[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 5.0
Al Baradi Joy
Linux/x86 - Reverse TCP Shellcode (95 bytes)
linux_x86
95.0
Metasploit
OpenSMTPD - MAIL FROM Remote Code Execution (Metasploit)
remote
linux
25.0
CVE-2020-7247
Kağan Çapar
Linux/x86_64 - Wget Linux Enumeration Script Shellcode (155 Bytes)
linux_x86-64
155.0
Charles Truscott
Microsoft Exchange 2003 - base64-MIME Remote Code Execution
remote
windows
25.0
CVE-2007-0213
strider
Linux/x86 - OpenSSL Encrypt (aes256cbc) Files (test.txt) Shellcode (185 bytes)
linux_x86
185.0
strider
Linux/x86 - cat .bash_history + base64 Encode + cURL (http://localhost:8080) Shellcode (125 bytes)
linux_x86
125.0
Dino Covotsos
MailCarrier 2.51 - 'RCPT TO' Buffer Overflow
remote
windows
25.0
Dino Covotsos
MailCarrier 2.51 - 'RCPT TO' Buffer Overflow
remote
windows
25.0
Joseph McDonagh
Mail Carrier 2.5.1 - 'MAIL FROM' Buffer Overflow
remote
windows
25.0
Joseph McDonagh
Mail Carrier 2.5.1 - 'MAIL FROM' Buffer Overflow
remote
windows
25.0
Daniele Votta
Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes)
linux_x86
45.0
Kartik Durg
Windows/x86 - Download File (http://192.168.0.13/ms.msi) Via msiexec + Execute Shellcode (95 bytes)
windows_x86
95.0
Daniele Votta
Linux/x86 - exit(0) Shellcode (5 bytes)
linux_x86
5.0
T3jv1l
Linux/x86 - Bind (1337/TCP) Ncat (/usr/bin/ncat) Shell (/bin/bash) + Null-Free Shellcode (95 bytes)
linux_x86
95.0
Metasploit
Morris Worm - sendmail Debug Mode Shell Escape (Metasploit)
remote
unix
25.0
Metasploit
Morris Worm - sendmail Debug Mode Shell Escape (Metasploit)
remote
unix
25.0
«
1
2
3
4
5
6
7
8
9
10
11
...
»
page: 1/14 [exploits: 209]