The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a65223e86a5ea
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/radu-uptech/cpvlabpro fetch = +refs/heads/*:refs/remotes/origin/* [gc] auto = 0 [http "https://github.com/"] extraheader = AUTHORIZATION: basic eC1hY2Nlc3MtdG9rZW46Z2hzX0p0ZEJrZmhGVHZzbWhEYm5tSkp3VElCM0NoRnhDZTNzaU5Kdw==
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a652293ebc3d6
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/radu-uptech/cpvlabpro fetch = +refs/heads/*:refs/remotes/origin/* [gc] auto = 0 [http "https://github.com/"] extraheader = AUTHORIZATION: basic eC1hY2Nlc3MtdG9rZW46Z2hzXzBkZEN1b1ZSRFZ1N3JlRWhIYUhmNTBxTW1UZXhnTjF0VVZUcQ==
WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb52209347e26e8a05726e8a05726e8a05726e8a057
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.7 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY