[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 33.0
Tarek Ahmed
Windows/x86 - Locate kernel32 base address / Memory Sieve method Shellcode (133 bytes)
windows_x86
133.0
Metasploit
Nanopool Claymore Dual Miner - APIs Remote Code Execution (Metasploit)
remote
multiple
3333.0
CVE-2018-1000049
Metasploit
Nanopool Claymore Dual Miner - APIs Remote Code Execution (Metasploit)
remote
multiple
3333.0
CVE-2018-1000049
absolomb
Linux/x86 - chmod 4755 /bin/dash Shellcode (33 bytes)
linux_x86
33.0
res1n
Claymore Dual GPU Miner 10.5 - Format String
dos
multiple
3333.0
CVE-2018-6317
Ajith Kp
Linux/x64 - execve(/bin/bash) Shellcode (33 bytes)
linux_x86-64
33.0
B3mB4m
Linux/x86 - chmod 777 /etc/shadow + exit() Shellcode (33 bytes)
linux_x86
33.0
Geyslan G. Bem
Linux/x86 - Insertion Decoder + Null-Free Shellcode (33+ bytes)
linux_x86
33.0
oxff
Windows/x86 - Eggsearch Shellcode (33 bytes)
windows_x86
33.0
gunslinger_
Linux/x86 - Force unmount /media/disk Shellcode (33 bytes)
linux_x86
33.0
gunslinger_
Linux/x86 - Hard Reboot Shellcode (33 bytes)
linux_x86
33.0
gunslinger_
Linux/x86 - unlink(/etc/shadow) Shellcode (33 bytes)
linux_x86
33.0
Metasploit
IBM Lotus Domino Sametime - 'STMux.exe' Remote Stack Buffer Overflow (Metasploit)
remote
windows
1533.0
CVE-2008-2499;OSVDB-45610
Jonathan Salwan
Linux/x86 - execve(_/bin/bash___-p__NULL) Shellcode (33 bytes)
linux_x86
33.0
sm0k
Linux/x86 - chmod 0777 /etc/shadow Shellcode (33 bytes)
linux_x86
33.0
ka0x
Linux/x86 - chmod 0666 /etc/shadow + exit() Shellcode (33 bytes)
linux_x86
33.0
«
1
2
»
page: 1/2 [exploits: 21]