[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 7.0
odzhancode
Linux - execve(_/bin/sh__ NULL_ 0) Multi/Dual Mode Shellcode (37 bytes)
linux
37.0
Ajith Kp
Linux/x64 - Bind (5600/TCP) Shell Shellcode (87 bytes)
linux_x86-64
87.0
Kenzo
Eir D1000 Wireless Router - WAN Side Remote Command Injection (Metasploit)
remote
linux_mips
7547.0
Roziul Hasan Khan Shifat
Windows/x86 - Bind (/TCP) Shell + Password (damn_it!$$##@;*#) Shellcode (637 bytes)
windows_x86
637.0
Roziul Hasan Khan Shifat
Windows/x86 (7) - Bind (4444/TCP) Shell Shellcode (357 bytes)
windows_x86
357.0
LiquidWorm
Gemalto Sentinel License Manager 18.0.1.55505 - Directory Traversal
webapps
windows
1947.0
JollyFrogs
Linux/x86 - Bind (1234/TCP) Shell (/bin/sh) Shellcode (87 bytes) (Generator)
generator
87.0
Sathishshan
Linux/x64 - execve() Stack + Polymorphic Shellcode (47 bytes)
linux_x86-64
47.0
Metasploit
Oracle BeeHive 2 - 'voice-servlet prepareAudioToPlay()' Arbitrary File Upload (Metasploit)
remote
windows
7777.0
OSVDB-130219
Metasploit
Oracle BeeHive 2 - 'voice-servlet processEvaluation()' Write File (Metasploit)
remote
windows
7777.0
CVE-2010-4417;OSVDB-70552
Metasploit
w3tw0rk / Pitbul IRC Bot - Remote Code Execution (Metasploit)
remote
multiple
6667.0
OSVDB-120384
Metasploit
Western Digital Arkeia < 11.0.12 - Remote Code Execution (Metasploit)
remote
multiple
617.0
CVE-2015-7709;OSVDB-124434
Bill Borskey
Linux/x64 - execve() + Encoded Shellcode (57 bytes)
linux_x86-64
57.0
Mohammad Reza Espargham
Linux/x86 - chmod /etc/gshadow Shellcode (37 bytes)
linux_x86
37.0
TUNISIAN CYBER
Windows/x86 (XP SP3) - Restart Shellcode (57 bytes)
windows_x86
57.0
Mohammad Reza Ramezani
Linux/x86 - Create 'my.txt' In Working Directory Shellcode (37 bytes)
linux_x86
37.0
«
1
2
3
4
5
6
7
8
»
page: 2/8 [exploits: 116]