https://securitylit.medium.com/blog-topic-understanding-path-traversal-vulnerabilities-and-their-exploitation-7f3009c5f48b