We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
默认读取web.xml文件,漏洞利用方式是通过web.xml文件读取其中的class文件到本地