Description
One or more fully qualified path names were been found. From this information the attacker may learn the file system structure from the web server. This information can be used to conduct further attacks.
Remediation
Prevent this information from being displayed to the user.
References
Related Vulnerabilities
Struts 2 Config Browser plugin enabled
WordPress Plugin Health Check & Troubleshooting Arbitrary File Disclosure (1.2.3)
WordPress 4.6.x Multiple Vulnerabilities (4.6 - 4.6.26)
WordPress Plugin Import all XML, CSV & TXT into WordPress Arbitrary File Disclosure (3.7)
WordPress Plugin W3 Total Cache Arbitrary File Disclosure (0.9.3)