exploit-db-mirror/exploits/windows/remote/20019.txt
Offensive Security d304cc3d3e DB: 2017-11-24
116602 new exploits

Too many to list!
2017-11-24 20:56:23 +00:00

5 lines
No EOL
411 B
Text

source: http://www.securityfocus.com/bid/1358/info
By appending the string "/expdate" to a request for the cart32.exe executable, (http: //target/cgi-bin/cart32.exe/expdate) an attacker can access an error message followed by a debugging page containing the server variables, the Cart32 administration directory and possibly the contents of the cgi-bin.
http: //target/cgi-bin/cart32.exe/expdate