Description
The web server is vulnerable to double dot "../" directory traversal exploitation if extended UNICODE character representations are used in substitution for "/" and "\".
Remediation
Install the latest patches from Microsoft.
References
Related Vulnerabilities
WordPress Plugin Slider Revolution Responsive Local File Inclusion (4.1.4)
WordPress Plugin Extensive VC Addons for WPBakery page builder Local File Inclusion (1.9)
WordPress Plugin Mailster-Email Newsletter for WordPress Local File Inclusion (4.0.6)
Python object deserialization of user-supplied data
WordPress Plugin Adaptive Images for WordPress Multiple Vulnerabilities (0.6.66)