[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 24.0
Metasploit
Disk Savvy Enterprise 10.4.18 - Stack-Based Buffer Overflow (Metasploit)
remote
windows
9124.0
Metasploit
Disk Savvy Enterprise 10.4.18 - Stack-Based Buffer Overflow (Metasploit)
remote
windows
9124.0
0x4ndr3
Linux/x64 - Execute /bin/sh Shellcode (24 bytes)
linux_x86-64
24.0
James Fitts
Sielco Sistemi Winlog 2.07.16 - Remote Buffer Overflow (Metasploit)
remote
windows
46824.0
Touhid M.Shaikh
Linux/x86 - execve(/bin/sh) Shellcode (24 bytes) (4)
linux_x86
24.0
m4n3dw0lf
Linux/x64 - execve(/bin/sh) Shellcode (24 bytes)
linux_x86-64
24.0
Roziul Hasan Khan Shifat
Windows/x86 - system(systeminfo) Shellcode (224 bytes)
windows_x86
224.0
Dennis 'dhn' Herrmann
Linux/x86 - execve(/bin/sh) Shellcode (24 bytes) (1)
linux_x86
24.0
d4sh&r
Linux/x64 - Egghunter (0x6b634068) Shellcode (24 bytes)
linux_x86-64
24.0
B3mB4m
Windows/x86 (XP SP3) (Turkish) - MessageBox Shellcode (24 bytes)
windows_x86
24.0
haphet
OSX/x86 - execve(/bin/sh) Shellcode (24 bytes)
osx
24.0
Weiss
Windows/x86 - Download File (http://127.0.0.1/file.exe) + Execute Shellcode (124 bytes)
windows_x86
124.0
hophet
Linux/x86 - execve(/bin/sh) Shellcode (24 bytes) (2)
linux_x86
24.0
Matias Sedalo
Linux/x86 - execve(/bin/sh) Shellcode (24 bytes) (3)
linux_x86
24.0
Scrippie
BSD - Reverse (127.0.0.1:31337/TCP) Shell (/bin/sh) Shellcode (124 bytes)
bsd
124.0