[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 103.0
Ken Kitahara
Apple macOS - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (103 bytes)
macos
103.0
Ray Doyle
Linux/x86 - Add Root User (r00t/blank) + Polymorphic Shellcode (103 bytes)
linux_x86
103.0
Snir Levi
Linux/x86 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Alphanumeric + Staged Shellcode (103 bytes)
linux_x86
103.0
Scorpion_
Linux/x64 - Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (103 bytes)
linux_x86-64
103.0
Metasploit
Microsoft Message Queueing Service - Path Overflow (MS05-017) (Metasploit)
remote
windows
2103.0
CVE-2005-0059;OSVDB-15458;MS05-017
houseofdabus
Microsoft Windows Message Queuing - Remote Buffer Overflow Universal (MS05-017) (v.0.3)
remote
windows
2103.0
OSVDB-15458;CVE-2005-0059;MS05-017