2000-02-04 10:00:00
mitre
PUBLISHED
In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).