Cart32 "expdate"...

- AV AC AU C I A
发布: 2000-05-03
修订: 2025-04-13

By appending the string "/expdate" to a request for the cart32.exe executable, (http: //target/cgi-bin/cart32.exe/expdate) an attacker can access an error message followed by a debugging page containing the server variables, the Cart32 administration directory and possibly the contents of the cgi-bin.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息