msf > db_autopwn -e -t -r -p
[-] The db_autopwn command isDEPRECATED
[-] See http://r-7.co/xY65Zr instead
[-]
[-] Warning: The db_autopwn command is not officially supported and exists only ina branch.
[-] This code isnot well maintained, crashes systems, and crashes itself.
[-] Use only if you understand it's current limitations/issues.
[-] Minimal support and development via neinwechter on GitHub metasploit fork.
[-]
[*] Analysis completed in 130 seconds (0 vulns / 0refs)
[*]
[*] ================================================================================[*] Matching Exploit Modules
[*] ================================================================================[*] 202.193.58.13:21 exploit/freebsd/ftp/proftp_telnet_iac (port match)
[*] 202.193.58.13:21 exploit/linux/ftp/proftp_sreplace (port match)
[*] 202.193.58.13:21 exploit/linux/ftp/proftp_telnet_iac (port match)
[*] 202.193.58.13:21 exploit/mainframe/ftp/ftp_jcl_creds (port match)
[*] 202.193.58.13:21 exploit/multi/ftp/pureftpd_bash_env_exec (port match)
[*] 202.193.58.13:21 exploit/multi/ftp/wuftpd_site_exec_format (port match)
[*] 202.193.58.13:21 exploit/osx/ftp/webstar_ftp_user (port match)
[*] 202.193.58.13:21 exploit/unix/ftp/proftpd_133c_backdoor (port match)
[*] 202.193.58.13:21 exploit/unix/ftp/vsftpd_234_backdoor (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/3cdaemon_ftp_user (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/ability_server_stor (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/bison_ftp_bof (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/cesarftp_mkd (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/comsnd_ftpd_fmtstr (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/dreamftp_format (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/easyfilesharing_pass (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/easyftp_cwd_fixret (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/easyftp_list_fixret (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/easyftp_mkd_fixret (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/filecopa_list_overflow (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/freefloatftp_user (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/freefloatftp_wbem (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/freeftpd_pass (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/freeftpd_user (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/globalscapeftp_input (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/goldenftp_pass_bof (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/httpdx_tolog_format (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/kmftp_utility_cwd (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/ms09_053_ftpd_nlst (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/netterm_netftpd_user (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/open_ftpd_wbem (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/oracle9i_xdb_ftp_pass (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/oracle9i_xdb_ftp_unlock (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/pcman_put (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/pcman_stor (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/quickshare_traversal_write (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/ricoh_dl_bof (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/sami_ftpd_list (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/sami_ftpd_user (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/sasser_ftpd_port (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/servu_chmod (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/servu_mdtm (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/slimftpd_list_concat (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/turboftp_port (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/vermillion_ftpd_port (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/warftpd_165_pass (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/warftpd_165_user (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/wftpd_size (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/wsftp_server_503_mkd (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/wsftp_server_505_xmd5 (port match)
[*] 202.193.58.13:21 exploit/windows/ftp/xlink_server (port match)
[*] 202.193.58.13:22 exploit/apple_ios/ssh/cydia_default_ssh (port match)
[*] 202.193.58.13:22 exploit/linux/ssh/ceragon_fibeair_known_privkey (port match)
[*] 202.193.58.13:22 exploit/linux/ssh/exagrid_known_privkey (port match)
[*] 202.193.58.13:22 exploit/linux/ssh/f5_bigip_known_privkey (port match)
[*] 202.193.58.13:22 exploit/linux/ssh/loadbalancerorg_enterprise_known_privkey (port match)
[*] 202.193.58.13:22 exploit/linux/ssh/quantum_dxi_known_privkey (port match)
[*] 202.193.58.13:22 exploit/linux/ssh/quantum_vmpro_backdoor (port match)
[*] 202.193.58.13:22 exploit/linux/ssh/symantec_smg_ssh (port match)
[*] 202.193.58.13:22 exploit/multi/ssh/sshexec (port match)
[*] 202.193.58.13:22 exploit/unix/ssh/array_vxag_vapv_privkey_privesc (port match)
[*] 202.193.58.13:22 exploit/unix/ssh/tectia_passwd_changereq (port match)
[*] 202.193.58.13:22 exploit/windows/ssh/freeftpd_key_exchange (port match)
[*] 202.193.58.13:22 exploit/windows/ssh/freesshd_authbypass (port match)
[*] 202.193.58.13:22 exploit/windows/ssh/freesshd_key_exchange (port match)
[*] 202.193.58.13:22 exploit/windows/ssh/sysax_ssh_username (port match)
[*] 202.193.58.13:23 exploit/freebsd/telnet/telnet_encrypt_keyid (port match)
[*] 202.193.58.13:23 exploit/linux/http/dlink_dcs_930l_authenticated_remote_command_execution (port match)
[*] 202.193.58.13:23 exploit/linux/http/tp_link_sc2020n_authenticated_telnet_injection (port match)
