Skip to search formSkip to main contentSkip to account menu

Directory traversal attack

Known as: Directory traversal, Path traversal, Path traversal vulnerability 
A directory traversal (or path traversal) consists in exploiting insufficient security validation / sanitization of user-supplied input file names… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
With web applications becoming a preferred method of presenting graphical user interfaces to users, software vulnerabilities… 
2014
2014
Java applications have proliferated rapidly in recent years, and the security issue in the source code seems to bring a great… 
2014
2014
Chromecast is a small, system-on-chip device, that plugs into the HDMI port of a larger screen and turns it into a smart screen… 
2004
2004
A fundamental area of software engineering that remains a challenge for software developers is the delivery of software with the… 
1990
1990
The authors present an algorithm which minimizes the time for two robots holding the same workpiece to move along a given path… 
Highly Cited
1989
Highly Cited
1989
SUMMARY The Autonomous Robot Architecture (AuRA) provides multi-level representation and planning capabilities. This paper…