[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 40.0
Ken Kitahara
Linux/ARM64 - execve(_/bin/sh__ NULL_ NULL) Shellcode (40 Bytes)
arm
40.0
Ken Kitahara
Linux/ARM64 - Reverse (::1:4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (140 bytes)
arm
140.0
Florian Bogner
ELBA5 5.8.0 - Remote Code Execution
remote
windows
2640.0
Core Security
TP-LINK TDDP - Multiple Vulnerabilities
dos
hardware
1040.0
Maximiliano Gomez Vidal
Linux/x86 - execve(/bin/sh) + Obfuscated Shellcode (40 bytes)
linux_x86
40.0
c0d3_z3r0
FreeBSD x86/x64 - execve(/bin/sh) + Anti-Debugging Shellcode (140 bytes)
freebsd
140.0
scut/teso
IRIX - stdin-read Shellcode (40 bytes)
irix
40.0
dev0id
BSD/x86 - Break chroot (../ 10x Loop) Shellcode (40 bytes)
bsd_x86
40.0
Skylined
Windows/x86 - Message Box + Null-Free Shellcode (140 bytes)
windows_x86
140.0
Kris Katterjohn
Linux/x86 - Flush IPTables Rules (/sbin/iptables -F) Shellcode (40 bytes)
linux_x86
40.0
Kris Katterjohn
Linux/x86 - Flush IPChains Rules (/sbin/ipchains -F) Shellcode (40 bytes)
linux_x86
40.0
NicatiN
Linux/x86 - execve(/bin/sh) + Anti-IDS Shellcode (40 bytes)
linux_x86
40.0
izik
Linux/x86 - Eject CD-Rom (Follows /dev/cdrom Symlink) + exit() Shellcode (40 bytes)
linux_x86
40.0
lhall
Solaris/SPARC - Bind (6666/TCP) Shell Shellcode (240 bytes)
solaris_sparc
240.0
Charles Stevenson
Linux/PPC - Reverse (192.168.1.1:31337/TCP) Shell (/bin/sh) Shellcode (240 bytes)
linux_ppc
240.0
dopesquad.net
Solaris/SPARC - Bind (/TCP) Shell Shellcode (240 bytes)
solaris_sparc
240.0