Vulnerability scans | Joachim De Zutter
June 2017-May 2018

What follows are fragments of a log containing attempts to find potentially vulnerable server-side scripts and/or DLLs and/or attempts to perform a directory traversal attack and/or remote exploit and/or vulnerability probe/banner grab by unauthorized parties.
The IP of the HTTP server has been replaced by #.#.#.#. The hostname of the HTTP server has been replaced by *.*.*.
Binary file (standard input) matches