source: http://www.securityfocus.com/bid/568/info A 'GET' request for a URL longer than 166 characters will overflow a buffer and cause the web server to crash with the following or similar error message: VHTTPD32 caused an invalid page fault in module VHTTPD32.EXE at 0137:0040aaed. Registers: EAX=010d7740 CS=0137 EIP=0040aaed EFLGS=00010202 EBX=00000000 SS=013f ESP=010d53d0 EBP=010d0074 ECX=010d7740 DS=013f ESI=010d7740 FS=13c7 EDX=000000a8 ES=013f EDI=bff92ac1 GS=0000 Bytes at CS:EIP: ff 75 10 56 68 94 01 00 00 eb 1c 68 00 24 40 00 Stack dump: 00000010 010d7740 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19445.zip