[*] 202.193.58.13:23 exploit/linux/telnet/telnet_encrypt_keyid (port match)
[*] 202.193.58.13:23 exploit/solaris/telnet/fuser (port match)
[*] 202.193.58.13:23 exploit/solaris/telnet/ttyprompt (port match)
[*] 202.193.58.13:23 exploit/unix/misc/psh_auth_bypass (port match)
[*] 202.193.58.13:23 exploit/windows/proxy/ccproxy_telnet_ping (port match)
[*] 202.193.58.13:23 exploit/windows/scada/procyon_core_server (port match)
[*] 202.193.58.13:23 exploit/windows/telnet/gamsoft_telsrv_username (port match)
[*] 202.193.58.13:25 exploit/linux/smtp/exim_gethostbyname_bof (port match)
[*] 202.193.58.13:25 exploit/unix/smtp/clamav_milter_blackhole (port match)
[*] 202.193.58.13:25 exploit/unix/smtp/exim4_string_format (port match)
[*] 202.193.58.13:25 exploit/unix/webapp/squirrelmail_pgp_plugin (port match)
[*] 202.193.58.13:25 exploit/windows/lotus/domino_icalendar_organizer (port match)
[*] 202.193.58.13:25 exploit/windows/lotus/lotusnotes_lzh (port match)
[*] 202.193.58.13:25 exploit/windows/smtp/mailcarrier_smtp_ehlo (port match)
[*] 202.193.58.13:25 exploit/windows/smtp/mercury_cram_md5 (port match)
[*] 202.193.58.13:25 exploit/windows/smtp/ms03_046_exchange2000_xexch50 (port match)
[*] 202.193.58.13:25 exploit/windows/smtp/njstar_smtp_bof (port match)
[*] 202.193.58.13:25 exploit/windows/smtp/wmailserver (port match)
[*] 202.193.58.13:25 exploit/windows/smtp/ypops_overflow1 (port match)
[*] 202.193.58.13:80 exploit/bsdi/softcart/mercantec_softcart (port match)
[*] 202.193.58.13:80 exploit/freebsd/http/watchguard_cmd_exec (port match)
[*] 202.193.58.13:80 exploit/freebsd/misc/citrix_netscaler_soap_bof (port match)
[*] 202.193.58.13:80 exploit/linux/antivirus/escan_password_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/accellion_fta_getstatus_oauth (port match)
[*] 202.193.58.13:80 exploit/linux/http/advantech_switch_bash_env_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/airties_login_cgi_bof (port match)
[*] 202.193.58.13:80 exploit/linux/http/alienvault_sqli_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/apache_continuum_cmd_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/astium_sqli_upload (port match)
[*] 202.193.58.13:80 exploit/linux/http/atutor_filemanager_traversal (port match)
[*] 202.193.58.13:80 exploit/linux/http/belkin_login_bof (port match)
[*] 202.193.58.13:80 exploit/linux/http/centreon_sqli_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/centreon_useralias_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/cfme_manageiq_evm_upload_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/ddwrt_cgibin_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/dlink_authentication_cgi_bof (port match)
[*] 202.193.58.13:80 exploit/linux/http/dlink_command_php_exec_noauth (port match)
[*] 202.193.58.13:80 exploit/linux/http/dlink_dcs931l_upload (port match)
[*] 202.193.58.13:80 exploit/linux/http/dlink_dcs_930l_authenticated_remote_command_execution (port match)
[*] 202.193.58.13:80 exploit/linux/http/dlink_dir300_exec_telnet (port match)
[*] 202.193.58.13:80 exploit/linux/http/dlink_dir605l_captcha_bof (port match)
[*] 202.193.58.13:80 exploit/linux/http/dlink_dspw110_cookie_noauth_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/dlink_dspw215_info_cgi_bof (port match)
[*] 202.193.58.13:80 exploit/linux/http/dlink_hedwig_cgi_bof (port match)
[*] 202.193.58.13:80 exploit/linux/http/dlink_hnap_bof (port match)
[*] 202.193.58.13:80 exploit/linux/http/dlink_hnap_header_exec_noauth (port match)
[*] 202.193.58.13:80 exploit/linux/http/dlink_upnp_exec_noauth (port match)
[*] 202.193.58.13:80 exploit/linux/http/dolibarr_cmd_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/dreambox_openpli_shell (port match)
[*] 202.193.58.13:80 exploit/linux/http/efw_chpasswd_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/esva_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/f5_icall_cmd (port match)
[*] 202.193.58.13:80 exploit/linux/http/f5_icontrol_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/foreman_openstack_satellite_code_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/fritzbox_echo_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/gitlist_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/groundwork_monarch_cmd_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/hp_system_management (port match)
[*] 202.193.58.13:80 exploit/linux/http/ipfire_bashbug_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/ipfire_proxy_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/kaltura_unserialize_rce (port match)
[*] 202.193.58.13:80 exploit/linux/http/kloxo_sqli (port match)
[*] 202.193.58.13:80 exploit/linux/http/lifesize_uvc_ping_rce (port match)
[*] 202.193.58.13:80 exploit/linux/http/linksys_apply_cgi (port match)
[*] 202.193.58.13:80 exploit/linux/http/linksys_themoon_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/linksys_wrt110_cmd_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/linksys_wrt160nv2_apply_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/mutiny_frontend_upload (port match)
[*] 202.193.58.13:80 exploit/linux/http/nagios_xi_chained_rce (port match)
[*] 202.193.58.13:80 exploit/linux/http/netgear_readynas_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/nginx_chunked_size (port match)
[*] 202.193.58.13:80 exploit/linux/http/nuuo_nvrmini_auth_rce (port match)
[*] 202.193.58.13:80 exploit/linux/http/nuuo_nvrmini_unauth_rce (port match)
[*] 202.193.58.13:80 exploit/linux/http/op5_config_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/openfiler_networkcard_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/pandora_fms_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/pandora_fms_sqli (port match)
