[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 22.0
Metasploit
Cisco UCS Director - default scpuser password (Metasploit)
remote
unix
22.0
CVE-2019-1935
Aron Mihaljevic
Linux/x86_64 - execve(/bin/sh) Shellcode (22 bytes)
linux_x86-64
22.0
Leap Security
OpenSSH < 7.7 - User Enumeration (2)
remote
linux
22.0
CVE-2018-15473
Paul Taylor
Dell EMC RecoverPoint < 5.1.2 - Remote Root Command Execution
remote
linux
22.0
Paul Taylor
Dell EMC RecoverPoint < 5.1.2 - Remote Root Command Execution
remote
linux
22.0
Tim Kosse
PuTTY < 0.68 - 'ssh_agent_channel_data' Integer Overflow Heap Corruption
dos
linux
22.0
CVE-2017-6542
Metasploit
Mercurial - Custom hg-ssh Wrapper Remote Code Exec (Metasploit)
remote
python
22.0
Robert L. Taylor
Linux/x64 - execve(/bin/sh) Shellcode (22 bytes)
linux_x86-64
22.0
Google Security Research
OpenSSH < 7.4 - agent Protocol Arbitrary Library Loading
remote
linux
22.0
CVE-2016-10009
0_o
OpenSSH 7.2p2 - Username Enumeration
remote
linux
22.0
CVE-2016-6210
Eddie Harari
OpenSSHd 7.2p2 - Username Enumeration
remote
linux
22.0
CVE-2016-6210
Metasploit
ExaGrid - Known SSH Key and Default Password (Metasploit)
remote
linux
22.0
CVE-2016-1561;CVE-2016-1560
tintinweb
OpenSSH 7.2p1 - (Authenticated) xauth Command Injection
remote
multiple
22.0
CVE-2016-3115
Sathishshan
Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (hack) + Polymorphic Shellcode (122 bytes)
linux_x86-64
122.0
d4sh&r
Linux/x64 - execve() Shellcode (22 bytes)
linux_x86-64
22.0
3unnym00n
Sysax Multi Server 6.40 - SSH Component Denial of Service
dos
windows
22.0
OSVDB-126848
«
1
2
3
»
page: 1/3 [exploits: 43]