This category is for tagging path issues that allow attackers to access files that are not intended to be accessed. Generally, this is due to dynamically construction of a file path using unvalidated user input.
Attacks that can exploit this vulnerability
- Path Traversal Attack
- Path Equivalence Attack
- Link Following Attack
- Virtual Files Attack
This category currently contains no pages or media.