[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: windows_x86
Michael Thumann
PrivateWire Gateway 3.7 (Windows x86) - Remote Buffer Overflow (Metasploit)
remote
windows_x86
80.0
OSVDB-26861;CVE-2006-3252
Weiss
Windows/x64 - URLDownloadToFileA(http://localhost/trojan.exe) + Execute Shellcode (218+ bytes)
windows_x86-64
218.0
RunningBon
Quake 3 Engine Client (Windows x86) - CS_ITEms Remote Overflow
dos
windows_x86
OSVDB-34447;CVE-2006-3401;OSVDB-26929;CVE-2006-3325
xnull
Windows/x86 (SP1/SP2) - Beep Shellcode (35 bytes)
windows_x86
35.0
Weiss
Windows/x86 - Command WinExec() Shellcode (104+ bytes)
windows_x86
104.0
Omega7
Windows/x86 (XP SP2) - MessageBox Shellcode (110 bytes)
windows_x86
110.0
darkeagle
Windows/x86 - Download File (http://www.ph4nt0m.org/a.exe) + Execute (C:/a.exe) Shellcode (226+ bytes)
windows_x86
226.0
darkeagle
Windows (NT/2000/XP) (Russian) - Add Administartor User (slim/shady) Shellcode (318 bytes)
windows_x86
318.0
Kevin Finisterre
Veritas NetBackup 6.0 (Windows x86) - 'bpjava-msvc' Remote Command Execution
remote
windows_x86
13722.0
CVE-2005-2715;OSVDB-19949
Matthieu Suiche
Windows (9x/NT/2000/XP) - Reverse Generic Without Loader (192.168.1.11:4919) Shellcode (249 bytes)
windows_x86
249.0
loco
Windows (9x/NT/2000/XP) - PEB Method Shellcode (29 bytes)
windows_x86
29.0
twoci
Windows (9x/NT/2000/XP) - PEB Method Shellcode (31 bytes)
windows_x86
31.0
oc192
Windows (9x/NT/2000/XP) - PEB Method Shellcode (35 bytes)
windows_x86
35.0
lion
Windows (XP/2000/2003) - Download File (http://127.0.0.1/test.exe) + Execute (%systemdir%/a.exe) Shellcode (241 bytes)
windows_x86
241.0
houseofdabus
Microsoft Windows (x86) - Metafile '.emf' Heap Overflow (MS04-032)
remote
windows_x86
OSVDB-10692;CVE-2004-0209;MS04-032
silicon
Windows (XP SP1) - Bind (58821/TCP) Shell Shellcode (116 bytes)
windows_x86
116.0
«
...
21
22
23
24
25
26
27
28
29
30
31
»
page: 30/31 [exploits: 483]