[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 83.0
Kyzer
Linux/x64 - Bind (4442/TCP) Shell + Syscall Persistent + Multi-Terminal/Port-Range (4444-4447/TCP) + Password (la crips) + Daemon Shellcode (83/148/177 bytes)
linux_x86-64
83.0
TUNISIAN CYBER
Windows/x86 (XP SP3) - Create (file.txt) Shellcode (83 bytes)
windows_x86
83.0
Matt Schmidt
HP Operations Agent - Cross-Site Scripting iFrame Injection
webapps
multiple
383.0
CVE-2014-2647;OSVDB-113420
Jean Pascal Pereira
Linux/x86 - Disable ASLR Security Shellcode (83 bytes)
linux_x86
83.0
agix
Linux/x86 - pwrite(/etc/shadow_ (md5 hash of agix)_ 32_ 8) Shellcode (83 bytes)
linux_x86
83.0
XenoMuta
Linux/x86 - Bind (/TCP) Listener (5555/TCP) + Receive Shellcode + Payload Loader Shellcode (83 bytes)
linux_x86
83.0
Hamid Zamani
Linux/x86 - /proc/sys/net/ipv4/ip_forward 0 + exit() Shellcode (83 bytes)
linux_x86
83.0
bob
Linux/x86 - Add Root User To /etc/passwd + No Password + exit() Shellcode (83 bytes)
linux_x86
83.0
storm
Linux/x86 - Bind (64713/TCP) Shell (/bin/sh) Shellcode (83 bytes)
linux_x86
83.0
patrick
SpamAssassin spamd 3.1.3 - Command Injection (Metasploit)
remote
unix
783.0
CVE-2006-2447;OSVDB-26177
p. minervini
NetBSD/x86 - Reverse (6666/TCP) Shell Shellcode (83 bytes)
netbsd_x86
83.0
no1
BSD/x86 - Bind (31337/TCP) Shell Shellcode (83 bytes)
bsd_x86
83.0