[ Date Index ][
Thread Index ]
[ <= Previous by date /
thread ]
[ Next by date /
thread => ]
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Thursday 25 March 2004 12:15, David Johnson wrote: <snip lots of escaped hex garbage> <div class=\"serendipity_comment\">\n <a id=\"c13\"></a>\n <br />\n\n <div class=\"serendipity_comment_source\">\n <a href=\"#c13\" title=\"Link to comment #3\">#3</a> \n<a href=\"mailto:dj[at]david-web.co.uk\" title=\"Send a mail to David Johnson Someone is trying to test for a vulnerability in your web server / common scripts. It can come from a test FormMail.pl query or some other target. http://smtp.linux-sxs.org/pipermail/linux-users/2003-November/023423.html Somewhere in that very large snip, you should have found something like: /bin/sh or command.exe or something. This is typical of a buffer overflow exploit. - -- Neil Williams ============= http://www.codehelp.co.uk/ http://www.dclug.org.uk/ http://www.isbn.org.uk/ http://sourceforge.net/projects/isbnsearch/ http://www.biglumber.com/x/web?qs=0x8801094A28BCB3E3 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFAYzE9iAEJSii8s+MRAi1zAKC/VSixDsIcvSIVQWltEIrc6UuNDQCfepNb 09W0x2e1Ao9u/WrD54WxXiI= =49Qb -----END PGP SIGNATURE----- -- The Mailing List for the Devon & Cornwall LUG Mail majordomo@xxxxxxxxxxxx with "unsubscribe list" in the message body to unsubscribe.