[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 28.0
Ken Kitahara
Linux/ARM64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (128 bytes)
arm
128.0
Aron Mihaljevic
Linux/x86_64 - Delete File (test.txt) Shellcode (28 bytes)
linux_x86-64
28.0
Ken Kitahara
Linux/ARM - Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (28 Bytes)
arm
28.0
Ken Kitahara
Linux/ARM - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (128 Bytes)
arm
128.0
B3mB4m
Linux/x86 - reboot() Shellcode (28 bytes)
linux_x86
28.0
b33f
Windows (XP Professional SP3) - calc.exe (C:/WINDOWS/system32/calc.exe) ROP Shellcode (428 bytes)
windows
428.0
Metasploit
Proxy-Pro Professional GateKeeper 4.7 - GET Overflow (Metasploit)
remote
windows
3128.0
CVE-2004-0326;OSVDB-4027
Jonathan Salwan
Linux/ARM - setuid(0) + kill(-1_ SIGKILL) Shellcode (28 bytes)
arm
28.0
Metasploit
Novell eDirectory NDS Server - Host Header Overflow (Metasploit)
remote
windows
8028.0
CVE-2006-5478;OSVDB-29993
TheWorm
Linux/x86 - execve(/sbin/reboot_/sbin/reboot) Shellcode (28 bytes)
linux_x86
28.0
Jean Pascal Pereira
Linux/x86 - execve(/bin/sh) Shellcode (28 bytes)
linux_x86
28.0
storm
Linux/x86 - setuid(0) + execve(_/bin/sh__0_0) Shellcode (28 bytes)
linux_x86
28.0
dev0id
BSD/x86 - execve(/bin/sh) Shellcode (28 bytes)
bsd_x86
28.0
dev0id
BSD/x86 - Break chroot (../ 10x Loop) Shellcode (28 bytes)
bsd_x86
28.0
Gitsnik
FreeBSD/x64 - execve(/bin/sh) Shellcode (28 bytes)
freebsd_x86-64
28.0
sch3m4
Linux/x86 - setuid(0) + execve(/bin/sh_0_0) + Null-Free Shellcode (28 bytes)
linux_x86
28.0
«
1
2
»
page: 1/2 [exploits: 27]