All-in-one free web application security tool. Web application vulnerability and privacy scanner with support for HTTP cookies, Flash, HTML5 localStorage, sessionStorage, CANVAS, Supercookies, Evercookies. Includes a free SSL/TLS, HTML and HTTP vulnerability scanner and URL malware scanner.
Keywords: fish italy media needs south canada dating france mexico online plenty united denmark kingdom service republic netherlands plentyoffish relationship relationships
Last fetched: 2019-09-17T14:38:18.283421+00:00
HTTP status: 5 Sub-resource URL
Announces web server software and optionally version details.Read more...
Expect-CT: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
The Expect-CT header allows sites to opt in to reporting and/or enforcement of Certificate Transparency requirements, which prevents the use of misissued certificates for that site from going unnoticed. When a site enables the Expect-CT header, they are requesting that the browser check that any certificate for that site appears in public CT logs.Read more...
Clickjacking protection is enabled+2
Instructs the browser if the current website can be embedded in HTML frame by another website. Since this allows the parent website to control the framed page, this creates a potential for data theft attacks ("clickjacking") and most sensitive websites won't allow them to be framed at all (
deny) or just allow parts of them to be embedded in frames created by themselves only (
Transport Layer Security (TLS) is enabled+2
X-XSS-Protection header is missing
X-Content-Type-Options header is missing
img-src https: 'unsafe-inline' 'unsafe-eval' 'self' data:; default-src https: 'unsafe-inline' 'unsafe-eval'; report-uri /lytics/cspreport?api=1
base-uri allows attackers to inject
base tags which override the base URI to an attacker-controlled origin. Set to
'none' unless you need to handle tricky relative URLs scheme
block-all-mixed-content directive if your website is only accessible over TLS and you are certain it doesn not have any legacy plaintext resources. Otherwise you may add adding
upgrade-insecure-requests directive if your website may still have some legacy plaintext HTTP resources and you want them to be still available rather than blocked
img-src data: origin allows bypassing CSP and execution of inlined untrusted scripts
img-src 'unsafe-inline' allows bypassing of CSP and execution of inlined untrusted scripts. Use
img-src 'unsafe-eval' allows bypassing of CSP and execution of inlined untrusted scripts. Use
default-src 'unsafe-inline' allows bypassing of CSP and execution of inlined untrusted scripts. Use
default-src 'unsafe-eval' allows bypassing of CSP and execution of inlined untrusted scripts. Use
The website uses the following advertisement publisher ids: