[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 92.0
Eduardo Silva
Linux/x86 - Polymorphic linux x86 Shellcode (92 Bytes)
linux_x86
92.0
Ken Kitahara
Linux/ARM - Bind (0.0.0.0:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (92 Bytes)
arm
92.0
Anurag Srivastava
Linux/x86 - Bind (1337/TCP) Shell (/bin/sh) + Null-Free Shellcode (92 bytes)
linux_x86
92.0
Chris Lyne
Advantech WebAccess < 8.1 - webvrpcs DrawSrv.dll Path BwBuildPath Stack-Based Buffer Overflow
remote
windows
4592.0
ZDI-16-093
Metasploit
Advantech WebAccess 8.2-2017.03.31 - Webvrpcs Service Opcode 80061 Stack Buffer Overflow (Metasploit)
webapps
windows
4592.0
CVE-2017-14016
Andrea Sindoni
Linux/ARM (Raspberry Pi) - Bind (4444/TCP) Shell (/bin/sh) Shellcode (192 bytes)
arm
192.0
nixawk
Intel Active Management Technology - System Privileges
remote
multiple
16992.0
CVE-2017-5689
d4sh&r
Linux/x64 - Bind (31173/TCP) Shell (/bin/sh) + Password (1234) Shellcode (92 bytes)
linux_x86-64
92.0
Russell Willis
Linux/x86 - Reverse (192.168.1.10:31337/TCP) Shell Shellcode (92 bytes)
linux_x86
92.0
Metasploit
Symantec Alert Management System Intel Alert Originator Service - Remote Buffer Overflow (Metasploit)
remote
windows
38292.0
CVE-2009-1430;OSVDB-54159
czy
Windows/x86 - Download File + Execute Shellcode (192 bytes)
windows_x86
192.0
0ut0fbound
Linux/x86 - execve() + Read Shellcode (92 bytes)
linux_x86
92.0
bunker
Solaris/SPARC - setreuid() + Executes Command Shellcode (92+ bytes)
solaris_sparc
92.0
Matias Sedalo
BSD/x86 - execve(/bin/cat /etc/master.passwd) | mail root@localhost Shellcode (92 bytes)
bsd_x86
92.0
RaiSe
Linux/x86 - execve(/bin/sh) + Alphanumeric Shellcode (392 bytes)
linux_x86
392.0
Matias Sedalo
Linux/x86 - Bind (5074/TCP) Shell Shellcode (92 bytes)
linux_x86
92.0