source: https://www.securityfocus.com/bid/43358/info Pinky is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue will allow an attacker to read files outside the webroot directory. Information harvested may aid in launching further attacks. Pinky 1.0 is vulnerable; other versions may also be affected. http://www.example.com/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../windows/win.ini