[] NeoSense
search results for » port:
Metasploit Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (Metasploit)
remote windows 8080.0 CVE-2019-0232
Chapman Schleiss Symantec DLP 15.5 MP1 - Cross-Site Scripting
webapps multiple 8443.0 CVE-2019-9701
Kirill Nikolaev Linux/x86 - execve(/bin/sh) Using JMP-CALL-POP Shellcode (21 bytes)
linux_x86 21.0
Mehmet EMIROGLU Varient 1.6.1 - SQL Injection
webapps multiple 80.0
Ken Kitahara Linux/ARM64 - execve(_/bin/sh__ [_/bin/sh_]_ NULL) Shellcode (48 Bytes)
arm 48.0
Ken Kitahara Linux/ARM64 - execve(_/bin/sh__ NULL_ NULL) + Jump Back Shellcode (8 Bytes)
arm 8.0
Ken Kitahara Linux/ARM64 - execve(_/bin/sh__ NULL_ NULL) + mmap() + read() Stager Shellcode (60 Bytes)
arm 60.0
Ken Kitahara Linux/ARM64 - Egghunter (PWN!PWN!) + execve(_/bin/sh__ NULL_ NULL) + mprotect() Shellcode (88 Bytes)
arm 88.0
Ken Kitahara Linux/ARM64 - Read /etc/passwd Shellcode (120 Bytes)
arm 120.0
Ken Kitahara Linux/ARM64 - Reverse (::1:4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (140 bytes)
arm 140.0
Ken Kitahara Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (176 bytes)
arm 176.0
Ken Kitahara Linux/ARM64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (128 bytes)
arm 128.0
Ken Kitahara Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164 bytes)
arm 164.0
Ken Kitahara Linux/ARM64 - execve(_/bin/sh__ NULL_ NULL) Shellcode (40 Bytes)
arm 40.0
Mehmet EMIROGLU CiuisCRM 1.6 - 'eventType' SQL Injection
webapps php 80.0
Mehmet EMIROGLU WorkSuite PRM 2.4 - 'password' SQL Injection
webapps php 80.0
page: 10/269 [exploits: 4303]