MS IIS/PWS Escaped Characters Decoding Command Execution Vulnerability
CORE has developed a working commercial exploit for their IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild. The 'execiis.c' exploit has been provided by Filip Maertens <filip@securax.be>. Hux Flux <huxflux2001@hotmail.com> has provided the 'iisex.c' exploit. Cyrus The Great <cyrusarmy@yahoo.com> has provided the 'IIS_CGI_decode_hole.pl' exploit. Leif Jakob <bugtraq@jakob.weite-welt.com> has provided the 'IIS_escape_test.sh' exploit. A.Ramos <aramos@lander.es> has provided the 'iisrules.tgz' exploit. Gary O'leary-Steele <dilbert96@hushmail.com> has provided the 'Iisenc.zip' exploit. Roelof <roelof@sensepost.com> has provided the following 'sensedecode.tgz' exploit. MovAX <movax@softhome.net> has provided the following 'lala.c' exploit.
|
|
Privacy Statement |