Risk Level | Number of Alerts |
---|---|
High
|
0
|
Medium
|
7
|
Low
|
11
|
Informational
|
8
|
False Positives:
|
0
|
Medium
|
Application Error Disclosure |
---|---|
Description |
This page contains an error/warning message that may disclose sensitive information like the
location
of the file that produced the unhandled exception. This information can be used to launch
further
attacks against the web application. The alert could be a false positive if the error message is
found
inside a documentation page.
|
URL | http://43.204.203.77/admin/4244.ab01d466bc47b4f4.js |
Method | GET |
Parameter | |
Attack | |
Evidence | internal error |
URL | https://cdn.jsdelivr.net/npm/ckeditor@4.9.1/lang/en-gb.js?t=I2QG |
Method | GET |
Parameter | |
Attack | |
Evidence | internal error |
Instances | 2 |
Solution |
Review the source code of this page. Implement custom error pages. Consider implementing a
mechanism to
provide a unique error reference/identifier to the client (browser) while logging the details on
the
server side and not exposing them to the user.
|
Reference | |
CWE Id | 200 |
WASC Id | 13 |
Plugin Id | 90022 |
Medium
|
CSP: Wildcard Directive |
---|---|
Description |
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate
certain
types of attacks. Including (but not limited to) Cross Site Scripting (XSS), and data injection
attacks.
These attacks are used for everything from data theft to site defacement or distribution of
malware. CSP
provides a set of standard HTTP headers that allow website owners to declare approved sources of
content
that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML
frames,
fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
|
URL | https://edgeservices.bing.com/edgesvc/shell?&lightschemeovr=1&FORM=SHORUN&udscs=1&udsnav=1&setlang=en-GB&clientscopes=noheader,coauthor,chat,docvisibility,visibilitypm,&udsframed=1 |
Method | GET |
Parameter | Content-Security-Policy |
Attack | |
Evidence | frame-src https://www.bing.com/search https://edgeservices.bing.com/ https://www.bing.com/shop/productpage https://www.bing.com/images/create https://login.live.com/login.srf; base-uri 'self'; script-src 'strict-dynamic' 'nonce-Vc4IqNUYtCHThP1UIcSdfUfpqlHmC/ZNsdBptmGy950='; connect-src 'self' https://r.bing.com/; require-trusted-types-for 'script'; trusted-types default; report-to csp-endpoint |
Instances | 1 |
Solution |
Ensure that your web server, application server, load balancer, etc. is properly configured to
set the
Content-Security-Policy header.
|
Reference |
http://www.w3.org/TR/CSP2/
http://www.w3.org/TR/CSP/ http://caniuse.com/#search=content+security+policy http://content-security-policy.com/ https://github.com/shapesecurity/salvation https://developers.google.com/web/fundamentals/security/csp#policy_applies_to_a_wide_variety_of_resources |
CWE Id | 693 |
WASC Id | 15 |
Plugin Id | 10055 |
Medium
|
CSP: style-src unsafe-inline |
---|---|
Description |
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate
certain
types of attacks. Including (but not limited to) Cross Site Scripting (XSS), and data injection
attacks.
These attacks are used for everything from data theft to site defacement or distribution of
malware. CSP
provides a set of standard HTTP headers that allow website owners to declare approved sources of
content
that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML
frames,
fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
|
URL | https://edgeservices.bing.com/edgesvc/shell?&lightschemeovr=1&FORM=SHORUN&udscs=1&udsnav=1&setlang=en-GB&clientscopes=noheader,coauthor,chat,docvisibility,visibilitypm,&udsframed=1 |
Method | GET |
Parameter | Content-Security-Policy |
Attack | |
Evidence | frame-src https://www.bing.com/search https://edgeservices.bing.com/ https://www.bing.com/shop/productpage https://www.bing.com/images/create https://login.live.com/login.srf; base-uri 'self'; script-src 'strict-dynamic' 'nonce-Vc4IqNUYtCHThP1UIcSdfUfpqlHmC/ZNsdBptmGy950='; connect-src 'self' https://r.bing.com/; require-trusted-types-for 'script'; trusted-types default; report-to csp-endpoint |
Instances | 1 |
Solution |
Ensure that your web server, application server, load balancer, etc. is properly configured to
set the
Content-Security-Policy header.
|
Reference |
http://www.w3.org/TR/CSP2/
http://www.w3.org/TR/CSP/ http://caniuse.com/#search=content+security+policy http://content-security-policy.com/ https://github.com/shapesecurity/salvation https://developers.google.com/web/fundamentals/security/csp#policy_applies_to_a_wide_variety_of_resources |
CWE Id | 693 |
WASC Id | 15 |
Plugin Id | 10055 |
Medium
|
Content Security Policy (CSP) Header Not Set |
---|---|
Description |
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate
certain
types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks
are
used for everything from data theft to site defacement or distribution of malware. CSP provides
a set of
standard HTTP headers that allow website owners to declare approved sources of content that
browsers
should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts,
images
and embeddable objects such as Java applets, ActiveX, audio and video files.
