This Metasploit module uses a valid username and password of any level (or password hash) to execute an arbitrary payload. This Metasploit module is similar to the "psexec" module, except allows any non-guest account by default.
62064773ec9a35ea65bfaad94997ca19e3bcbb3be2deb552ff222d7fe63317a4
Simple demonstration of a stack overflow in GAIM 1.2.1.
2939f7d4c5b8f352d2fe3b7a82fb15899cf63ac93e106ff54705d72ce886c439