The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d098fd830a98fd830a98fd830a98fd830a98fd830a98fd830a
Laravel Telescope enabled at https://13.40.139.70:9124
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d02831bcf92831bcf92831bcf92831bcf92831bcf92831bcf9
Laravel Telescope enabled at https://13.40.139.70:5079
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0f2a3600bf2a3600bf2a3600bf2a3600bf2a3600bf2a3600b
Laravel Telescope enabled at https://13.40.139.70:1712
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d09008025d9008025d9008025d9008025d9008025d9008025d
Laravel Telescope enabled at https://13.40.139.70:9512
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d09d6929d19d6929d19d6929d19d6929d19d6929d19d6929d1
Laravel Telescope enabled at https://13.40.139.70:8032
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d054f427c854f427c854f427c854f427c854f427c854f427c8
Laravel Telescope enabled at https://13.40.139.70:7696
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0a46b734fa46b734fa46b734fa46b734fa46b734fa46b734f
Laravel Telescope enabled at https://13.40.139.70:8100
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0a55ea928a55ea928a55ea928a55ea928a55ea928a55ea928
Laravel Telescope enabled at https://13.40.139.70:8437
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d070951c3c70951c3c70951c3c70951c3c70951c3c70951c3c
Laravel Telescope enabled at https://13.40.139.70:1135
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0503e087e503e087e503e087e503e087e503e087e503e087e
Laravel Telescope enabled at https://13.40.139.70:453
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d04c00e5f14c00e5f14c00e5f14c00e5f14c00e5f14c00e5f1
Laravel Telescope enabled at https://13.40.139.70:7107
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d01bb7b5941bb7b5941bb7b5941bb7b5941bb7b5941bb7b594
Laravel Telescope enabled at https://13.40.139.70:3076
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0a0692ea9a0692ea9a0692ea9a0692ea9a0692ea9a0692ea9
Laravel Telescope enabled at https://13.40.139.70:8065
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0c89848fec89848fec89848fec89848fec89848fec89848fe
Laravel Telescope enabled at https://13.40.139.70:4325
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d02d31c4a62d31c4a62d31c4a62d31c4a62d31c4a62d31c4a6
Laravel Telescope enabled at https://13.40.139.70:5029
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0defbbd37defbbd37defbbd37defbbd37defbbd37defbbd37
Laravel Telescope enabled at https://13.40.139.70:7376
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0ad34cc8ead34cc8ead34cc8ead34cc8ead34cc8ead34cc8e
Laravel Telescope enabled at https://13.40.139.70:5388
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d048a44b0d48a44b0d48a44b0d48a44b0d48a44b0d48a44b0d
Laravel Telescope enabled at https://13.40.139.70:4403
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d02feabf8a2feabf8a2feabf8a2feabf8a2feabf8a2feabf8a
Laravel Telescope enabled at https://13.40.139.70:2392
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0bf86f14dbf86f14dbf86f14dbf86f14dbf86f14dbf86f14d
Laravel Telescope enabled at https://13.40.139.70:4832
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0ca9a8abcca9a8abcca9a8abcca9a8abcca9a8abcca9a8abc
Laravel Telescope enabled at https://13.40.139.70:4064
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d08fec2bc28fec2bc28fec2bc28fec2bc28fec2bc28fec2bc2
Laravel Telescope enabled at https://13.40.139.70:9850
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0626459c4626459c4626459c4626459c4626459c4626459c4
Laravel Telescope enabled at https://13.40.139.70:6578
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0346646323466463234664632346646323466463234664632
Laravel Telescope enabled at https://13.40.139.70:8343
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c3c1fc5e93c1fc5e9cdbb983a861027db088a08617820ca67
Found 5 files trough .DS_Store spidering: /images /images/original /images/thumbnail /pdfs /system