.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c2eda814e2eda814e21ea37ebaba48a8b42388f55da87cb6a
Found 6 files trough .DS_Store spidering: /.well-known /css /emails /img /js /vendor
Severity: low
Fingerprint: 5f32cf5d6962f09cec7f8772ec7f8772624a800724e8dd6fb6f69de71db9fc03
Found 11 files trough .DS_Store spidering: /.well-known /.well-known/acme-challenge /css /emails /emails/css /emails/images /emails/js /img /js /js/jquery.cookiebar /vendor
Severity: low
Fingerprint: 5f32cf5d6962f09c026392ab026392ab5f9b01264a36c34c08ee6eecdab61bdb
Found 7 files trough .DS_Store spidering: /.well-known /.well-known/acme-challenge /css /emails /img /js /vendor
Severity: low
Fingerprint: 5f32cf5d6962f09c8329733f8329733f90296a025fce0af88cf7858019c8dc68
Found 10 files trough .DS_Store spidering: /.well-known /.well-known/acme-challenge /css /emails /emails/css /emails/images /emails/js /img /js /vendor
Fingerprint: 5f32cf5d6962f09c11d3744d11d3744d8ea011687fd62e661ed24b3e3d24a50e
Found 12 files trough .DS_Store spidering: /.well-known /.well-known/acme-challenge /css /emails /emails/css /emails/images /emails/js /img /js /js/jquery.cookiebar /vendor /vendor/leaflet-tag-filter-button
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d015f5c38a15f5c38a15f5c38a15f5c38a15f5c38a15f5c38a
Laravel Telescope enabled at https://35.163.216.102
Fingerprint: 3ae8115d762f12d01b5e4c9c1b5e4c9c1b5e4c9c1b5e4c9c1b5e4c9c1b5e4c9c
Laravel Telescope enabled at https://35.163.216.102/telescope/requests
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d09427d9819427d9819427d9819427d9819427d9819427d981
Laravel Telescope enabled at http://35.163.216.102
Fingerprint: 3ae8115d762f12d0f9885de9f9885de9f9885de9f9885de9f9885de9f9885de9
Laravel Telescope enabled at http://35.163.216.102/telescope/requests
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c8329733f8329733f90296a025fce0af88cf7858019c8dc68
Found 10 files trough .DS_Store spidering: /.well-known /.well-known/acme-challenge /css /emails /emails/css /emails/images /emails/js /img /js /vendor
Severity: low
Fingerprint: 5f32cf5d6962f09c026392ab026392ab5f9b01264a36c34c08ee6eecdab61bdb
Found 7 files trough .DS_Store spidering: /.well-known /.well-known/acme-challenge /css /emails /img /js /vendor
Severity: low
Fingerprint: 5f32cf5d6962f09c11d3744d11d3744d8ea011687fd62e661ed24b3e3d24a50e
Found 12 files trough .DS_Store spidering: /.well-known /.well-known/acme-challenge /css /emails /emails/css /emails/images /emails/js /img /js /js/jquery.cookiebar /vendor /vendor/leaflet-tag-filter-button
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d09d55f11e9d55f11e9d55f11e9d55f11e9d55f11e9d55f11e
Laravel Telescope enabled at http://35.163.216.102:3000/telescope/requests
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c11d3744d11d3744d8ea011687fd62e661ed24b3e3d24a50e
Found 12 files trough .DS_Store spidering: /.well-known /.well-known/acme-challenge /css /emails /emails/css /emails/images /emails/js /img /js /js/jquery.cookiebar /vendor /vendor/leaflet-tag-filter-button
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0deba83acdeba83acdeba83acdeba83acdeba83acdeba83ac
Laravel Telescope enabled at http://serendipity.app
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d06d1310256d1310256d1310256d1310256d1310256d131025
Laravel Telescope enabled at https://serendipity.app
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09cec7f8772ec7f8772624a800724e8dd6fb6f69de71db9fc03
Found 11 files trough .DS_Store spidering: /.well-known /.well-known/acme-challenge /css /emails /emails/css /emails/images /emails/js /img /js /js/jquery.cookiebar /vendor
Severity: low
Fingerprint: 5f32cf5d6962f09c2eda814e2eda814e21ea37ebaba48a8b42388f55da87cb6a
Found 6 files trough .DS_Store spidering: /.well-known /css /emails /img /js /vendor
Severity: low
Fingerprint: 5f32cf5d6962f09c026392ab026392ab5f9b01264a36c34c08ee6eecdab61bdb
Found 7 files trough .DS_Store spidering: /.well-known /.well-known/acme-challenge /css /emails /img /js /vendor
Severity: low
Fingerprint: 5f32cf5d6962f09c8329733f8329733f90296a025fce0af88cf7858019c8dc68
Found 10 files trough .DS_Store spidering: /.well-known /.well-known/acme-challenge /css /emails /emails/css /emails/images /emails/js /img /js /vendor
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d05f8ec5c25f8ec5c25f8ec5c25f8ec5c25f8ec5c25f8ec5c2
Laravel Telescope enabled at http://35.163.216.102:9200/telescope/requests