[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 112.0
Azeria
Linux/ARM (Raspberry Pi) - Bind (0.0.0.0:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (112 bytes)
arm
112.0
Russell Willis
Linux/x86 - Bind (/TCP) Shell Shellcode (112 bytes)
linux_x86
112.0
KaHPeSeSe
Windows/x86 (PerfectXp-pc1/SP3 ) (Turkish) - Add Administrator User (kpss/12345) Shellcode (112 bytes)
windows_x86
112.0
anonymous
Alpha - execve() Shellcode (112 bytes)
alpha
112.0
suN8Hclf
FreeBSD/x86 - Reverse (192.168.1.33:8000/TCP) cat /etc/passwd Shellcode (112 bytes)
freebsd_x86
112.0
anonymous
OpenBSD/x86 - Add Root User (w00w00) Shellcode (112 bytes)
openbsd_x86
112.0
Palante
Linux/PPC - execve(/bin/sh) Shellcode (112 bytes)
linux_ppc
112.0
noir
Solaris 8 dtspcd - Remote Heap Overflow (Metasploit)
remote
solaris
6112.0
CVE-2001-0803;OSVDB-4503