ZM System Log Detected

A system log file was detected.

  • logs
  • zm
  • exposure

System logs contain sensitive information like application version, operating system and host name, etc.


An attacker may be able to learn important information that can be used to further exploit the vulnerable application or other systems.


It is strongly recommended to review and delete system logs files that are not required.

Was this page helpful?