exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16470
This Metasploit module exploits a buffer overflow in NTDLL.dll on Windows 2000 via the SEARCH WebDAV method in IIS 5.0. It uses a long URL to trigger the overflow and includes multiple return addresses for brute-forcing.
Classification
Working Poc 100%
Target:
Microsoft IIS 5.0 on Windows 2000
No auth needed
Prerequisites:
IIS 5.0 with WebDAV enabled · Network access to the target server
exploitdb
WORKING POC
VERIFIED
by Schizoprenic · cremotewindows
https://www.exploit-db.com/exploits/51
This exploit targets a buffer overflow vulnerability in IIS 5.0 WebDAV (CVE-2003-0109) by sending a maliciously crafted XML request. It includes shellcode to spawn a reverse shell on port 31337, leveraging a known NTDLL.DLL overflow.
Classification
Working Poc 95%
Target:
Microsoft IIS 5.0
No auth needed
Prerequisites:
Network access to target IIS server · WebDAV enabled on the target
exploitdb
WORKING POC
VERIFIED
by alumni · cremotewindows
https://www.exploit-db.com/exploits/36
This exploit targets CVE-2003-0109, a buffer overflow vulnerability in Microsoft IIS WebDAV. It crafts a malicious HTTP SEARCH request with embedded shellcode to spawn a reverse shell on port 32768.
Classification
Working Poc 95%
Target:
Microsoft IIS 5.0/6.0 with WebDAV enabled
No auth needed
Prerequisites:
WebDAV enabled on target IIS server · Network access to target
exploitdb
WRITEUP
VERIFIED
by Morning Wood · textremotewindows
https://www.exploit-db.com/exploits/22367
The writeup describes a vulnerability in the ntdll.dll function 'RtlDosPathNameToNtPathName_U' which lacks sufficient bounds checking. This vulnerability can be exploited through programs like WebDAV in IIS 5.0, allowing remote attackers to execute arbitrary code.
Classification
Writeup 90%
Target:
Microsoft Windows NT, IIS 5.0
No auth needed
Prerequisites:
Access to a vulnerable system running IIS 5.0 with WebDAV enabled
exploitdb
WORKING POC
VERIFIED
by ThreaT · cremotewindows
https://www.exploit-db.com/exploits/22366
This exploit generates a malicious .reg file that triggers a buffer overflow in regedit.exe via an unchecked ReadFile() function, leading to arbitrary code execution. The payload downloads and executes a specified URL, demonstrating a remote code execution (RCE) vulnerability.
Classification
Working Poc 90%
Target:
Windows regedit.exe (affecting Windows NT, 2000, XP with WebDAV)
No auth needed
Prerequisites:
Victim must open the malicious .reg file
exploitdb
WORKING POC
VERIFIED
by RoMaNSoFt · cremotewindows
https://www.exploit-db.com/exploits/2
This exploit targets a buffer overflow vulnerability in IIS 5.0 WebDAV (CVE-2003-0109) by sending a maliciously crafted HTTP SEARCH request. It uses a Unicode conversion flaw to overwrite the return address and execute shellcode, binding a cmd.exe shell to a specified port.
Classification
Working Poc 90%
Target:
Microsoft IIS 5.0
No auth needed
Prerequisites:
Network access to the target IIS server · WebDAV enabled on the target server
exploitdb
WORKING POC
VERIFIED
by mat · perlremotewindows
https://www.exploit-db.com/exploits/22365
This exploit targets a buffer overflow vulnerability in the `RtlDosPathNameToNtPathName_U` function in `ntdll.dll` via WebDAV in IIS 5.0. It uses a unicode decoder scheme and self-modifying shellcode to execute arbitrary commands (e.g., adding a user).
Classification
Working Poc 95%
Target:
Microsoft IIS 5.0 with WebDAV enabled (Windows 2000)
No auth needed
Prerequisites:
WebDAV enabled on target IIS 5.0 server · Network access to port 80
exploitdb
WORKING POC
VERIFIED
by kralor · cremotewindows
https://www.exploit-db.com/exploits/1
This exploit targets a buffer overflow vulnerability in ntdll.dll through WebDAV on IIS servers. It uses a reverse shell shellcode and requires manual padding adjustments to achieve successful exploitation.
Classification
Working Poc 95%
Target:
Microsoft IIS with WebDAV enabled (ntdll.dll vulnerability)
No auth needed
Prerequisites:
WebDAV enabled on target IIS server · Network access to target · Manual padding adjustment for successful exploitation
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/22368
The writeup describes a vulnerability in the ntdll.dll function 'RtlDosPathNameToNtPathName_U' which lacks sufficient bounds checking. This can be exploited remotely via WebDAV in IIS 5.0 or through other attack vectors in programs using the library.
Classification
Writeup 90%
Target:
Microsoft Windows NT, XP, IIS 5.0/5.1
No auth needed
Prerequisites:
WebDAV enabled on IIS 5.0/5.1 · Network access to vulnerable system