[*] 202.193.58.13:80 exploit/linux/http/pineapp_ldapsyncnow_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/pineapp_livelog_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/pineapp_test_li_conn_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/pineapple_bypass_cmdinject (port match)
[*] 202.193.58.13:80 exploit/linux/http/pineapple_preconfig_cmdinject (port match)
[*] 202.193.58.13:80 exploit/linux/http/piranha_passwd_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/raidsonic_nas_ib5220_exec_noauth (port match)
[*] 202.193.58.13:80 exploit/linux/http/realtek_miniigd_upnp_exec_noauth (port match)
[*] 202.193.58.13:80 exploit/linux/http/seagate_nas_php_exec_noauth (port match)
[*] 202.193.58.13:80 exploit/linux/http/smt_ipmi_close_window_bof (port match)
[*] 202.193.58.13:80 exploit/linux/http/sophos_wpa_iface_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/sophos_wpa_sblistpack_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/symantec_web_gateway_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/symantec_web_gateway_file_upload (port match)
[*] 202.193.58.13:80 exploit/linux/http/symantec_web_gateway_lfi (port match)
[*] 202.193.58.13:80 exploit/linux/http/symantec_web_gateway_pbcontrol (port match)
[*] 202.193.58.13:80 exploit/linux/http/symantec_web_gateway_restore (port match)
[*] 202.193.58.13:80 exploit/linux/http/synology_dsm_sliceupload_exec_noauth (port match)
[*] 202.193.58.13:80 exploit/linux/http/tiki_calendar_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/tp_link_sc2020n_authenticated_telnet_injection (port match)
[*] 202.193.58.13:80 exploit/linux/http/vap2500_tools_command_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/vcms_upload (port match)
[*] 202.193.58.13:80 exploit/linux/http/wanem_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/webcalendar_settings_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/webid_converter (port match)
[*] 202.193.58.13:80 exploit/linux/http/zabbix_sqli (port match)
[*] 202.193.58.13:80 exploit/linux/http/zen_load_balancer_exec (port match)
[*] 202.193.58.13:80 exploit/linux/http/zenoss_showdaemonxmlconfig_exec (port match)
[*] 202.193.58.13:80 exploit/linux/ids/alienvault_centerd_soap_exec (port match)
[*] 202.193.58.13:80 exploit/linux/ssh/ubiquiti_airos_file_upload (port match)
[*] 202.193.58.13:80 exploit/linux/upnp/miniupnpd_soap_bof (port match)
[*] 202.193.58.13:80 exploit/multi/elasticsearch/script_mvel_rce (port match)
[*] 202.193.58.13:80 exploit/multi/elasticsearch/search_groovy_script (port match)
[*] 202.193.58.13:80 exploit/multi/http/activecollab_chat (port match)
[*] 202.193.58.13:80 exploit/multi/http/ajaxplorer_checkinstall_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/apache_jetspeed_file_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/apache_mod_cgi_bash_env_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/apache_roller_ognl_injection (port match)
[*] 202.193.58.13:80 exploit/multi/http/apprain_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/atutor_sqli (port match)
[*] 202.193.58.13:80 exploit/multi/http/auxilium_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/axis2_deployer (port match)
[*] 202.193.58.13:80 exploit/multi/http/bolt_file_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/caidao_php_backdoor_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/cisco_dcnm_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/coldfusion_rds (port match)
[*] 202.193.58.13:80 exploit/multi/http/cups_bash_env_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/cuteflow_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/dexter_casinoloader_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/drupal_drupageddon (port match)
[*] 202.193.58.13:80 exploit/multi/http/eaton_nsm_code_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/eventlog_file_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/extplorer_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/familycms_less_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/freenas_exec_raw (port match)
[*] 202.193.58.13:80 exploit/multi/http/gestioip_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/gitlab_shell_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/gitorious_graph (port match)
[*] 202.193.58.13:80 exploit/multi/http/glassfish_deployer (port match)
[*] 202.193.58.13:80 exploit/multi/http/glossword_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/glpi_install_rce (port match)
[*] 202.193.58.13:80 exploit/multi/http/horde_href_backdoor (port match)
[*] 202.193.58.13:80 exploit/multi/http/hp_sitescope_issuesiebelcmd (port match)
[*] 202.193.58.13:80 exploit/multi/http/hp_sitescope_uploadfileshandler (port match)
[*] 202.193.58.13:80 exploit/multi/http/hp_sys_mgmt_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/hyperic_hq_script_console (port match)
[*] 202.193.58.13:80 exploit/multi/http/ispconfig_php_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/jboss_bshdeployer (port match)
[*] 202.193.58.13:80 exploit/multi/http/jboss_deploymentfilerepository (port match)
[*] 202.193.58.13:80 exploit/multi/http/jboss_invoke_deploy (port match)
[*] 202.193.58.13:80 exploit/multi/http/jboss_maindeployer (port match)
[*] 202.193.58.13:80 exploit/multi/http/jboss_seam_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/jenkins_script_console (port match)
[*] 202.193.58.13:80 exploit/multi/http/jira_hipchat_template (port match)
[*] 202.193.58.13:80 exploit/multi/http/joomla_http_header_rce (port match)
[*] 202.193.58.13:80 exploit/multi/http/kordil_edms_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/lcms_php_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/log1cms_ajax_create_folder (port match)
[*] 202.193.58.13:80 exploit/multi/http/magento_unserialize (port match)
