Difference between revisions of "Category:Path Vulnerability"
(Reverting to last version not containing links to www.texterorrolsitc.com)
|(3 intermediate revisions by 2 users not shown)|
Latest revision as of 12:29, 27 May 2009
This category is for tagging path issues that allow attackers to access files that are not intended to be accessed. Generally, this is due to dynamically construction of a file path using unvalidated user input.
Attacks that can exploit this vulnerability
- Path Traversal Attack
- Path Equivalence Attack
- Link Following Attack
- Virtual Files Attack
This category currently contains no pages or media.