.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c39aac35b39aac35b33e8323ba33578819d140592df59c7bb
Found 14 files trough .DS_Store spidering: /css /css/template-colors /fonts /images /images/badges /images/blog /images/clients /images/extra /images/favicons /images/works /index.html /js /less /mailer
Severity: low
Fingerprint: 5f32cf5d6962f09c026392ab026392ab8b46cfcb2e13b9d8d954bd69c7ddc476
Found 7 files trough .DS_Store spidering: /css /fonts /images /index.html /js /less /mailer
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c39aac35b39aac35b33e8323ba33578819d140592df59c7bb
Found 14 files trough .DS_Store spidering: /css /css/template-colors /fonts /images /images/badges /images/blog /images/clients /images/extra /images/favicons /images/works /index.html /js /less /mailer
Severity: low
Fingerprint: 5f32cf5d6962f09c026392ab026392ab8b46cfcb2e13b9d8d954bd69c7ddc476
Found 7 files trough .DS_Store spidering: /css /fonts /images /index.html /js /less /mailer
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522264b6428
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/mrmarrocos/mrmarrocos_website fetch = +refs/heads/*:refs/remotes/origin/* [gc] auto = 0 [http "https://github.com/"] extraheader = AUTHORIZATION: basic eC1hY2Nlc3MtdG9rZW46djEuMzZjNWU1ZmIyMDE2MDZlZjkyZDY4NzFmMTJkNTViNWRhOGMwNjZlYQ== [branch "master"] remote = origin merge = refs/heads/master
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522264b6428
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/mrmarrocos/mrmarrocos_website fetch = +refs/heads/*:refs/remotes/origin/* [gc] auto = 0 [http "https://github.com/"] extraheader = AUTHORIZATION: basic eC1hY2Nlc3MtdG9rZW46djEuMzZjNWU1ZmIyMDE2MDZlZjkyZDY4NzFmMTJkNTViNWRhOGMwNjZlYQ== [branch "master"] remote = origin merge = refs/heads/master