Security Report Summary
C
Site: https://avvocato-italiano.fr/
IP Address: 185.146.22.239
Report Time: 19 Apr 2024 21:44:54 UTC
Headers:
  • Strict-Transport-Security
  • X-Frame-Options
  • X-Content-Type-Options
  • Content-Security-Policy
  • Referrer-Policy
  • Permissions-Policy
Advanced:
Not bad… Maybe you should perform a deeper security analysis of your website and APIs:
Missing Headers
Content-Security-PolicyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets.
Referrer-PolicyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
Permissions-PolicyPermissions Policy is a new header that allows a site to control which features and APIs can be used in the browser.
Raw Headers
HTTP/2200
x-powered-byPHP/7.4.33
set-cookie483085d2f00acfb89b2acf8f4355a6ce=12f7d581caa914285317a7c2c657c75b; path=/; secure; HttpOnly
link</templates/shaper_helixultimate/fonts/fontawesome-webfont.eot?v=4.7.0>; rel=preload; as=font; crossorigin; type="application/vnd.ms-fontobject",</templates/shaper_helixultimate/fonts/fontawesome-webfont.eot#iefix&v=4.7.0>; rel=preload; as=font; crossorigin; type="application/vnd.ms-fontobject",</templates/shaper_helixultimate/fonts/fontawesome-webfont.woff2?v=4.7.0>; rel=preload; as=font; crossorigin; type="font/woff2",</templates/shaper_helixultimate/fonts/fontawesome-webfont.woff?v=4.7.0>; rel=preload; as=font; crossorigin; type="font/woff",</templates/shaper_helixultimate/fonts/fontawesome-webfont.ttf?v=4.7.0>; rel=preload; as=font; crossorigin; type="font/ttf",</templates/shaper_helixultimate/fonts/fontawesome-webfont.svg?v=4.7.0#fontawesomeregular>; rel=preload; as=font; crossorigin; type="image/svg+xml",</images/logo.png>; rel=preload; as=image,</images/wa.png>; rel=preload; as=image,</images/foto.jpg>; rel=preload; as=image,</component/com_rsfirewall/string,Z2FyZ2l1bG8uYXZ2ZnJhbmNlc2NvQHlhaG9vLml0/task,cloak/>; rel=preload; as=image
varyAccept-Encoding,User-Agent
content-typetext/html; charset=utf-8
expiresWed, 17 Aug 2005 00:00:00 GMT
last-modifiedFri, 19 Apr 2024 21:44:54 GMT
cache-controlno-store, no-cache, must-revalidate, post-check=0, pre-check=0
pragmano-cache
content-encodinggzip
dateFri, 19 Apr 2024 21:44:54 GMT
serverLiteSpeed
strict-transport-securitymax-age=63072000; includeSubDomains
x-frame-optionsSAMEORIGIN
x-content-type-optionsnosniff
alt-svch3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
Upcoming Headers
Cross-Origin-Embedder-PolicyCross-Origin Embedder Policy allows a site to prevent assets being loaded that do not grant permission to load them via CORS or CORP.
Cross-Origin-Opener-PolicyCross-Origin Opener Policy allows a site to opt-in to Cross-Origin Isolation in the browser.
Cross-Origin-Resource-PolicyCross-Origin Resource Policy allows a resource owner to specify who can load the resource.
Additional Information
x-powered-byX-Powered-By can usually be seen with values like "PHP/5.5.9-1ubuntu4.5" or "ASP.NET". Trying to minimise the amount of information you give out about your server is a good idea. This header should be removed or the value changed.
serverServer value has been changed. Typically you will see values like "Microsoft-IIS/8.0" or "nginx 1.7.2".
strict-transport-securityHTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS.
x-frame-optionsX-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.
x-content-type-optionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".