Family: CGI abuses --> Category: attack
QWikiwiki directory traversal vulnerability Vulnerability Scan
Vulnerability Scan Summary
Searches for the existence of a File Inclusion Vulnerability
Detailed Explanation for this Vulnerability Test
The remote host is running QWikiwiki, a Wiki application written in PHP.
The remote version of this software contains a validation input flaw
which may allow a possible hacker to use it to read arbitrary files on the
remote host with the rights of the web server.
Solution : Upgrade to the newest version of this software.
Risk factor: High
Click HERE for more information and discussions on this network vulnerability scan.