Published: 1999-01-26
In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).
Overall Severity: N/A
| Type | Score | Severity | Vector |
|---|
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions: