Log File Scanner
Critical information can be compromised if log files are accessed by anyone.
Short Info
Level
Medium
Single Scan
Single Scan
Can be used by
Everyone
Estimated Time
7 seconds
Time Interval
1 day
Scan only one
URL
Toolbox
-
Access logs and error logs are used for both understanding systems and detecting errors.
Critical information can be compromised if these files are accessed by anyone. This information can be:
- Used System
- IP Addresses
- URL Information
- Referrings
- Application Directories and Files
- Critical links
- Session information
It would also be critical if it combines with other weaknesses.