CVS/Entries High Medium Low Network Vulnerabilities Web application abuses CVS/Entries SummaryYour website allows read access to the CVS/Entries file. This exposes all file names in your CVS module on your website. Change your website permissions to deny access to your CVS directory. Severity Classification CVSS Base Score: 5.0 AV:N/AC:L/Au:N/C:P/I:N/A:N Related Vulnerabilities AlienForm CGI scriptApache Tomcat Multiple Vulnerabilities June-09Adiscon LogAnalyzer 'highlight' Parameter Cross Site Scripting VulnerabilityApache Commons Daemon 'jsvc' Information Disclosure VulnerabilityApache ActiveMQ Source Code Information Disclosure Vulnerability