_arcade_installerdlg
use exploit/windows/browser/realplayer_cdda_uri
use exploit/windows/browser/realplayer_console
use exploit/windows/browser/realplayer_import
use exploit/windows/browser/realplayer_qcp
use exploit/windows/browser/realplayer_smil
use exploit/windows/browser/roxio_cineplayer
use exploit/windows/browser/safari_xslt_output
use exploit/windows/browser/samsung_neti_wiewer_backuptoavi_bof
use exploit/windows/browser/sapgui_saveviewtosessionfile
use exploit/windows/browser/siemens_solid_edge_selistctrlx
use exploit/windows/browser/softartisans_getdrivename
use exploit/windows/browser/sonicwall_addrouteentry
use exploit/windows/browser/symantec_altirisdeployment_downloadandinstall
use exploit/windows/browser/symantec_altirisdeployment_runcmd
use exploit/windows/browser/symantec_appstream_unsafe
use exploit/windows/browser/symantec_backupexec_pvcalendar
use exploit/windows/browser/symantec_consoleutilities_browseandsavefile
use exploit/windows/browser/synactis_connecttosynactis_bof
use exploit/windows/browser/systemrequirementslab_unsafe
use exploit/windows/browser/teechart_pro
use exploit/windows/browser/tom_sawyer_tsgetx71ex552
use exploit/windows/browser/trendmicro_extsetowner
use exploit/windows/browser/trendmicro_officescan
use exploit/windows/browser/tumbleweed_filetransfer
use exploit/windows/browser/ubisoft_uplay_cmd_exec
use exploit/windows/browser/ultramjcam_openfiledig_bof
use exploit/windows/browser/ultraoffice_httpupload
use exploit/windows/browser/verypdf_pdfview
use exploit/windows/browser/viscom_movieplayer_drawtext
use exploit/windows/browser/vlc_amv
use exploit/windows/browser/vlc_mms_bof
use exploit/windows/browser/webdav_dll_hijacker
use exploit/windows/browser/webex_ucf_newobject
use exploit/windows/browser/winamp_playlist_unc
use exploit/windows/browser/winamp_ultravox
use exploit/windows/browser/windvd7_applicationtype
use exploit/windows/browser/winzip_fileview
use exploit/windows/browser/wmi_admintools
use exploit/windows/browser/x360_video_player_set_text_bof
use exploit/windows/browser/xmplay_asx
use exploit/windows/browser/yahoomessenger_fvcom
use exploit/windows/browser/yahoomessenger_server
use exploit/windows/browser/zenturiprogramchecker_unsafe
use exploit/windows/browser/zenworks_helplauncher_exec
use exploit/windows/dcerpc/ms03_026_dcom
use exploit/windows/dcerpc/ms05_017_msmq
use exploit/windows/dcerpc/ms07_029_msdns_zonename
use exploit/windows/dcerpc/ms07_065_msmq
use exploit/windows/email/ms07_017_ani_loadimage_chunksize
use exploit/windows/email/ms10_045_outlook_ref_only
use exploit/windows/email/ms10_045_outlook_ref_resolve
use exploit/windows/emc/alphastor_agent
use exploit/windows/emc/alphastor_device_manager_exec
use exploit/windows/emc/networker_format_string
use exploit/windows/emc/replication_manager_exec
use exploit/windows/fileformat/a_pdf_wav_to_mp3
use exploit/windows/fileformat/abbs_amp_lst
use exploit/windows/fileformat/acdsee_fotoslate_string
use exploit/windows/fileformat/acdsee_xpm
use exploit/windows/fileformat/actfax_import_users_bof
use exploit/windows/fileformat/activepdf_webgrabber
use exploit/windows/fileformat/adobe_collectemailinfo
use exploit/windows/fileformat/adobe_cooltype_sing
use exploit/windows/fileformat/adobe_flashplayer_button
use exploit/windows/fileformat/adobe_flashplayer_newfunction
use exploit/windows/fileformat/adobe_flatedecode_predictor02
use exploit/windows/fileformat/adobe_geticon
use exploit/windows/fileformat/adobe_illustrator_v14_eps
use exploit/windows/fileformat/adobe_jbig2decode
use exploit/windows/fileformat/adobe_libtiff
use exploit/windows/fileformat/adobe_media_newplayer
use exploit/windows/fileformat/adobe_pdf_embedded_exe
use exploit/windows/fileformat/adobe_pdf_embedded_exe_nojs
use exploit/windows/fileformat/adobe_reader_u3d
use exploit/windows/fileformat/adobe_toolbutton
use exploit/windows/fileformat/adobe_u3d_meshdecl
use exploit/windows/fileformat/adobe_utilprintf
use exploit/windows/fileformat/allplayer_m3u_bof
use exploit/windows/fileformat/altap_salamander_pdb
