WSDL File Detection
- Type:
- Passive
- Summary
A WSDL File has been detected.
- Solution
Make your WSDL files visible only for technical issues (ex: testing purposes).
- Other info
- A WSDL File has been detected.
Oracle silently fixes zero-day exploit leaked by ShinyHunters
CISA: High-severity Windows SMB flaw now exploited in attacks
Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT
New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
CISA confirms hackers exploited Oracle E-Business Suite SSRF flaw
New FileFix attack uses cache smuggling to evade security software
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
Over 75,000 WatchGuard security devices vulnerable to critical RCE
Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
CVE-2025-61884 Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability
CVE-2025-33073 Microsoft Windows SMB Client Improper Access Control Vulnerability
CVE-2022-48503 Apple Multiple Products Unspecified Vulnerability
CVE-2025-54253 Adobe Experience Manager Forms Code Execution Vulnerability
CVE-2016-7836 SKYSEA Client View Improper Authentication Vulnerability
CVE-2025-6264 Rapid7 Velociraptor Incorrect Default Permissions Vulnerability
CVE-2025-59230 Microsoft Windows Improper Access Control Vulnerability
CVE-2025-24990 Microsoft Windows Untrusted Pointer Dereference Vulnerability
CWE-1268 Policy Privileges are not Assigned Consistently Between Control and Data Agents
CWE-733 Compiler Optimization Removal or Modification of Security-critical Code
CWE-637 Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')
HighCWE-649 Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
Free online web security scanner