If exploited an attacker could traverse the file system to access files or directories that would otherwise be inaccessible
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation2 reference(s) from NVD