It is possible for a remote attacker to view segments of a requested file. A maliciously crafted URL could cause IIS to use .htr ISAPI extensions to process requests of other file types.
It is possible for a remote attacker to view segments of a requested file. A maliciously crafted URL could cause IIS to use .htr ISAPI extensions to process requests of other file types.