.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c2eda814e2eda814ebe1cdd568d481a78a56c3c8c35b97a91
Found 6 files trough .DS_Store spidering: /css /en /en/news /img /ja /ko
Severity: low
Fingerprint: 5f32cf5d6962f09c0f8dcf020f8dcf0223d984c22f911ae497dd87b011967f12
Found 24 files trough .DS_Store spidering: /css /en /en/news /img /img/game-1.jpg /img/game-2.jpg /img/game-3.jpg /img/game-4.jpg /img/game-5.jpg /img/game-6.jpg /img/google_ja.png /img/google_ko.png /img/google_us.png /img/ico_01.png /img/ios_ja.png /img/ios_ko.png /img/ios_us.png /img/logo_thumbnail.jpg /img/PiG_logo_1x.png /img/PiG_logo_2x.png /img/thumb.png /img/top_mess.png /ja /ko
Severity: low
Fingerprint: 5f32cf5d6962f09ca0cc0fcfa0cc0fcf7c01fcc76079ad0f35da72fb6e24df53
Found 25 files trough .DS_Store spidering: /css /en /en/news /img /img/game-1.jpg /img/game-2.jpg /img/game-3.jpg /img/game-4.jpg /img/game-5.jpg /img/game-6.jpg /img/google_ja.png /img/google_ko.png /img/google_us.png /img/ico_01.png /img/ios_ja.png /img/ios_ko.png /img/ios_us.png /img/logo_thumbnail.jpg /img/PiG_logo_1x.png /img/PiG_logo_2x.png /img/thumb.png /img/top_mess.png /ja /ja/news /ko
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c2eda814e2eda814ebe1cdd568d481a78a56c3c8c35b97a91
Found 6 files trough .DS_Store spidering: /css /en /en/news /img /ja /ko
Severity: low
Fingerprint: 5f32cf5d6962f09ca0cc0fcfa0cc0fcf7c01fcc76079ad0f35da72fb6e24df53
Found 25 files trough .DS_Store spidering: /css /en /en/news /img /img/game-1.jpg /img/game-2.jpg /img/game-3.jpg /img/game-4.jpg /img/game-5.jpg /img/game-6.jpg /img/google_ja.png /img/google_ko.png /img/google_us.png /img/ico_01.png /img/ios_ja.png /img/ios_ko.png /img/ios_us.png /img/logo_thumbnail.jpg /img/PiG_logo_1x.png /img/PiG_logo_2x.png /img/thumb.png /img/top_mess.png /ja /ja/news /ko
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Additionally the GIT credentials are present and could give unauthorized access to source code repository of private projects.
Severity: critical
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522927fd37e
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://dist_techpm:xpzmxpzm!@git.line.games/techpm/pig-homepage.git fetch = +refs/heads/*:refs/remotes/origin/*
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Additionally the GIT credentials are present and could give unauthorized access to source code repository of private projects.
Severity: critical
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522927fd37e
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://dist_techpm:xpzmxpzm!@git.line.games/techpm/pig-homepage.git fetch = +refs/heads/*:refs/remotes/origin/*