Lucene search

K
exploitdbCassiusEDB-ID:20019
HistoryMay 03, 2000 - 12:00 a.m.

Cart32 3.0 - 'expdate' Administrative Information Disclosure

2000-05-0300:00:00
cassius
www.exploit-db.com
38

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/1358/info

By appending the string "/expdate" to a request for the cart32.exe executable, (http: //target/cgi-bin/cart32.exe/expdate) an attacker can access an error message followed by a debugging page containing the server variables, the Cart32 administration directory and possibly the contents of the cgi-bin.

http: //target/cgi-bin/cart32.exe/expdate 

AI Score

7.4

Confidence

Low

Related for EDB-ID:20019