.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09cccdd54a0ccdd54a034b65d8c1fcc9057fd36a75258fc0d8f
Found 13 files trough .DS_Store spidering: /android /android/apps /build /bundles /domainAddSoon /fonts /icons /ios /ios/apps /media /panel /site /uploads
Severity: low
Fingerprint: 5f32cf5d6962f09c11d3744d11d3744daa01d445e11975005c6df14960fab99f
Found 12 files trough .DS_Store spidering: /android /android/apps /build /bundles /domainAddSoon /fonts /icons /ios /media /panel /site /uploads
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09cccdd54a0ccdd54a034b65d8c1fcc9057fd36a75258fc0d8f
Found 13 files trough .DS_Store spidering: /android /android/apps /build /bundles /domainAddSoon /fonts /icons /ios /ios/apps /media /panel /site /uploads
Severity: low
Fingerprint: 5f32cf5d6962f09c11d3744d11d3744daa01d445e11975005c6df14960fab99f
Found 12 files trough .DS_Store spidering: /android /android/apps /build /bundles /domainAddSoon /fonts /icons /ios /media /panel /site /uploads
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07fb3efdd4fb3efdd4fb3efdd4fb3efdd4fb3efdd4
Symfony profiler enabled: https://neginyar.com:8443/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e0776d9b57376d9b57376d9b57376d9b57376d9b573
Symfony profiler enabled: https://neginyar.com/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c11d3744d11d3744daa01d445e11975005c6df14960fab99f
Found 12 files trough .DS_Store spidering: /android /android/apps /build /bundles /domainAddSoon /fonts /icons /ios /media /panel /site /uploads
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e0711446aea11446aea11446aea11446aea11446aea
Symfony profiler enabled: http://neginyar.com/_profiler/empty/search/results