https://www.docker.com/

Submitted URL:
https://www.docker.com/
Report Finished:

Risks · 0 found

Practices that may pose security risks

Security Headers · 6 found

HTTP response headers that can harden the security of a web application

Learn more...
NameValueSupportInfo
Strict-Transport-Securitymax-age=31536000Declare that a website is only accessible over a secure connection (HTTPS).

Click to learn more...
X-Frame-OptionsSAMEORIGINIndicate whether a browser should be allowed to render a page in a <frame>, <iframe>, <embed> or <object>.

Click to learn more...
X-Content-Type-OptionsnosniffIndicate that the MIME types advertised in the Content-Type headers should be followed and not be changed.

Click to learn more...
Content-Security-Policy—Control resources the user agent is allowed to load for a given page.

Click to learn more...
Referrer-Policystrict-origin-when-cross-originControl how much referrer information should be included with requests.

Click to learn more...
Clear-Site-Data—Control the data stored by a client browser for their origins.

Click to learn more...
X-Permitted-Cross-Domain-Policies—Control whether a web client such as Adobe Flash Player or Adobe Acrobat has permission to handle data across domains.

Click to learn more...
Permissions-Policygeolocation=(); microphone=(); camera=(); fullscreen=(self); payment=()Allow and deny the use of browser features in a document or iframe.

Click to learn more...
Cross-Origin-Embedder-Policy—Configure embedding cross-origin resources into the document.

Click to learn more...
Cross-Origin-Opener-Policy—Ensure a top-level document does not share a browsing context group with cross-origin documents.

Click to learn more...
Cross-Origin-Resource-Policy—Request that the browser blocks no-cors cross-origin/cross-site requests to the given resource.

Click to learn more...
X-XSS-Protection1; mode=blockDeprecated. Stops pages from loading when they detect reflected cross-site scripting (XSS) attacks.

Click to learn more...
Feature-Policy—Deprecated. Replaced by the Permissions-Policy header.

Click to learn more...
Expect-CT—Deprecated. Opt in to reporting and/or enforcement of Certificate Transparency requirements.

Click to learn more...
Public-Key-Pins—Deprecated. Allows HTTPS websites to resist impersonation by attackers using mis-issued or otherwise fraudulent certificates.

Click to learn more...

Security Violations · 0 found

Requests or resources offending security policies

Certificates · 9 found

SSL/TLS Certificates enable websites to encrypt transactions between the client and the server and provide server identity verification

SubjectIssue dateExpiry date
www.docker.comDec 5, 2024, 11:45:13Mar 5, 2025, 11:45:12
upload.video.google.comNov 4, 2024, 08:38:51Jan 27, 2025, 08:38:50
www.google.comNov 4, 2024, 08:39:37Jan 27, 2025, 08:39:36
cookielaw.orgDec 9, 2024, 19:16:11Mar 9, 2025, 20:16:09
*.google-analytics.comNov 4, 2024, 08:37:47Jan 27, 2025, 08:37:46
*.gstatic.comNov 4, 2024, 08:38:50Jan 27, 2025, 08:38:49
*.apis.google.comNov 4, 2024, 08:39:42Jan 27, 2025, 08:39:41
*.visualwebsiteoptimizer.comJun 29, 2024, 05:16:26Jul 31, 2025, 05:16:26
geolocation.onetrust.comDec 9, 2024, 18:59:53Mar 9, 2025, 19:59:51