Security Report Summary
R
Redirect: Click here to follow the redirect to https://otvet.mail.ru/.
Site: http://otvet.mail.ru/ - (Scan again over https)
IP Address: 5.61.236.236
Report Time: 28 May 2022 05:23:19 UTC
Headers:
  • Content-Security-Policy
  • X-Frame-Options
  • X-Content-Type-Options
  • Referrer-Policy
  • Permissions-Policy
Warning: Grade capped at A, please see warnings below.
Supported By
Probely
Perform a deeper security analysis of your website and APIs:
Raw Headers
HTTP/1.1301 Moved Permanently
Servernginx/1.21.6
DateSat, 28 May 2022 05:23:19 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Locationhttps://otvet.mail.ru/
X-XSS-Protection1; mode=block; report=https://xss-report.otvet.mail.ru
Content-Security-Policy-Report-Onlystyle-src 'unsafe-inline' 'unsafe-eval' *.mail.ru *.imgsmail.ru *.mradx.net yandex.st yastatic.net yastat.net fonts.googleapis.com relap.io *.criteo.net *.criteo.com consentmanager.mgr.consensu.org *.consentmanager.mgr.consensu.org; font-src data: *.mail.ru *.imgsmail.ru *.mradx.net an.yandex.ru yastatic.net yastat.net fonts.gstatic.com relap.io *.criteo.net *.criteo.com fonts.googleapis.com; report-uri https://csp-report-only.otvet.mail.ru
Content-Security-Policydefault-src 'self' 'unsafe-inline' 'unsafe-eval' chromeinvoke: chromeinvokeimmediate: chromenull: data: mx: localhost local.otvet.mail.ru *.perl7.otvet.cloud.devmail.ru perl7.otvet.cloud.devmail.ru *.mail.ru *.appsmail.ru *.imgsmail.ru *.mradx.net an.yandex.ru yastatic.net yastat.net *.gemius.pl *.weborama.fr *.adriver.ru *.serving-sys.com *.live.com *.youtube.com *.youtube.ru *.youtu.be *.rutube.ru *.vimeo.com *.smotri.com *.dailymotion.com *.rambler.ru *.ivi.ru *.videomore.ru *.google-analytics.com *.googlesyndication.com *.googleapis.com *.gstatic.com *.google.com *.doubleclick.net *.ya.ru ya.ru yandex.ru *.yandex.ru *.odnoklassniki.ru *.ok.ru ok.ru *.scorecardresearch.com vk.com *.vk.com connect.facebook.net *.moatads.com *.doubleverify.com *.adsafeprotected.com *.dvtps.com *.googletagservices.com *.googleadservices.com *.adlooxtracking.com relap.io *.criteo.net *.criteo.com consentmanager.mgr.consensu.org *.consentmanager.mgr.consensu.org; img-src data: blob: *; style-src 'unsafe-inline' 'unsafe-eval' blob: *.mail.ru *.imgsmail.ru *.mradx.net *.perl7.otvet.cloud.devmail.ru perl7.otvet.cloud.devmail.ru fonts.googleapis.com relap.io *.criteo.net *.criteo.com consentmanager.mgr.consensu.org *.consentmanager.mgr.consensu.org; font-src data: blob: *.mail.ru *.imgsmail.ru *.mradx.net fonts.gstatic.com relap.io *.criteo.net *.criteo.com; child-src mail.ru *.mail.ru *.mradx.net *.doubleverify.com *.doubleclick.net *.youtube.com; connect-src 'self' ws: wss: chromenull: localhost local.otvet.mail.ru *.mail.ru *.imgsmail.ru *.mradx.net an.yandex.ru strm.yandex.ru mc.yandex.ru yandex.st yastatic.net jstracer.yandex.ru yastat.net yandex.ru www.google-analytics.com ssl.google-analytics.com *.serving-sys.com *.doubleverify.com relap.io *.criteo.net *.criteo.com consentmanager.mgr.consensu.org *.consentmanager.mgr.consensu.org vk.com *.vk.com ok.ru; frame-src 'self' chromenull: data: blob: localhost local.otvet.mail.ru mail.ru *.mail.ru *.imgsmail.ru *.mradx.net st.yandexadexchange.net yandexadexchange.net an.yandex.ru mc.yandex.ru awaps.yandex.ru yastatic.net yastat.net www.google-analytics.com googleads.g.doubleclick.net ssl.google-analytics.com *.facebook.com vk.com *.vk.com connect.ok.ru *.doubleverify.com *.doubleclick.net *.youtube.com consentmanager.mgr.consensu.org *.consentmanager.mgr.consensu.org *.criteo.com; report-uri https://csp.otvet.mail.ru
Missing Headers
X-Frame-OptionsX-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking. Recommended value "X-Frame-Options: SAMEORIGIN".
X-Content-Type-OptionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".
Referrer-PolicyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
Permissions-PolicyPermissions Policy is a new header that allows a site to control which features and APIs can be used in the browser.
Warnings
Site is using HTTPThis site was served over HTTP and did not redirect to HTTPS.
Content-Security-PolicyThis policy contains 'unsafe-inline' which is dangerous in the default-src directive. This policy contains 'unsafe-eval' which is dangerous in the default-src directive. This policy contains 'unsafe-inline' which is dangerous in the style-src directive. This policy contains 'unsafe-eval' which is dangerous in the style-src directive.
Upcoming Headers
Cross-Origin-Embedder-PolicyCross-Origin Embedder Policy allows a site to prevent assets being loaded that do not grant permission to load them via CORS or CORP.
Cross-Origin-Opener-PolicyCross-Origin Opener Policy allows a site to opt-in to Cross-Origin Isolation in the browser.
Cross-Origin-Resource-PolicyCross-Origin Resource Policy allows a resource owner to specify who can load the resource.
Additional Information
ServerThis Server header seems to advertise the software being run on the server but you can remove or change this value.
X-XSS-ProtectionX-XSS-Protection sets the configuration for the XSS Auditor built into older browsers. The recommended value was "X-XSS-Protection: 1; mode=block" but you should now look at Content Security Policy instead.
Content-Security-Policy-Report-OnlyContent Security Policy Report Only is used to test a Content Security Policy before making it live. The browser will report on actions that would have been taken based on the policy. Analyse this policy in more detail. You can sign up for a free account on Report URI to collect reports about problems on your site.
Content-Security-PolicyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets. Analyse this policy in more detail. You can sign up for a free account on Report URI to collect reports about problems on your site.