use exploit/windows/fileformat/aol_desktop_linktag
use exploit/windows/fileformat/aol_phobos_bof
use exploit/windows/fileformat/apple_quicktime_pnsize
use exploit/windows/fileformat/apple_quicktime_rdrf
use exploit/windows/fileformat/audio_coder_m3u
use exploit/windows/fileformat/audio_wkstn_pls
use exploit/windows/fileformat/audiotran_pls
use exploit/windows/fileformat/audiotran_pls_1424
use exploit/windows/fileformat/aviosoft_plf_buf
use exploit/windows/fileformat/bacnet_csv
use exploit/windows/fileformat/beetel_netconfig_ini_bof
use exploit/windows/fileformat/blazedvd_hdtv_bof
use exploit/windows/fileformat/blazedvd_plf
use exploit/windows/fileformat/bpftp_client_bps_bof
use exploit/windows/fileformat/bsplayer_m3u
use exploit/windows/fileformat/ca_cab
use exploit/windows/fileformat/cain_abel_4918_rdp
use exploit/windows/fileformat/ccmplayer_m3u_bof
use exploit/windows/fileformat/chasys_draw_ies_bmp_bof
use exploit/windows/fileformat/coolpdf_image_stream_bof
use exploit/windows/fileformat/corelpdf_fusion_bof
use exploit/windows/fileformat/csound_getnum_bof
use exploit/windows/fileformat/cutezip_bof
use exploit/windows/fileformat/cyberlink_p2g_bof
use exploit/windows/fileformat/cytel_studio_cy3
use exploit/windows/fileformat/deepburner_path
use exploit/windows/fileformat/destinymediaplayer16
use exploit/windows/fileformat/digital_music_pad_pls
use exploit/windows/fileformat/djstudio_pls_bof
use exploit/windows/fileformat/djvu_imageurl
use exploit/windows/fileformat/dvdx_plf_bof
use exploit/windows/fileformat/easycdda_pls_bof
use exploit/windows/fileformat/emc_appextender_keyworks
use exploit/windows/fileformat/erdas_er_viewer_bof
use exploit/windows/fileformat/erdas_er_viewer_rf_report_error
use exploit/windows/fileformat/esignal_styletemplate_bof
use exploit/windows/fileformat/etrust_pestscan
use exploit/windows/fileformat/ezip_wizard_bof
use exploit/windows/fileformat/fatplayer_wav
use exploit/windows/fileformat/fdm_torrent
use exploit/windows/fileformat/feeddemon_opml
use exploit/windows/fileformat/foxit_reader_filewrite
use exploit/windows/fileformat/foxit_reader_launch
use exploit/windows/fileformat/foxit_title_bof
use exploit/windows/fileformat/free_mp3_ripper_wav
use exploit/windows/fileformat/galan_fileformat_bof
use exploit/windows/fileformat/gsm_sim
use exploit/windows/fileformat/gta_samp
use exploit/windows/fileformat/hhw_hhp_compiledfile_bof
use exploit/windows/fileformat/hhw_hhp_contentfile_bof
use exploit/windows/fileformat/hhw_hhp_indexfile_bof
use exploit/windows/fileformat/ht_mp3player_ht3_bof
use exploit/windows/fileformat/ibm_forms_viewer_fontname
use exploit/windows/fileformat/ibm_pcm_ws
use exploit/windows/fileformat/ideal_migration_ipj
use exploit/windows/fileformat/iftp_schedule_bof
use exploit/windows/fileformat/irfanview_jpeg2000_bof
use exploit/windows/fileformat/ispvm_xcf_ispxcf
use exploit/windows/fileformat/kingview_kingmess_kvl
use exploit/windows/fileformat/lattice_pac_bof
use exploit/windows/fileformat/lotusnotes_lzh
use exploit/windows/fileformat/magix_musikmaker_16_mmm
use exploit/windows/fileformat/mcafee_hercules_deletesnapshot
use exploit/windows/fileformat/mcafee_showreport_exec
use exploit/windows/fileformat/mediacoder_m3u
use exploit/windows/fileformat/mediajukebox
use exploit/windows/fileformat/microp_mppl
use exploit/windows/fileformat/millenium_mp3_pls
use exploit/windows/fileformat/mini_stream_pls_bof
use exploit/windows/fileformat/mjm_coreplayer2011_s3m
use exploit/windows/fileformat/mjm_quickplayer_s3m
use exploit/windows/fileformat/moxa_mediadbplayback
use exploit/windows/fileformat/mplayer_m3u_bof
use exploit/windows/fileformat/mplayer_sami_bof
use exploit/windows/fileformat/ms09_067_excel_featheader
use exploit/windows/fileformat/ms10_004_textbytesatom
use exploit/windows/fileformat/ms10_038_excel_obj_bof
use exploit/windows/fileformat/ms10_087_rtf_pfragments_bof
use exploit/windows/fileformat/ms11_006_createsizeddibsection
use exploit/windows/fileformat/ms11_021_xlb_bof
use exploit/windows/fileformat/ms12_005
use exploit/windows/fileformat/ms12_027_mscomctl_bof
