Family: CGI abuses --> Category: attack
Resin traversal Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
It is possible to read arbitrary files on
the remote server by prepending /\../\../
in front on the file name.
Solution : Upgrade your version of Resin in 1.2.3
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.