[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 53.0
boku
macOS/x64 - Execve Null-Free Shellcode
macos
253.0
Daniel Ortiz
Linux/x86 - Bind (43690/TCP) + Null-Free Shellcode (53 Bytes)
linux_x86
53.0
Daniel Ortiz
Linux/x86 - chmod(/etc/shadow_ 0666) + Polymorphic Shellcode (53 bytes)
linux_x86
53.0
Daniele Votta
Linux/x86 - execve() - Terminal Calculator (bc) Shellcode (53 bytes)
linux_x86
53.0
Debashis Pal
Linux/x86 - execve(/bin/sh) + Polymorphic Shellcode (53 bytes)
linux_x86
53.0
James Fitts
haneWIN DNS Server 1.5.3 - Remote Buffer Overflow (Metasploit)
remote
windows
53.0
OSVDB-102773
Touhid M.Shaikh
Linux/x64 - Reverse (192.168.1.2:4444/TCP) Shell Shellcode (153 bytes)
linux_x86-64
153.0
Infobyte
ISC BIND 9 - Denial of Service
dos
multiple
53.0
CVE-2016-2776
Roziul Hasan Khan Shifat
Windows/x86 - CreateProcessA cmd.exe Shellcode (253 bytes)
windows_x86
253.0
Dario Estrada
haneWIN DNS Server 1.5.3 - Remote Buffer Overflow (SEH)
remote
windows
53.0
OSVDB-102773
sajith
haneWIN DNS Server 1.5.3 - Denial of Service
dos
windows
53.0
OSVDB-102272
ZoRLu
Windows/x86 (XP SP3) (Turkish) - calc.exe Shellcode (53 bytes)
windows_x86
53.0
egeektronic
Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
linux_x86
53.0
egeektronic
Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes)
linux_x86
53.0
egeektronic
Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes)
linux_x86
53.0
John Babio
Linux/x86 - /etc/init.d/apparmor teardown Shellcode (53 bytes)
linux_x86
53.0
«
1
2
»
page: 1/2 [exploits: 22]