The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d04b42cadb4b42cadb4b42cadb4b42cadb4b42cadb4b42cadb
Laravel Telescope enabled at https://35.181.5.161:8419
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0bc1e29abbc1e29abbc1e29abbc1e29abbc1e29abbc1e29ab
Laravel Telescope enabled at https://35.181.5.161:170
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0db9a3302db9a3302db9a3302db9a3302db9a3302db9a3302
Laravel Telescope enabled at https://35.181.5.161:9581
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0bb0cded4bb0cded4bb0cded4bb0cded4bb0cded4bb0cded4
Laravel Telescope enabled at https://35.181.5.161:843
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0da3b5d08da3b5d08da3b5d08da3b5d08da3b5d08da3b5d08
Laravel Telescope enabled at https://35.181.5.161:8302
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0022a5d00022a5d00022a5d00022a5d00022a5d00022a5d00
Laravel Telescope enabled at https://35.181.5.161:6739
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0f8da8504f8da8504f8da8504f8da8504f8da8504f8da8504
Laravel Telescope enabled at https://35.181.5.161:5716
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d06baa8e0d6baa8e0d6baa8e0d6baa8e0d6baa8e0d6baa8e0d
Laravel Telescope enabled at https://35.181.5.161:4325
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0e0ee1092e0ee1092e0ee1092e0ee1092e0ee1092e0ee1092
Laravel Telescope enabled at https://35.181.5.161:2197
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d085d0d5fc85d0d5fc85d0d5fc85d0d5fc85d0d5fc85d0d5fc
Laravel Telescope enabled at https://35.181.5.161:5341
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d00b3bb4b40b3bb4b40b3bb4b40b3bb4b40b3bb4b40b3bb4b4
Laravel Telescope enabled at https://35.181.5.161:6021
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0d236d343d236d343d236d343d236d343d236d343d236d343
Laravel Telescope enabled at https://35.181.5.161:8147
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0ed91c2c9ed91c2c9ed91c2c9ed91c2c9ed91c2c9ed91c2c9
Laravel Telescope enabled at https://35.181.5.161:4941
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d05442d9355442d9355442d9355442d9355442d9355442d935
Laravel Telescope enabled at https://35.181.5.161:8488
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d053e8b5b853e8b5b853e8b5b853e8b5b853e8b5b853e8b5b8
Laravel Telescope enabled at https://35.181.5.161:2388
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d01ab8b5ae1ab8b5ae1ab8b5ae1ab8b5ae1ab8b5ae1ab8b5ae
Laravel Telescope enabled at https://35.181.5.161:7802
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d07058ff2a7058ff2a7058ff2a7058ff2a7058ff2a7058ff2a
Laravel Telescope enabled at https://35.181.5.161:3011
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0a6a23886a6a23886a6a23886a6a23886a6a23886a6a23886
Laravel Telescope enabled at https://35.181.5.161:7727
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d06ea8546c6ea8546c6ea8546c6ea8546c6ea8546c6ea8546c
Laravel Telescope enabled at https://35.181.5.161:4096
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d06765bcd06765bcd06765bcd06765bcd06765bcd06765bcd0
Laravel Telescope enabled at https://35.181.5.161:3563
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d058a1b38758a1b38758a1b38758a1b38758a1b38758a1b387
Laravel Telescope enabled at https://35.181.5.161:9078
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0af0ccc35af0ccc35af0ccc35af0ccc35af0ccc35af0ccc35
Laravel Telescope enabled at https://35.181.5.161:886
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d080d30cb380d30cb380d30cb380d30cb380d30cb380d30cb3
Laravel Telescope enabled at https://35.181.5.161:5096
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0e662b30ae662b30ae662b30ae662b30ae662b30ae662b30a
Laravel Telescope enabled at https://35.181.5.161:3473
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d040763b4040763b4040763b4040763b4040763b4040763b40
Laravel Telescope enabled at https://35.181.5.161:1969
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0ce7b9806ce7b9806ce7b9806ce7b9806ce7b9806ce7b9806
Laravel Telescope enabled at https://35.181.5.161:1707
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0706a480b706a480b706a480b706a480b706a480b706a480b
Laravel Telescope enabled at https://35.181.5.161:3797
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d067fa1e2d67fa1e2d67fa1e2d67fa1e2d67fa1e2d67fa1e2d
Laravel Telescope enabled at https://35.181.5.161:2420
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: medium
Fingerprint: 5f32cf5d6962f09cef4770e6ef4770e66baa8708a7439970644a7f04b04184b3
Found 42 files trough .DS_Store spidering: /.editorconfig /.env /.env.example /.git /.gitattributes /.gitignore /.gitlab-ci.yml /.idea /.styleci.yml /analyse /app /app/Console /app/Contracts /app/DataObjects /app/Exceptions /app/Exceptions/UnknowSite.php /app/Helpers /app/Http /app/Mail /app/Models /app/Providers /app/Services /app/Traits /app/View /artisan /bootstrap /composer.json /composer.lock /config /database /lang /node_modules /package.json /phpunit.xml /public /README.md /resources /routes /server.php /storage /Tests /vendor