[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 65.0
Robert L. Taylor
Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) Shellcode (65 bytes)
linux_x86-64
65.0
Ajith Kp
Linux/x64 - Read /etc/passwd Shellcode (65 bytes)
linux_x86-64
65.0
Ben Turner
Persistent Systems Client Automation - Command Injection Remote Code Execution (Metasploit)
remote
windows
3465.0
CVE-2015-1497;OSVDB-118382
Metasploit
HP Client - Automation Command Injection (Metasploit)
remote
multiple
3465.0
CVE-2015-1497;OSVDB-118382
Osanda Malith Jayathissa
Linux/x64 - /sbin/shutdown -h now Shellcode (65 bytes)
linux_x86-64
65.0
Geyslan G. Bem
Linux/x86 - Bind (Random TCP Port) Shell + Null-Free Shellcode (65 bytes)
linux_x86
65.0
certaindeath
Linux/x86 - Read /etc/passwd Shellcode (65+ bytes)
linux_x86
65.0
sm4x
FreeBSD/x86 - execve(/bin/cat /etc/master.passwd) + Null-Free Shellcode (65 bytes)
freebsd_x86
65.0