More Sources
Tools & Data
If exploited an attacker could traverse the file system to access files or directories that would otherwise be inaccessible