That is a fairly common tactic. It exploits poor input validation and register globals in PHP. Do yourself a huge favor and install mod_security (I assume you're using apache?) as an extra measure of security if you haven't already. On Wed, Dec 3, 2008 at 3:39 PM, keith smith wrote: > > Hi, > > I am working on a website that gets a lot of exploit attempts. > > They mostly look like this: /index.php?display= > http://humano.ya.com/mysons/index.htm? > > Our code is set to disregard any value that is not expected. > > I'm wondering if there is a clearing house for reporting this type of > stuff. I have the IP address as reported.... if that is accurate. > > Thanks in advance! > > Keith > > > > > --------------------------------------------------- > PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us > To subscribe, unsubscribe, or to change your mail settings: > http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss >