[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 9.0
Metasploit
Morris Worm - fingerd Stack Buffer Overflow (Metasploit)
remote
bsd
79.0
Ray Doyle
Linux/x86 - File Modification (/etc/hosts 127.1.1.1 google.com) + Polymorphic Shellcode (99 bytes)
linux_x86
99.0
epi
Linux/x64 - Add Root User (toor/toor) Shellcode (99 bytes)
linux_x86-64
99.0
Metasploit
ASUS infosvr - Authentication Bypass Command Execution (Metasploit)
remote
hardware
9999.0
CVE-2014-9583
absolomb
Linux/x86 - Edit /etc/sudoers (ALL ALL=(ALL) NOPASSWD: ALL) For Full Access + Null-Free Shellcode (79 bytes)
linux_x86
79.0
Metasploit
AsusWRT LAN - Remote Code Execution (Metasploit)
remote
hardware
9999.0
CVE-2018-6000;CVE-2018-5999
Metasploit
AsusWRT LAN - Remote Code Execution (Metasploit)
remote
hardware
9999.0
CVE-2018-6000;CVE-2018-5999
Nipun Jaswal
Linux/x86 - Reverse (127.1.1.1:8888/TCP) Shell (/bin/sh) + Null-Free Shellcode (67/69 bytes)
linux_x86
69.0
X41 D-Sec GmbH
shadowsocks-libev 3.1.0 - Command Execution
local
linux
8839.0
James Fitts
Cloudview NMS 2.00b - Writable Directory Traversal Execution (Metasploit)
remote
windows
69.0
Touhid M.Shaikh
Linux/x86 - Fork Bomb Shellcode (9 bytes)
linux_x86
9.0
Touhid M.Shaikh
Linux/x64 - Kill All Processes Shellcode (19 bytes)
linux_x86-64
19.0
Ege Balci
Windows/x86 - SE_DACL_PROTECTED Protect Process Shellcode (229 bytes)
windows_x86
229.0
odzhancode
Linux - Reverse (/TCP) Shell + Multi/Dual Mode Shellcode (129 bytes) (Generator)
generator
129.0
Ashiyane Digital Security Team
Linux/x64 - execve(/bin/sh -c reboot) Shellcode (89 bytes)
linux_x86-64
89.0
Metasploit
OpenNMS - Java Object Unserialization Remote Code Execution (Metasploit)
remote
linux
1099.0
«
1
2
3
4
5
6
7
8
9
10
11
...
»
page: 2/12 [exploits: 187]