Microsoft Internet Information Services (IIS) 5.0 does not log requests that use the TRACK method, which allows remote attackers to obtain sensitive information without detection.
Exploitability
AV:NAC:LAu:NImpact
C:NI:PA:N5/AV:N/AC:L/Au:N/C:N/I:P/A:N