[*] 202.193.58.13:80 exploit/multi/http/manage_engine_dc_pmp_sqli (port match)
[*] 202.193.58.13:80 exploit/multi/http/manageengine_auth_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/manageengine_sd_uploader (port match)
[*] 202.193.58.13:80 exploit/multi/http/manageengine_search_sqli (port match)
[*] 202.193.58.13:80 exploit/multi/http/mantisbt_php_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/mediawiki_thumb (port match)
[*] 202.193.58.13:80 exploit/multi/http/metasploit_static_secret_key_base (port match)
[*] 202.193.58.13:80 exploit/multi/http/metasploit_webui_console_command_execution (port match)
[*] 202.193.58.13:80 exploit/multi/http/mma_backdoor_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/mobilecartly_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/moodle_cmd_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/movabletype_upgrade_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/nas4free_php_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/netwin_surgeftp_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/nibbleblog_file_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/novell_servicedesk_rce (port match)
[*] 202.193.58.13:80 exploit/multi/http/op5_license (port match)
[*] 202.193.58.13:80 exploit/multi/http/op5_welcome (port match)
[*] 202.193.58.13:80 exploit/multi/http/openfire_auth_bypass (port match)
[*] 202.193.58.13:80 exploit/multi/http/openmediavault_cmd_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/openx_backdoor_php (port match)
[*] 202.193.58.13:80 exploit/multi/http/opmanager_socialit_file_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/oracle_ats_file_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/oracle_reports_rce (port match)
[*] 202.193.58.13:80 exploit/multi/http/pandora_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/phoenix_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/php_cgi_arg_injection (port match)
[*] 202.193.58.13:80 exploit/multi/http/php_utility_belt_rce (port match)
[*] 202.193.58.13:80 exploit/multi/http/php_volunteer_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/phpfilemanager_rce (port match)
[*] 202.193.58.13:80 exploit/multi/http/phpldapadmin_query_engine (port match)
[*] 202.193.58.13:80 exploit/multi/http/phpmoadmin_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/phpmyadmin_3522_backdoor (port match)
[*] 202.193.58.13:80 exploit/multi/http/phpmyadmin_preg_replace (port match)
[*] 202.193.58.13:80 exploit/multi/http/phpscheduleit_start_date (port match)
[*] 202.193.58.13:80 exploit/multi/http/phptax_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/phpwiki_ploticus_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/plone_popen2 (port match)
[*] 202.193.58.13:80 exploit/multi/http/pmwiki_pagelist (port match)
[*] 202.193.58.13:80 exploit/multi/http/polarcms_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/processmaker_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/qdpm_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/rails_actionpack_inline_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/rails_json_yaml_code_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/rails_secret_deserialization (port match)
[*] 202.193.58.13:80 exploit/multi/http/rails_web_console_v2_code_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/rails_xml_yaml_code_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/rocket_servergraph_file_requestor_rce (port match)
[*] 202.193.58.13:80 exploit/multi/http/sflog_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/simple_backdoors_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/sit_file_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/snortreport_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/solarwinds_store_manager_auth_filter (port match)
[*] 202.193.58.13:80 exploit/multi/http/sonicwall_gms_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/sonicwall_scrutinizer_methoddetail_sqli (port match)
[*] 202.193.58.13:80 exploit/multi/http/splunk_mappy_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/splunk_upload_app_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/spree_search_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/spree_searchlogic_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/struts_code_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/struts_code_exec_classloader (port match)
[*] 202.193.58.13:80 exploit/multi/http/struts_code_exec_exception_delegator (port match)
[*] 202.193.58.13:80 exploit/multi/http/struts_code_exec_parameters (port match)
[*] 202.193.58.13:80 exploit/multi/http/struts_default_action_mapper (port match)
[*] 202.193.58.13:80 exploit/multi/http/struts_dev_mode (port match)
[*] 202.193.58.13:80 exploit/multi/http/struts_dmi_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/struts_dmi_rest_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/struts_include_params (port match)
[*] 202.193.58.13:80 exploit/multi/http/stunshell_eval (port match)
[*] 202.193.58.13:80 exploit/multi/http/stunshell_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/sun_jsws_dav_options (port match)
[*] 202.193.58.13:80 exploit/multi/http/sysaid_auth_file_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/sysaid_rdslogs_file_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/testlink_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/tomcat_mgr_deploy (port match)
[*] 202.193.58.13:80 exploit/multi/http/tomcat_mgr_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/traq_plugin_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/uptime_file_upload_1 (port match)
[*] 202.193.58.13:80 exploit/multi/http/uptime_file_upload_2 (port match)
