[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 128.0
Ken Kitahara
Linux/ARM64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (128 bytes)
arm
128.0
Ken Kitahara
Linux/ARM - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (128 Bytes)
arm
128.0
Metasploit
Proxy-Pro Professional GateKeeper 4.7 - GET Overflow (Metasploit)
remote
windows
3128.0
CVE-2004-0326;OSVDB-4027
Marcin Kozlowski
3proxy 0.5.3g (Windows x86) - 'logurl()' Remote Buffer Overflow
remote
windows_x86
3128.0
Palante
BSD/PPC - execve(/bin/sh) Shellcode (128 bytes)
bsd_ppc
128.0
kralor
Proxy-Pro Professional GateKeeper Pro 4.7 - Web proxy Remote Buffer Overflow
remote
windows
3128.0
OSVDB-4027;CVE-2004-0326
diman
Oops! 1.4.6 - one russi4n proxy-server Heap Buffer Overflow
remote
bsd
3128.0
OSVDB-476;CVE-2001-0029