Apache 2.4.62
tcp/443
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07ac513148ac513148ac513148ac513148ac513148
Symfony profiler enabled: https://qmsro.quasar.us/_profiler/empty/search/results
Open service 20.50.2.65:80 · qmsro.quasar.us
2026-01-10 16:17
HTTP/1.1 301 Moved Permanently Content-Length: 0 Connection: close Date: Sat, 10 Jan 2026 16:18:05 GMT Location: https://qmsro.quasar.us/
Open service 20.50.2.65:443 · qmsro.quasar.us
2026-01-10 16:17
HTTP/1.1 302 Found
Connection: close
Content-Type: text/html; charset=utf-8
Date: Sat, 10 Jan 2026 16:18:06 GMT
Server: Apache/2.4.62 (Debian)
Cache-Control: max-age=0, must-revalidate, private
Expires: Sat, 10 Jan 2026 16:18:06 GMT
Location: https://qmsro.quasar.us/login
Set-Cookie: PHPSESSID=a4380b8d1241d29f6e86733ed4f13687; path=/; secure; httponly; samesite=lax
Transfer-Encoding: chunked
X-Powered-By: PHP/8.3.23
Page title: Redirecting to https://qmsro.quasar.us/login
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8" />
<meta http-equiv="refresh" content="0;url='https://qmsro.quasar.us/login'" />
<title>Redirecting to https://qmsro.quasar.us/login</title>
</head>
<body>
Redirecting to <a href="https://qmsro.quasar.us/login">https://qmsro.quasar.us/login</a>.
</body>
</html>