[*] 202.193.58.13:80 exploit/multi/http/v0pcr3w_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/vbseo_proc_deutf (port match)
[*] 202.193.58.13:80 exploit/multi/http/vbulletin_unserialize (port match)
[*] 202.193.58.13:80 exploit/multi/http/visual_mining_netcharts_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/vtiger_install_rce (port match)
[*] 202.193.58.13:80 exploit/multi/http/vtiger_php_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/vtiger_soap_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/webnms_file_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/webpagetest_upload_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/werkzeug_debug_rce (port match)
[*] 202.193.58.13:80 exploit/multi/http/wikka_spam_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/x7chat2_php_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/zabbix_script_exec (port match)
[*] 202.193.58.13:80 exploit/multi/http/zemra_panel_rce (port match)
[*] 202.193.58.13:80 exploit/multi/http/zenworks_configuration_management_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/zenworks_control_center_upload (port match)
[*] 202.193.58.13:80 exploit/multi/http/zpanel_information_disclosure_rce (port match)
[*] 202.193.58.13:80 exploit/multi/misc/indesign_server_soap (port match)
[*] 202.193.58.13:80 exploit/multi/php/php_unserialize_zval_cookie (port match)
[*] 202.193.58.13:80 exploit/multi/realserver/describe (port match)
[*] 202.193.58.13:80 exploit/multi/sap/sap_soap_rfc_sxpg_call_system_exec (port match)
[*] 202.193.58.13:80 exploit/multi/sap/sap_soap_rfc_sxpg_command_exec (port match)
[*] 202.193.58.13:80 exploit/multi/wyse/hagent_untrusted_hsdata (port match)
[*] 202.193.58.13:80 exploit/unix/ftp/proftpd_modcopy_exec (port match)
[*] 202.193.58.13:80 exploit/unix/http/contentkeeperweb_mimencode (port match)
[*] 202.193.58.13:80 exploit/unix/http/ctek_skyrouter (port match)
[*] 202.193.58.13:80 exploit/unix/http/dell_kace_k1000_upload (port match)
[*] 202.193.58.13:80 exploit/unix/http/freepbx_callmenum (port match)
[*] 202.193.58.13:80 exploit/unix/http/lifesize_room (port match)
[*] 202.193.58.13:80 exploit/unix/http/twiki_debug_plugins (port match)
[*] 202.193.58.13:80 exploit/unix/http/vmturbo_vmtadmin_exec_noauth (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/actualanalyzer_ant_cookie_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/arkeia_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/awstats_configdir_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/awstats_migrate_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/awstatstotals_multisort (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/barracuda_img_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/base_qry_common (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/basilic_diff_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/cacti_graphimage_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/cakephp_cache_corruption (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/carberp_backdoor_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/citrix_access_gateway_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/clipbucket_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/coppermine_piceditor (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/datalife_preview_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/dogfood_spell_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/drupal_coder_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/drupal_restws_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/egallery_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/flashchat_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/foswiki_maketext (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/freepbx_config_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/generic_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/get_simple_cms_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/google_proxystylesheet_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/graphite_pickle_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/guestbook_ssi_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/hastymail_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/havalite_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/horde_unserialize_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/hybridauth_install_php_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/instantcms_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/invision_pboard_unserialize_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/joomla_akeeba_unserialize (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/joomla_comjce_imgmanager (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/joomla_contenthistory_sqli_rce (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/joomla_media_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/joomla_tinybrowser (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/kimai_sqli (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/libretto_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/maarch_letterbox_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/mambo_cache_lite (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/mitel_awc_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/moinmoin_twikidraw (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/mybb_backdoor (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/nagios3_history_cgi (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/nagios3_statuswml_ping (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/nagios_graph_explorer (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/narcissus_backend_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/open_flash_chart_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/openemr_sqli_privesc_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/openemr_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/opensis_modname_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/openview_connectednodes_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/openx_banner_edit (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/oracle_vm_agent_utl (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/oscommerce_filemanager (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/pajax_remote_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/php_charts_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/php_eval (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/php_include (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/php_vbulletin_template (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/php_xmlrpc_eval (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/phpbb_highlight (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/phpmyadmin_config (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/projectpier_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/projectsend_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/qtss_parse_xml_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/redmine_scm_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/seportal_sqli_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/simple_e_document_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/sixapart_movabletype_storable_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/skybluecanvas_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/sphpblog_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/spip_connect_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/squash_yaml_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/sugarcrm_rest_unserialize_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/sugarcrm_unserialize_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/tikiwiki_graph_formula_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/tikiwiki_jhot_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/tikiwiki_unserialize_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/tikiwiki_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/trixbox_langchoice (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/tuleap_unserialize_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/twiki_history (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/twiki_maketext (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/twiki_search (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/vbulletin_vote_sqli_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/vicidial_manager_send_cmd_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/webmin_show_cgi_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/webtester_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_admin_shell_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_advanced_custom_fields_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_ajax_load_more_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_asset_manager_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_creativecontactform_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_downloadmanager_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_easycart_unrestricted_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_foxypress_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_frontend_editor_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_google_document_embedder_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_holding_pattern_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_inboundio_marketing_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_infusionsoft_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_lastpost_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_ninja_forms_unauthenticated_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_nmediawebsite_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_optimizepress_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_photo_gallery_unrestricted_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_pixabay_images_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_platform_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_property_upload_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_reflexgallery_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_revslider_upload_execute (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_slideshowgallery_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_symposium_shell_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_total_cache_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_worktheflow_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_wpshop_ecommerce_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_wptouch_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/wp_wysija_newsletters_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/xoda_file_upload (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/zeroshell_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/zimbra_lfi (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/zoneminder_packagecontrol_exec (port match)
[*] 202.193.58.13:80 exploit/unix/webapp/zpanel_username_exec (port match)
[*] 202.193.58.13:80 exploit/windows/antivirus/symantec_endpoint_manager_rce (port match)
[*] 202.193.58.13:80 exploit/windows/antivirus/symantec_workspace_streaming_exec (port match)
[*] 202.193.58.13:80 exploit/windows/ftp/wing_ftp_admin_exec (port match)
[*] 202.193.58.13:80 exploit/windows/http/adobe_robohelper_authbypass (port match)
