[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 49.0
strider
Linux/x86 - Add User (sshd/root) To /etc/passwd Shellcode (149 bytes)
linux_x86
149.0
Febriyanto Nugroho
Linux/x86 - setreuid(0_ 0) + execve(/sbin/halt) + exit(0) Shellcode (49 bytes)
linux_x86
49.0
10n1z3d
Linux/x64 - Flush IPTables Rules (execve(_/sbin/iptables__ [_/sbin/iptables__ _-F_]_ NULL)) Shellcode (49 bytes)
linux_x86-64
49.0
ka0x
Linux/x86 - setuid(0) + /bin/cat /etc/shadow Shellcode (49 bytes)
linux_x86
49.0
evil.xi4oyu
Linux/x64 - setuid(0) + execve(/bin/sh) Shellcode (49 bytes)
linux_x86-64
49.0
Chroniccommand
Linux/x86 - execve(/bin/dash) Shellcode (49 bytes)
linux_x86
49.0
Doreth.Z10
Linux/x64 - Bind (1337/TCP) Shell + Password (pAzzW0rd) + Egghunter Using sys_access() Shellcode (49 bytes)
linux_x86-64
49.0
Koshi
Windows/x86 - PEB 'Kernel32.dll' ImageBase Finder + ASCII Printable Shellcode (49 bytes)
windows_x86
49.0
militan
Linux/x86 - Reverse (140.115.53.35:9999/TCP) + Download File (cb) + Execute Shellcode (149 bytes)
linux_x86
149.0
MC
Xtacacsd 4.1.2 - 'report()' Remote Buffer Overflow (Metasploit)
remote
bsd
49.0
CVE-2008-7232;OSVDB-58140
Evgeny Legerov
Omni-NFS Server 5.2 - 'nfsd.exe' Remote Stack Overflow (Metasploit)
remote
windows
2049.0
OSVDB-30224;CVE-2006-5780
bunker
Linux/x86 - setreuid() + Executes Command Shellcode (49+ bytes)
linux_x86
49.0
Matthieu Suiche
Windows (9x/NT/2000/XP) - Reverse Generic Without Loader (192.168.1.11:4919) Shellcode (249 bytes)
windows_x86
249.0
Luigi Auriemma
Breed patch #1 - Zero-Length Remote Crash
dos
windows
7649.0
OSVDB-12897;CVE-2005-0382
Sp4rK
Linux/x86 - Flush IPChains Rules (/sbin/ipchains -F) Shellcode (49 bytes)
linux_x86
49.0
dev0id
BSD/x86 - execve(/bin/sh) + Encoded Shellcode (49 bytes)
bsd_x86
49.0