|
URL | http://43.204.203.77/admin/ |
Method | GET |
Parameter | |
Attack | |
Evidence | |
URL | http://detectportal.firefox.com/canonical.html |
Method | GET |
Parameter | |
Attack | |
Evidence | |
URL | https://www2.bing.com/ipv6test/test |
Method | GET |
Parameter | |
Attack | |
Evidence | |
Instances | 3 |
Solution |
Ensure that your web server, application server, load balancer, etc. is configured to set the
Content-Security-Policy header.
|
Reference |
https://developer.mozilla.org/en-US/docs/Web/Security/CSP/Introducing_Content_Security_Policy
https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html http://www.w3.org/TR/CSP/ http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html http://www.html5rocks.com/en/tutorials/security/content-security-policy/ http://caniuse.com/#feat=contentsecuritypolicy http://content-security-policy.com/ |
CWE Id | 693 |
WASC Id | 15 |
Plugin Id | 10038 |
Medium
|
Missing Anti-clickjacking Header |
---|---|
Description |
The response does not include either Content-Security-Policy with 'frame-ancestors'
directive
or X-Frame-Options to protect against 'ClickJacking' attacks.
|
URL | http://43.204.203.77/admin/ |
Method | GET |
Parameter | X-Frame-Options |
Attack | |
Evidence | |
URL | http://detectportal.firefox.com/canonical.html |
Method | GET |
Parameter | X-Frame-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/edgesvc/shell?&lightschemeovr=1&FORM=SHORUN&udscs=1&udsnav=1&setlang=en-GB&clientscopes=noheader,coauthor,chat,docvisibility,visibilitypm,&udsframed=1 |
Method | GET |
Parameter | X-Frame-Options |
Attack | |
Evidence | |
URL | https://www2.bing.com/ipv6test/test |
Method | GET |
Parameter | X-Frame-Options |
Attack | |
Evidence | |
Instances | 4 |
Solution |
Modern Web browsers support the Content-Security-Policy and X-Frame-Options HTTP headers.
Ensure one of
them is set on all web pages returned by your site/app.
If you expect the page to be framed only by pages on your server (e.g. it's part of a
FRAMESET)
then you'll want to use SAMEORIGIN, otherwise if you never expect the page to be framed, you
should
use DENY. Alternatively consider implementing Content Security Policy's "frame-ancestors"
directive.
|
Reference | https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options |
CWE Id | 1021 |
WASC Id | 15 |
Plugin Id | 10020 |
Low
|
Cookie without SameSite Attribute |
---|---|
Description |
A cookie has been set without the SameSite attribute, which means that the cookie can be sent
as a
result of a 'cross-site' request. The SameSite attribute is an effective counter measure
to
cross-site request forgery, cross-site script inclusion, and timing attacks.
|
URL | https://edgeservices.bing.com/edgesvc/shell?&lightschemeovr=1&FORM=SHORUN&udscs=1&udsnav=1&setlang=en-GB&clientscopes=noheader,coauthor,chat,docvisibility,visibilitypm,&udsframed=1 |
Method | GET |
Parameter | _EDGE_S |
Attack | |
Evidence | Set-Cookie: _EDGE_S |
URL | https://edgeservices.bing.com/edgesvc/shell?&lightschemeovr=1&FORM=SHORUN&udscs=1&udsnav=1&setlang=en-GB&clientscopes=noheader,coauthor,chat,docvisibility,visibilitypm,&udsframed=1 |
Method | GET |
Parameter | _EDGE_V |
Attack | |
Evidence | Set-Cookie: _EDGE_V |
URL | https://edgeservices.bing.com/edgesvc/shell?&lightschemeovr=1&FORM=SHORUN&udscs=1&udsnav=1&setlang=en-GB&clientscopes=noheader,coauthor,chat,docvisibility,visibilitypm,&udsframed=1 |
Method | GET |
Parameter | MUIDB |
Attack | |
Evidence | Set-Cookie: MUIDB |
URL | https://www2.bing.com/ipv6test/test |
Method | GET |
Parameter | MUIDB |
Attack | |
Evidence | Set-Cookie: MUIDB |
Instances | 4 |
Solution |
Ensure that the SameSite attribute is set to either 'lax' or ideally 'strict'
for all
cookies.
|
Reference | https://tools.ietf.org/html/draft-ietf-httpbis-cookie-same-site |
CWE Id | 1275 |
WASC Id | 13 |
Plugin Id | 10054 |
Low
|
Cross-Domain JavaScript Source File Inclusion |
---|---|
Description |
The page includes one or more script files from a third-party domain.
