[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: osx_ppc
Metasploit
Samba 2.2.8 (OSX/PPC) - 'trans2open' Remote Overflow (Metasploit)
remote
osx_ppc
CVE-2003-0201;OSVDB-4469
haphet
OSX/PPC - execve(/bin/sh_[/bin/sh]_NULL) + exit() Shellcode (72 bytes)
osx_ppc
72.0
ghandi
OSX/PPC - execve(/bin/sh) + Null-Free Shellcode
osx_ppc
300.0
H D Moore
OSX/PPC - Bind (8000/TCP) Shell + OSXPPCLongXOR Encoded Shellcode (300 bytes)
osx_ppc
300.0
H D Moore
OSX/PPC - Stager Sock Reverse Shellcode
osx_ppc
H D Moore
OSX/PPC - Stager Sock Find Shellcode
osx_ppc
H D Moore
OSX/PPC - Stager Sock Find MSG_PEEK + Null-Free Shellcode
osx_ppc
H D Moore
OSX/PPC - Reverse (/TCP) Shell (/bin/csh) Shellcode
osx_ppc
Dino Dai Zovi
OSX/PPC - Remote findsock by recv() Key Shellcode
osx_ppc
hophet
OSX/PPC - execve(/bin/sh) + exit() Shellcode (72 bytes)
osx_ppc
72.0
hophet
OSX/PPC - sync() + reboot() Shellcode (32 bytes)
osx_ppc
32.0
B-r00t
OSX/PPC - execve(/usr/X11R6/bin/xterm) Shellcode (141 bytes)
osx_ppc
141.0
B-r00t
OSX/PPC - Simple write() Shellcode (75 bytes)
osx_ppc
75.0
B-r00t
OSX/PPC - Create /tmp/suid Shellcode (122 bytes)
osx_ppc
122.0
B-r00t
OSX/PPC - setuid(0) + execve(/bin/sh) Shellcode (88 bytes)
osx_ppc
88.0
B-r00t
OSX/PPC - Reboot() Shellcode (28 bytes)
osx_ppc
28.0
«
1
2
»
page: 1/2 [exploits: 19]