On Mon, May 8, 2006 10:45 am, Paul Patrick Carpio Prantilla wrote: > Hello Kelsey, > > awstats has a good history of exploits against it, and it appears to be > commonly exploited in redhat systems. Unless that's you downloading > "ping.txt" or "ping" --which is apparently a perl exploit that most > likely takes an IP addresss and port for it's two arguments-- those logs > (or at least, set of commands) look like exploit attempts.
from what i understand, this doesn't look like a log only but actual processes running on his system. and yes there are many vulnerabilities in awstats. _________________________________________________ Philippine Linux Users' Group (PLUG) Mailing List [email protected] (#PLUG @ irc.free.net.ph) Read the Guidelines: http://linux.org.ph/lists Searchable Archives: http://archives.free.net.ph

