All-in-one free web application security tool. Web application vulnerability and privacy scanner with support for HTTP cookies, Flash, HTML5 localStorage, sessionStorage, CANVAS, Supercookies, Evercookies. Includes a free SSL/TLS, HTML and HTTP vulnerability scanner and URL malware scanner.
Keywords: bank news wait banks dotjo events rights search company piotech process business password reserved solution username management information performance managementcase
Last fetched: 2019-06-30T12:54:53.498059+00:00
HTTP status: 5 Sub-resource URL
Server: Apache mod_fcgid/2.3.9
Announces web server software and optionally version details.Read more...
The header exposes web server version details. These server no purpose apart from making life of security auditors and hackers easier, leading them straight to exploits for this particular version of product. WebCookies.org does offer security design and penetration testing services so we can help!-1
A non-standard but widely accepted header introduced originally by Microsoft to disable "content sniffing" or heuristic content type discovery in absence or mismatch of a proper HTTP
Content-Type declaration, which led to a number of web attacks. In general, presence of the header with its only defined value of
nosniff is considered as part of a properly secured HTTP response.
Fuzzy content type guessing is disabled+1
Transport Layer Security (TLS) is not enabled-2
X-Frame-Options header is missing
X-XSS-Protection header is missing