All-in-one free web application security tool. Web application vulnerability and privacy scanner with support for HTTP cookies, Flash, HTML5 localStorage, sessionStorage, CANVAS, Supercookies, Evercookies. Includes a free SSL/TLS, HTML and HTTP vulnerability scanner and URL malware scanner.
Category: Cloud Service/Hosting
Keywords: data dont uses those using google rights account changes content license privacy service policies services software available permitted additional information
Last fetched: 2019-10-02T21:03:22.187880+00:00
HTTP status: 5 Sub-resource URL
Server: ESF
Announces web server software and optionally version details.
Read more...X-XSS-Protection: 0
Controls an Cross-Site Scripting (XSS) filters built into the majority of web browsers. The filter is usually turned on by default anyway, but requirement to set the header to 1
became part of canonical set of "secure" HTTP headers. Over time, vulnerabilities in the "sanitizing" mode filter were found, so 1; mode=block
became the recommended value. Some companies decided that they don't really need a browser-side XSS filter to mess with their web services which are XSS-free anyway and they became consciously disabling the XSS filter by setting the header to 0
.
XSS auditor is disabled
0Transport Layer Security (TLS) is enabled
+2X-Frame-Options
header is missing
X-Content-Type-Options
header is missing
script-src 'report-sample' 'nonce-6Gsbx3v1S84yM7lL8QlA1g' 'unsafe-inline' 'strict-dynamic' https: http: 'unsafe-eval';object-src 'none';base-uri 'self';report-uri /o/cspreport
Content-Security-Policy
Consider adding block-all-mixed-content
directive if your website is only accessible over TLS and you are certain it doesn not have any legacy plaintext resources. Otherwise you may add adding upgrade-insecure-requests
directive if your website may still have some legacy plaintext HTTP resources and you want them to be still available rather than blocked
Origin script-src 'unsafe-eval'
allows bypassing of CSP and execution of inlined untrusted scripts. Use 'nonce-'
or 'sha256-'
instead
Want second opinion? Try Google CSP Evaluator.