![xee 2.2 xee 2.2](https://i.ebayimg.com/images/g/T6AAAOSw~O1a~XEE/s-l300.jpg)
Print "| Simple Web Server 2.2 rc2 - Remote Buffer Overflow Exploit | \n" # (C) Copyright 1985-2001 Microsoft Corp. # | Simple Web Server 2.2 rc2 - Remote Buffer Overflow Exploit | # Exploit Title: SimpleWebServer 2.2-rc2 - Remote Buffer Overflow Exploit
XEE 2.2 CODE
An attacker, can submit a specially crafted HTTP header ‘Connection:’ parameter value to trigger a buffer overflow and execute arbitrary code on the target system.
![xee 2.2 xee 2.2](https://static.filehorse.com/screenshots-mac/imaging-and-digital-photo/xee-screenshot-03.jpg)
PMSoftware Simple Web Server 2.2-rc2 suffers from remote buffer overflow vulnerability on HTTP header “ Connection: ” parameter. A very simple scripting language (Pawn) can be used to generate dynamic Web Pages with dynamic content.According to “Windows Task Manager” sws.exe (with AMX plugin) require less then 3Mb of Memory.
XEE 2.2 PC
A Simple Web Server (for example can be used to share a folder of your PC to friends).Now HTTP/1.1 compliant, RTSP/1.0, PAWN and LUA plugins PMSoftware Simple Web Server 2.2-rc2: The easy and small way to open an HTTP Web Server.