Knowledge is a matter of definitions. Here you will find the most important technical terms for cybersecurity.

Path Traversal

Web applications often contain functions to read and write files. If these functions are buggy and an attacker can break out of the intended file directory this is called a “path traversal attack”.
Reading capabilities may allow an attacker to read critical data such as configuration files, passwords and databases. Write access may enable the creation or manipulation of web pages. In extreme cases system files could be overwritten.

Don’t miss anything! Subscribe to our free newsletter.

Your security is our top priority – our specialists provide you with professional support.

Availability Monday to Friday 8:00 a.m. – 12:00 p.m. and 1:00 p.m. – 5:00 p.m (exception: customers with SLA – please call the 24/7 IRFA emergency number).

Private individuals please contact your trusted IT service provider or the local police station.

For more information about our DFIR services here:

Add CSIRT to contacts