[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 20.0
Gonçalo Ribeiro
Linux/x86_64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (pass) Shellcode (120 bytes)
linux_x86-64
120.0
Ken Kitahara
Linux/ARM64 - Read /etc/passwd Shellcode (120 Bytes)
arm
120.0
Rajvardhan
Linux/x86 - execve(/bin/sh) Shellcode (20 bytes)
linux_x86
20.0
Ken Kitahara
Linux/ARM - execve(_/bin/sh__ NULL_ NULL) + read(0_ buf_ 0xff) Stager Shellcode (20 Bytes)
arm
20.0
Nathu Nandwani
Linux/x86 - Kill Process Shellcode (20 bytes)
linux_x86
20.0
Google Security Research
Blizzard Update Agent - JSON RPC DNS Rebinding
local
windows
1120.0
Metasploit
ManageEngine Desktop Central 9 - FileUploadServlet ConnectionId (Metasploit)
remote
jsp
8020.0
CVE-2015-8249;OSVDB-130862
Paw Petersen
Linux/x86 - Egghunter (0x5159) Shellcode (20 bytes)
linux_x86
20.0
Mohamed Idris
ManageEngine Desktop Central 9 Build 90087 - Cross-Site Request Forgery
webapps
multiple
8020.0
CVE-2014-9331;OSVDB-117896
Metasploit
ManageEngine Desktop Central StatusUpdate - Arbitrary File Upload (Metasploit)
remote
windows
8020.0
CVE-2014-5005;OSVDB-110643;CVE-2014-5006
Pedro Ribeiro
ManageEngine Password Manager - MetadataServlet.dat SQL Injection (Metasploit)
webapps
multiple
8020.0
CVE-2014-3996;OSVDB-110198
Metasploit
DesktopCentral AgentLogUpload - Arbitrary File Upload (Metasploit)
remote
windows
8020.0
OSVDB-100008;CVE-2014-5007;CVE-2013-7390
funkysh
Linux/StrongARM - setuid() Shellcode (20 bytes)
arm
20.0
izik
Linux/x86 - reboot() Shellcode (20 bytes)
linux_x86
20.0
lamagra
Linux/x86 - Reverse (/TCP) Shell (/bin/sh) Shellcode (120 bytes)
linux_x86
120.0