exploitdb
WORKING POC
VERIFIED
by Optyx · cremotewindows
https://www.exploit-db.com/exploits/190
This exploit targets a directory traversal vulnerability in Microsoft IIS 4.0/5.0 via Unicode encoding manipulation. It allows remote command execution by traversing directories to access cmd.exe and execute arbitrary commands.
Classification
Working Poc 95%
Target:
Microsoft IIS 4.0/5.0
No auth needed
Prerequisites:
Network access to vulnerable IIS server · IIS 4.0/5.0 with default configurations
exploitdb
WORKING POC
VERIFIED
by Roelof Temmingh · perlremotewindows
https://www.exploit-db.com/exploits/192
This Perl script exploits the IIS Unicode vulnerability (CVE-2000-0884) to achieve remote command execution by leveraging directory traversal via Unicode-encoded characters. It first checks for the presence of a copied cmd.exe (sensepost.exe) and copies it if missing, then executes arbitrary commands.
Classification
Working Poc 100%
Target:
Microsoft IIS 4.0/5.0
No auth needed
Prerequisites:
Vulnerable IIS server with Unicode directory traversal flaw · Network access to the target
exploitdb
WORKING POC
VERIFIED
by steeLe · perlremotewindows
https://www.exploit-db.com/exploits/191
This Perl script exploits a Unicode directory traversal vulnerability in IIS 4.0/5.0 (CVE-2000-0884) by sending crafted HTTP requests to execute arbitrary commands (e.g., `cmd.exe /c dir`). It checks multiple Unicode-encoded traversal sequences and logs vulnerable hosts.
Classification
Working Poc 95%
Target:
Microsoft IIS 4.0/5.0
No auth needed
Prerequisites:
Network access to target IIS server · IIS 4.0/5.0 with vulnerable Unicode parsing
exploitdb
WORKING POC
VERIFIED
by incubus · cremotewindows
https://www.exploit-db.com/exploits/189
This exploit targets a directory traversal vulnerability in IIS 4/5 via a malformed URL to execute arbitrary commands through cmd.exe. It sends an HTTP GET request with encoded traversal sequences to achieve remote command execution.
Classification
Working Poc 95%
Target:
Microsoft Internet Information Services (IIS) 4.0/5.0
No auth needed
Prerequisites:
Network access to the target IIS server · IIS 4.0/5.0 with vulnerable configuration
exploitdb
SCANNER
VERIFIED
by Roelof Temmingh · perlremotewindows
https://www.exploit-db.com/exploits/20299
This Perl script tests for the Unicode directory traversal vulnerability (CVE-2000-0884) in Microsoft IIS 4.0/5.0 and Personal Web Server by sending HTTP requests with encoded traversal sequences to check if arbitrary file access is possible.
Classification
Scanner 90%
Target:
Microsoft IIS 4.0, 5.0, Personal Web Server
No auth needed
Prerequisites:
Network access to the target web server
exploitdb
WORKING POC
VERIFIED
by Andrea Spabam · perlremotewindows
https://www.exploit-db.com/exploits/20302
This exploit leverages Unicode directory traversal vulnerabilities in Microsoft IIS 4.0/5.0 to execute arbitrary commands via `cmd.exe`. It includes multiple encoded paths to bypass security filters and achieve remote code execution.
Classification
Working Poc 95%
Target:
Microsoft IIS 4.0/5.0
No auth needed
Prerequisites:
Network access to vulnerable IIS server · Target server must be running IIS 4.0/5.0 with Unicode traversal vulnerability
exploitdb
WORKING POC
VERIFIED
by BoloTron · phpremotewindows
https://www.exploit-db.com/exploits/20301
This exploit leverages Unicode directory traversal in Microsoft IIS 4.0/5.0 to execute arbitrary commands via `cmd.exe`. It includes multiple attack vectors to bypass security checks and achieve remote code execution.
Classification
Working Poc 95%
Target:
Microsoft IIS 4.0/5.0, Microsoft Personal Web Server
No auth needed
Prerequisites:
Network access to vulnerable IIS server · Knowledge of target paths
exploitdb
WORKING POC
VERIFIED
by zipo · cremotewindows
https://www.exploit-db.com/exploits/20300
This exploit leverages a Unicode directory traversal vulnerability in Microsoft IIS 4.0/5.0 to execute arbitrary commands via cmd.exe. It sends crafted HTTP requests with encoded traversal sequences to bypass security checks and achieve remote code execution.
Classification
Working Poc 95%
Target:
Microsoft IIS 4.0/5.0
No auth needed
Prerequisites:
Network access to vulnerable IIS server · Knowledge of target paths
exploitdb
WORKING POC
VERIFIED
by Gabriel Maggiotti · cremotewindows
https://www.exploit-db.com/exploits/20298
This exploit targets CVE-2000-0884, a directory traversal vulnerability in Microsoft IIS 4.0/5.0 and Personal Web Server via Unicode-encoded '../' sequences. It attempts to execute arbitrary commands by accessing 'cmd.exe' through various paths and Unicode obfuscation techniques.
Classification
Working Poc 95%
Target:
Microsoft IIS 4.0/5.0, Microsoft Personal Web Server
No auth needed
Prerequisites:
Network access to vulnerable IIS server · Knowledge of target file paths