[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 8.0
Metasploit
Novell ZENworks Configuration Management Preboot Service - 0x4c Buffer Overflow (Metasploit)
remote
windows
998.0
CVE-2011-3176;OSVDB-80231;CVE-2011-3175
Metasploit
Novell ZENworks Configuration Management Preboot Service 0x21 - Remote Buffer Overflow (Metasploit)
remote
windows
998.0
OSVDB-65361
Metasploit
Novell ZENworks Configuration Management Preboot Service 0x06 - Remote Buffer Overflow (Metasploit)
remote
windows
998.0
OSVDB-65361
Metasploit
ALLMediaServer 0.8 - Remote Buffer Overflow (Metasploit)
remote
windows
888.0
OSVDB-83889
motaz reda
ALLMediaServer 0.8 - Remote Overflow (SEH)
remote
windows
888.0
OSVDB-83889
rigan
Linux/MIPS - Reverse (0x7a69/TCP) Shell Shellcode (168 bytes)
linux_mips
168.0
rigan
Linux/MIPS - execve(/bin/sh) Shellcode (48 bytes)
linux_mips
48.0
Metasploit
Proxy-Pro Professional GateKeeper 4.7 - GET Overflow (Metasploit)
remote
windows
3128.0
CVE-2004-0326;OSVDB-4027
dijital1
Windows/x86 - Egghunter Checksum Routine Shellcode (18 bytes)
windows_x86
18.0
Metasploit
eDirectory 8.7.3 - iMonitor Remote Stack Buffer Overflow (Metasploit)
remote
windows
8008.0
CVE-2005-2551;OSVDB-18703
Brett Gervasoni
Windows/x86 - Write-to-file ('pwned' ./f.txt) + Null-Free Shellcode (278 bytes)
windows_x86
278.0
CVE-2010-0425
Jonathan Salwan
Linux/ARM - execve(_/bin/sh__ [_/bin/sh_]_ NULL) + XOR 88 Encoded + Polymorphic Shellcode (78 bytes)
arm
78.0
Jonathan Salwan
Linux/ARM - setuid(0) + kill(-1_ SIGKILL) Shellcode (28 bytes)
arm
28.0
Jonathan Salwan
Linux/ARM - setuid(0) + execve(_/bin/sh___/bin/sh__0) Shellcode (38 bytes)
arm
38.0
Jonathan Salwan
Solaris/x86 - Sync() + reboot() + exit(0) Shellcode (48 bytes)
solaris_x86
48.0
RubberDuck
Windows - MessageBoxA() Shellcode (238 bytes)
windows
238.0
«
1
2
3
4
5
6
7
8
9
10
»
page: 6/10 [exploits: 153]