[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 77.0
Hashim Jawad
Linux/x86 - execve(/bin/sh) + ROT-N/Shift-N/XOR-N Encoded Shellcode (77 bytes)
linux_x86
77.0
Metasploit
Oracle BeeHive 2 - 'voice-servlet prepareAudioToPlay()' Arbitrary File Upload (Metasploit)
remote
windows
7777.0
OSVDB-130219
Metasploit
Oracle BeeHive 2 - 'voice-servlet processEvaluation()' Write File (Metasploit)
remote
windows
7777.0
CVE-2010-4417;OSVDB-70552
Sean Dillon
Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (Z~r0) + Null-Free Shellcode (77-85/90-98 bytes)
linux_x86-64
77.0
Javier Tejedor
Linux/x86 - Add Map (127.1.1.1 google.com) To /etc/hosts Shellcode (77 bytes)
linux_x86
77.0
Jake Reynolds
Dahua DVR 2.608.0000.0/2.608.GV00.0 - Authentication Bypass (Metasploit)
webapps
hardware
37777.0
CVE-2013-6117;OSVDB-99783;CVE-2013-3615;CVE-2013-3614;CVE-2013-3613;CVE-2013-3612;OSVDB-97333;OSVDB-97332;OSVDB-97330;OSVDB-97329;OSVDB-97328
zillion
Linux/x86 - Add Root User (w000t) + No Password Shellcode (177 bytes)
linux_x86
177.0