use exploit/windows/fileformat/ms13_071_theme
use exploit/windows/fileformat/ms14_017_rtf
use exploit/windows/fileformat/ms14_060_sandworm
use exploit/windows/fileformat/ms14_064_packager_python
use exploit/windows/fileformat/ms14_064_packager_run_as_admin
use exploit/windows/fileformat/ms15_020_shortcut_icon_dllloader
use exploit/windows/fileformat/ms_visual_basic_vbp
use exploit/windows/fileformat/mswin_tiff_overflow
use exploit/windows/fileformat/msworks_wkspictureinterface
use exploit/windows/fileformat/mymp3player_m3u
use exploit/windows/fileformat/netop
use exploit/windows/fileformat/nuance_pdf_launch_overflow
use exploit/windows/fileformat/openoffice_ole
use exploit/windows/fileformat/orbit_download_failed_bof
use exploit/windows/fileformat/orbital_viewer_orb
use exploit/windows/fileformat/ovf_format_string
use exploit/windows/fileformat/proshow_cellimage_bof
use exploit/windows/fileformat/proshow_load_bof
use exploit/windows/fileformat/publishit_pui
use exploit/windows/fileformat/real_networks_netzip_bof
use exploit/windows/fileformat/real_player_url_property_bof
use exploit/windows/fileformat/realplayer_ver_attribute_bof
use exploit/windows/fileformat/sascam_get
use exploit/windows/fileformat/scadaphone_zip
use exploit/windows/fileformat/shadow_stream_recorder_bof
use exploit/windows/fileformat/somplplayer_m3u
use exploit/windows/fileformat/subtitle_processor_m3u_bof
use exploit/windows/fileformat/tfm_mmplayer_m3u_ppl_bof
use exploit/windows/fileformat/total_video_player_ini_bof
use exploit/windows/fileformat/tugzip
use exploit/windows/fileformat/ultraiso_ccd
use exploit/windows/fileformat/ultraiso_cue
use exploit/windows/fileformat/ursoft_w32dasm
use exploit/windows/fileformat/varicad_dwb
use exploit/windows/fileformat/videolan_tivo
use exploit/windows/fileformat/videospirit_visprj
use exploit/windows/fileformat/visio_dxf_bof
use exploit/windows/fileformat/visiwave_vwr_type
use exploit/windows/fileformat/vlc_modplug_s3m
use exploit/windows/fileformat/vlc_realtext
use exploit/windows/fileformat/vlc_smb_uri
use exploit/windows/fileformat/vlc_webm
use exploit/windows/fileformat/vuplayer_cue
use exploit/windows/fileformat/vuplayer_m3u
use exploit/windows/fileformat/winamp_maki_bof
use exploit/windows/fileformat/winrar_name_spoofing
use exploit/windows/fileformat/wireshark_mpeg_overflow
use exploit/windows/fileformat/wireshark_packet_dect
use exploit/windows/fileformat/wm_downloader_m3u
use exploit/windows/fileformat/xenorate_xpl_bof
use exploit/windows/fileformat/xion_m3u_sehbof
use exploit/windows/fileformat/xradio_xrl_sehbof
use exploit/windows/fileformat/zinfaudioplayer221_pls
use exploit/windows/firewall/blackice_pam_icq
use exploit/windows/firewall/kerio_auth
use exploit/windows/ftp/32bitftp_list_reply
use exploit/windows/ftp/3cdaemon_ftp_user
use exploit/windows/ftp/aasync_list_reply
use exploit/windows/ftp/ability_server_stor
use exploit/windows/ftp/absolute_ftp_list_bof
use exploit/windows/ftp/cesarftp_mkd
use exploit/windows/ftp/comsnd_ftpd_fmtstr
use exploit/windows/ftp/dreamftp_format
use exploit/windows/ftp/easyfilesharing_pass
use exploit/windows/ftp/easyftp_cwd_fixret
use exploit/windows/ftp/easyftp_list_fixret
use exploit/windows/ftp/easyftp_mkd_fixret
use exploit/windows/ftp/filecopa_list_overflow
use exploit/windows/ftp/filewrangler_list_reply
use exploit/windows/ftp/freefloatftp_user
use exploit/windows/ftp/freefloatftp_wbem
use exploit/windows/ftp/freeftpd_pass
use exploit/windows/ftp/ftpgetter_pwd_reply
use exploit/windows/ftp/ftppad_list_reply
use exploit/windows/ftp/ftpshell51_pwd_reply
use exploit/windows/ftp/ftpsynch_list_reply
use exploit/windows/ftp/gekkomgr_list_reply
use exploit/windows/ftp/globalscapeftp_input
use exploit/windows/ftp/goldenftp_pass_bof
use exploit/windows/ftp/httpdx_tolog_format
use exploit/windows/ftp/leapftp_list_reply
use exploit/windows/ftp/leapftp_pasv_reply
use exploit/windows/ftp/ms09_053_ftpd_nlst
use exploit/windows/ftp/netterm_netftpd_user
use exploit/windows/ftp/odin_list_reply
use exploit/windows/ftp/open_ftpd_wbem
