lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20060102143303.GA10768@melpomene.jschipper.dynalias.net>
Date: Mon Jan  2 14:33:16 2006
From: j.schipper at math.uu.nl (Joachim Schipper)
Subject: What's with the /event.php?q=... hits?

On Mon, Jan 02, 2006 at 04:50:49AM -0700, Scott Edwards wrote:
> Has anyone seen these in their http logs?  I suppose my q= value is
> unique, because the last 5 search engines I used have no results.  I'm
> seeing them from a few different ip's that only probe for this file. 
> Just odd, or is something up?

Just another web bug. See
http://www.google.com/search?q=event.php+exploit. (There appear to be a
couple of exploits using such a file, BTW).

		Joachim

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