Hey all, Just thought I'd pass on this observation though not related directly to the framework but this happens to be the only list I'm on anymore.
Anyways, I've been monitoring a large influx of code injection attempts by inserting php code in the server variables, HTTP_USER_AGENT mostly. These sometimes are included with a URL Injection attempt but not always. Also for those out there who have some CF or ASP (I think) there are a lot of the following being appended to page requests. Trimmed but should make the point... [EMAIL PROTECTED](4000);[EMAIL PROTECTED](0x4445...%20AS%20CHAR(4000));EXEC(@S ); Just as a reminder to everyone to write more secure code. Here are some numbers from a smaller site I'm logging, avg 2500 visitors a day. Date..............# 01/Sep/2008 86 02/Sep/2008 119 03/Sep/2008 56 04/Sep/2008 31 05/Sep/2008 93 06/Sep/2008 84 07/Sep/2008 129 08/Sep/2008 141 09/Sep/2008 47 10/Sep/2008 136 11/Sep/2008 96 12/Sep/2008 140 13/Sep/2008 200 14/Sep/2008 250 15/Sep/2008 130 16/Sep/2008 36 URL Injection attempts from 1773 unique ip addresses. (that's a few infected machines) These numbers don't count all the HTTP_USER_AGENT code injection attempts as those are getting blocked but .htaccess currently. Just wanted to let people know the script-kiddy scanners are out playing. Terre
