[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 28.0
Marcin Kozlowski
3proxy 0.5.3g (Windows x86) - 'logurl()' Remote Buffer Overflow
remote
windows_x86
3128.0
Revenge
Linux/x86 - setuid(0) + execve(/bin/sh) Shellcode (28 bytes)
linux_x86
28.0
FistFuXXer
Novell eDirectory 8.8 - NDS Server Remote Stack Overflow
remote
windows
8028.0
izik
Linux/x86 - execve(/bin/sh) + '.RIFF' Header Shellcode (28 bytes)
linux_x86
28.0
izik
Linux/x86 - execve(/bin/sh) + '.ZIP' Header Shellcode (28 bytes)
linux_x86
28.0
Claes M. Nyberg
Solaris/SPARC - Bind (6789/TCP) Shell (/bin/sh) Shellcode (228 bytes)
solaris_sparc
228.0
B-r00t
OSX/PPC - Reboot() Shellcode (28 bytes)
osx_ppc
28.0
Palante
BSD/PPC - execve(/bin/sh) Shellcode (128 bytes)
bsd_ppc
128.0
dev0id
Linux/x86 - Break chroot (../ 10x Loop) Shellcode (28 bytes)
linux_x86
28.0
kralor
Proxy-Pro Professional GateKeeper Pro 4.7 - Web proxy Remote Buffer Overflow
remote
windows
3128.0
OSVDB-4027;CVE-2004-0326
diman
Oops! 1.4.6 - one russi4n proxy-server Heap Buffer Overflow
remote
bsd
3128.0
OSVDB-476;CVE-2001-0029
«
1
2
»
page: 2/2 [exploits: 27]