• A directory traversal (or path traversal) attack exploits insufficient security validation or sanitization of user-supplied file names, such that characters...
    11 KB (1,162 words) - 11:55, 12 May 2025
  • Thumbnail for Web server directory index
    as a directory indexing attack. Such a security misconfiguration may also assist in other attacks, such as a path or directory traversal attack. When...
    8 KB (799 words) - 09:33, 6 February 2025
  • include vulnerability is distinct from a generic directory traversal attack, in that directory traversal is a way of gaining unauthorized file system access...
    9 KB (1,036 words) - 20:05, 22 January 2025
  • directory traversal attacks that incorporate their payload into the HTTP GET parameter file. As a security filter against directory traversal attacks...
    14 KB (1,869 words) - 03:24, 11 June 2025
  • can provide an exploit for unintended access to all records. A directory traversal attack is considered a special case of an IDOR. The vulnerability is...
    4 KB (425 words) - 16:46, 18 May 2025
  • conf file. CVE-2007-1744 Directory traversal vulnerability in shared folders feature for VMware CVE-2008-0923 Directory traversal vulnerability in shared...
    11 KB (1,141 words) - 19:43, 5 March 2025
  • unsigned int sum = x + y; return sum >= x && sum >= y && sum <= MAX; } Path traversal is a vulnerability whereby paths provided from an untrusted source are...
    8 KB (988 words) - 17:30, 1 September 2024
  • Thumbnail for Kaseya
    reviews and that the jobs would not disappear. In 2015, Kaseya fixed a directory traversal vulnerability in their remote access tool. The same bug was present...
    11 KB (731 words) - 13:22, 23 March 2025
  • Exploitation of various Internet Information Services (IIS) 4.0 / 5.0 directory traversal vulnerabilities. (Both Code Red and Nimda were hugely successful...
    5 KB (327 words) - 15:23, 20 February 2025
  • the server side (e.g., cross-site scripting) Username enumeration Directory traversal Sensitive API keys Source code auditing tools generally look for...
    6 KB (697 words) - 07:01, 12 June 2024
  • Thumbnail for Common Weakness Enumeration
    over 600 categories, including classes for buffer overflows, path/directory tree traversal errors, race conditions, cross-site scripting, hard-coded passwords...
    6 KB (487 words) - 08:03, 1 June 2025
  • Thumbnail for MikroTik
    unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary files due to a directory traversal vulnerability...
    13 KB (1,200 words) - 15:20, 14 February 2025
  • Thumbnail for Recursion (computer science)
    behind tree traversal are applicable to traversing a filesystem. More specifically, the code below would be an example of a preorder traversal of a filesystem...
    62 KB (7,388 words) - 14:45, 29 March 2025
  • Session Traversal Utilities for NAT (STUN)". IETF. RFC 5389. Retrieved 2014-05-27. Mahy, R.; Matthews, P.; Rosenberg, J. (2010). "RFC 5766 – Traversal Using...
    320 KB (13,096 words) - 04:31, 16 June 2025
  • surrounding culture have spawned a wide range of technical and slang terms. Directory:  0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z See also 1CC...
    278 KB (32,381 words) - 17:08, 13 June 2025
  • output any file on the system.[citation needed] Directory traversal vulnerabilities can be used by attackers without accounts if CGI script vulnerabilities...
    8 KB (928 words) - 11:38, 27 April 2025
  • Brute-force attack FTP bounce attack Packet capture Port stealing (guessing the next open port and usurping a legitimate connection) Spoofing attack Username...
    34 KB (4,034 words) - 04:12, 4 June 2025
  • Algorithmic complexity attacks force the victim to spend its entire scheduling quantum inside a single system call traversing the kernel's hash table...
    13 KB (1,340 words) - 22:46, 3 May 2025
  • Thumbnail for Dassault-Breguet Super Étendard
    Dassault-Breguet Super Étendard (category 1970s French attack aircraft)
    shipping traversing the Persian Gulf. The Super Étendards began maritime operations over Persian Gulf in March 1984; a total of 34 attacks were carried...
    40 KB (4,425 words) - 16:57, 31 March 2025
  • to the Minister of Foreign Affairs at Stockholm." Honolulu Almanac and Directory, 1884: 41–55. OCLC 663247370. Hale, Frederick (1986). Their Own Saga:...
    48 KB (5,798 words) - 06:16, 17 June 2025
  • Thumbnail for Sukhoi Su-24
    first of the USSR's aircraft to carry an integrated digital navigation/attack system. The Su-24 started development in the early 1960s and first flew...
    94 KB (9,262 words) - 21:48, 14 June 2025
  • Retrieved 5 October 2019. "Microsoft IIS and PWS Extended Unicode Directory Traversal Vulnerability". Security Focus. Archived from the original on 10...
    6 KB (352 words) - 16:59, 29 December 2024
  •  174–177. ISBN 978-0-345-50108-0. "Superman II". Who's Who: The Definitive Directory of the DC Universe. 1 (22): 29. Dec 1986. Mark Waid (w), Alex Ross (a)...
    24 KB (1,341 words) - 02:41, 14 June 2025
  • the content of the query, but also a significant measure of firewall-traversal capability. In 2019, DNSCrypt was further extended to support an "anonymized"...
    69 KB (9,812 words) - 13:55, 15 June 2025
  • Thumbnail for Om Puri
    the original on 23 March 2017. Retrieved 22 August 2019. "Padma Awards Directory (1954–2014)" (PDF). Ministry of Home Affairs (India). 21 May 2014. p. 98...
    62 KB (3,282 words) - 15:41, 10 June 2025
  • Thumbnail for Brother and Sister
    brother not to drink from the spring, lest he transform into a tiger and attack her. So they continue on their way, but when they come to the second spring...
    27 KB (3,337 words) - 10:51, 13 June 2025
  • Thumbnail for Minneapolis–Saint Paul International Airport
    Minneapolis-Saint Paul International Airport. Official website "Minnesota Airport Directory: Minneapolis–St. Paul International Airport (Wold–Chamberlain Field)"...
    63 KB (3,104 words) - 00:02, 17 June 2025
  • Thumbnail for Westland Lynx
    Westland Lynx (category 1970s British attack aircraft)
    Archived from the original on 9 November 2014. Retrieved 4 December 2014. "Directory: World Air Forces". flightglobal.com. Archived from the original on 26...
    101 KB (10,689 words) - 21:51, 18 April 2025
  • integrated into firewall systems through the use of directory services such as Active Directory, LDAP, RADIUS or TACACS+. These services link the user's...
    29 KB (3,129 words) - 07:37, 14 June 2025
  • Thumbnail for Willi Unsoeld
    climb was the first ascent from the peak's west ridge, and the first major traverse of a Himalayan peak. His subsequent activities included working as a U...
    11 KB (1,264 words) - 05:16, 30 May 2025