Look at the file that are vulnerable and the file are not vulnerable.. Look at the directory path that the file are vulnerable.. That will answer your question...