How Freebsd.org was hacked - By combining insecurities in two CGI scripts, www.freebsd.org was taken over by Nohican and Frank Van Vliet.
a9d71e318700dd856a56a3d174a9700ea8a3e6f68489a1adb726739dc6089ab0
BufferOverflow Advisory: Unchecked system call in Bugzilla 2.8. The script used to submit new bugs, process_bug.cgi, is vulnerable because it does not check the contents of the who field. Includes perl remote exploit code.
c03b1338b6456d559d308a4ca0f67b5d6cb1acb1d1ed85a1dec83f1ca6175f4c
How www.apache.org was defaced. This paper does _not_ uncover any new vulnerabilities. It points out common (and slightly less common) configuration errors, which even the people at apache.org made. This is a general warning. Learn from it.
c8fbb4923e10b56d5fcbff059d91139c68b95de7f091f514ef51869d1183cf7a
This is the securestackpatch by Openwall, ported for linux 2.3.99-pre5. There are no fancy configuration options, when you use this patch, next time you compile your kernel, the stack will be secure.
8de998b9481496276ed791afea42b3403f6d88559543d5466f115c7de6cca436