[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port:
Metasploit
Linksys WRT160N v2 - 'apply.cgi' Remote Command Injection (Metasploit)
remote
hardware
80.0
OSVDB-90093;OSVDB-89912
Russell Willis
Linux/x86 - Reverse (192.168.1.10:31337/TCP) Shell Shellcode (92 bytes)
linux_x86
92.0
Metasploit
SAP SOAP RFC - SXPG_COMMAND_EXECUTE Remote Command Execution (Metasploit)
remote
multiple
8000.0
OSVDB-93538;OSVDB-93537;OSVDB-93536;OSVDB-93535;OSVDB-93534;OSVDB-93533;OSVDB-93532;OSVDB-100704
Metasploit
SAP SOAP RFC - SXPG_CALL_SYSTEM Remote Command Execution (Metasploit)
remote
multiple
8000.0
OSVDB-93537
High-Tech Bridge SA
b2evolution 4.1.6 - Multiple Vulnerabilities
webapps
php
80.0
CVE-2013-2945;OSVDB-92905
xis_one
Mikrotik Syslog Server for Windows 1.15 - Denial of Service (Metasploit)
dos
windows
514.0
OSVDB-92744
Andras Kabai
SAP ConfigServlet - OS Command Execution (Metasploit)
remote
multiple
50000.0
OSVDB-92704
Metasploit
Nagios Remote Plugin Executor - Arbitrary Command Execution (Metasploit)
remote
linux
5666.0
CVE-2013-1362;OSVDB-90582
xis_one
Allied Telesyn TFTP (AT-TFTP) Server/Daemon 2.0 - Stack Buffer Overflow (Denial of Service) (PoC)
dos
windows
69.0
CVE-2006-6184;OSVDB-30756
Paul Haas
Polycom HDX - Telnet Authentication Bypass (Metasploit)
remote
hardware
23.0
xistence
Astium VoIP PBX 2.1 build 25399 - Remote Crash (PoC)
dos
linux
5655.0
OSVDB-88861
Geyslan G. Bem
Linux/x86 - execve(/bin/sh) + Uzumaki Encoded + Null-Free Shellcode (50 bytes)
linux_x86
50.0
Geyslan G. Bem
Linux/x86 - execve(wget) + Mutated + Null-Free Shellcode (96 bytes)
linux_x86
96.0
Geyslan G. Bem
Linux/x86 - Fork Bomb + Mutated + Null-Free Shellcode (15 bytes)
linux_x86
15.0
Geyslan G. Bem
Linux/x86 - reboot() + Mutated + Null-Free Shellcode (55 bytes)
linux_x86
55.0
Geyslan G. Bem
Linux/x86 - Read /etc/passwd file + Null-Free Shellcode (51 bytes)
linux_x86
51.0
«
...
176
177
178
179
180
181
182
183
184
185
186
...
»
page: 181/269 [exploits: 4303]