|
URL | http://43.204.203.77/admin/ |
Method | GET |
Parameter | https://cdn.ckeditor.com/4.5.11/full-all/ckeditor.js |
Attack | |
Evidence | <script src="https://cdn.ckeditor.com/4.5.11/full-all/ckeditor.js"></script> |
URL | http://43.204.203.77/admin/ |
Method | GET |
Parameter | https://cdn.jsdelivr.net/npm/ckeditor@4.9.1/ckeditor.js |
Attack | |
Evidence | <script src="https://cdn.jsdelivr.net/npm/ckeditor@4.9.1/ckeditor.js"></script> |
URL | http://43.204.203.77/admin/ |
Method | GET |
Parameter | https://cdnjs.cloudflare.com/ajax/libs/lodash.js/4.17.5/lodash.min.js |
Attack | |
Evidence | <script src="https://cdnjs.cloudflare.com/ajax/libs/lodash.js/4.17.5/lodash.min.js"></script> |
Instances | 3 |
Solution |
Ensure JavaScript source files are loaded from only trusted sources, and the sources can't
be
controlled by end users of the application.
|
Reference | |
CWE Id | 829 |
WASC Id | 15 |
Plugin Id | 10017 |
Low
|
Information Disclosure - Debug Error Messages |
---|---|
Description |
The response appeared to contain common error messages returned by platforms such as ASP.NET,
and
Web-servers such as IIS and Apache. You can configure the list of common debug messages.
|
URL | https://image.spurtcart.com/?path=&name=&width=60&height=60 |
Method | GET |
Parameter | |
Attack | |
Evidence | Internal server error |
URL | https://image.spurtcart.com/?path=null&name=null&width=50&height=50 |
Method | GET |
Parameter | |
Attack | |
Evidence | Internal server error |
Instances | 2 |
Solution |
Disable debugging messages before pushing to production.
|
Reference | |
CWE Id | 200 |
WASC Id | 13 |
Plugin Id | 10023 |
Low
|
Server Leaks Version Information via "Server" HTTP Response Header Field |
---|---|
Description |
The web/application server is leaking version information via the "Server" HTTP
response
header. Access to such information may facilitate attackers identifying other vulnerabilities
your
web/application server is subject to.
|
URL | http://43.204.203.77/admin/ |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/1213.bca9fde12e008d13.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/1232.b3a0b996ea7ced18.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/1236.ac00b447876f35b9.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/1382.9e89c899dafb16e2.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/1410.e3a454c0710677c9.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/1508.34db89c6110c7eb1.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/1531.bfac6ac261a7a729.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/1553.79ef9fb84a1533d6.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/1629.bf1bb77dbb335690.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/1631.91fac68058f2ba62.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/1671.6b5b3f2af01bb1d9.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/1855.a1c23c0399f16559.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/2039.76a232eb5be6d9c6.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/2061.0aaabbf01ef4124f.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/2164.eabe34d2d9541461.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/2174.8fbc351c90652f70.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/2258.3a7ca7b07681a1a7.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/2266.5257588dbe04091e.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/2323.c3670583ff5371a7.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/2352.38f6dd1009aa06fc.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/2455.77c97a23349bf3b9.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/2498.34fc6082abcd2f25.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/256.69b82f589c560e62.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/263.720e9c3bc3ed172f.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/3054.9c8fc0ccd99ba312.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/3085.835786bbfd845184.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/3176.0179da3689dfe749.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/3540.570918aaed1f303b.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/3548.88f0c804e8d28bbe.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/38.45a73bab14b7abbf.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/3851.7ff0770c5ea7829d.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/3911.9ad0191bda4456b8.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4064.6c1e4adbcdcac046.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4134.189a96638e0b2a09.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4182.eed8618ac35157d9.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4202.dd93c6202b312542.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4214.d99700b30528c4af.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4244.ab01d466bc47b4f4.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4248.aea604632219d8c3.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4338.a85572402a984d01.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4443.5a77094282f9cbe1.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4455.0cdbc03106a15a9c.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4515.6b24bd1f0a5b6df9.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4611.b376c6d86b62039f.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4682.8cfef23f793f094e.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/4954.97afa1213c59eedd.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/5013.bb0565972037a79e.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/5042.f969505118c2fd89.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/5063.2f17dc964eae5e98.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/5145.801736656b54c672.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/5308.d4cd4ffce10a71c7.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/5336.64676d9206ffa68f.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/5377.b0e45c2addd39450.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/5566.916466eea17e3544.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/5595.0612fe5ebe4f3c57.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/5608.2a1109079b10bf56.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/5641.87f5d32535958130.