[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port:
rtmcx
Linux/ARM - Egghunter (0x50905090) + execve('/bin/sh') Shellcode (60 bytes)
arm
60.0
Ken Kitahara
Linux/ARM - Egghunter (0x50905090) + execve('/bin/sh') Shellcode (32 bytes)
arm
32.0
Paolo Perego
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (105 bytes)
linux_x86
105.0
Paolo Perego
Linux/x86 - Egghunter (0xdeadbeef) + access() + execve(/bin/sh) Shellcode (38 bytes)
linux_x86
38.0
Sysdream
Dolibarr ERP/CRM 7.0.0 - (Authenticated) SQL Injection
webapps
php
80.0
CVE-2018-10094
Amine Taouirsa
MachForm < 4.2.3 - SQL Injection / Path Traversal / Upload Bypass
webapps
php
80.0
CVE-2018-6411;CVE-2018-6410;CVE-2018-6409
Luca
Linux/x86 - Bind (5555/TCP) Shell (/bin/sh) Shellcode (98 bytes)
linux_x86
98.0
Nathu Nandwani
wityCMS 0.6.1 - Cross-Site Scripting
webapps
php
80.0
CVE-2018-11512
Jonathan Crosby
Linux/x86 - Reverse (10.0.7.17:4444/TCP) Shell (/bin/sh) Shellcode (101 Bytes)
linux_x86
101.0
Nuno Freitas
Linux/x86 - Reverse (10.10.2.4:4444/TCP) Shell Shellcode (68 bytes)
linux_x86
68.0
Matteo Malvica
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (113 bytes)
linux_x86
113.0
Metasploit
Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit)
remote
multiple
8080.0
CVE-2017-9791
Metasploit
Apache Struts 2 - Struts 1 Plugin Showcase OGNL Code Execution (Metasploit)
remote
multiple
8080.0
CVE-2017-9791
Metasploit
Jenkins CLI - HTTP Java Deserialization (Metasploit)
remote
linux
8080.0
CVE-2016-9299
Metasploit
Jenkins CLI - HTTP Java Deserialization (Metasploit)
remote
linux
8080.0
CVE-2016-9299
neonsea
Inteno IOPSYS 2.0 < 4.2.0 - 'p910nd' Remote Command Execution
remote
hardware
9100.0
CVE-2018-10123
«
...
54
55
56
57
58
59
60
61
62
63
64
...
»
page: 59/269 [exploits: 4303]