The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07f78e183df78e183df78e183df78e183df78e183d
Symfony profiler enabled: https://ainjohra.farahtech.ma/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c0215adfc0215adfca469d9f424cc7272e6b2deed32a52bc4
Found 4 files trough .DS_Store spidering: /files /files/3 /files/3/06 /files/3/06/2023
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07d891ec1ad891ec1ad891ec1ad891ec1ad891ec1a
Symfony profiler enabled: http://ainjohra.farahtech.ma/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c0215adfc0215adfca469d9f424cc7272e6b2deed32a52bc4
Found 4 files trough .DS_Store spidering: /files /files/3 /files/3/06 /files/3/06/2023