Description
Invicti determined that it was possible to access a monitoring system without authentication.
Remediation
Restrict access to the monitoring system
References
Related Vulnerabilities
RoR Database Configuration File Detected
WordPress Plugin Contact Form Email Information Disclosure (1.2.66)
WordPress Plugin WP-Live Chat by 3CX Information Disclosure (8.0.28)
WordPress Plugin BackupBuddy Information Disclosure (2.2.28)
WordPress Plugin User Meta Manager Information Disclosure (3.4.7)