Description
Microsoft Internet Information Services (IIS) 5.0 does not log requests that use the TRACK method, which allows remote attackers to obtain sensitive information without detection.
Remediation
References
Related Vulnerabilities
WordPress Plugin WORDPRESS VIDEO GALLERY SQL Injection (2.7)
Oracle Database Server CVE-2014-0377 Vulnerability (CVE-2014-0377)
WordPress Plugin Juiz Social Post Sharer Multiple Cross-Site Scripting Vulnerabilities (1.3.3.7)
WordPress Plugin Share Posts To Email Cross-Site Scripting (1.0.2)
Jenkins Improper Authentication Vulnerability (CVE-2014-2066)