All-in-one free web application security tool. Web application vulnerability and privacy scanner with support for HTTP cookies, Flash, HTML5 localStorage, sessionStorage, CANVAS, Supercookies, Evercookies. Includes a free SSL/TLS, HTML and HTTP vulnerability scanner and URL malware scanner.
1x1 transparent GIF is frequently used as user tracking mechanism
Category: Advertising & Tracking
Keywords: data free learn suite better center google manager surveys audience business optimize partners products analytics companies marketing solutions attribution measurement
Last fetched: 2019-12-19T20:54:33.142396+00:00
HTTP status: 5 Sub-resource URL
Advanced user tracking and fingerprinting techniques are used by websites to bypass privacy protection in web browsers and increase tracking persistence.
b'GIF8' … b'\x01\x00\x01\x00'
Access-Control-Allow-Origin: *
Controls origins (websites) that are allowed to load data from this web service over JavaScript-based APIs as part of Cross-Origin Resource Sharing (CORS) standard. By default, a web browser will refuse to load data over XmlHttpRequest
from a website that is not in the same origin, which is a precaution against various types of data stealing attacks. The target server has to explicitly allow the origin domain using the Access-Control-Allow-Origin
(ACAO) header, or it may allow all origins to access it using a wildcard *
. The latter however creates a potential security issue if the website in question is transactional and processing sensitive data, so the wildcard should be only used on websites consciously offering public APIs.
The header sets permissive AJAX access by using wildcard origin *
. It may be OK if the website is a publicly accessible REST API but otherwise it should be not present at all
X-Content-Type-Options: nosniff
A non-standard but widely accepted header introduced originally by Microsoft to disable "content sniffing" or heuristic content type discovery in absence or mismatch of a proper HTTP Content-Type
declaration, which led to a number of web attacks. In general, presence of the header with its only defined value of nosniff
is considered as part of a properly secured HTTP response.
Fuzzy content type guessing is disabled
+1Server: Golfe2
Announces web server software and optionally version details.
Read more...Transport Layer Security (TLS) is enabled
+2X-Frame-Options
header is missing
X-XSS-Protection
header is missing