[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 129.0
Gonçalo Ribeiro
Linux/x86_64 - Bind (4444/TCP) Shell (/bin/sh) + Password (pass) Shellcode (129 bytes)
linux_x86-64
129.0
LockedByte
Linux/x86 - chmod + execute(/usr/bin/wget http://192.168.1.93//x) + Hide Output Shellcode (129 bytes)
linux_x86
129.0
Ken Kitahara
Apple macOS - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (129 bytes)
macos
129.0
odzhancode
Linux - Reverse (/TCP) Shell + Multi/Dual Mode Shellcode (129 bytes) (Generator)
generator
129.0
jpno5
DameWare Mini Remote Control 4.0 < 4.9 - Client Agent Remote Overflow
remote
windows
6129.0
OSVDB-19119;CVE-2005-2842
Sinan Eren
BSD/x86 - Reverse (192.168.2.33:6969/TCP) Shell Shellcode (129 bytes)
bsd
129.0
skape
Squid 2.5.x/3.x - NTLM Buffer Overflow (Metasploit)
remote
multiple
3129.0
CVE-2004-0541;OSVDB-6791