This Metasploit module exploits a boundary condition error in Intrasrv Simple Web Server 1.0. The web interface does not validate the boundaries of an HTTP request string prior to copying the data to an insufficiently large buffer. Successful exploitation leads to arbitrary remote code execution in the context of the application.
49e8f27267aed47c682375ea5911705765e895cff8046206e064332f203dd75a
BOINC Manager (SETI at Home) version 7.0.64 Field stack based buffer overflow exploit.
9a68f8632644c25c3db7ebc94abb6b9bcd6204f3cab0bd2f03d079a774d30a30
Intrasrv Simple Web Server version 1.0 SEH based remote code execution exploit.
912fd073e0d783dd318697693b042acb7b403d1ca339837fcfa75c842e5512b8
Ophcrack version 3.5.0 suffers from stack based buffer overflow vulnerability that leads to local code execution.
85e4c42a672fe0a884bdf1e279ba0680a6f49152f227aadb304bf714bbb09e86