source: http://www.securityfocus.com/bid/43358/info

Pinky is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.

Exploiting this issue will allow an attacker to read files outside the webroot directory. Information harvested may aid in launching further attacks.

Pinky 1.0 is vulnerable; other versions may also be affected.

http://www.example.com/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../windows/win.ini