This script bypasses DEP (Data Execution Prevention) for OptIn/OptOut. It uses a ROP chain to call SetProcessDEPPolicy.
This exploit allows an attacker to disclose files on SharePoint 2007/2010 and DotNetNuke versions lower than 6. By exploiting an XML External Entity (XEE) vulnerability, the attacker can read arbitrary files on the system. The proof of concept (POC) files xee.xml and xee.xsl are provided.
This is a proof of concept exploit for freeSSHd version 1.0.9. It allows an attacker to execute arbitrary code on the target system.
This exploit is designed to bypass the OptIn/OptOut DEP (Data Execution Prevention) policy on Windows XP SP3. It was written by Blake and has been tested on a virtual machine running Windows XP SP3. The exploit uses a combination of shellcode and return-oriented programming (ROP) techniques to bypass DEP and execute arbitrary code.
This exploit allows an attacker to execute arbitrary code on a PHP Support Tickets v2.2 system. By manipulating the 'page' parameter in the 'index.php' file, an attacker can inject PHP code and execute it.
This exploit takes advantage of a buffer overflow vulnerability in Aika colladaconverter. The exploit code is encoded and will be injected inside the file path.
The vulnerability allows an attacker to include local files by manipulating the 'pdf' parameter in the '/pdf.php' script. By specifying a relative path to a file, the attacker can read sensitive information, such as the '/etc/passwd' file.
This exploit targets ScadaTEC ModbusTagServer and ScadaPhone software. It triggers a buffer overflow vulnerability when loading a project from a zip file. The ScadaPhone exploit bypasses DEP on Windows XP SP3, while the ModbusTagServer exploit does not. The vulnerability affects ScadaPhone versions up to 5.3.11.1230 and ModbusTagServer versions up to 4.1.1.81. The exploit has been tested on Windows XP SP3 with NX enabled.
The exploit allows an attacker to perform SQL injection by manipulating the 'event_id' parameter in the URL.
This exploit bypasses Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) in DVD X Player 5.5 Pro. It uses a combination of ROP (Return-Oriented Programming) techniques to execute arbitrary code.