[] NeoSense
search results for » port: 8.0
Metasploit Novell ZENworks Configuration Management Preboot Service - 0x4c Buffer Overflow (Metasploit)
remote windows 998.0 CVE-2011-3176;OSVDB-80231;CVE-2011-3175
Metasploit Novell ZENworks Configuration Management Preboot Service 0x21 - Remote Buffer Overflow (Metasploit)
remote windows 998.0 OSVDB-65361
Metasploit Novell ZENworks Configuration Management Preboot Service 0x06 - Remote Buffer Overflow (Metasploit)
remote windows 998.0 OSVDB-65361
Metasploit ALLMediaServer 0.8 - Remote Buffer Overflow (Metasploit)
remote windows 888.0 OSVDB-83889
motaz reda ALLMediaServer 0.8 - Remote Overflow (SEH)
remote windows 888.0 OSVDB-83889
rigan Linux/MIPS - Reverse (0x7a69/TCP) Shell Shellcode (168 bytes)
linux_mips 168.0
rigan Linux/MIPS - execve(/bin/sh) Shellcode (48 bytes)
linux_mips 48.0
Metasploit Proxy-Pro Professional GateKeeper 4.7 - GET Overflow (Metasploit)
remote windows 3128.0 CVE-2004-0326;OSVDB-4027
dijital1 Windows/x86 - Egghunter Checksum Routine Shellcode (18 bytes)
windows_x86 18.0
Metasploit eDirectory 8.7.3 - iMonitor Remote Stack Buffer Overflow (Metasploit)
remote windows 8008.0 CVE-2005-2551;OSVDB-18703
Brett Gervasoni Windows/x86 - Write-to-file ('pwned' ./f.txt) + Null-Free Shellcode (278 bytes)
windows_x86 278.0 CVE-2010-0425
Jonathan Salwan Linux/ARM - execve(_/bin/sh__ [_/bin/sh_]_ NULL) + XOR 88 Encoded + Polymorphic Shellcode (78 bytes)
arm 78.0
Jonathan Salwan Linux/ARM - setuid(0) + kill(-1_ SIGKILL) Shellcode (28 bytes)
arm 28.0
Jonathan Salwan Linux/ARM - setuid(0) + execve(_/bin/sh___/bin/sh__0) Shellcode (38 bytes)
arm 38.0
Jonathan Salwan Solaris/x86 - Sync() + reboot() + exit(0) Shellcode (48 bytes)
solaris_x86 48.0
RubberDuck Windows - MessageBoxA() Shellcode (238 bytes)
windows 238.0
page: 6/10 [exploits: 153]