On Wed, Feb 15, 2006 at 05:13:27PM -0600, Ben Kamen wrote: > Speaking of which, I saw these in my logs today... > > "POST /xmlrpc.php HTTP/1.1" 500 256
Likely looking for versions not patched against this: http://b2evolution.net/news/2005/08/31/fix_for_xml_rpc_vulnerability_again_1 I'll have to agree with David on PHP: Horrible Programming. It's the Public Hackers Paradise. Next to mail(), my favorite gripe about it is: require($url) -- #!perl -wpl # mmfppfmpmmpp mmpffm <[EMAIL PROTECTED]> $p=3-2*/[^\W\dmpf_]/i;s.[a-z]{$p}.vec($f=join('',$p-1?chr(sub{$_[0]*9+$_[1]*3+ $_[2]}->(map{/p|f/i+/f/i}split//,$&)+97):qw(m p f)[map{((ord$&)%32-1)/$_%3}(9, 3,1)]),5,1)='`'lt$&;$f.eig; # Jan-Pieter Cornet _______________________________________________ NOTE: If there is a disclaimer or other legal boilerplate in the above message, it is NULL AND VOID. You may ignore it. Visit http://www.mimedefang.org and http://www.roaringpenguin.com MIMEDefang mailing list MIMEDefang@lists.roaringpenguin.com http://lists.roaringpenguin.com/mailman/listinfo/mimedefang