7.5
CVSSv2

CVE-2001-0333

Published: 27/06/2001 Updated: 12/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 795
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Directory traversal vulnerability in IIS 5.0 and previous versions allows remote malicious users to execute arbitrary commands by encoding .. (dot dot) and "\" characters twice.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft internet information server 4.0

microsoft internet information server

Exploits

source: wwwsecurityfocuscom/bid/2708/info Due to a flaw in the handling of CGI filename program requests, remote users can execute arbitrary commands on an IIS host When IIS receives a CGI filename request, it automatically performs two actions before completing the request: 1 IIS decodes the filename to determine the filetype and ...
source: wwwsecurityfocuscom/bid/2708/info Due to a flaw in the handling of CGI filename program requests, remote users can execute arbitrary commands on an IIS host When IIS receives a CGI filename request, it automatically performs two actions before completing the request: 1 IIS decodes the filename to determine the filetyp ...
source: wwwsecurityfocuscom/bid/2708/info Due to a flaw in the handling of CGI filename program requests, remote users can execute arbitrary commands on an IIS host When IIS receives a CGI filename request, it automatically performs two actions before completing the request: 1 IIS decodes the filename to determine th ...
## # $Id: ms01_026_dbldecoderb 11513 2011-01-08 00:25:44Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' req ...
source: wwwsecurityfocuscom/bid/2708/info Due to a flaw in the handling of CGI filename program requests, remote users can execute arbitrary commands on an IIS host When IIS receives a CGI filename request, it automatically performs two actions before completing the request: 1 IIS decodes the filename to determine ...
source: wwwsecurityfocuscom/bid/2708/info Due to a flaw in the handling of CGI filename program requests, remote users can execute arbitrary commands on an IIS host When IIS receives a CGI filename request, it automatically performs two actions before completing the request: 1 IIS decodes the filename to determine the f ...
source: wwwsecurityfocuscom/bid/2708/info Due to a flaw in the handling of CGI filename program requests, remote users can execute arbitrary commands on an IIS host When IIS receives a CGI filename request, it automatically performs two actions before completing the request: 1 IIS decodes the filename to determine the filetype a ...
source: wwwsecurityfocuscom/bid/2708/info Due to a flaw in the handling of CGI filename program requests, remote users can execute arbitrary commands on an IIS host When IIS receives a CGI filename request, it automatically performs two actions before completing the request: 1 IIS decodes the filename to determine the filetype and the ...
source: wwwsecurityfocuscom/bid/2708/info Due to a flaw in the handling of CGI filename program requests, remote users can execute arbitrary commands on an IIS host When IIS receives a CGI filename request, it automatically performs two actions before completing the request: 1 IIS decodes the filename to determine the file ...