The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0f5c92936f5c92936f5c92936f5c92936f5c92936f5c92936
Laravel Telescope enabled at https://3.36.91.181:6439
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d091f81db191f81db191f81db191f81db191f81db191f81db1
Laravel Telescope enabled at https://3.36.91.181:3242
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0a56858c3a56858c3a56858c3a56858c3a56858c3a56858c3
Laravel Telescope enabled at https://3.36.91.181:2540
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d09b998cb29b998cb29b998cb29b998cb29b998cb29b998cb2
Laravel Telescope enabled at https://3.36.91.181:9724
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d05daca84e5daca84e5daca84e5daca84e5daca84e5daca84e
Laravel Telescope enabled at https://3.36.91.181:7252
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d01fbaedfa1fbaedfa1fbaedfa1fbaedfa1fbaedfa1fbaedfa
Laravel Telescope enabled at https://3.36.91.181:4983
WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb50006c01bfe916ff6fe916ff6fe916ff6fe916ff6
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_8.7 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY