Cherokee Web Server <= 0.5.4 is vulnerable to remote directory traversal attack by accessing files outside of the webroot directory.
There is directory traversal vulnerability in the checkview(??). Exploit Testing involves sending a crafted HTTP request to the vulnerable application, which can be used to access files outside the web root directory.
This module exploits a directory traversal in Persits Software Inc's XUpload ActiveX control(version 3.0.0.3) that's included in HP LoadRunner 9.5. By passing a string containing ".." sequences to the MakeHttpRequest method
This module exploits a directory traversal vulnerability in Motorola's Timbuktu Pro for Windows 8.6.5.
The vulnerability allows an attacker to download files from the disk of the server through directory traversal attacks. The exploit involves sending a specially crafted request to the server with a manipulated file path.
The FileCOPA FTP Server 6.01 is vulnerable to directory traversal, allowing an attacker to access files outside of the server's root directory.
A directory traversal vulnerability was found in Mongoose version 2.11. This vulnerability allows an attacker to access files outside of the intended directory.
WinTFTP Pro Server is vulnerable to a path traversal vulnerability, which allows an unprivileged attacker to read and write files that they do not have permissions for. The vulnerability can be exploited using the FTP commands GET and PUT.
This exploit allows an attacker to traverse directories and access files outside of the intended directory structure. The exploit is performed using the DotDotPwn tool with specific parameters.
The Home FTP Server software allows for directory traversal, which can be exploited by an attacker to access files outside of the intended directory structure.