- Scan ID:
- 3aacd7ea-e544-4adf-b0b4-dd4e4da25a6dFinished
- Submitted URL:
- https://qrco.de/bfei3DRedirected
- Report Finished:
Risks · 0 found
Practices that may pose security risks
Security Headers · 1 found
HTTP response headers that can harden the security of a web application
Learn more...Security Violations · 7 found
Requests or resources offending security policies
Violation | Type | Info |
---|---|---|
| Subresource Integrity | Enables browsers to verify that resources fetched are not manipulated. Click to learn more... |
| Cross-Origin Resource Sharing | Controls which external origins are allowed load resources. Click to learn more... |
| Cross-Origin Resource Sharing | Controls which external origins are allowed load resources. Click to learn more... |
| Cross-Origin Resource Sharing | Controls which external origins are allowed load resources. Click to learn more... |
| Cross-Origin Resource Sharing | Controls which external origins are allowed load resources. Click to learn more... |
| Cross-Origin Resource Sharing | Controls which external origins are allowed load resources. Click to learn more... |
| Cross-Origin Resource Sharing | Controls which external origins are allowed load resources. Click to learn more... |
Certificates · 6 found
SSL/TLS Certificates enable websites to encrypt transactions between the client and the server and provide server identity verification
Subject | Issue date | Expiry date |
---|---|---|
web.app | Dec 4, 2024, 17:01:24 | Mar 4, 2025, 17:01:23 |
bootstrapcdn.com | Nov 18, 2024, 00:43:34 | Feb 16, 2025, 00:43:33 |
jsdelivr.net | Jul 30, 2024, 15:36:05 | Aug 31, 2025, 15:36:04 |
moonito.net | Dec 4, 2024, 11:46:55 | Mar 4, 2025, 11:46:54 |
www.google.com | Dec 2, 2024, 08:37:44 | Feb 24, 2025, 08:37:43 |
*.gstatic.com | Dec 2, 2024, 08:36:58 | Feb 24, 2025, 08:36:57 |