2000-02-04 05:00:00
mitre
PUBLISHED
In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).