The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e0778c5f23778c5f23778c5f23778c5f23778c5f237
Symfony profiler enabled: http://tenkelly.art/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07994ed640994ed640994ed640994ed640994ed640
Symfony profiler enabled: http://www.tenkelly.art/_profiler/empty/search/results
WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb53afddcfef79eb0d7f79eb0d7f79eb0d7f79eb0d7
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.3p1 Ubuntu-1ubuntu3.2 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e072357ccd62357ccd62357ccd62357ccd62357ccd6
Symfony profiler enabled: https://tenkelly.art/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07d6982e5dd6982e5dd6982e5dd6982e5dd6982e5d
Symfony profiler enabled: https://www.tenkelly.art/_profiler/empty/search/results
Open service 109.164.102.39:8443 ยท tenkelly.art
2024-12-22 05:01