If exploited an attacker could traverse the file system to access files or directories that would otherwise be inaccessibleReferenceshttps://publisher.hitachienergy.com/preview?DocumentId=8DBD000202&languageCode=en&Preview=true