.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c4239b3d84239b3d8549ce439225f545f2ceb558178593ec9
Found 8 files trough .DS_Store spidering: /asset /asset/fonts /asset/fonts/Basier-Circle-Webfont /build /img /uploads /uploads/profilePic_directory /uploads/resumePDF_directory
Severity: low
Fingerprint: 5f32cf5d6962f09c0215adfc0215adfcfc73d085e80d76d2b518abcd7b6ec26e
Found 4 files trough .DS_Store spidering: /build /uploads /uploads/profilePic_directory /uploads/resumePDF_directory
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c4239b3d84239b3d8549ce439225f545f2ceb558178593ec9
Found 8 files trough .DS_Store spidering: /asset /asset/fonts /asset/fonts/Basier-Circle-Webfont /build /img /uploads /uploads/profilePic_directory /uploads/resumePDF_directory
Severity: low
Fingerprint: 5f32cf5d6962f09c0215adfc0215adfcfc73d085e80d76d2b518abcd7b6ec26e
Found 4 files trough .DS_Store spidering: /build /uploads /uploads/profilePic_directory /uploads/resumePDF_directory
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e075ad55b645ad55b645ad55b645ad55b645ad55b64
Symfony profiler enabled: http://www.experience-gem.com/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e070a626f850a626f850a626f850a626f850a626f85
Symfony profiler enabled: https://www.experience-gem.com/_profiler/empty/search/results