Multiple buffer overflows in H-Sphere WebShell 2.3 allow remote attackers to execute arbitrary code via (1) a long URL content type in CGI::readFile, (2) a long path in diskusage, and (3) a long fname in flist.
psoft.net/misc/webshell_patch.html
secunia.com/advisories/7832
www.iss.net/security_center/static/10999.php
www.iss.net/security_center/static/11002.php
www.iss.net/security_center/static/11003.php
www.securityfocus.com/archive/1/305313
www.securityfocus.com/bid/6527
www.securityfocus.com/bid/6537
www.securityfocus.com/bid/6538
www.securityfocus.com/bid/6540
www.securitytracker.com/id?1005893