[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 72.0
boku
Linux/x64 - Bind (0.0.0.0:4444/TCP) Shell (/bin/bash) + Password (P3WP3Wl4ZerZ) + Null-free Shellcode (272 Bytes)
linux_x86-64
272.0
strider
Linux/x86 - Shred File (test.txt) Shellcode (72 bytes)
linux_x86
72.0
Metasploit
Erlang - Port Mapper Daemon Cookie Remote Code Execution (Metasploit)
remote
multiple
25672.0
Metasploit
Erlang - Port Mapper Daemon Cookie Remote Code Execution (Metasploit)
remote
multiple
25672.0
Robert L. Taylor
Linux/x64 - Reverse Netcat Shell (127.0.0.1:1337) Shellcode (72 bytes)
linux_x86-64
72.0
Filippo Bersani
Linux/x86 - execve(/bin/bash -c) Arbitrary Command Execution + Null-Free Shellcode (72 bytes)
linux_x86
72.0
Kyzer
Linux/x64 - Reverse (10.1.1.4/TCP) Shell + Continuously Probing Via Socket + Port-Range (391-399) + Password (la crips) + Null-Free Shellcode (172 bytes)
linux_x86-64
172.0
S3ba
ManageEngine Password Manager Pro 8102 to 8302 - Multiple Vulnerabilities
webapps
jsp
7272.0
Marlow Tannhauser
Xeams 4.5 Build 5755 - Multiple Vulnerabilities
webapps
php
5272.0
CVE-2015-3141;OSVDB-121847
Maximiliano Gomez Vidal
Linux/x86 - Reverse (192.168.1.133:33333/TCP) Shell (/bin/sh) Shellcode (72 bytes)
linux_x86
72.0
Geyslan G. Bem
Linux/x86 - Reverse (127.1.1.1:55555/TCP) Shell + Null-Free Shellcode (72 bytes)
linux_x86
72.0
midnitesnake
Linux/ARM (Raspberry Pi) - Reverse (10.1.1.2:0x1337/TCP) Shell (/bin/sh) Shellcode (72 bytes)
arm
72.0
Metasploit
InterSystems Cache - UtilConfigHome.csp Argument Buffer Overflow (Metasploit)
remote
windows
57772.0
OSVDB-60549
anonymous
IRIX - execve(/bin/sh -c) Shellcode (72 bytes)
irix
72.0
Michel Kaempf
Linux/SPARC - setreuid(0_0) + execve() Shellcode (72 bytes)
linux_sparc
72.0
haphet
OSX/PPC - execve(/bin/sh_[/bin/sh]_NULL) + exit() Shellcode (72 bytes)
osx_ppc
72.0
«
1
2
»
page: 1/2 [exploits: 21]