Total Scans
Most Used Server
Most Used Platform
Today Scan's
Total CWE Found:
Do you want to perform a deep scan to uncover more?
Perform Deep ScanReferrer-Policy Header Not Implemented
CWE-16
More InfoINFORMATIONAL
The Referrer-Policy HTTP header controls how much referrer information (sent via the Referer header) should be included with requests. Mozilla The Referer (sic) header contains the address of the previous web page from which a link to the currently requested page was followed, which has lots of fairly innocent uses including analytics, logging, or optimized caching. However, there are more problematic uses such as tracking or stealing information, or even just side effects such as inadvertently leaking sensitive information.
Configure your server to send the Referrer-Policy header for all pages with the value set to strict-origin-when-cross-origin. You can see references for other possible values.
Permissions-Policy header Not Implemented
CWE-1021
More InfoINFORMATIONAL
The Permissions-Policy header allows developers to selectively enable and disable use of various browser features and APIs.
Configure Permission Policy Header properly
X-Permitted-Cross-Domain-Policies is Not Implemented
CWE-200
More InfoINFORMATIONAL
This header is used to limit which data external resources, such as Adobe Flash and PDF documents, can access on the domain. Failure to set the X-Permitted- Cross-Domain-Policies header to “none” value allows other domains to embed the application’s data in their content.
If there is no requirement to load application data within web clients such as Adobe Flash Player or Adobe Acrobat (not limited to these), then the header should be configured as follows. X-Permitted-Cross-Domain-Policies: none
OPTIONS Method Enabled
CWE-16
More InfoINFORMATIONAL
AWASAF detected that OPTIONS method is allowed. This issue is reported as extra information. Information disclosed from this page can be used to gain additional information about the target system.
Disable OPTIONS method in all production systems.
Directory Listings Enabled
CWE-538
More InfoMEDIUM
Directory listing is a web server function that displays the directory contents when there is no index file in a specific website directory. It is dangerous to leave this function turned on for the web server because it leads to information disclosure.
You should make sure no sensitive information is disclosed or you may want to restrict directory listings from the web server configuration
Misconfigured Access-Control-Allow-Origin Header
CWE-942
More InfoMEDIUM
CORS (Cross-Origin Resource Sharing) defines a mechanism to enable client-side cross-origin requests. This application is using CORS in an insecure way. The web application fails to properly validate the Origin header (check Details section for more information) and returns the header Access-Control-Allow-Credentials: true. In this configuration any website can issue requests made with user credentials and read the responses to these requests. Trusting arbitrary origins effectively disables the same-origin policy, allowing two-way interaction by third-party web sites
Allow only selected, trusted domains in the Access-Control-Allow-Origin header.
Do you need the full picture?
Our free, light scans return limited results.
To experience the full power of our security testing toolkit, subscribe now to use 40+ scan tools and features with no scan limits.
Testing areas & features | Free / Light | Premium |
---|---|---|
Fingerprint web server software | Yes | Yes |
Analyze HTTP headers for security misconfiguration | Yes | Yes |
Check the security of HTTP cookies | Yes | Yes |
Check the SSL certificate of the server(Valid or Expired) | Yes | Yes |
Check if the server software is affected by known vulnerabilities | Yes | Yes |
Analyze robots.txt for interesting URLs | Yes | Yes |
Check client access files policy | Yes | Yes |
Discover server configuration problems (ex. directory listing at home page) | Yes | Yes |
Check if HTTP TRACK/TRACE methods are enabled | Yes | Yes |
Check if security.txt is missing on the server | Yes | Yes |
Check if HTTP OPTIONS methods are enabled | Yes | Yes |
Check if HTTP PUT methods are enabled | Yes | Yes |
Check if CORS is misconfigured | Yes | Yes |
CMS Detection | Yes | Yes |
Communication is not Secure (HTTP or HTTPS) | Yes | Yes |
Crawl website | - | Yes |
Check for SQL Injection | - | Yes |
Check for Cross-Site Scripting | - | Yes |
Check for Local File Inclusion and Remote File Inclusion | - | Yes |
Check for OS Command Injection | - | Yes |
Check for ASP Cookieless Cross-Site Scripting | - | Yes |
Check for Server Side Request Forgery | - | Yes |
Check for Open Redirect | - | Yes |
Check for Broken Authentication | - | Yes |
Check for PHP Code Injection | - | Yes |
Check for JavaScript Code Injection | - | Yes |
Check for Ruby Code Injection | - | Yes |
Check for Python Code Injection | - | Yes |
Check for Perl Code Injection | - | Yes |
Check for Log4j Remote Code Execution | - | Yes |
Check for Server-Side Template Injection | - | Yes |
Check for ViewState Remote Code Execution | - | Yes |
Check for Client-Side Prototype Pollution | - | Yes |
Check for Exposed Backup Files | - | Yes |
Check for Request URL Override | - | Yes |
Check for Client-Side Template Injection | - | Yes |
Check for HTTP/1.1 Request Smuggling | - | Yes |
Check for XML External Entity attacks | - | Yes |
Check for outdated JavaScript libraries | - | Yes |
Find administrative pages | - | Yes |
Check for sensitive files (archives, backups, certificates, etc) | - | Yes |
Attempt to find interesting files / functionality | - | Yes |
Check for information disclosure issues | - | Yes |
Clear text submission of credentials | - | Yes |
Verify domain sources | - | Yes |
Check for commented code/debug messages | - | Yes |
Find login interfaces | - | Yes |
Sensitive data detection | - | Yes |