Page 10 of 46 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe). • https://www.exploit-db.com/exploits/19152 http://www.securityfocus.com/bid/194 •