Description
The web server is vulnerable to double dot "../" directory traversal exploitation if extended UNICODE character representations are used in substitution for "/" and "\".
Remediation
Install the latest patches from Microsoft.
References
Related Vulnerabilities
WordPress Plugin A Page Flip Book 'pageflipbook_language' Parameter Local File Include (2.3)
WordPress Plugin Gallery-Flagallery Photo Portfolio Multiple Vulnerabilities (2.00)
Spring Boot Misconfiguration: Datasource credentials stored in the properties file
WordPress Plugin AWSM Team-Team Showcase Local File Inclusion (1.3.1)