use exploit/windows/ftp/oracle9i_xdb_ftp_pass
use exploit/windows/ftp/oracle9i_xdb_ftp_unlock
use exploit/windows/ftp/pcman_stor
use exploit/windows/ftp/proftp_banner
use exploit/windows/ftp/quickshare_traversal_write
use exploit/windows/ftp/ricoh_dl_bof
use exploit/windows/ftp/sami_ftpd_list
use exploit/windows/ftp/sami_ftpd_user
use exploit/windows/ftp/sasser_ftpd_port
use exploit/windows/ftp/scriptftp_list
use exploit/windows/ftp/seagull_list_reply
use exploit/windows/ftp/servu_chmod
use exploit/windows/ftp/servu_mdtm
use exploit/windows/ftp/slimftpd_list_concat
use exploit/windows/ftp/trellian_client_pasv
use exploit/windows/ftp/turboftp_port
use exploit/windows/ftp/vermillion_ftpd_port
use exploit/windows/ftp/warftpd_165_pass
use exploit/windows/ftp/warftpd_165_user
use exploit/windows/ftp/wftpd_size
use exploit/windows/ftp/wing_ftp_admin_exec
use exploit/windows/ftp/wsftp_server_503_mkd
use exploit/windows/ftp/wsftp_server_505_xmd5
use exploit/windows/ftp/xftp_client_pwd
use exploit/windows/ftp/xlink_client
use exploit/windows/ftp/xlink_server
use exploit/windows/games/mohaa_getinfo
use exploit/windows/games/racer_503beta5
use exploit/windows/games/ut2004_secure
use exploit/windows/http/adobe_robohelper_authbypass
use exploit/windows/http/altn_securitygateway
use exploit/windows/http/altn_webadmin
use exploit/windows/http/amlibweb_webquerydll_app
use exploit/windows/http/apache_chunked
use exploit/windows/http/apache_mod_rewrite_ldap
use exploit/windows/http/apache_modjk_overflow
use exploit/windows/http/badblue_ext_overflow
use exploit/windows/http/badblue_passthru
use exploit/windows/http/bea_weblogic_jsessionid
use exploit/windows/http/bea_weblogic_post_bof
use exploit/windows/http/bea_weblogic_transfer_encoding
use exploit/windows/http/belkin_bulldog
use exploit/windows/http/ca_arcserve_rpc_authbypass
use exploit/windows/http/ca_igateway_debug
use exploit/windows/http/ca_totaldefense_regeneratereports
use exploit/windows/http/cogent_datahub_command
use exploit/windows/http/cogent_datahub_request_headers_bof
use exploit/windows/http/coldfusion_fckeditor
use exploit/windows/http/cyclope_ess_sqli
use exploit/windows/http/desktopcentral_file_upload
use exploit/windows/http/desktopcentral_statusupdate_upload
use exploit/windows/http/easyftp_list
use exploit/windows/http/edirectory_host
use exploit/windows/http/edirectory_imonitor
use exploit/windows/http/efs_easychatserver_username
use exploit/windows/http/efs_fmws_userid_bof
use exploit/windows/http/ektron_xslt_exec
use exploit/windows/http/ericom_access_now_bof
use exploit/windows/http/ezserver_http
use exploit/windows/http/fdm_auth_header
use exploit/windows/http/generic_http_dll_injection
use exploit/windows/http/hp_autopass_license_traversal
use exploit/windows/http/hp_imc_bims_upload
use exploit/windows/http/hp_imc_mibfileupload
use exploit/windows/http/hp_loadrunner_copyfiletoserver
use exploit/windows/http/hp_mpa_job_acct
use exploit/windows/http/hp_nnm_getnnmdata_hostname
use exploit/windows/http/hp_nnm_getnnmdata_icount
use exploit/windows/http/hp_nnm_getnnmdata_maxage
use exploit/windows/http/hp_nnm_nnmrptconfig_nameparams
use exploit/windows/http/hp_nnm_nnmrptconfig_schdparams
use exploit/windows/http/hp_nnm_openview5
use exploit/windows/http/hp_nnm_ovalarm_lang
use exploit/windows/http/hp_nnm_ovas
use exploit/windows/http/hp_nnm_ovbuildpath_textfile
use exploit/windows/http/hp_nnm_ovwebhelp
use exploit/windows/http/hp_nnm_ovwebsnmpsrv_main
use exploit/windows/http/hp_nnm_ovwebsnmpsrv_ovutil
use exploit/windows/http/hp_nnm_ovwebsnmpsrv_uro
use exploit/windows/http/hp_nnm_snmp
use exploit/windows/http/hp_nnm_snmpviewer_actapp
use exploit/windows/http/hp_nnm_toolbar_01
use exploit/windows/http/hp_nnm_toolbar_02
use exploit/windows/http/hp_nnm_webappmon_execvp
use exploit/windows/http/hp_nnm_webappmon_ovjavalocale
use exploit/windows/http/hp_openview_insight_backdoor
use exploit/windows/http/hp_pcm_snac_update_domain
use exploit/windows/http/hp_power_manager_filename
use exploit/windows/http/hp_power_manager_login
use exploit/windows/http/hp_sitescope_runomagentcommand
