[] NeoSense
search results for » port: 48.0
Ken Kitahara Linux/ARM64 - execve(_/bin/sh__ [_/bin/sh_]_ NULL) Shellcode (48 Bytes)
arm 48.0
Metasploit Oracle GlassFish Server Open Source Edition 4.1 - Path Traversal (Metasploit)
webapps windows 4848.0 CVE-2017-1000028
Metasploit Oracle GlassFish Server Open Source Edition 4.1 - Path Traversal (Metasploit)
webapps windows 4848.0 CVE-2017-1000028
Google Security Research Trend Micro - 'CoreServiceShell.exe' Multiple HTTP s
webapps windows 37848.0
bingbing GlassFish Server - Arbitrary File Read
webapps java 4848.0
Steven Padilla Google Android - Bind (1035/TCP) Telnetd Shell + Environment/Parameters Shellcode (248 bytes)
android 248.0
Trustwave's SpiderLabs Oracle GlassFish Server 4.1 - Directory Traversal
webapps multiple 4848.0 CVE-2017-1000028
rigan Linux/MIPS - execve(/bin/sh) Shellcode (48 bytes)
linux_mips 48.0
Jonathan Salwan Solaris/x86 - Sync() + reboot() + exit(0) Shellcode (48 bytes)
solaris_x86 48.0
gunslinger_ Linux/x86 - chown root:root /bin/sh Shellcode (48 bytes)
linux_x86 48.0
Jonathan Salwan Linux/x86 - execve(/bin/sh) + Polymorphic Shellcode (48 bytes)
linux_x86 48.0
c0d3_z3r0 FreeBSD/x86 - execve(/bin/sh) + Encoded Shellcode (48 bytes)
freebsd_x86 48.0
Sinan Eren OpenBSD/x86 - Bind (6969/TCP) Shell Shellcode (148 bytes)
openbsd_x86 148.0
Dino Dai Zovi Apple Mac OSX 10.3.3 - AppleFileServer Overflow Remote Code Execution
remote osx 548.0 OSVDB-5762;CVE-2004-0430
H D Moore AppleFileServer 10.3.3 (OSX) - LoginEXT PathName Overflow (Metasploit)
remote osx 548.0 CVE-2004-0430;OSVDB-5762