INetCop Security Advisory #2002-0x82-003 - LibHTTPD, a utility that can be used to add basic web server capabilities to an application or embedded device, is vulnerable to a buffer overflow which allows remote attackers to gain root access to the system.
42b98d2d9176568731b8e14b52d0f6712290e40350893e64b5996c712275747a
INetCop Security Advisory #2002-0x82-002 - A buffer overflow in Light HTTPd version 1.0 allows for remote attackers to grab a shell or perform related activities as the webserver uid.
4394e54d71505d1fce1d0784dbc84067ece93adfb1a1d1cad4e863b4f87b14c9
The KeyFocus Web server, a Win32 HTTP server with web administration, contains a flaw that enables attackers to traverse above the webroot in the directory structure. Only files with recognized MIME types can be compromised as there are internal defenses by the server that disallow retrieval of other files.
dc22d736a755b10bd7c27a85bf36efee3c7f89158ea10d7ed13173909498eafa
A memory corruption vulnerability exists in INweb Mail Server v2.01. The POP3 server included with INweb Mail Server does not properly handle some types of requests. By submitting a maliciously crafted request to the POP3 server, an attacker could crash the system, resulting in a denial of service.
1c82afe19efc5cd1f9b94c6e761931142f3ae2f1c1916669da77662486122d4e
Xsun-expl.c is a local exploit for the SPARC architecture that makes use of the Xsun -co heap overflow found in April, 2002 on Solaris 2.6, 7, and 8.
97e55a2ca5d9e617ff856cd2414f020155d9ce6262a00ab465fbed2df4dbfdb0
This email describes a temporary file vulnerability that exists in the cvsupd startup script that comes with the FreeBSD cvsup port. A fix for this issue can be found here.
f8bb71bc647a742d50ee9080be67f7742e1dbfc273873279986cf4fe4629d4aa
Lycos.com, the popular search engine and free e-mail site, has a Cross Site Scripting vulnerability that allows an attacker to fool a victim into clicking on a link to Lycos and in turn the attacker can hijack the Cookies of the victim.
d1802d7585d53ad58b69f79cc631f0470c55c28d1e28dc48ff19554a808c7ebb
Exploit for the utility networking_utils.php which does not properly sanitize variables from the client side and in turn will allow any remote visitor to view any file on the webserver.
f24477d4888f51dc4febd2bcdce740fd4c7df95c1dda5100eb5b595ac7970f9e
Solaris suffers from a TTYPROMPT remote login bypass that allows for command execution as uid bin.
70ebcee51d2df3080fb3f951463a878b96b34bc14e853bfdff728b55adb1313c
Smartmail v1.0Beta10 and 2.0 remote denial of service exploit in perl.
b2a5a46a5a2cc9670a85bb0503ac9279cfc04afd26501261ab2b854990c32dce