use exploit/windows/http/httpdx_handlepeer
use exploit/windows/http/httpdx_tolog_format
use exploit/windows/http/ia_webmail
use exploit/windows/http/ibm_tivoli_endpoint_bof
use exploit/windows/http/ibm_tpmfosd_overflow
use exploit/windows/http/ibm_tsm_cad_header
use exploit/windows/http/icecast_header
use exploit/windows/http/integard_password_bof
use exploit/windows/http/intersystems_cache
use exploit/windows/http/intrasrv_bof
use exploit/windows/http/ipswitch_wug_maincfgret
use exploit/windows/http/jira_collector_traversal
use exploit/windows/http/kaseya_uploadimage_file_upload
use exploit/windows/http/kolibri_http
use exploit/windows/http/landesk_thinkmanagement_upload_asp
use exploit/windows/http/lexmark_markvision_gfd_upload
use exploit/windows/http/mailenable_auth_header
use exploit/windows/http/manageengine_apps_mngr
use exploit/windows/http/maxdb_webdbm_database
use exploit/windows/http/maxdb_webdbm_get_overflow
use exploit/windows/http/mcafee_epolicy_source
use exploit/windows/http/mdaemon_worldclient_form2raw
use exploit/windows/http/minishare_get_overflow
use exploit/windows/http/miniweb_upload_wbem
use exploit/windows/http/navicopa_get_overflow
use exploit/windows/http/netdecision_http_bof
use exploit/windows/http/novell_imanager_upload
use exploit/windows/http/novell_mdm_lfi
use exploit/windows/http/novell_messenger_acceptlang
use exploit/windows/http/nowsms
use exploit/windows/http/oracle9i_xdb_pass
use exploit/windows/http/oracle_btm_writetofile
use exploit/windows/http/oracle_endeca_exec
use exploit/windows/http/oracle_event_processing_upload
use exploit/windows/http/osb_uname_jlist
use exploit/windows/http/peercast_url
use exploit/windows/http/php_apache_request_headers_bof
use exploit/windows/http/privatewire_gateway
use exploit/windows/http/psoproxy91_overflow
use exploit/windows/http/rabidhamster_r4_log
use exploit/windows/http/rejetto_hfs_exec
use exploit/windows/http/sambar6_search_results
use exploit/windows/http/sap_configservlet_exec_noauth
use exploit/windows/http/sap_host_control_cmd_exec
use exploit/windows/http/sapdb_webtools
use exploit/windows/http/savant_31_overflow
use exploit/windows/http/shoutcast_format
use exploit/windows/http/shttpd_post
use exploit/windows/http/solarwinds_fsm_userlogin
use exploit/windows/http/solarwinds_storage_manager_sql
use exploit/windows/http/sonicwall_scrutinizer_sqli
use exploit/windows/http/steamcast_useragent
use exploit/windows/http/sws_connection_bof
use exploit/windows/http/sybase_easerver
use exploit/windows/http/sysax_create_folder
use exploit/windows/http/trackercam_phparg_overflow
use exploit/windows/http/trackit_file_upload
use exploit/windows/http/trendmicro_officescan
use exploit/windows/http/ultraminihttp_bof
use exploit/windows/http/umbraco_upload_aspx
use exploit/windows/http/vmware_vcenter_chargeback_upload
use exploit/windows/http/webster_http
use exploit/windows/http/xampp_webdav_upload_php
use exploit/windows/http/xitami_if_mod_since
use exploit/windows/http/zenworks_assetmgmt_uploadservlet
use exploit/windows/http/zenworks_uploadservlet
use exploit/windows/iis/iis_webdav_upload_asp
use exploit/windows/iis/ms01_023_printer
use exploit/windows/iis/ms01_026_dbldecode
use exploit/windows/iis/ms01_033_idq
use exploit/windows/iis/ms02_018_htr
use exploit/windows/iis/ms02_065_msadc
use exploit/windows/iis/ms03_007_ntdll_webdav
use exploit/windows/iis/msadc
use exploit/windows/imap/eudora_list
use exploit/windows/imap/imail_delete
use exploit/windows/imap/ipswitch_search
use exploit/windows/imap/mailenable_login
use exploit/windows/imap/mailenable_status
use exploit/windows/imap/mailenable_w3c_select
use exploit/windows/imap/mdaemon_cram_md5
use exploit/windows/imap/mdaemon_fetch
use exploit/windows/imap/mercur_imap_select_overflow
use exploit/windows/imap/mercur_login
use exploit/windows/imap/mercury_login
use exploit/windows/imap/mercury_rename
use exploit/windows/imap/novell_netmail_append
use exploit/windows/imap/novell_netmail_auth
use exploit/windows/imap/novell_netmail_status
