Sun Java Web Server version 7.0 update 7 remote stack overflow exploit that is capable of bypassing DEP. In order to do this it uses ROP to invoke SetProcessDEPPolicy(). This is the second version of this exploit.
5ad70f7b7f2e69ccea95b224be4c72b4098e1aff0d6b032f6327e5d85239389e
Sun Java Web Server version 7.0 update 7 remote stack overflow exploit.
1d5f8ef617835a71a58262660e2ce215591ca0aad2cd8ed70a7c99368e4b3aec
This Metasploit module exploits a buffer overflow in Sun Java Web Server prior to version 7 Update 8. By sending an "OPTIONS" request with an overly long path, attackers can execute arbitrary code. In order to reach the vulnerable code, the attacker must also specify the path to a directory with WebDAV enabled. This exploit was tested and confirmed to work on Windows XP SP3 without DEP. Versions for other platforms are vulnerable as well. The vulnerability was originally discovered and disclosed by Evgeny Legerov of Intevydis.
c3475168b519e0a4d79aa02d77825b2c1bfbe2132656b22f2313752701602378
Sun Microsystems Sun Java System Web Server remote exploit for Sparc. Binds a shell to port 5555.
58d3d00ceb2912ac710a08f0960ba35a4e854dccf29619ef655137c811281052