[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 203.0
Roziul Hasan Khan Shifat
Linux/x64 - Reverse (192.168.209.131:1472/TCP) Shell (/bin/sh) + IPv6 Shellcode (203 bytes)
linux_x86-64
203.0
Metasploit
Computer Associates License Client - GETCONFIG Overflow (Metasploit)
remote
windows
10203.0
CVE-2005-0581;OSVDB-95742;OSVDB-14389
Metasploit
Medal of Honor Allied Assault - getinfo Stack Buffer Overflow (Metasploit)
remote
windows
12203.0
CVE-2004-0735;OSVDB-8061
funkysh
Linux/StrongARM - Bind (/TCP) Shell (/bin/sh) Shellcode (203 bytes)
arm
203.0
RunningBon
Medal of Honor - 'getinfo' Remote Buffer Overflow
remote
windows
12203.0
class101
CA License Server - 'GETCONFIG' Remote Buffer Overflow
remote
windows
10203.0
OSVDB-95740;CVE-2005-0582;CVE-2005-0581;OSVDB-14389
millhouse
Medal of Honor Spearhead (Linux) - Server Remote Buffer Overflow
remote
linux
12203.0
OSVDB-8061;CVE-2004-0735