
Log File Scanner
Critical information can be compromised if log files are accessed by anyone.
Short Info
Level
Medium
Single Scan
Single Scan
Can be used by
Everyone
Estimated Time
7 seconds
Time Interval
17 hours
Scan only one
URL
Toolbox
Access logs and error logs are used for both understanding systems and detecting errors.
Critical information can be compromised if these files are accessed by anyone. This information can be:
- Used System
- IP Addresses
- URL Information
- Referrings
- Application Directories and Files
- Critical links
- Session information
It would also be critical if it combines with other weaknesses.