It is declared as proof-of-concept. Scan only one Url. Cipher Protocols Sigalg Trusted. Get free usage. If an attacker takes advantage of this vulnerability, they can access files or directories outside of the application's root directory, effectively gaining control over the application.
nest...