[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 5.0
hackk.gr
exim 4.90 - Remote Code Execution
remote
linux
25.0
CVE-2018-6789
Hashim Jawad
Linux/x64 - Reverse (::1:1337/TCP) Shell (/bin/sh) + IPv6 + Password (pwnd) Shellcode (115 bytes)
linux_x86-64
115.0
Paolo Perego
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (105 bytes)
linux_x86
105.0
straight_blast
Exim < 4.90.1 - 'base64d' Remote Code Execution
remote
linux
25.0
CVE-2018-6789
Metasploit
HP Mercury LoadRunner Agent magentproc.exe - Remote Command Execution (Metasploit)
remote
windows
54345.0
CVE-2010-1549
anonymous
Huawei Router HG532 - Arbitrary Command Execution
webapps
hardware
37215.0
CVE-2017-17215
James Fitts
Lockstep Backup for Workgroups 4.0.3 - Remote Buffer Overflow (Metasploit)
remote
windows
2125.0
Metasploit
Docker Daemon - Unprotected TCP Socket (Metasploit)
remote
python
2375.0
wetw0rk
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (75 bytes)
linux_x86
75.0
sleepya
Microsoft Windows 7/2008 R2 - 'EternalBlue' SMB Remote Code Execution (MS17-010)
remote
windows
445.0
CVE-2017-0144
sleepya
Microsoft Windows 8/8.1/2012 R2 (x64) - 'EternalBlue' SMB Remote Code Execution (MS17-010)
remote
windows_x86-64
445.0
CVE-2017-0144
Sean Dillon
Microsoft Windows - SMB Remote Code Execution Scanner (MS17-010) (Metasploit)
dos
windows
445.0
CVE-2017-0147;CVE-2017-0146;CVE-2017-0148;CVE-2017-0145;CVE-2017-0144;CVE-2017-0143;MS17-010
Peter Baris
Windows/x64 (10) - Egghunter Shellcode (45 bytes)
windows_x86-64
45.0
lu0xheap
Linux/x86 - SELinux Permissive Mode Switcher Shellcode (45 bytes)
linux_x86
45.0
Robert L. Taylor
Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) Shellcode (65 bytes)
linux_x86-64
65.0
Ajith Kp
Linux/x64 - mkdir(ajit) Shellcode (25 bytes)
linux_x86-64
25.0
«
1
2
3
4
5
6
7
8
9
10
11
...
»
page: 2/14 [exploits: 209]