[*] 202.193.58.13:80 exploit/windows/http/altn_securitygateway (port match)
[*] 202.193.58.13:80 exploit/windows/http/altn_webadmin (port match)
[*] 202.193.58.13:80 exploit/windows/http/amlibweb_webquerydll_app (port match)
[*] 202.193.58.13:80 exploit/windows/http/apache_chunked (port match)
[*] 202.193.58.13:80 exploit/windows/http/apache_mod_rewrite_ldap (port match)
[*] 202.193.58.13:80 exploit/windows/http/apache_modjk_overflow (port match)
[*] 202.193.58.13:80 exploit/windows/http/avaya_ccr_imageupload_exec (port match)
[*] 202.193.58.13:80 exploit/windows/http/badblue_ext_overflow (port match)
[*] 202.193.58.13:80 exploit/windows/http/badblue_passthru (port match)
[*] 202.193.58.13:80 exploit/windows/http/bea_weblogic_jsessionid (port match)
[*] 202.193.58.13:80 exploit/windows/http/bea_weblogic_post_bof (port match)
[*] 202.193.58.13:80 exploit/windows/http/bea_weblogic_transfer_encoding (port match)
[*] 202.193.58.13:80 exploit/windows/http/belkin_bulldog (port match)
[*] 202.193.58.13:80 exploit/windows/http/ca_arcserve_rpc_authbypass (port match)
[*] 202.193.58.13:80 exploit/windows/http/ca_totaldefense_regeneratereports (port match)
[*] 202.193.58.13:80 exploit/windows/http/cogent_datahub_request_headers_bof (port match)
[*] 202.193.58.13:80 exploit/windows/http/coldfusion_fckeditor (port match)
[*] 202.193.58.13:80 exploit/windows/http/cyclope_ess_sqli (port match)
[*] 202.193.58.13:80 exploit/windows/http/desktopcentral_file_upload (port match)
[*] 202.193.58.13:80 exploit/windows/http/desktopcentral_statusupdate_upload (port match)
[*] 202.193.58.13:80 exploit/windows/http/easyfilesharing_seh (port match)
[*] 202.193.58.13:80 exploit/windows/http/easyftp_list (port match)
[*] 202.193.58.13:80 exploit/windows/http/edirectory_imonitor (port match)
[*] 202.193.58.13:80 exploit/windows/http/efs_easychatserver_username (port match)
[*] 202.193.58.13:80 exploit/windows/http/efs_fmws_userid_bof (port match)
[*] 202.193.58.13:80 exploit/windows/http/ektron_xslt_exec (port match)
[*] 202.193.58.13:80 exploit/windows/http/ericom_access_now_bof (port match)
[*] 202.193.58.13:80 exploit/windows/http/fdm_auth_header (port match)
[*] 202.193.58.13:80 exploit/windows/http/generic_http_dll_injection (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_autopass_license_traversal (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_imc_bims_upload (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_imc_mibfileupload (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_loadrunner_copyfiletoserver (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_mpa_job_acct (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_getnnmdata_hostname (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_getnnmdata_icount (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_getnnmdata_maxage (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_nnmrptconfig_nameparams (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_nnmrptconfig_schdparams (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_openview5 (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_ovalarm_lang (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_ovas (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_ovbuildpath_textfile (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_ovwebhelp (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_ovwebsnmpsrv_main (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_ovwebsnmpsrv_ovutil (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_ovwebsnmpsrv_uro (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_snmp (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_snmpviewer_actapp (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_toolbar_01 (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_toolbar_02 (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_webappmon_execvp (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_nnm_webappmon_ovjavalocale (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_openview_insight_backdoor (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_pcm_snac_update_certificates (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_pcm_snac_update_domain (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_power_manager_filename (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_power_manager_login (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_sitescope_dns_tool (port match)
[*] 202.193.58.13:80 exploit/windows/http/hp_sitescope_runomagentcommand (port match)
[*] 202.193.58.13:80 exploit/windows/http/httpdx_handlepeer (port match)
[*] 202.193.58.13:80 exploit/windows/http/httpdx_tolog_format (port match)
[*] 202.193.58.13:80 exploit/windows/http/ia_webmail (port match)
[*] 202.193.58.13:80 exploit/windows/http/ibm_tivoli_endpoint_bof (port match)
[*] 202.193.58.13:80 exploit/windows/http/ibm_tpmfosd_overflow (port match)
[*] 202.193.58.13:80 exploit/windows/http/integard_password_bof (port match)
[*] 202.193.58.13:80 exploit/windows/http/intersystems_cache (port match)
[*] 202.193.58.13:80 exploit/windows/http/intrasrv_bof (port match)
[*] 202.193.58.13:80 exploit/windows/http/ipswitch_wug_maincfgret (port match)
[*] 202.193.58.13:80 exploit/windows/http/jira_collector_traversal (port match)
[*] 202.193.58.13:80 exploit/windows/http/kaseya_uploader (port match)
[*] 202.193.58.13:80 exploit/windows/http/kaseya_uploadimage_file_upload (port match)
[*] 202.193.58.13:80 exploit/windows/http/kolibri_http (port match)
[*] 202.193.58.13:80 exploit/windows/http/landesk_thinkmanagement_upload_asp (port match)
[*] 202.193.58.13:80 exploit/windows/http/lexmark_markvision_gfd_upload (port match)
[*] 202.193.58.13:80 exploit/windows/http/mailenable_auth_header (port match)
