. . "Once WSDL is accessible, attacker can get information about web methods, data types of input and output parameters, end point information and others." . . .