OVHcloud
tcp/443
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07c9284ba2c9284ba2c9284ba2c9284ba2c9284ba2
Symfony profiler enabled: https://preprod.api.jabu-app.com/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c87f05b7087f05b7078e208f8425d6f9bd7b60fe9566a355d
Found 26 files trough .DS_Store spidering: /.env /.env.local /.env.test /.git /.gitignore /.php-cs-fixer.dist.php /bin /composer.json /composer.lock /config /docker /docker-compose.yml /Dockerfile /docs /Makefile /migrations /phpunit.xml.dist /public /README.md /src /symfony.lock /templates /tests /translations /var /vendor
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c87f05b7087f05b7078e208f8425d6f9bd7b60fe9566a355d
Found 26 files trough .DS_Store spidering: /.env /.env.local /.env.test /.git /.gitignore /.php-cs-fixer.dist.php /bin /composer.json /composer.lock /config /docker /docker-compose.yml /Dockerfile /docs /Makefile /migrations /phpunit.xml.dist /public /README.md /src /symfony.lock /templates /tests /translations /var /vendor
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07e60cbcc3e60cbcc3e60cbcc3e60cbcc3e60cbcc3
Symfony profiler enabled: http://preprod.api.jabu-app.com/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e077e0cc2b17e0cc2b17e0cc2b17e0cc2b17e0cc2b1
Symfony profiler enabled: https://www.preprod.api.jabu-app.com/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e078d088acb8d088acb8d088acb8d088acb8d088acb
Symfony profiler enabled: https://www.api.jabu-app.com/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c87f05b7087f05b7078e208f8425d6f9bd7b60fe9566a355d
Found 26 files trough .DS_Store spidering: /.env /.env.local /.env.test /.git /.gitignore /.php-cs-fixer.dist.php /bin /composer.json /composer.lock /config /docker /docker-compose.yml /Dockerfile /docs /Makefile /migrations /phpunit.xml.dist /public /README.md /src /symfony.lock /templates /tests /translations /var /vendor
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e0763a2b40563a2b40563a2b40563a2b40563a2b405
Symfony profiler enabled: http://api.jabu-app.com/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07e3dd32e9e3dd32e9e3dd32e9e3dd32e9e3dd32e9
Symfony profiler enabled: https://staging.api.jabu-app.com/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c87f05b7087f05b7078e208f8425d6f9bd7b60fe9566a355d
Found 26 files trough .DS_Store spidering: /.env /.env.local /.env.test /.git /.gitignore /.php-cs-fixer.dist.php /bin /composer.json /composer.lock /config /docker /docker-compose.yml /Dockerfile /docs /Makefile /migrations /phpunit.xml.dist /public /README.md /src /symfony.lock /templates /tests /translations /var /vendor
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e078c92e4488c92e4488c92e4488c92e4488c92e448
Symfony profiler enabled: http://staging.api.jabu-app.com/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e077fc05caa7fc05caa7fc05caa7fc05caa7fc05caa
Symfony profiler enabled: https://www.staging.api.jabu-app.com/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07ebadbf94ebadbf94ebadbf94ebadbf94ebadbf94
Symfony profiler enabled: https://api.jabu-app.com/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07fc6185c6fc6185c6fc6185c6fc6185c6fc6185c6
Symfony profiler enabled: http://www.api.jabu-app.com/_profiler/empty/search/results
Open service 2001:41d0:301::30:443 · www.staging.api.jabu-app.com
2026-01-22 22:00
HTTP/1.1 404 Not Found Date: Thu, 22 Jan 2026 22:00:13 GMT Content-Type: text/html; charset=UTF-8 Transfer-Encoding: chunked Connection: close Server: OVHcloud X-Powered-By: PHP/8.2 Cache-Control: no-cache, private X-API-Version: 2.1.0 X-Debug-Token: 8f4179 X-Debug-Token-Link: https://www.staging.api.jabu-app.com/_profiler/8f4179 X-Robots-Tag: noindex
Open service 2001:41d0:301::30:443 · staging.api.jabu-app.com
2026-01-22 19:29
HTTP/1.1 404 Not Found Date: Thu, 22 Jan 2026 19:29:26 GMT Content-Type: text/html; charset=UTF-8 Transfer-Encoding: chunked Connection: close Server: OVHcloud X-Powered-By: PHP/8.2 Cache-Control: no-cache, private X-API-Version: 2.1.0 X-Debug-Token: e59538 X-Debug-Token-Link: https://staging.api.jabu-app.com/_profiler/e59538 X-Robots-Tag: noindex
Open service 2001:41d0:301::30:443 · preprod.api.jabu-app.com
2026-01-22 11:51
HTTP/1.1 404 Not Found Date: Thu, 22 Jan 2026 11:51:50 GMT Content-Type: text/html; charset=UTF-8 Transfer-Encoding: chunked Connection: close Server: OVHcloud X-Powered-By: PHP/8.2 Cache-Control: no-cache, private X-API-Version: 2.1.0 X-Debug-Token: f35052 X-Debug-Token-Link: https://preprod.api.jabu-app.com/_profiler/f35052 X-Robots-Tag: noindex