use exploit/windows/imap/novell_netmail_subscribe
use exploit/windows/isapi/ms00_094_pbserver
use exploit/windows/isapi/ms03_022_nsiislog_post
use exploit/windows/isapi/ms03_051_fp30reg_chunked
use exploit/windows/isapi/rsa_webagent_redirect
use exploit/windows/isapi/w3who_query
use exploit/windows/ldap/imail_thc
use exploit/windows/license/calicclnt_getconfig
use exploit/windows/license/calicserv_getconfig
use exploit/windows/license/flexnet_lmgrd_bof
use exploit/windows/license/sentinel_lm7_udp
use exploit/windows/local/adobe_sandbox_adobecollabsync
use exploit/windows/local/agnitum_outpost_acs
use exploit/windows/local/always_install_elevated
use exploit/windows/local/ask
use exploit/windows/local/bthpan
use exploit/windows/local/bypassuac
use exploit/windows/local/bypassuac_injection
use exploit/windows/local/current_user_psexec
use exploit/windows/local/ikeext_service
use exploit/windows/local/ipass_launch_app
use exploit/windows/local/mqac_write
use exploit/windows/local/ms10_015_kitrap0d
use exploit/windows/local/ms10_092_schelevator
use exploit/windows/local/ms11_080_afdjoinleaf
use exploit/windows/local/ms13_005_hwnd_broadcast
use exploit/windows/local/ms13_053_schlamperei
use exploit/windows/local/ms13_081_track_popup_menu
use exploit/windows/local/ms13_097_ie_registry_symlink
use exploit/windows/local/ms14_009_ie_dfsvc
use exploit/windows/local/ms14_058_track_popup_menu
use exploit/windows/local/ms14_070_tcpip_ioctl
use exploit/windows/local/ms15_004_tswbproxy
use exploit/windows/local/ms_ndproxy
use exploit/windows/local/novell_client_nicm
use exploit/windows/local/novell_client_nwfs
use exploit/windows/local/ntapphelpcachecontrol
use exploit/windows/local/nvidia_nvsvc
use exploit/windows/local/payload_inject
use exploit/windows/local/persistence
use exploit/windows/local/powershell_cmd_upgrade
use exploit/windows/local/powershell_remoting
use exploit/windows/local/ppr_flatten_rec
use exploit/windows/local/pxeexploit
use exploit/windows/local/run_as
use exploit/windows/local/s4u_persistence
use exploit/windows/local/service_permissions
use exploit/windows/local/trusted_service_path
use exploit/windows/local/virtual_box_guest_additions
use exploit/windows/local/virtual_box_opengl_escape
use exploit/windows/local/vss_persistence
use exploit/windows/local/wmi
use exploit/windows/lotus/domino_http_accept_language
use exploit/windows/lotus/domino_icalendar_organizer
use exploit/windows/lotus/domino_sametime_stmux
use exploit/windows/lotus/lotusnotes_lzh
use exploit/windows/lpd/hummingbird_exceed
use exploit/windows/lpd/saplpd
use exploit/windows/lpd/wincomlpd_admin
use exploit/windows/misc/achat_bof
use exploit/windows/misc/actfax_raw_server_bof
use exploit/windows/misc/agentxpp_receive_agentx
use exploit/windows/misc/allmediaserver_bof
use exploit/windows/misc/altiris_ds_sqli
use exploit/windows/misc/apple_quicktime_rtsp_response
use exploit/windows/misc/asus_dpcproxy_overflow
use exploit/windows/misc/avaya_winpmd_unihostrouter
use exploit/windows/misc/avidphoneticindexer
use exploit/windows/misc/bakbone_netvault_heap
use exploit/windows/misc/bcaaa_bof
use exploit/windows/misc/bigant_server
use exploit/windows/misc/bigant_server_250
use exploit/windows/misc/bigant_server_dupf_upload
use exploit/windows/misc/bigant_server_sch_dupf_bof
use exploit/windows/misc/bigant_server_usv
use exploit/windows/misc/bomberclone_overflow
use exploit/windows/misc/bopup_comm
use exploit/windows/misc/borland_interbase
use exploit/windows/misc/borland_starteam
use exploit/windows/misc/citrix_streamprocess
use exploit/windows/misc/citrix_streamprocess_data_msg
use exploit/windows/misc/citrix_streamprocess_get_boot_record_request
use exploit/windows/misc/citrix_streamprocess_get_footer
use exploit/windows/misc/citrix_streamprocess_get_objects
use exploit/windows/misc/doubletake
use exploit/windows/misc/eiqnetworks_esa
use exploit/windows/misc/eiqnetworks_esa_topology
use exploit/windows/misc/enterasys_netsight_syslog_bof
use exploit/windows/misc/eureka_mail_err
use exploit/windows/misc/fb_cnct_group
use exploit/windows/misc/fb_isc_attach_database
use exploit/windows/misc/fb_isc_create_database
use exploit/windows/misc/fb_svc_attach
use exploit/windows/misc/gimp_script_fu
use exploit/windows/misc/hp_dataprotector_cmd_exec
use exploit/windows/misc/hp_dataprotector_crs
use exploit/windows/misc/hp_dataprotector_dtbclslogin
use exploit/windows/misc/hp_dataprotector_exec_bar
use exploit/windows/misc/hp_dataprotector_new_folder
use exploit/windows/misc/hp_dataprotector_traversal
use exploit/windows/misc/hp_imc_uam
use exploit/windows/misc/hp_loadrunner_magentproc
use exploit/windows/misc/hp_magentservice
use exploit/windows/misc/hp_omniinet_1
use exploit/windows/misc/hp_omniinet_2
use exploit/windows/misc/hp_omniinet_3
use exploit/windows/misc/hp_omniinet_4
use exploit/windows/misc/hp_operations_agent_coda_8c
use exploit/windows/misc/hp_ovtrace
use exploit/windows/misc/ib_isc_attach_database
use exploit/windows/misc/ib_isc_create_database
use exploit/windows/misc/ib_svc_attach
use exploit/windows/misc/ibm_cognos_tm1admsd_bof
use exploit/windows/misc/ibm_director_cim_dllinject
use exploit/windows/misc/ibm_tsm_cad_ping
use exploit/windows/misc/ibm_tsm_rca_dicugetidentify
use exploit/windows/misc/itunes_extm3u_bof
use exploit/windows/misc/landesk_aolnsrvr
use exploit/windows/misc/lianja_db_net
use exploit/windows/misc/mercury_phonebook
use exploit/windows/misc/mini_stream
use exploit/windows/misc/mirc_privmsg_server
use exploit/windows/misc/ms07_064_sami
use exploit/windows/misc/ms10_104_sharepoint
use exploit/windows/misc/netcat110_nt
use exploit/windows/misc/nettransport
use exploit/windows/misc/nvidia_mental_ray
use exploit/windows/misc/poisonivy_bof
use exploit/windows/misc/poppeeper_date
use exploit/windows/misc/poppeeper_uidl
use exploit/windows/misc/realtek_playlist
use exploit/windows/misc/sap_2005_license
use exploit/windows/misc/sap_netweaver_dispatcher
use exploit/windows/misc/shixxnote_font
use exploit/windows/misc/solidworks_workgroup_pdmwservice_file_write
use exploit/windows/misc/splayer_content_type
use exploit/windows/misc/stream_down_bof
use exploit/windows/misc/talkative_response
use exploit/windows/misc/tiny_identd_overflow
use exploit/windows/misc/trendmicro_cmdprocessor_addtask
use exploit/windows/misc/ufo_ai
use exploit/windows/misc/windows_rsh
use exploit/windows/misc/wireshark_lua
use exploit/windows/misc/wireshark_packet_dect
use exploit/windows/mmsp/ms10_025_wmss_connect_funnel
use exploit/windows/motorola/timbuktu_fileupload
use exploit/windows/mssql/lyris_listmanager_weak_pass
use exploit/windows/mssql/ms02_039_slammer
use exploit/windows/mssql/ms02_056_hello
use exploit/windows/mssql/ms09_004_sp_replwritetovarbin
use exploit/windows/mssql/ms09_004_sp_replwritetovarbin_sqli
use exploit/windows/mssql/mssql_linkcrawler
use exploit/windows/mssql/mssql_payload
use exploit/windows/mssql/mssql_payload_sqli
use exploit/windows/mysql/mysql_mof
use exploit/windows/mysql/mysql_payload
use exploit/windows/mysql/mysql_start_up
use exploit/windows/mysql/scrutinizer_upload_exec
use exploit/windows/nfs/xlink_nfsd
use exploit/windows/nntp/ms05_030_nntp
use exploit/windows/novell/file_reporter_fsfui_upload
use exploit/windows/novell/groupwisemessenger_client
use exploit/windows/novell/netiq_pum_eval
use exploit/windows/novell/nmap_stor
use exploit/windows/novell/zenworks_desktop_agent
use exploit/windows/novell/zenworks_preboot_op21_bof
use exploit/windows/novell/zenworks_preboot_op4c_bof
use exploit/windows/novell/zenworks_preboot_op6_bof
use exploit/windows/novell/zenworks_preboot_op6c_bof
use exploit/windows/oracle/client_system_analyzer_upload
use exploit/windows/oracle/extjob
use exploit/windows/oracle/osb_ndmp_auth
use exploit/windows/oracle/tns_arguments
use exploit/windows/oracle/tns_auth_sesskey
use exploit/windows/oracle/tns_service_name
use exploit/windows/pop3/seattlelab_pass
use exploit/windows/postgres/postgres_payload
use exploit/windows/proxy/bluecoat_winproxy_host
use exploit/windows/proxy/ccproxy_telnet_ping
use exploit/windows/proxy/proxypro_http_get
use exploit/windows/proxy/qbik_wingate_wwwproxy
