In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft internet information server 3.0 |
||
microsoft internet information services 5.0 |
||
microsoft internet information services 2.0 |
||
microsoft internet information server 4.0 |