Apple security advisory APPLE-SA-2002-09-19 - Apple QuickTime ActiveX v5.0.2 has a buffer overrun conditions that can result in execution of arbitrary code. To exploit this vulnerability an attacker would need to get his or her target to open a malicious HTML file as an attachment to an email message, as a file on the local or network file system, or as a file via HTTP.
5907e5ca8b939567f596c5abdbc0ead1070c8160b0c2423fbea33fdb62a333be
This exploit uses a symbolic link vulnerability in the Borland Interbase gds_lock_mgr binary to overwrite /etc/xinetd.d/xinetdbd with code that spawns a root shell on port 666 TCP.
d7d156c479c021809f9a0057514db6f1459ab7f03ab76f348bc1c94b1dfed0a8
Gentoo Linux security advisory - A vulnerability found in default Apache Tomcat 4.x installation can be used to remotely disclose the source of served JSP files.
44918fb3fe44c0391cb282db4a9797872dc7635f9b5b0467868f2917103a9e8a
Microsoft Security Advisory MS02-053 - Serious vulnerabilities have been discovered in Microsoft FrontPage Server Extensions 2000 and 2002 in the SmartHTML Interpreter (shtml.dll). FrontPage Server Extensions 2002 the flaw allows remote attackers to run code of his choice; on FrontPage Server Extensions 2000 the attacker can consume most or all available CPU until the service is restarted.
e336209cb8e7287fcc28062f2faba13182a7f5785256bb71bd5aa1e1aeb6918f