This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:Path Vulnerability"
From OWASP
(Reverting to last version not containing links to s1.shard.jp) |
(Reverting to last version not containing links to www.texterorrolsitc.com) |
||
Line 1: | Line 1: | ||
− | |||
This category is for tagging path issues that allow attackers to access files that are not intended to be accessed. Generally, this is due to dynamically construction of a file path using unvalidated user input. | This category is for tagging path issues that allow attackers to access files that are not intended to be accessed. Generally, this is due to dynamically construction of a file path using unvalidated user input. | ||
Latest revision as of 18:29, 27 May 2009
This category is for tagging path issues that allow attackers to access files that are not intended to be accessed. Generally, this is due to dynamically construction of a file path using unvalidated user input.
Attacks that can exploit this vulnerability
This category currently contains no pages or media.