You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Vulnerbilities involving files and file operations often rely on a program assuming that a file resides in a certain directory.

  • No labels