[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 52.0
Ken Kitahara
Linux/ARM - Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) + sigaction() Shellcode (52 Bytes)
arm
52.0
LiquidWorm
CyberPower Systems PowerPanel 3.1.2 - XML External Entity Out-Of-Band Data Retrieval
webapps
xml
3052.0
Metasploit
D-Link Devices - UPnP SOAP TelnetD Command Execution (Metasploit)
remote
unix
49152.0
OSVDB-94924
X-h4ck
Linux/x64 - execve(/bin/sh) Shellcode (52 bytes)
linux_x86-64
52.0
entropy
Linux/MIPS - execve(/bin/sh) Shellcode (52 bytes)
linux_mips
52.0
Rick
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) + XOR Encoded Shellcode (152 bytes)
linux_x86
152.0
Paolo Stivanin
Linux/x86 - execve(/bin/sh) Using jump/call/pop Shellcode (52 bytes)
linux_x86
52.0
ZoRLu
Windows/x86 (XP SP3) (Turkish) - cmd.exe Shellcode (52 bytes)
windows_x86
52.0
LSD-PLaNET
Solaris/SPARC - execve(/bin/sh) Shellcode (52 bytes)
solaris_sparc
52.0