For example, vulnerabilities at this level may include partial disclosure of file contents, access to certain files on the host, directory browsing, disclosure of filtering rules ... vulnerability ...
Some results have been hidden because they may be inaccessible to you