Course
Directory Traversal vulnerabilities occur due to insufficient filtering or encoding of user inputs that are used to construct file paths. This type of vulnerability allows attackers to access files and directories that are outside the intended directory.
Skills covered
Injection
Operating System
CWE-23
Included with PRO
Full course content
2 videos
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.