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/574.f68660774b9c7073.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/5864.e6cf23d4b8bde2ed.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/5939.e071093f9de25a2e.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/6083.6f52944e71c49843.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/6093.c4d026c0e6cfb2d8.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/636.4a87c2dcbbae797c.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/6727.65485f2be6cf644e.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/6874.b37fc5c4a6dc4918.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/6879.41e5a9c4f62a4f88.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/6905.3c4d514bdd7b26ca.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7.472206f9bbd253df.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7154.2187bd5843fba8a6.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7185.873f3f9c8855ff16.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7294.eeb6937739f265b5.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7314.735603d04c6a69dd.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7324.8258d7ea7c7489b9.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7339.78847452049e2559.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7498.39e2df10da020fde.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7633.de6dd6b9bf8bd228.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7648.a5db27b3c0c1ecc6.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7651.79a779703123ba4a.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7654.77a32404c600674d.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7739.b38d03efacc81c19.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7773.d25ce3f58b5e23a2.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7790.fbb1998e6164a47b.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7932.d9080416c797853a.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/7970.1ee5d960a1ca3532.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/808.1da73573c54d95e8.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/8110.a01cf4c1217d7be7.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/8410.20e060e1ec2ef01e.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/8461.4a04ccab7beaceee.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/8538.c93f9f4d8e30041f.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/8622.cf18b2bf0bacf8dd.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/8654.c58c2f574061819f.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/877.1d2d037edb7ebd92.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/8804.fad5e05126357e70.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/8891.0729d83d00f9d5a2.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/9041.de49dc19422a1558.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/9154.c62ca6951082ec08.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/9169.cc55dab143f39277.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/9279.999b16799a71fb09.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/9416.33eecdd80361ba8a.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/9442.6eba38d870f411d4.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/9473.7f26a820cc350a1a.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/9584.b6efee3482211830.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/9675.41014bbf75aaa443.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/993.8497a298a793d670.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/9990.467b034322daa8d5.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/assets/i18n/en.json |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/common.ef4a1c86199084fd.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/fa-solid-900.a7ba84a018f500ca.woff2 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/main.0f1cfd2e4f5d7956.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/polyfills.dd6de2846bef6fea.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/runtime.71e0e9c6b76c5be6.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/admin/styles.099d46fcafc5fcf1.css |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/admin-customer/customer-visit-list?month=4&year=2023 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/admin-customer/vendor-graph-list?vendorId=211&duration=2023 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/admin-vendor?limit=0&offset=0&name=&email=&status=1&count=0&customerId=&keyword= |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/auth/get-profile |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/category?limit=0&offset=0&keyword=&sortOrder=0&status=1 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/order-status/order-status-list?limit=0&offset=0&keyword=&count=false&status= |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/order-status/order-status-list?limit=0&offset=0&keyword=&status=1 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/order-status/order-status-list?limit=20&offset=0&keyword=&count=false&status= |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/order/order-count |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/order/order-count-for-list?limit=20&offset=0&orderId=&totalAmount=&dateAdded=&keyword=&customerName=&count=true&orderStatusId= |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/order/order-detail?orderId=2356&orderStatusId= |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/order/order-product-log-list?orderProductId=3148 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/order/orderlist?limit=20&offset=0&orderId=&totalAmount=&dateAdded=&keyword=&customerName=&count=0&orderStatusId= |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/order/sales-graph-list?year=2023&month=4 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/order/transaction-list?year=2023 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/permission-module/permission-me |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/dashboard-admin-totalvendor-totalproduct-count |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/dashboard-admin/orders-count?duration=4 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/dashboard-average-conversion-ratio?duration=4 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/dashboard-average-order-value?limit=10&offset=0&count=0&duration=4 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/dashboard-total-revenue?duration=4 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/dashboard/admin-customers-count?duration=4 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/dashboard/graph-weekly-saleslist?productId=1931,1911,1934 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/dashboard/graph-weekly-saleslist?productId=1931,1934,1911 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/product-count |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/recent-selling-product |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/top-five-repeatedly-purchased-customers |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/top-performing-products?limit=10&offset=0&count=0&duration=2 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/top-performing-products?limit=10&offset=0&count=0&duration=4 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product/top-performing-products?limit=10&offset=0&count=true&duration=4 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product?limit=0&offset=0&keyword=&sku=&status=&price=0&count=false&productType= |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product?limit=20&offset=0&keyword=&sku=&status=&price=0&count=false&productType= |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/product?limit=20&offset=0&keyword=&sku=&status=&price=0&count=true&productType= |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/settings/get-settings |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/tax/tax-list?limit=0&offset=0&keyword=&count=0&status=1 |
Method | GET |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | https://cdn.ckeditor.com/4.5.11/full-all/ckeditor.js |
Method | GET |
Parameter | |
Attack | |
Evidence | CFS 0215 |
URL | https://cdn.plot.ly/plotly-basic-1.55.2.min.js |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-2023-05-20-17-04-38.chain |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://tracking-protection.cdn.mozilla.net/ads-track-digest256/1668785275 |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://tracking-protection.cdn.mozilla.net/analytics-track-digest256/1663274228 |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://tracking-protection.cdn.mozilla.net/base-cryptomining-track-digest256/1604686195 |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://tracking-protection.cdn.mozilla.net/base-email-track-digest256/1668785275 |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://tracking-protection.cdn.mozilla.net/base-fingerprinting-track-digest256/1663274228 |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://tracking-protection.cdn.mozilla.net/content-email-track-digest256/1668785275 |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://tracking-protection.cdn.mozilla.net/content-track-digest256/1670952926 |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://tracking-protection.cdn.mozilla.net/google-trackwhite-digest256/1604686195 |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://tracking-protection.cdn.mozilla.net/mozstd-trackwhite-digest256/1670952926 |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://tracking-protection.cdn.mozilla.net/social-track-digest256/1668785275 |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://tracking-protection.cdn.mozilla.net/social-tracking-protection-facebook-digest256/1604686195 |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://tracking-protection.cdn.mozilla.net/social-tracking-protection-linkedin-digest256/1564526481 |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | https://tracking-protection.cdn.mozilla.net/social-tracking-protection-twitter-digest256/1604686195 |
Method | GET |
Parameter | |
Attack | |
Evidence | AmazonS3 |
URL | http://43.204.203.77/backend/api/auth/login |
Method | POST |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
URL | http://43.204.203.77/backend/api/order/update-order-product-status/3148 |
Method | PUT |
Parameter | |
Attack | |
Evidence | Apache/2.4.41 (Ubuntu) |
Instances | 166 |
Solution |
Ensure that your web server, application server, load balancer, etc. is configured to suppress
the
"Server" header or provide generic details.
|
Reference |
http://httpd.apache.org/docs/current/mod/core.html#servertokens
http://msdn.microsoft.com/en-us/library/ff648552.aspx#ht_urlscan_007 http://blogs.msdn.com/b/varunm/archive/2013/04/23/remove-unwanted-http-response-headers.aspx http://www.troyhunt.com/2012/02/shhh-dont-let-your-response-headers.html |
CWE Id | 200 |
WASC Id | 13 |
Plugin Id | 10036 |
Low
|
Strict-Transport-Security Disabled |
---|---|
Description |
A HTTP Strict Transport Security (HSTS) header was found, but it contains the directive
max-age=0 which
disables the control and instructs browsers to reset any previous HSTS related settings. See RFC
6797
for further details.
HTTP Strict Transport Security (HSTS) is a web security policy mechanism whereby a web server
declares
that complying user agents (such as a web browser) are to interact with it using only secure
HTTPS
connections (i.e. HTTP layered over TLS/SSL).
|
URL | https://edge.microsoft.com/abusiveadblocking/api/v1/blocklist |
Method | GET |
Parameter | |
Attack | |
Evidence | max-age=0 |
Instances | 1 |
Solution |
Review the configuration of this control. Ensure that your web server, application server, load
balancer, etc. is configured to set Strict-Transport-Security with an appropriate max-age value.
|
Reference | http://tools.ietf.org/html/rfc6797#section-6.2 |
CWE Id | 319 |
WASC Id | 15 |
Plugin Id | 10035 |
Low
|
X-Content-Type-Options Header Missing |
---|---|
Description |
The Anti-MIME-Sniffing header X-Content-Type-Options was not set to 'nosniff'. This
allows
older versions of Internet Explorer and Chrome to perform MIME-sniffing on the response body,
potentially causing the response body to be interpreted and displayed as a content type other
than the
declared content type. Current (early 2014) and legacy versions of Firefox will use the declared
content
type (if one is set), rather than performing MIME-sniffing.
