More Sources
Tools & Data
If exploited an attacker could traverse the file system to access files or directories that would otherwise be inaccessible
Allow attackers to intercept or falsify data exchanges between the client and the server