The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07313c48fd313c48fd313c48fd313c48fd313c48fd
Symfony profiler enabled: https://www.gf.crous-uad.com/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c026392ab026392aba32e16b01598cb6e0257d10aa627faba
Found 7 files trough .DS_Store spidering: /angular /archives /assets /bas-de-page.png /index.php /logo /nifty
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e079ce12fa09ce12fa09ce12fa09ce12fa09ce12fa0
Symfony profiler enabled: http://www.gf.crous-uad.com/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c026392ab026392aba32e16b01598cb6e0257d10aa627faba
Found 7 files trough .DS_Store spidering: /angular /archives /assets /bas-de-page.png /index.php /logo /nifty