OVHcloud
tcp/443
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c8329733f8329733f75ba2d2a9b2f1f500559e4b7d665e0e3
Found 10 files trough .DS_Store spidering: /build /bundles /index.php /res /res/bg.png /res/bryan-logo.png /res/bryan.png /res/duo.png /res/julie.png /res/separator.png
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07b2b922e6b2b922e6b2b922e6b2b922e6b2b922e6
Symfony profiler enabled: http://www.brylie.fr/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e074a4051854a4051854a4051854a4051854a405185
Symfony profiler enabled: https://www.brylie.fr/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c8329733f8329733f75ba2d2a9b2f1f500559e4b7d665e0e3
Found 10 files trough .DS_Store spidering: /build /bundles /index.php /res /res/bg.png /res/bryan-logo.png /res/bryan.png /res/duo.png /res/julie.png /res/separator.png
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e0714efda2f14efda2f14efda2f14efda2f14efda2f
Symfony profiler enabled: http://brylie.fr/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e077f85c18c7f85c18c7f85c18c7f85c18c7f85c18c
Symfony profiler enabled: https://brylie.fr/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c8329733f8329733f75ba2d2a9b2f1f500559e4b7d665e0e3
Found 10 files trough .DS_Store spidering: /build /bundles /index.php /res /res/bg.png /res/bryan-logo.png /res/bryan.png /res/duo.png /res/julie.png /res/separator.png
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c8329733f8329733f75ba2d2a9b2f1f500559e4b7d665e0e3
Found 10 files trough .DS_Store spidering: /build /bundles /index.php /res /res/bg.png /res/bryan-logo.png /res/bryan.png /res/duo.png /res/julie.png /res/separator.png
Open service 2001:41d0:301::30:443 · www.brylie.fr
2026-01-23 08:03
HTTP/1.1 200 OK Date: Fri, 23 Jan 2026 08:03:10 GMT Content-Type: text/html; charset=UTF-8 Transfer-Encoding: chunked Connection: close Server: OVHcloud X-Powered-By: PHP/8.2 Cache-Control: no-cache, private X-Debug-Token: ebbd64 X-Debug-Token-Link: https://www.brylie.fr/_profiler/ebbd64 X-Robots-Tag: noindex Vary: Accept-Encoding
Open service 145.239.37.162:443 · www.brylie.fr
2026-01-09 02:42
HTTP/1.1 200 OK Date: Fri, 09 Jan 2026 02:42:43 GMT Content-Type: text/html; charset=UTF-8 Transfer-Encoding: chunked Connection: close Server: OVHcloud X-Powered-By: PHP/8.2 Cache-Control: no-cache, private X-Debug-Token: 9d20bd X-Debug-Token-Link: https://www.brylie.fr/_profiler/9d20bd X-Robots-Tag: noindex Vary: Accept-Encoding