Ravens PHP Scripts: Forums
 

 

View next topic
View previous topic
Post new topic   Reply to topic    Ravens PHP Scripts And Web Hosting Forum Index -> NukeSentinel(tm)
Author Message
xGaizka
New Member
New Member



Joined: Aug 04, 2004
Posts: 1

PostPosted: Wed Aug 11, 2004 2:14 pm Reply with quote

Date & Time: 2004-08-11 19:24:44
Blocked IP: 66.81.156.22
User ID: Anonymous (1)
Reason: Abuse-Script
--------------------
User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Query String: site.com/modules.php?name=News&file=friend&op=StorySent&title=Inauguraci%F3n+de+el+cafe+%22El+Dal%ED%22&fname=rebeca
Forwarded For: 66.81.156.22, 64.136.48.54
Client IP: none
Remote Address: 64.136.49.227
Remote Port: 27500
Request Method: GET



isnt a normal send news? or its a nuke exploit opr hack attemp?
 
View user's profile Send private message
Raven
Site Admin/Owner



Joined: Aug 27, 2002
Posts: 17088

PostPosted: Wed Aug 11, 2004 2:44 pm Reply with quote

When the query string is decoded, it is actually
Code:
site.com/modules.php?name=News&file=friend&op=StorySent&title=Inauguración de el cafe "El Dalí"&fname=rebeca
It's the " which set off both nuke's and NukeSentinel's alarms. Either remove the " or modify the string catcher, but that will open you up to security risks.
 
View user's profile Send private message
Display posts from previous:       
Post new topic   Reply to topic    Ravens PHP Scripts And Web Hosting Forum Index -> NukeSentinel(tm)

View next topic
View previous topic
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You can attach files in this forum
You can download files in this forum


Powered by phpBB © 2001-2007 phpBB Group
All times are GMT - 6 Hours
 
Forums ©