D-Link routers with a firmware of 2.70 and below are vulnerable to a denial of service vulnerability providing the attacker has the ability to see the internal interface on the router. Sending a malformed URL to the syslog script will caused a DNS query. Multitudes of this query can result in a DoS and other odd forms of behavior.
802c81b31a6ec34d42defd9d16029f1790493faf92d67f06228dcf953950b333
Boss 3.2.1 with Jetty is vulnerable to full JSP source code disclosure when using a null byte.
5fa351f9ce58e57f2eea703a4be52cd1c81ec605244c7ecb9a5c8efb1cfdf9cf
Apache Tomcat versions prior to tomcat-4.1.24 create /opt/tomcat with a directory mode which allowed users to access files containing passwords.
cde571310caa333d67c4be137c14773e0f74daef1c8995e8560ef274ee015dff
This simple utility will connect to a webserver of your choosing and verify whether or not it is compliant to RFC 2616. Designed to verify Microsoft IIS servers.
5b11c0bdc25366a8b34ef23012f5c5ecbc7af057a245736c18f21d6c0f7efddb
Snort is giving away free t-shirts for writing rules. Gets yours today.
f8789fd7432e8330b4af0cc468f682831b8f4a00d5b5f64cbae23771e0386080
Windows XP SP1 shellcode (19 bytes).
899f2c53b410dc0da0d2f31d29ce2c89f7b9071b13a561c87063be6e5dd4b27d