Resources
People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
To start with, an API can be abused to delete arbitrary files. This is done by a classic directory traversal (../).
Stack based buffer overflow done by the concatenating of two strings :) Interesting never heard of this one before!
OS command injection in the administrative features via a server configuration.
Overall, a great article that goes into VERY deep technical details about the vulnerabilities!