.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: high
Fingerprint: 5f32cf5d6962f09ca0cc0fcfa0cc0fcff5cd479247de8ca7aa413aae0183eee2
Found 25 files trough .DS_Store spidering: /.htaccess /.well-known /apple-app-site-association /autocomplete /back /build /bundles /css /favicon.ico /firebase /fonts /general.kml /google1f7827b016ec2ced.html /img /index.php /js /login /login_veci /media /reports /robots.txt /sitemap.xml /upload /uploads /webfonts
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e071fa22dd41fa22dd41fa22dd41fa22dd41fa22dd4
Symfony profiler enabled: https://romancerelax.iridian.co/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07733de0d8733de0d8733de0d8733de0d8733de0d8
Symfony profiler enabled: https://berlian.iridian.co/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07bc062318bc062318bc062318bc062318bc062318
Symfony profiler enabled: https://medintia.iridian.co/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e075eb2e6eb5eb2e6eb5eb2e6eb5eb2e6eb5eb2e6eb
Symfony profiler enabled: http://34.74.17.15:8010/_profiler/empty/search/results
The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a652234cef3c8
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/Iridian-co/zely-landing.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "main"] remote = origin merge = refs/heads/main
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c47dfe71947dfe719bf3fd42cc2f14923736f95fecf0dcbc8
Found 16 files trough .DS_Store spidering: /.well-known /adapters /build /bundles /css /documents /firebase /fonts /games /images /js /lang /plugins /skins /uploads /vendor
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07685cde4b685cde4b685cde4b685cde4b685cde4b
Symfony profiler enabled: https://farmaciavirtualecuador.iridian.co/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07c8de22dac8de22dac8de22dac8de22dac8de22da
Symfony profiler enabled: https://medicosecuador.iridian.co/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07ca31b581ca31b581ca31b581ca31b581ca31b581
Symfony profiler enabled: http://34.74.17.15:8005/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e077a6266d27a6266d27a6266d27a6266d27a6266d2
Symfony profiler enabled: https://edukaecuador.iridian.co/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07dc1c6fb9dc1c6fb9dc1c6fb9dc1c6fb9dc1c6fb9
Symfony profiler enabled: http://34.74.17.15:8078/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07141be2bf141be2bf141be2bf141be2bf141be2bf
Symfony profiler enabled: http://34.74.17.15:8076/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07a54591f5a54591f5a54591f5a54591f5a54591f5
Symfony profiler enabled: http://34.74.17.15:8089/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07d550b085d550b085d550b085d550b085d550b085
Symfony profiler enabled: http://34.74.17.15:8052/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e072fed9b842fed9b842fed9b842fed9b842fed9b84
Symfony profiler enabled: http://34.74.17.15:8077/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: high
Fingerprint: 5f32cf5d6962f09ca0cc0fcfa0cc0fcff5cd479247de8ca7aa413aae0183eee2
Found 25 files trough .DS_Store spidering: /.htaccess /.well-known /apple-app-site-association /autocomplete /back /build /bundles /css /favicon.ico /firebase /fonts /general.kml /google1f7827b016ec2ced.html /img /index.php /js /login /login_veci /media /reports /robots.txt /sitemap.xml /upload /uploads /webfonts
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07d93dc536d93dc536d93dc536d93dc536d93dc536
Symfony profiler enabled: http://34.74.17.15:8084/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07cb1f5218cb1f5218cb1f5218cb1f5218cb1f5218
Symfony profiler enabled: http://34.74.17.15:8086/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07ff62e027ff62e027ff62e027ff62e027ff62e027
Symfony profiler enabled: http://34.74.17.15:8083/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: high
Fingerprint: 5f32cf5d6962f09ca0cc0fcfa0cc0fcff5cd479247de8ca7aa413aae0183eee2
Found 25 files trough .DS_Store spidering: /.htaccess /.well-known /apple-app-site-association /autocomplete /back /build /bundles /css /favicon.ico /firebase /fonts /general.kml /google1f7827b016ec2ced.html /img /index.php /js /login /login_veci /media /reports /robots.txt /sitemap.xml /upload /uploads /webfonts
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e0741879ffc41879ffc41879ffc41879ffc41879ffc
Symfony profiler enabled: http://34.74.17.15:8059/_profiler/empty/search/results
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07c5447cbbc5447cbbc5447cbbc5447cbbc5447cbb
Symfony profiler enabled: http://34.74.17.15:8007/_profiler/empty/search/results
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c2eda814e2eda814e4ce52271cbc9b5ef74efface70172af6
Found 6 files trough .DS_Store spidering: /img_2 /img_2/2x /img_2/3x /img_2/NINSBA.jpg /img_2/Sin-título-1.jpg /img_2/SVG
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07dc256170dc256170dc256170dc256170dc256170
Symfony profiler enabled: http://34.74.17.15:8055/_profiler/empty/search/results
The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a65226cce6dd3
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/Iridian-co/paletteria-wordpress.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "main"] remote = origin merge = refs/heads/main
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e079029de4d9029de4d9029de4d9029de4d9029de4d
Symfony profiler enabled: http://34.74.17.15:8045/_profiler/empty/search/results
The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522d3210c55
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://github.com/Iridian-co/academia-alejandro-falla.git fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master