Description
The ASP.NET application trace is enabled. This file contains sensitive information such as Session ID values and physical path to the requested file.
Remediation
Remove this file from your website or change its permissions to remove access.
References
Related Vulnerabilities
Spring Boot Misconfiguration: All Spring Boot Actuator endpoints are web exposed
Apache Axis2 administration console weak password
HTTP Strict Transport Security (HSTS) Errors and Warnings
WordPress Plugin Recent Backups Arbitrary File Download (0.7)
WordPress Plugin Crayon Syntax Highlighter Local File Disclosure (2.6.10)