[*] 202.193.58.13:80 exploit/windows/http/manage_engine_opmanager_rce (port match)
[*] 202.193.58.13:80 exploit/windows/http/manageengine_apps_mngr (port match)
[*] 202.193.58.13:80 exploit/windows/http/manageengine_connectionid_write (port match)
[*] 202.193.58.13:80 exploit/windows/http/maxdb_webdbm_get_overflow (port match)
[*] 202.193.58.13:80 exploit/windows/http/minishare_get_overflow (port match)
[*] 202.193.58.13:80 exploit/windows/http/miniweb_upload_wbem (port match)
[*] 202.193.58.13:80 exploit/windows/http/navicopa_get_overflow (port match)
[*] 202.193.58.13:80 exploit/windows/http/netdecision_http_bof (port match)
[*] 202.193.58.13:80 exploit/windows/http/netgear_nms_rce (port match)
[*] 202.193.58.13:80 exploit/windows/http/novell_imanager_upload (port match)
[*] 202.193.58.13:80 exploit/windows/http/novell_mdm_lfi (port match)
[*] 202.193.58.13:80 exploit/windows/http/nowsms (port match)
[*] 202.193.58.13:80 exploit/windows/http/oracle_beehive_evaluation (port match)
[*] 202.193.58.13:80 exploit/windows/http/oracle_beehive_prepareaudiotoplay (port match)
[*] 202.193.58.13:80 exploit/windows/http/oracle_btm_writetofile (port match)
[*] 202.193.58.13:80 exploit/windows/http/oracle_endeca_exec (port match)
[*] 202.193.58.13:80 exploit/windows/http/oracle_event_processing_upload (port match)
[*] 202.193.58.13:80 exploit/windows/http/osb_uname_jlist (port match)
[*] 202.193.58.13:80 exploit/windows/http/php_apache_request_headers_bof (port match)
[*] 202.193.58.13:80 exploit/windows/http/privatewire_gateway (port match)
[*] 202.193.58.13:80 exploit/windows/http/rabidhamster_r4_log (port match)
[*] 202.193.58.13:80 exploit/windows/http/rejetto_hfs_exec (port match)
[*] 202.193.58.13:80 exploit/windows/http/sambar6_search_results (port match)
[*] 202.193.58.13:80 exploit/windows/http/sap_configservlet_exec_noauth (port match)
[*] 202.193.58.13:80 exploit/windows/http/sapdb_webtools (port match)
[*] 202.193.58.13:80 exploit/windows/http/savant_31_overflow (port match)
[*] 202.193.58.13:80 exploit/windows/http/sepm_auth_bypass_rce (port match)
[*] 202.193.58.13:80 exploit/windows/http/servu_session_cookie (port match)
[*] 202.193.58.13:80 exploit/windows/http/shoutcast_format (port match)
[*] 202.193.58.13:80 exploit/windows/http/shttpd_post (port match)
[*] 202.193.58.13:80 exploit/windows/http/solarwinds_fsm_userlogin (port match)
[*] 202.193.58.13:80 exploit/windows/http/solarwinds_storage_manager_sql (port match)
[*] 202.193.58.13:80 exploit/windows/http/sonicwall_scrutinizer_sqli (port match)
[*] 202.193.58.13:80 exploit/windows/http/sws_connection_bof (port match)
[*] 202.193.58.13:80 exploit/windows/http/sybase_easerver (port match)
[*] 202.193.58.13:80 exploit/windows/http/sysax_create_folder (port match)
[*] 202.193.58.13:80 exploit/windows/http/trackercam_phparg_overflow (port match)
[*] 202.193.58.13:80 exploit/windows/http/trackit_file_upload (port match)
[*] 202.193.58.13:80 exploit/windows/http/trendmicro_officescan (port match)
[*] 202.193.58.13:80 exploit/windows/http/ultraminihttp_bof (port match)
[*] 202.193.58.13:80 exploit/windows/http/umbraco_upload_aspx (port match)
[*] 202.193.58.13:80 exploit/windows/http/vmware_vcenter_chargeback_upload (port match)
[*] 202.193.58.13:80 exploit/windows/http/webster_http (port match)
[*] 202.193.58.13:80 exploit/windows/http/xampp_webdav_upload_php (port match)
[*] 202.193.58.13:80 exploit/windows/http/xitami_if_mod_since (port match)
[*] 202.193.58.13:80 exploit/windows/http/zenworks_assetmgmt_uploadservlet (port match)
[*] 202.193.58.13:80 exploit/windows/http/zenworks_uploadservlet (port match)
[*] 202.193.58.13:80 exploit/windows/iis/iis_webdav_upload_asp (port match)
[*] 202.193.58.13:80 exploit/windows/iis/ms01_023_printer (port match)
[*] 202.193.58.13:80 exploit/windows/iis/ms01_026_dbldecode (port match)
[*] 202.193.58.13:80 exploit/windows/iis/ms01_033_idq (port match)
[*] 202.193.58.13:80 exploit/windows/iis/ms02_018_htr (port match)
[*] 202.193.58.13:80 exploit/windows/iis/ms02_065_msadc (port match)
[*] 202.193.58.13:80 exploit/windows/iis/ms03_007_ntdll_webdav (port match)
[*] 202.193.58.13:80 exploit/windows/iis/msadc (port match)
[*] 202.193.58.13:80 exploit/windows/isapi/ms00_094_pbserver (port match)
[*] 202.193.58.13:80 exploit/windows/isapi/ms03_022_nsiislog_post (port match)
[*] 202.193.58.13:80 exploit/windows/isapi/ms03_051_fp30reg_chunked (port match)
[*] 202.193.58.13:80 exploit/windows/isapi/rsa_webagent_redirect (port match)
[*] 202.193.58.13:80 exploit/windows/isapi/w3who_query (port match)
[*] 202.193.58.13:80 exploit/windows/lotus/domino_http_accept_language (port match)
[*] 202.193.58.13:80 exploit/windows/misc/borland_starteam (port match)
[*] 202.193.58.13:80 exploit/windows/misc/manageengine_eventlog_analyzer_rce (port match)
[*] 202.193.58.13:80 exploit/windows/misc/ms10_104_sharepoint (port match)
[*] 202.193.58.13:80 exploit/windows/mssql/ms09_004_sp_replwritetovarbin_sqli (port match)
[*] 202.193.58.13:80 exploit/windows/mssql/mssql_payload_sqli (port match)
[*] 202.193.58.13:80 exploit/windows/mysql/scrutinizer_upload_exec (port match)
[*] 202.193.58.13:80 exploit/windows/novell/file_reporter_fsfui_upload (port match)
[*] 202.193.58.13:80 exploit/windows/oracle/client_system_analyzer_upload (port match)
[*] 202.193.58.13:80 exploit/windows/proxy/bluecoat_winproxy_host (port match)
[*] 202.193.58.13:80 exploit/windows/proxy/qbik_wingate_wwwproxy (port match)
[*] 202.193.58.13:80 exploit/windows/scada/advantech_webaccess_dashboard_file_upload (port match)
[*] 202.193.58.13:80 exploit/windows/scada/ge_proficy_cimplicity_gefebt (port match)
[*] 202.193.58.13:80 exploit/windows/vnc/winvnc_http_get (port match)
[*] 202.193.58.13:80 exploit/windows/winrm/winrm_script_exec (port match)