use exploit/windows/scada/abb_wserver_exec
use exploit/windows/scada/citect_scada_odbc
use exploit/windows/scada/codesys_gateway_server_traversal
use exploit/windows/scada/codesys_web_server
use exploit/windows/scada/daq_factory_bof
use exploit/windows/scada/factorylink_csservice
use exploit/windows/scada/factorylink_vrn_09
use exploit/windows/scada/ge_proficy_cimplicity_gefebt
use exploit/windows/scada/iconics_genbroker
use exploit/windows/scada/iconics_webhmi_setactivexguid
use exploit/windows/scada/igss9_igssdataserver_listall
use exploit/windows/scada/igss9_igssdataserver_rename
use exploit/windows/scada/igss9_misc
use exploit/windows/scada/igss_exec_17
use exploit/windows/scada/indusoft_webstudio_exec
use exploit/windows/scada/moxa_mdmtool
use exploit/windows/scada/procyon_core_server
use exploit/windows/scada/realwin
use exploit/windows/scada/realwin_on_fc_binfile_a
use exploit/windows/scada/realwin_on_fcs_login
use exploit/windows/scada/realwin_scpc_initialize
use exploit/windows/scada/realwin_scpc_initialize_rf
use exploit/windows/scada/realwin_scpc_txtevent
use exploit/windows/scada/scadapro_cmdexe
use exploit/windows/scada/sunway_force_control_netdbsrv
use exploit/windows/scada/winlog_runtime
use exploit/windows/scada/yokogawa_bkbcopyd_bof
use exploit/windows/scada/yokogawa_bkesimmgr_bof
use exploit/windows/scada/yokogawa_bkfsim_vhfd
use exploit/windows/scada/yokogawa_bkhodeq_bof
use exploit/windows/sip/aim_triton_cseq
use exploit/windows/sip/sipxezphone_cseq
use exploit/windows/sip/sipxphone_cseq
use exploit/windows/smb/generic_smb_dll_injection
use exploit/windows/smb/ipass_pipe_exec
use exploit/windows/smb/ms03_049_netapi
use exploit/windows/smb/ms04_007_killbill
use exploit/windows/smb/ms04_011_lsass
use exploit/windows/smb/ms04_031_netdde
use exploit/windows/smb/ms05_039_pnp
use exploit/windows/smb/ms06_025_rasmans_reg
use exploit/windows/smb/ms06_025_rras
use exploit/windows/smb/ms06_040_netapi
use exploit/windows/smb/ms06_066_nwapi
use exploit/windows/smb/ms06_066_nwwks
use exploit/windows/smb/ms06_070_wkssvc
use exploit/windows/smb/ms07_029_msdns_zonename
use exploit/windows/smb/ms08_067_netapi
use exploit/windows/smb/ms09_050_smb2_negotiate_func_index
use exploit/windows/smb/ms10_046_shortcut_icon_dllloader
use exploit/windows/smb/ms10_061_spoolss
use exploit/windows/smb/ms15_020_shortcut_icon_dllloader
use exploit/windows/smb/netidentity_xtierrpcpipe
use exploit/windows/smb/psexec
use exploit/windows/smb/psexec_psh
use exploit/windows/smb/smb_relay
use exploit/windows/smb/timbuktu_plughntcommand_bof
use exploit/windows/smtp/mailcarrier_smtp_ehlo
use exploit/windows/smtp/mercury_cram_md5
use exploit/windows/smtp/ms03_046_exchange2000_xexch50
use exploit/windows/smtp/njstar_smtp_bof
use exploit/windows/smtp/wmailserver
use exploit/windows/smtp/ypops_overflow1
use exploit/windows/ssh/freeftpd_key_exchange
use exploit/windows/ssh/freesshd_authbypass
use exploit/windows/ssh/freesshd_key_exchange
use exploit/windows/ssh/putty_msg_debug
use exploit/windows/ssh/securecrt_ssh1
use exploit/windows/ssh/sysax_ssh_username
use exploit/windows/ssl/ms04_011_pct
use exploit/windows/telnet/gamsoft_telsrv_username
use exploit/windows/telnet/goodtech_telnet
use exploit/windows/tftp/attftp_long_filename
use exploit/windows/tftp/distinct_tftp_traversal
use exploit/windows/tftp/dlink_long_filename
use exploit/windows/tftp/futuresoft_transfermode
use exploit/windows/tftp/netdecision_tftp_traversal
use exploit/windows/tftp/opentftp_error_code
use exploit/windows/tftp/quick_tftp_pro_mode
use exploit/windows/tftp/tftpd32_long_filename
use exploit/windows/tftp/tftpdwin_long_filename
use exploit/windows/tftp/tftpserver_wrq_bof
use exploit/windows/tftp/threectftpsvc_long_mode
use exploit/windows/unicenter/cam_log_security
use exploit/windows/vnc/realvnc_client
use exploit/windows/vnc/ultravnc_client
use exploit/windows/vnc/ultravnc_viewer_bof
use exploit/windows/vnc/winvnc_http_get
use exploit/windows//safenet_ike_11
use exploit/windows/winrm/winrm_script_exec
use exploit/windows/wins/ms04_045_wins