|
URL | http://43.204.203.77/admin/ |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/1213.bca9fde12e008d13.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/1232.b3a0b996ea7ced18.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/1236.ac00b447876f35b9.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/1382.9e89c899dafb16e2.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/1410.e3a454c0710677c9.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/1508.34db89c6110c7eb1.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/1531.bfac6ac261a7a729.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/1553.79ef9fb84a1533d6.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/1629.bf1bb77dbb335690.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/1631.91fac68058f2ba62.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/1671.6b5b3f2af01bb1d9.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/1855.a1c23c0399f16559.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/2039.76a232eb5be6d9c6.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/2061.0aaabbf01ef4124f.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/2164.eabe34d2d9541461.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/2174.8fbc351c90652f70.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/2258.3a7ca7b07681a1a7.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/2266.5257588dbe04091e.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/2323.c3670583ff5371a7.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/2352.38f6dd1009aa06fc.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/2455.77c97a23349bf3b9.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/2498.34fc6082abcd2f25.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/256.69b82f589c560e62.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/263.720e9c3bc3ed172f.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/3054.9c8fc0ccd99ba312.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/3085.835786bbfd845184.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/3176.0179da3689dfe749.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/3540.570918aaed1f303b.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/3548.88f0c804e8d28bbe.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/38.45a73bab14b7abbf.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/3851.7ff0770c5ea7829d.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/3911.9ad0191bda4456b8.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4064.6c1e4adbcdcac046.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4134.189a96638e0b2a09.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4182.eed8618ac35157d9.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4202.dd93c6202b312542.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4214.d99700b30528c4af.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4244.ab01d466bc47b4f4.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4248.aea604632219d8c3.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4338.a85572402a984d01.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4443.5a77094282f9cbe1.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4455.0cdbc03106a15a9c.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4515.6b24bd1f0a5b6df9.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4611.b376c6d86b62039f.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4682.8cfef23f793f094e.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/4954.97afa1213c59eedd.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/5013.bb0565972037a79e.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/5042.f969505118c2fd89.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/5063.2f17dc964eae5e98.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/5145.801736656b54c672.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/5308.d4cd4ffce10a71c7.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/5336.64676d9206ffa68f.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/5377.b0e45c2addd39450.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/5566.916466eea17e3544.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/5595.0612fe5ebe4f3c57.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/5608.2a1109079b10bf56.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/5641.87f5d32535958130.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/574.f68660774b9c7073.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/5864.e6cf23d4b8bde2ed.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/5939.e071093f9de25a2e.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/6083.6f52944e71c49843.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/6093.c4d026c0e6cfb2d8.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/636.4a87c2dcbbae797c.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/6727.65485f2be6cf644e.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/6874.b37fc5c4a6dc4918.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/6879.41e5a9c4f62a4f88.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/6905.3c4d514bdd7b26ca.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7.472206f9bbd253df.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7154.2187bd5843fba8a6.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7185.873f3f9c8855ff16.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7294.eeb6937739f265b5.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7314.735603d04c6a69dd.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7324.8258d7ea7c7489b9.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7339.78847452049e2559.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7498.39e2df10da020fde.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7633.de6dd6b9bf8bd228.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7648.a5db27b3c0c1ecc6.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7651.79a779703123ba4a.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7654.77a32404c600674d.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7739.b38d03efacc81c19.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7773.d25ce3f58b5e23a2.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7790.fbb1998e6164a47b.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7932.d9080416c797853a.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/7970.1ee5d960a1ca3532.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/808.1da73573c54d95e8.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/8110.a01cf4c1217d7be7.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/8410.20e060e1ec2ef01e.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/8461.4a04ccab7beaceee.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/8538.c93f9f4d8e30041f.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/8622.cf18b2bf0bacf8dd.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/8654.c58c2f574061819f.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/877.1d2d037edb7ebd92.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/8804.fad5e05126357e70.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/8891.0729d83d00f9d5a2.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/9041.de49dc19422a1558.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/9154.c62ca6951082ec08.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/9169.cc55dab143f39277.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/9279.999b16799a71fb09.