Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs

MS IIS/PWS Escaped Characters Decoding Command Execution Vulnerability

CORE has developed a working commercial exploit for their IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.

The 'execiis.c' exploit has been provided by Filip Maertens <filip@securax.be>.

Hux Flux <huxflux2001@hotmail.com> has provided the 'iisex.c' exploit.

Cyrus The Great <cyrusarmy@yahoo.com> has provided the 'IIS_CGI_decode_hole.pl' exploit.

Leif Jakob <bugtraq@jakob.weite-welt.com> has provided the 'IIS_escape_test.sh' exploit.

A.Ramos <aramos@lander.es> has provided the 'iisrules.tgz' exploit.

Gary O'leary-Steele <dilbert96@hushmail.com> has provided the 'Iisenc.zip' exploit.

Roelof <roelof@sensepost.com> has provided the following 'sensedecode.tgz' exploit.

MovAX <movax@softhome.net> has provided the following 'lala.c' exploit.




 

Privacy Statement
Copyright 2005, SecurityFocus