.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c2eda814e2eda814e2cd21beaed1c563ea31f0d9e413640df
Found 6 files trough .DS_Store spidering: /assets /assets/css /assets/img /assets/js /assets/vendor /assets/vendor/bootstrap
Severity: low
Fingerprint: 5f32cf5d6962f09c3c1fc5e93c1fc5e975a091b75eb34fe95c6795ffc70b7974
Found 5 files trough .DS_Store spidering: /assets /assets/css /assets/img /assets/js /assets/vendor
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c2eda814e2eda814e2cd21beaed1c563ea31f0d9e413640df
Found 6 files trough .DS_Store spidering: /assets /assets/css /assets/img /assets/js /assets/vendor /assets/vendor/bootstrap
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e074706dc524706dc524706dc524706dc524706dc52
Symfony profiler enabled: https://www.dev.aqdafa.net/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e074f5a3b434f5a3b434f5a3b434f5a3b434f5a3b43
Symfony profiler enabled: http://www.dev.aqdafa.net/_profiler/empty/search/results