5 lines
No EOL
356 B
Text
5 lines
No EOL
356 B
Text
source: http://www.securityfocus.com/bid/1067/info
|
|
|
|
Some versions of vqSoft vqServer for Windows are vulnerable to the common ../../ method of retrieving known files from outside of the web directory structure, accomplished by appending a variable number of "../" and a known filename to an HTTP GET request.
|
|
|
|
http://target/../../../../../autoexec.bat |