[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 8.0
izik
Linux/x86 - execve(/bin/sh) + '.ZIP' Header Shellcode (28 bytes)
linux_x86
28.0
izik
Linux/x86 - Download File (HTTP/1.x http://127.0.0.1:8081/foobar.bin) + Receive + Payload Loader Shellcode (68+ bytes)
linux_x86
68.0
izik
Linux/x86 - Bind (31337/TCP) Shell (/bin/sh) + fork() Shellcode (98 bytes)
linux_x86
98.0
darkeagle
Windows (NT/2000/XP) (Russian) - Add Administartor User (slim/shady) Shellcode (318 bytes)
windows_x86
318.0
Metasploit
Novell eDirectory 8.7.3 - iMonitor Remote Stack Overflow (Metasploit)
remote
windows
8008.0
OSVDB-18703;CVE-2005-2551
xort
Linux/x86 - Alphanumeric Encoded + IMUL Method Shellcode (88 bytes)
linux_x86
88.0
Ruder
CCProxy Log - Remote Stack Overflow
remote
windows
808.0
OSVDB-11593;CVE-2004-2416
Claes M. Nyberg
Solaris/SPARC - Bind (6789/TCP) Shell (/bin/sh) Shellcode (228 bytes)
solaris_sparc
228.0
B-r00t
OSX/PPC - setuid(0) + execve(/bin/sh) Shellcode (88 bytes)
osx_ppc
88.0
B-r00t
OSX/PPC - Reboot() Shellcode (28 bytes)
osx_ppc
28.0
Sinan Eren
OpenBSD/x86 - Bind (6969/TCP) Shell Shellcode (148 bytes)
openbsd_x86
148.0
humble
NetBSD/x86 - execve(/bin/sh) Shellcode (68 bytes)
netbsd_x86
68.0
dev0id
Linux/x86 - Flush IPTables Rules (/sbin/iptables -F) Shellcode (58 bytes)
linux_x86
58.0
K2
HP-UX - execve(/bin/sh) Shellcode (58 bytes)
hp-ux
58.0
Palante
BSD/PPC - execve(/bin/sh) Shellcode (128 bytes)
bsd_ppc
128.0
Georgi Guninski
AIX - execve(/bin/sh) Shellcode (88 bytes)
aix
88.0
«
1
2
3
4
5
6
7
8
9
10
»
page: 9/10 [exploits: 153]