[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 67.0
Metasploit
w3tw0rk / Pitbul IRC Bot - Remote Code Execution (Metasploit)
remote
multiple
6667.0
OSVDB-120384
Jay Turla
w3tw0rk / Pitbull Perl IRC Bot - Remote Code Execution
remote
multiple
6667.0
OSVDB-120384
Geyslan G. Bem
Linux/x86 - Reverse (127.1.1.1:11111/TCP) Shell + Null-Free Shellcode (67 bytes)
linux_x86
67.0
beosroot
BSD/x86 - Bind (2525/TCP) Shell Shellcode (167 bytes)
bsd_x86
167.0
Crash
IrcDelphi Daemon Server - Denial of Service
dos
windows
6667.0
sbz
FreeBSD/x86 - Bind (1337/TCP) Shell (/bin/sh) Shellcode (167 bytes)
freebsd_x86
167.0
Paolo Stivanin
Linux/x86 - execve() Using JMP-FSTENV Shellcode (67 bytes)
linux_x86
67.0
dev0id
Linux/x86 - setuid(0) + Load Kernel Module (/tmp/o.o) Shellcode (67 bytes)
linux_x86
67.0
Koshi
Windows/x86 - PEB 'Kernel32.dll' ImageBase Finder + Alphanumeric Shellcode (67 bytes)
windows_x86
67.0
CorryL
ngIRCd 0.8.1 - Remote Denial of Service (2)
dos
linux
6667.0
CoKi
ngIRCd 0.8.2 - Remote Format String
remote
linux
6667.0
OSVDB-13444;CVE-2005-0226