This Metasploit module exploits a stack-based buffer overflow vulnerability in HTTPDX HTTP server 1.4. The vulnerability is caused due to a boundary error within the "h_handlepeer()" function in http.cpp. By sending an overly long HTTP request, an attacker can overrun a buffer and execute arbitrary code.
96eaa8c48e19f5fb3dca4fdb11170227a1757203bb4e06504fea12b4f61860cd
httpdx web server version 1.4 if vulnerable to a remote buffer overflow vulnerable when supplied a long GET request. Exploit is written for httpdx 1.4 on Windows XP SP3 and binds a shell to port 58821.
5d96dbe8f5911c612a8f12706970eff41b42e26d83533dd643d8743bbe48c779
httpdx web server version 1.4 Host Header remote format string denial of service exploit.
ad1c2ae6cf421d23d5b02795979e5414f32097f30f8f9bce200aced0f613943e
HTMLDOC version 1.8.27 stack buffer overflow exploit.
b4d4797b7107284a4b6474b24545749726ceea9eb72f5978e3645ba0ecf55f1e
Proof of concept stack overflow exploit for the Menu Editor in RadASM version 2.2.16.
1d34305d6bc1dbbb4e74d9862a991175a0b86541dd786d93c5fb6eae84f50c2c
VLC Media Player version 0.8.6f smb:// URI handling remote buffer overflow exploit.
aa0ab9f8122e71e917d958544e691d58e011aff7c532a2f6f79c89ad0366900e