Apache 2.4.29
tcp/443
Apache 2.4.46
tcp/8001
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07f0fb3250f0fb3250f0fb3250f0fb3250f0fb3250
Symfony profiler enabled: http://212.237.21.193:8001/_profiler/empty/search/results
Open service 212.237.21.193:443
2024-09-11 16:11
HTTP/1.1 404 Not Found Date: Wed, 11 Sep 2024 16:11:59 GMT Server: Apache/2.4.29 (Ubuntu) Cache-Control: no-cache Connection: close Transfer-Encoding: chunked Content-Type: text/html; charset=UTF-8
Open service 212.237.21.193:3306
2024-09-10 17:20
MySQL detected
Open service 212.237.21.193:8001
2024-08-17 20:21
HTTP/1.1 404 Not Found Date: Sat, 17 Aug 2024 20:21:54 GMT Server: Apache/2.4.46 (Unix) X-Powered-By: PHP/7.3.33 Cache-Control: no-cache, private Link: <http://212.237.21.193/api/docs.jsonld>; rel="http://www.w3.org/ns/hydra/core#apiDocumentation" X-Debug-Token: b587af X-Debug-Token-Link: http://212.237.21.193/_profiler/b587af X-Robots-Tag: noindex Connection: close Transfer-Encoding: chunked Content-Type: text/html; charset=UTF-8