The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0b725d2cab725d2cab725d2cab725d2cab725d2cab725d2ca
Laravel Telescope enabled at https://13.208.253.251:4118
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0d748cb0ed748cb0ed748cb0ed748cb0ed748cb0ed748cb0e
Laravel Telescope enabled at https://13.208.253.251:9621
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d052437c8052437c8052437c8052437c8052437c8052437c80
Laravel Telescope enabled at https://13.208.253.251:9072
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d02de916602de916602de916602de916602de916602de91660
Laravel Telescope enabled at https://13.208.253.251:5601
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d031f8271431f8271431f8271431f8271431f8271431f82714
Laravel Telescope enabled at https://13.208.253.251:5003
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d030f825a030f825a030f825a030f825a030f825a030f825a0
Laravel Telescope enabled at https://13.208.253.251:5014
WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb50006c01bfe916ff6fe916ff6fe916ff6fe916ff6
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_8.7 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY