Key Information File Location located in the directory Function Purpose : Retrieves the request protocol, prioritizing the header : Retrieves the request hostname, prioritizing the header : Retrieves the request URI, prioritizing the header Potential Vulnerabilities Attackers may exploit control over headers to forge requests, potentially leading to redirection or path traversal attacks.