Log File Scanner
Critical information can be compromised if log files are accessed by anyone.
Short Info
Level
Medium
Type
Single Scan
Can be used by
Everyone
Estimated Time
7 sec
Scan only one
Url
Parent Category
Log File Scanner Detail
Access logs and error logs are used for both understanding systems and detecting errors.
Critical information can be compromised if these files are accessed by anyone. This information can be:
- Used System
- IP Addresses
- URL Information
- Referrings
- Application Directories and Files
- Critical links
- Session information
It would also be critical if it combines with other weaknesses.
Try it yourself,
control security posture
control security posture