You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Many vulnerbilities involving files and file operations rely on a program assuming that a file resides in a certain directory and then manipulating those directories in a way that makes that program access a different file than the intended.

  • No labels