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/9416.33eecdd80361ba8a.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/9442.6eba38d870f411d4.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/9473.7f26a820cc350a1a.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/9584.b6efee3482211830.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/9675.41014bbf75aaa443.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/993.8497a298a793d670.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/9990.467b034322daa8d5.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/assets/i18n/en.json |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/common.ef4a1c86199084fd.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/fa-solid-900.a7ba84a018f500ca.woff2 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/main.0f1cfd2e4f5d7956.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/polyfills.dd6de2846bef6fea.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/runtime.71e0e9c6b76c5be6.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://43.204.203.77/admin/styles.099d46fcafc5fcf1.css |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://detectportal.firefox.com/canonical.html |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | http://detectportal.firefox.com/success.txt?ipv4 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://cdn.plot.ly/plotly-basic-1.55.2.min.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-2023-05-20-17-04-38.chain |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edge.microsoft.com/abusiveadblocking/api/v1/blocklist |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edge.microsoft.com/entityextractiontemplates/api/v1/assets/find-assets?name=arbitration_priority_list&version=2.*.*&channel=stable&key=d414dd4f9db345fa8003e32adc81b362 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edge.microsoft.com/entityextractiontemplates/api/v1/assets/find-assets?name=edge_hub_apps_manifest&version=4.7.*&channel=stable&key=d414dd4f9db345fa8003e32adc81b362 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edge.microsoft.com/serviceexperimentation/v2/ |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeassetservice.azureedge.net/assets/arbitration_priority_list/2.0.6/asset?sv=2017-07-29&sr=c&sig=syVgbBkg8uucUCbdAhbOcJHbhbWxF6Oaa0Ff5bb1IjQ%3D&st=2021-01-01T00%3A00%3A00Z&se=2023-06-30T00%3A00%3A00Z&sp=r&assetgroup=ArbitrationService |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeassetservice.azureedge.net/assets/edge_hub_apps_manifest/4.7.36/asset?sv=2017-07-29&sr=c&sig=syVgbBkg8uucUCbdAhbOcJHbhbWxF6Oaa0Ff5bb1IjQ%3D&st=2021-01-01T00%3A00%3A00Z&se=2023-06-30T00%3A00%3A00Z&sp=r&assetgroup=Shoreline |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/edgesvc/shell?&lightschemeovr=1&FORM=SHORUN&udscs=1&udsnav=1&setlang=en-GB&clientscopes=noheader,coauthor,chat,docvisibility,visibilitypm,&udsframed=1 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/6gwyvgUhMc_64xL4rIZIJiyI9Ik.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/BAWWNeRGZhdEM4X57-nYh3UUFWc.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/ehzbwa_MRvvT9Ntrf63tSdC2v6Y.css |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/Fl8hvdN-LRA_glbu6-DmucPb4hM.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/GBZ850ngNs7Vmx3K8jd6CJOXRog.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/IBCVtVNB4rIhrEoojHm4hLXgrio.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/JDsGCskJXJerqDlueE-JSck9YmY.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/jmjzP7bqHB1J2F3r3-zjXIy-E3o.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/jTX_lM98lKg9-czTzwiLUsV1Qbk.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/jyS-PUG9r2tazj4oG7YRLfgYf7Y.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/L3yoqw4shqYEILXl6pvlKqIoidw.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/Ltkqat-zSiRMPQNVPxjDdcFwJN4.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/qmFSVX8C0H6ihoMV-nT2OqfHW8E.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/rO-9PeVNCXkmW0qTG4ecU5hJ2Rc.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/T9UqkhCuv2zPJwI6ajUfDJtHw10.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/tVjySZU7uHF3djX0d9UfyyYoJZg.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/uvA8zPxfq5UVAj_3sgYCDgEEyx0.css |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/Wqzke5Dmb4xly7TpIjaICZD4pLI.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://edgeservices.bing.com/rp/XyQNqvQakaG0v1trKEJdUG1Lw0w.js |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://tracking-protection.cdn.mozilla.net/ads-track-digest256/1668785275 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://tracking-protection.cdn.mozilla.net/analytics-track-digest256/1663274228 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://tracking-protection.cdn.mozilla.net/base-cryptomining-track-digest256/1604686195 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://tracking-protection.cdn.mozilla.net/base-email-track-digest256/1668785275 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://tracking-protection.cdn.mozilla.net/base-fingerprinting-track-digest256/1663274228 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://tracking-protection.cdn.mozilla.net/content-email-track-digest256/1668785275 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://tracking-protection.cdn.mozilla.net/content-track-digest256/1670952926 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://tracking-protection.cdn.mozilla.net/google-trackwhite-digest256/1604686195 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://tracking-protection.cdn.mozilla.net/mozstd-trackwhite-digest256/1670952926 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://tracking-protection.cdn.mozilla.net/social-track-digest256/1668785275 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://tracking-protection.cdn.mozilla.net/social-tracking-protection-facebook-digest256/1604686195 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://tracking-protection.cdn.mozilla.net/social-tracking-protection-linkedin-digest256/1564526481 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://tracking-protection.cdn.mozilla.net/social-tracking-protection-twitter-digest256/1604686195 |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://www2.bing.com/ipv6test/test |
Method | GET |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
URL | https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=111.0&pver=2.2 |
Method | POST |
Parameter | X-Content-Type-Options |
Attack | |
Evidence | |
Instances | 158 |
Solution |
Ensure that the application/web server sets the Content-Type header appropriately, and that it
sets the
X-Content-Type-Options header to 'nosniff' for all web pages.
If possible, ensure that the end user uses a standards-compliant and modern web browser that
does not
perform MIME-sniffing at all, or that can be directed by the web application/web server to not
perform
MIME-sniffing.
|
Reference |
http://msdn.microsoft.com/en-us/library/ie/gg622941%28v=vs.85%29.aspx
https://owasp.org/www-community/Security_Headers |
CWE Id | 693 |
WASC Id | 15 |
Plugin Id | 10021 |
Informational
|
Content Security Policy (CSP) Report-Only Header Found |
---|---|
Description |
The response contained a Content-Security-Policy-Report-Only header, this may indicate a
work-in-progress implementation, or an oversight in promoting pre-Prod to Prod, etc.
