A year ago, my web host thoroughly explained how PHP include vulnerabilities can be exploited, hoping that better user education would leave less member-sites vulnerable to automated attacks by spammer scum.
Tag: exploit
Categories
Tags/Keywords
blog.bigsmoke.us
RAID
plugin
MediaWiki
metabolism
zimbra
shell
ssl
PostgreSQL
HTML
nutrition
HTTP
CSS
WordPress
Debian
Family
Gentoo
SSH
WLB07051
RuG
CLI
Firefox
VIM
Javascript
mod_rewrite
T61
X
Ruby
flashmq
xen
PHP
svn
van der Molen
MySQL
Apache
postfix
smb
Linux
samba
bash
Ubuntu
Subversion
DNS
WWW
Windows
Recent Posts
- Semantic version parsing and comparison within PostgreSQL: pg_text_semver
- pg_extra_time: some data-time functions, operators and casts that I’m surprise are not already part of Postgres
- pg_html5_email_address: Postgres email validation in sync. with the HTML5 spec.
- pg_xenophile: more than the bare necessities for PostgreSQL i18n and l10n
- pg_safer_settings: dealing with PostgreSQL settings more … safely
Recent Comments