The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07925edc63925edc63925edc63925edc63925edc63
Symfony profiler enabled: https://www.gestion.professionaldev.fr/_profiler/empty/search/results
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a65229ea21304
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/papageek06/electrika.git fetch = +refs/heads/*:refs/remotes/origin/*
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e078c9d4c4d8c9d4c4d8c9d4c4d8c9d4c4d8c9d4c4d
Symfony profiler enabled: http://gestion.professionaldev.fr/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e078fabaa448fabaa448fabaa448fabaa448fabaa44
Symfony profiler enabled: https://gestion.professionaldev.fr/_profiler/empty/search/results
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a65229ea21304
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/papageek06/electrika.git fetch = +refs/heads/*:refs/remotes/origin/*
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a65229ea21304
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/papageek06/electrika.git fetch = +refs/heads/*:refs/remotes/origin/*
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e073155df5e3155df5e3155df5e3155df5e3155df5e
Symfony profiler enabled: http://www.gestion.professionaldev.fr/_profiler/empty/search/results
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a65229ea21304
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/papageek06/electrika.git fetch = +refs/heads/*:refs/remotes/origin/*