Family: CGI abuses --> Category: attack
JWalk server traversal Vulnerability Scan
Vulnerability Scan Summary
Reads a file outside the web root
Detailed Explanation for this Vulnerability Test
It is possible to read arbitrary files on
the remote server by prepending .%252e/.%252e
in front on the file name.
Solution : Upgrade to JWalk 3.3c4
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.