.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: medium
Fingerprint: 5f32cf5d6962f09c8efce1938efce193c7c776cfa50cd3c758a71aef02d35145
Found 36 files trough .DS_Store spidering: /404.html /css /favicon.ico /fonts /fonts/DS-DIGIB.TTF /google9e64484ba4f3b46a.html /googleea187a4012f782b1.html /highcharts /index.html /layout /media /media/badges /media/best-deal-ribbon.png /media/bg.jpg /media/button.mp3 /media/chaching.mp3 /media/clearbarlong.png /media/default-profile.png /media/facebook.png /media/facebook.svg /media/gmail.svg /media/google.png /media/googleplus.svg /media/help /media/linkedIn.png /media/linkedin.svg /media/loading.gif /media/logo.gif /media/logo.jpg /media/losemoney.mp3 /media/makemoney.mp3 /media/online.png /media/online.svg /offline /robots.txt /static
Severity: low
Fingerprint: 5f32cf5d6962f09cccdd54a0ccdd54a0734de28a54bf471a33392b8e64ce1f6f
Found 13 files trough .DS_Store spidering: /404.html /css /favicon.ico /fonts /google9e64484ba4f3b46a.html /googleea187a4012f782b1.html /highcharts /index.html /layout /media /offline /robots.txt /static
Severity: low
Fingerprint: 5f32cf5d6962f09c39aac35b39aac35b92705af7b190a31f91b2d3574ca303ad
Found 14 files trough .DS_Store spidering: /404.html /css /favicon.ico /fonts /fonts/DS-DIGIB.TTF /google9e64484ba4f3b46a.html /googleea187a4012f782b1.html /highcharts /index.html /layout /media /offline /robots.txt /static
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09cccdd54a0ccdd54a0734de28a54bf471a33392b8e64ce1f6f
Found 13 files trough .DS_Store spidering: /404.html /css /favicon.ico /fonts /google9e64484ba4f3b46a.html /googleea187a4012f782b1.html /highcharts /index.html /layout /media /offline /robots.txt /static
Severity: low
Fingerprint: 5f32cf5d6962f09c39aac35b39aac35b92705af7b190a31f91b2d3574ca303ad
Found 14 files trough .DS_Store spidering: /404.html /css /favicon.ico /fonts /fonts/DS-DIGIB.TTF /google9e64484ba4f3b46a.html /googleea187a4012f782b1.html /highcharts /index.html /layout /media /offline /robots.txt /static
Severity: medium
Fingerprint: 5f32cf5d6962f09c8efce1938efce193c7c776cfa50cd3c758a71aef02d35145
Found 36 files trough .DS_Store spidering: /404.html /css /favicon.ico /fonts /fonts/DS-DIGIB.TTF /google9e64484ba4f3b46a.html /googleea187a4012f782b1.html /highcharts /index.html /layout /media /media/badges /media/best-deal-ribbon.png /media/bg.jpg /media/button.mp3 /media/chaching.mp3 /media/clearbarlong.png /media/default-profile.png /media/facebook.png /media/facebook.svg /media/gmail.svg /media/google.png /media/googleplus.svg /media/help /media/linkedIn.png /media/linkedin.svg /media/loading.gif /media/logo.gif /media/logo.jpg /media/losemoney.mp3 /media/makemoney.mp3 /media/online.png /media/online.svg /offline /robots.txt /static
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09cccdd54a0ccdd54a0734de28a54bf471a33392b8e64ce1f6f
Found 13 files trough .DS_Store spidering: /404.html /css /favicon.ico /fonts /google9e64484ba4f3b46a.html /googleea187a4012f782b1.html /highcharts /index.html /layout /media /offline /robots.txt /static
Severity: medium
Fingerprint: 5f32cf5d6962f09c8efce1938efce193c7c776cfa50cd3c758a71aef02d35145
Found 36 files trough .DS_Store spidering: /404.html /css /favicon.ico /fonts /fonts/DS-DIGIB.TTF /google9e64484ba4f3b46a.html /googleea187a4012f782b1.html /highcharts /index.html /layout /media /media/badges /media/best-deal-ribbon.png /media/bg.jpg /media/button.mp3 /media/chaching.mp3 /media/clearbarlong.png /media/default-profile.png /media/facebook.png /media/facebook.svg /media/gmail.svg /media/google.png /media/googleplus.svg /media/help /media/linkedIn.png /media/linkedin.svg /media/loading.gif /media/logo.gif /media/logo.jpg /media/losemoney.mp3 /media/makemoney.mp3 /media/online.png /media/online.svg /offline /robots.txt /static
Severity: low
Fingerprint: 5f32cf5d6962f09c39aac35b39aac35b92705af7b190a31f91b2d3574ca303ad
Found 14 files trough .DS_Store spidering: /404.html /css /favicon.ico /fonts /fonts/DS-DIGIB.TTF /google9e64484ba4f3b46a.html /googleea187a4012f782b1.html /highcharts /index.html /layout /media /offline /robots.txt /static
An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dcc7199b7cc7199b7dcbe1c09a5af5ae82c64d216
Found host file trough Directory traversal: 127.0.0.1 localhost # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters ff02::3 ip6-allhosts
Severity: critical
Fingerprint: ac4d53c4832b2491752255c435b0f8ec35b0f8ecffbe9af621e37827385f2a07
Found host file trough Apache traversal: 127.0.0.1 localhost # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters ff02::3 ip6-allhosts
An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dcc7199b7cc7199b7dcbe1c09a5af5ae82c64d216
Found host file trough Directory traversal: 127.0.0.1 localhost # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters ff02::3 ip6-allhosts
Severity: critical
Fingerprint: ac4d53c4832b2491752255c435b0f8ec35b0f8ecffbe9af621e37827385f2a07
Found host file trough Apache traversal: 127.0.0.1 localhost # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters ff02::3 ip6-allhosts
An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dcc7199b7cc7199b7dcbe1c09a5af5ae82c64d216
Found host file trough Directory traversal: 127.0.0.1 localhost # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters ff02::3 ip6-allhosts
Severity: critical
Fingerprint: ac4d53c4832b2491752255c435b0f8ec35b0f8ecffbe9af621e37827385f2a07
Found host file trough Apache traversal: 127.0.0.1 localhost # the following lines are desirable for ipv6 capable hosts ::1 ip6-localhost ip6-loopback fe00::0 ip6-localnet ff00::0 ip6-mcastprefix ff02::1 ip6-allnodes ff02::2 ip6-allrouters ff02::3 ip6-allhosts