[] NeoSense
search results for » platform: windows_x86
Michael Thumann PrivateWire Gateway 3.7 (Windows x86) - Remote Buffer Overflow (Metasploit)
remote windows_x86 80.0 OSVDB-26861;CVE-2006-3252
Weiss Windows/x64 - URLDownloadToFileA(http://localhost/trojan.exe) + Execute Shellcode (218+ bytes)
windows_x86-64 218.0
RunningBon Quake 3 Engine Client (Windows x86) - CS_ITEms Remote Overflow
dos windows_x86 OSVDB-34447;CVE-2006-3401;OSVDB-26929;CVE-2006-3325
xnull Windows/x86 (SP1/SP2) - Beep Shellcode (35 bytes)
windows_x86 35.0
Weiss Windows/x86 - Command WinExec() Shellcode (104+ bytes)
windows_x86 104.0
Omega7 Windows/x86 (XP SP2) - MessageBox Shellcode (110 bytes)
windows_x86 110.0
darkeagle Windows/x86 - Download File (http://www.ph4nt0m.org/a.exe) + Execute (C:/a.exe) Shellcode (226+ bytes)
windows_x86 226.0
darkeagle Windows (NT/2000/XP) (Russian) - Add Administartor User (slim/shady) Shellcode (318 bytes)
windows_x86 318.0
Kevin Finisterre Veritas NetBackup 6.0 (Windows x86) - 'bpjava-msvc' Remote Command Execution
remote windows_x86 13722.0 CVE-2005-2715;OSVDB-19949
Matthieu Suiche Windows (9x/NT/2000/XP) - Reverse Generic Without Loader (192.168.1.11:4919) Shellcode (249 bytes)
windows_x86 249.0
loco Windows (9x/NT/2000/XP) - PEB Method Shellcode (29 bytes)
windows_x86 29.0
twoci Windows (9x/NT/2000/XP) - PEB Method Shellcode (31 bytes)
windows_x86 31.0
oc192 Windows (9x/NT/2000/XP) - PEB Method Shellcode (35 bytes)
windows_x86 35.0
lion Windows (XP/2000/2003) - Download File (http://127.0.0.1/test.exe) + Execute (%systemdir%/a.exe) Shellcode (241 bytes)
windows_x86 241.0
houseofdabus Microsoft Windows (x86) - Metafile '.emf' Heap Overflow (MS04-032)
remote windows_x86 OSVDB-10692;CVE-2004-0209;MS04-032
silicon Windows (XP SP1) - Bind (58821/TCP) Shell Shellcode (116 bytes)
windows_x86 116.0
page: 30/31 [exploits: 483]