MS IIS/PWS Escaped Characters Decoding Command Execution Vulnerability
CORE has developed a working commercial exploit for their IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.
The 'execiis.c' exploit has been provided by Filip Maertens <firstname.lastname@example.org>.
Hux Flux <email@example.com> has provided the 'iisex.c' exploit.
Cyrus The Great <firstname.lastname@example.org> has provided the 'IIS_CGI_decode_hole.pl' exploit.
Leif Jakob <email@example.com> has provided the 'IIS_escape_test.sh' exploit.
A.Ramos <firstname.lastname@example.org> has provided the 'iisrules.tgz' exploit.
Gary O'leary-Steele <email@example.com> has provided the 'Iisenc.zip' exploit.
Roelof <firstname.lastname@example.org> has provided the following 'sensedecode.tgz' exploit.
MovAX <email@example.com> has provided the following 'lala.c' exploit.
An exploit is available to members of the Immunity Partner's program. This exploit is not otherwise publicly available or known to be circulating in the wild. It may be obtained from the following URI: