Website Vulnerability Scanner Report (Light)
Website Vulnerability Scanner Report (Light)
Website fingerprinting
SQL injection
Cross-Site Scripting
https://www.facebook.com/sopno.heinbalok
Summary
Ov erall risk lev el: Risk rat ings: Scan informat ion:
L ow High: 0 Start time: 2020-06-11 12:39:02 UTC+03
Medium: 0 Finish time: 2020-06-11 12:39:25 UTC+03
Findings
Details
Ris k de s c ription:
There is no particular security risk in having a robots.txt file. However, this file is often misused to try to hide some web pages from the users.
This should not be done as a security measure because these URLs can easily be read from the robots.txt file.
1/3
<input class="inputtext login_form_input_box" data-testid="royal_pass" id="pass" name="pass" type="password"/>
Details
Ris k de s c ription:
When password auto-complete is enabled, the browser will remember the password entered into the login form, such that it will automatically
fill it next time the user tries to login.
However, if an attacker gains physical access to the victim's computer, he can retrieve the saved password from the browser's memory and use
it to gain access to the victim's account in the application.
Furthermore, if the application is also vulnerable to Cross-Site Scripting, the attacker could steal the saved password remotely.
Communication is secure
2/3
Scan coverage information
Scan parameters
Website URL: https://www.facebook.com/sopno.heinbalok
Scan type: Light
Authentication: False
3/3