The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07be600f46be600f46be600f46be600f46be600f46
Symfony profiler enabled: https://new-admin.etaplius.lt/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e0759431fb959431fb959431fb959431fb959431fb9
Symfony profiler enabled: http://new-admin.etaplius.lt/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c63442d9d63442d9dfaa18764faa18764faa18764faa18764
Found 1 files trough .DS_Store spidering: /media