Knowledge Base - Issues

Our knowledge-base provides a comprehensive collection of information on vulnerabilities related to cyber security.

/ Admin Interface Identified

Admin interface identified is a vulnerability related to information gathering. It is categorized under CWE-200 and is classified as an ‘Incomplete Information’ type vulnerability. This vulnerability arises when an attacker is able to identify and access the administrative interface of a web application or API without the user’s authorization. This...

/ APK Files List

APK files list is an Information Gathering vulnerability (CWE-200) that occurs in Mobile App and Android. It is a vulnerability that allows an attacker to view the list of installed applications on a user's device. This can be used in a variety of ways to gain further access to the...

/ Default Apache Web Page

Default Apache Web Page vulnerability is an attack technique that occurs in web and API applications and is categorized as Information Gathering. This vulnerability is identified as CWE-598 and is defined as an attack that occurs when the attacker can access the default Apache web page on a target web...

/ Email Addresses Disclosed

Email addresses disclosed is a Information Gathering vulnerability that occurs in Web and API. It is classified as CWE-200 and is described as “Information Exposure Through Sent Data” in the Common Weakness Enumeration (CWE) directory. According to the Open Web Application Security Project (OWASP) Testing Guide, it means that sensitive...

/ Exposed Network Ports

Exposed network ports are one of the most common vulnerabilities in IT infrastructure. It occurs when ports on a network are left open and exposed to the public internet, allowing malicious actors to access the network without authentication. This vulnerability is described in CWE-264, Improper Control of Access to Network...

/ Robots.txt File

Robots.txt is a text file used by web servers to indicate which parts of a website can or cannot be accessed by a web crawler. It is also used to define a list of webpages that should not be indexed or crawled by search engine bots. This vulnerability occurs when...
Robots.txt file points to admin interface is a vulnerability that occurs when a web application contains a robots.txt file that points to a directory or file that is not intended for public access. This vulnerability is classified as CWE-922 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))...
Showing entries 1 to 7 of 7 entries.