source: https://www.securityfocus.com/bid/43358/info
Pinky is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue will allow an attacker to read files outside the webroot directory. Information harvested may aid in launching further attacks.
Pinky 1.0 is vulnerable; other versions may also be affected.
http://www.example.com/%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../%5C../windows/win.ini