The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e0760df671760df671760df671760df671760df6717
Symfony profiler enabled: https://eq.syjon.band/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c63442d9d63442d9d8bc298658bc298658bc298658bc29865
Found 1 files trough .DS_Store spidering: /css
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07aa5c26c4aa5c26c4aa5c26c4aa5c26c4aa5c26c4
Symfony profiler enabled: http://eq.syjon.band/_profiler/empty/search/results