.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c026392ab026392abdc1b177d75be5a8c401b78a2d8d8a6e3
Found 7 files trough .DS_Store spidering: /assets /assets/contact-ipad.png /assets/qr /chinh-sach-bao-mat /en /font /qr
Severity: low
Fingerprint: 5f32cf5d6962f09c4239b3d84239b3d86bfb45c8bc4e64fdc4b21e83378c1676
Found 8 files trough .DS_Store spidering: /assets /assets/contact-ipad.png /assets/qr /chinh-sach-bao-mat /en /font /font/otf /qr
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c026392ab026392abdc1b177d75be5a8c401b78a2d8d8a6e3
Found 7 files trough .DS_Store spidering: /assets /assets/contact-ipad.png /assets/qr /chinh-sach-bao-mat /en /font /qr
Severity: low
Fingerprint: 5f32cf5d6962f09c4239b3d84239b3d86bfb45c8bc4e64fdc4b21e83378c1676
Found 8 files trough .DS_Store spidering: /assets /assets/contact-ipad.png /assets/qr /chinh-sach-bao-mat /en /font /font/otf /qr
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Additionally the GIT credentials are present and could give unauthorized access to source code repository of private projects.
Severity: critical
Fingerprint: 2580fa947178c883cda65107b6f0882eb5010f354c5d91ec33bd1e39783519d5
[fetch] recurseSubmodules = false [core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://gitlab-ci-token:o1vAZq75mLtyRYEm6BcR@gitlab.kyanon.digital/rx3/bipbip/fe/report-landing-page.git fetch = +refs/heads/*:refs/remotes/origin/*
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Additionally the GIT credentials are present and could give unauthorized access to source code repository of private projects.
Severity: critical
Fingerprint: 2580fa947178c883cda65107b6f0882eb5010f354c5d91ec33bd1e39d37528a8
[fetch] recurseSubmodules = false [core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://gitlab-ci-token:fwkuxL91znscYwifnGN6@gitlab.kyanon.digital/rx3/bipbip/fe/landing-page-bibip.git fetch = +refs/heads/*:refs/remotes/origin/*
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Additionally the GIT credentials are present and could give unauthorized access to source code repository of private projects.
Severity: critical
Fingerprint: 2580fa947178c883cda65107b6f0882eb5010f354c5d91ec33bd1e39d37528a8
[fetch] recurseSubmodules = false [core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://gitlab-ci-token:fwkuxL91znscYwifnGN6@gitlab.kyanon.digital/rx3/bipbip/fe/landing-page-bibip.git fetch = +refs/heads/*:refs/remotes/origin/*