A sequence of commands or configuration data which can predictably utilize a vulnerability of a system.
Questions tagged [exploit]
65 questions
0
votes
3 answers
Does apache/PHP has overflow problem if the developer doesn't tweak it at all?
Is apache/PHP self secured so that developers don't need to care about it?

apache
- 3,227
- 7
- 27
- 25
0
votes
1 answer
Is it common to be constantly harassed by hackers?
I have recently become the proud operator of a server that runs wordpress and other software. Today I took a closer look at the log files to see what's going on on my server. Actually, I just wanted to see how people around the world can use…

eltitano
- 3
- 3
-1
votes
1 answer
how to mitigate hackers trying to find an exploit?
I have a Rails application running in a webserver inside my company, and now and then I see this messages on log:
I, [2014-09-04T06:15:33.057513 #37024] INFO -- : Started GET "/pma/scripts/setup.php" for 203.114.105.46 at 2014-09-04 06:│00
I,│15:33…

Luiz E.
- 111
- 6
-1
votes
1 answer
How do I figure out how the "Pharma Hack" hackers are gaining access to my site?
One of my sites has been the continuous target of the "Pharma Hack" - but it's using Drupal instead of Wordpress or Joomla. It is version 6, but it's updated to the latest version, and so are all of the modules that I have installed.
I've changed…

Ken
- 1
-1
votes
1 answer
Does blocking all output connections protect us from exploits on our server?
Let's say a hacker found a way to execute a vulnerability in my container and he can execute any code there (for example he has upload a bash file with HTTP protocoll). Let's make it more dangerous: his bash file is executed with root…

Simon
- 109
- 2