The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0c8e2dfd0c8e2dfd0c8e2dfd0c8e2dfd0c8e2dfd0c8e2dfd0
Laravel Telescope enabled at https://35.181.61.198:5008
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0c8e2dfdfc8e2dfdfc8e2dfdfc8e2dfdfc8e2dfdfc8e2dfdf
Laravel Telescope enabled at https://35.181.61.198:5007
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d00c2ec6320c2ec6320c2ec6320c2ec6320c2ec6320c2ec632
Laravel Telescope enabled at https://35.181.61.198:8005
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0c9e2e143c9e2e143c9e2e143c9e2e143c9e2e143c9e2e143
Laravel Telescope enabled at https://35.181.61.198:5018
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0998ce557998ce557998ce557998ce557998ce557998ce557
Laravel Telescope enabled at https://35.181.61.198:9443
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0872bb620872bb620872bb620872bb620872bb620872bb620
Laravel Telescope enabled at https://35.181.61.198:8111
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d00c2ec6300c2ec6300c2ec6300c2ec6300c2ec6300c2ec630
Laravel Telescope enabled at https://35.181.61.198:8007
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0e4f710a7e4f710a7e4f710a7e4f710a7e4f710a7e4f710a7
Laravel Telescope enabled at https://35.181.61.198:10443
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0042eb957042eb957042eb957042eb957042eb957042eb957
Laravel Telescope enabled at https://35.181.61.198:8088
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0a161f1dba161f1dba161f1dba161f1dba161f1dba161f1db
Laravel Telescope enabled at https://35.181.61.198:84
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0a161f1d8a161f1d8a161f1d8a161f1d8a161f1d8a161f1d8
Laravel Telescope enabled at https://35.181.61.198:87
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0a161f1dda161f1dda161f1dda161f1dda161f1dda161f1dd
Laravel Telescope enabled at https://35.181.61.198:82
MySQL is currently open without authentication.
This results in all the database data made available publicly.
Severity: medium
Fingerprint: cf350410ecceb5fdca5342c6fb5ae46bac24508ec4d508477ce8bdfe4f68ba36
Databases: 5, row count: 0, size: 0 B Found table mysql.procs_priv with 0 records Found table mysql.role_edges with 0 records Found table mysql.user with 0 records Found table production.accounts with 0 records Found table production.transactions with 0 records
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d068397fa968397fa968397fa968397fa968397fa968397fa9
Laravel Telescope enabled at https://35.181.61.198:444
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0a161f1dea161f1dea161f1dea161f1dea161f1dea161f1de
Laravel Telescope enabled at https://35.181.61.198:81
WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb5a83ecb97a4af29d2a4af29d2a4af29d2a4af29d2
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_3.8.1p1 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb5675568bbe622e896e622e896e622e896e622e896
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_3.8 in DesktopAuthority 7.1.091 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d00c2ec63e0c2ec63e0c2ec63e0c2ec63e0c2ec63e0c2ec63e
Laravel Telescope enabled at https://35.181.61.198:8009
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d07424dc537424dc537424dc537424dc537424dc537424dc53
Laravel Telescope enabled at https://35.181.61.198:8400
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d00e2ec91f0e2ec91f0e2ec91f0e2ec91f0e2ec91f0e2ec91f
Laravel Telescope enabled at https://35.181.61.198:8022
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d00c2ec63f0c2ec63f0c2ec63f0c2ec63f0c2ec63f0c2ec63f
Laravel Telescope enabled at https://35.181.61.198:8008
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0042eb95c042eb95c042eb95c042eb95c042eb95c042eb95c
Laravel Telescope enabled at https://35.181.61.198:8083
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d00b2ec4440b2ec4440b2ec4440b2ec4440b2ec4440b2ec444
Laravel Telescope enabled at https://35.181.61.198:8010
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0a161f1daa161f1daa161f1daa161f1daa161f1daa161f1da
Laravel Telescope enabled at https://35.181.61.198:85
The Redis instance is open to the public.
This could result to data leak and code execution.
Severity: medium
Fingerprint: d606b92f1b5fdf185732408f5732408f5732408f5732408f5732408f5732408f
Redis is open with 0 keys in dbs
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0042eb95a042eb95a042eb95a042eb95a042eb95a042eb95a
Laravel Telescope enabled at https://35.181.61.198:8085
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0b881b389b881b389b881b389b881b389b881b389b881b389
Laravel Telescope enabled at https://35.181.61.198:4532
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d002a2f7b102a2f7b102a2f7b102a2f7b102a2f7b102a2f7b1
Laravel Telescope enabled at https://35.181.61.198:6732
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0082ebf8b082ebf8b082ebf8b082ebf8b082ebf8b082ebf8b
Laravel Telescope enabled at https://35.181.61.198:8040