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate
certain
types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks
are
used for everything from data theft to site defacement or distribution of malware. CSP provides
a set of
standard HTTP headers that allow website owners to declare approved sources of content that
browsers
should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts,
images
and embeddable objects such as Java applets, ActiveX, audio and video files.
|
URL | https://www2.bing.com/ipv6test/test |
Method | GET |
Parameter | |
Attack | |
Evidence | |
Instances | 1 |
Solution |
Ensure that your web server, application server, load balancer, etc. is configured to set the
Content-Security-Policy header.
|
Reference |
https://www.w3.org/TR/CSP2/
https://w3c.github.io/webappsec-csp/ http://caniuse.com/#feat=contentsecuritypolicy http://content-security-policy.com/ |
CWE Id | 693 |
WASC Id | 15 |
Plugin Id | 10038 |
Informational
|
Content-Type Header Missing |
---|---|
Description |
The Content-Type header was either missing or empty.
|
URL | https://edgeservices.bing.com/ipv6test/test?FORM=MONITR |
Method | GET |
Parameter | |
Attack | |
Evidence | |
Instances | 1 |
Solution |
Ensure each page is setting the specific and appropriate content-type value for the content
being
delivered.
|
Reference | http://msdn.microsoft.com/en-us/library/ie/gg622941%28v=vs.85%29.aspx |
CWE Id | 345 |
WASC Id | 12 |
Plugin Id | 10019 |
Informational
|
Cookie Poisoning |
---|---|
Description |
This check looks at user-supplied input in query string parameters and POST data to identify
where
cookie parameters might be controlled. This is called a cookie poisoning attack, and becomes
exploitable
when an attacker can manipulate the cookie in various ways. In some cases this will not be
exploitable,
however, allowing URL parameters to set cookie values is generally considered a bug.
|
URL | https://edgeservices.bing.com/edgesvc/shell?&lightschemeovr=1&FORM=SHORUN&udscs=1&udsnav=1&setlang=en-GB&clientscopes=noheader,coauthor,chat,docvisibility,visibilitypm,&udsframed=1 |
Method | GET |
Parameter | FORM |
Attack | |
Evidence | |
Instances | 1 |
Solution |
Do not allow user input to control cookie names and values. If some query string parameters
must be set
in cookie values, be sure to filter out semicolon's that can serve as name/value pair
delimiters.
|
Reference | http://websecuritytool.codeplex.com/wikipage?title=Checks#user-controlled-cookie |
CWE Id | 20 |
WASC Id | 20 |
Plugin Id | 10029 |
Informational
|
Loosely Scoped Cookie |
---|---|
Description |
Cookies can be scoped by domain or path. This check is only concerned with domain scope.The
domain
scope applied to a cookie determines which domains can access it. For example, a cookie can be
scoped
strictly to a subdomain e.g. www.nottrusted.com, or loosely scoped to a parent domain e.g.
nottrusted.com. In the latter case, any subdomain of nottrusted.com can access the cookie.
Loosely
scoped cookies are common in mega-applications like google.com and live.com. Cookies set from a
subdomain like app.foo.bar are transmitted only to that domain by the browser. However, cookies
scoped
to a parent-level domain may be transmitted to the parent, or any subdomain of the parent.
|
URL | https://edgeservices.bing.com/edgesvc/shell?&lightschemeovr=1&FORM=SHORUN&udscs=1&udsnav=1&setlang=en-GB&clientscopes=noheader,coauthor,chat,docvisibility,visibilitypm,&udsframed=1 |
Method | GET |
Parameter | |
Attack | |
Evidence | |
Instances | 1 |
Solution |
Always scope cookies to a FQDN (Fully Qualified Domain Name).
|
Reference |
https://tools.ietf.org/html/rfc6265#section-4.1
https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/06-Session_Management_Testing/02-Testing_for_Cookies_Attributes.html http://code.google.com/p/browsersec/wiki/Part2#Same-origin_policy_for_cookies |
CWE Id | 565 |
WASC Id | 15 |
Plugin Id | 90033 |
Informational
|
Modern Web Application |
---|---|
Description |
The application appears to be a modern web application. If you need to explore it automatically
then
the Ajax Spider may well be more effective than the standard one.
|
URL | http://43.204.203.77/admin/ |
Method | GET |
Parameter | |
Attack | |
Evidence | <script src="https://cdn.jsdelivr.net/npm/ckeditor@4.9.1/ckeditor.js"></script> |
URL | https://edgeservices.bing.com/edgesvc/shell?&lightschemeovr=1&FORM=SHORUN&udscs=1&udsnav=1&setlang=en-GB&clientscopes=noheader,coauthor,chat,docvisibility,visibilitypm,&udsframed=1 |
Method | GET |
Parameter | |
Attack | |
Evidence | <a id="sb_feedback" role="button" target="_blank" _ctf="rdr_T" class="linkBtn" h="ID=SERP,5029.1"><span class="sb_fbdText">Feedback</span></a> |
Instances | 2 |
Solution |
This is an informational alert and so no changes are required.
|
Reference | |
CWE Id | |
WASC Id | |
Plugin Id | 10109 |