bot@idyllum:~$ Please wait, the scan will start shortly
bot@idyllum:~$ Scanning: /100
bot@idyllum:~$ Web Security Optimization (WSO) scan failed! Please try again
This site redirects to
Invalid domain!
Because of this, sensitive data coming from service providers or external databases could be intercepted and stolen.
Because of this, sensitive data coming from service providers or external databases could be intercepted and stolen.
Tags:information leak ·
What does this mean?Cross-Origin Request Site is an OWASP TOP 10 Security Misconfiguration vulnerability. In the process of enabling information sharing between sites, people tend to overlook the significance of CORS configuration. As developers or security experts, it's very important that you are aware of this vulnerability and how it can be exploited.
Web browser data loading may be possible, due to a Cross Origin Resource Sharing (CORS) misconfiguration on the web server
How to solve this?This sensitive data is available only for logged in customers. To see detailed security information please create a free account and log in.
Log in or sign upAn attacker could add this website as an invisible layer on top of theirs or impersonate your site by showing selected parts of it in their website
An attacker could add this website as an invisible layer on top of theirs or impersonate your site by showing selected parts of it in their website
Tags:clickjacking · tricking users ·
What does this mean?This vulnerability may allow an attack that is known as clickjacking. Clickjacking is technique where the user thinks they are performing an action, such a clicking a link, on one site. However, in reality their click is actually used to perform some other action on a site they are logged in from the same web browser. This particular vulnerability may allow an attacker to add your site as an invisible layer over their own website. To the user it looks like they are just browsing a harmless website when in reality all their clicks are actually registered on another logged in website.
X-Frame-Options header is not included in the HTTP response to protect against 'ClickJacking' attacks.
How to solve this?This sensitive data is available only for logged in customers. To see detailed security information please create a free account and log in.
Log in or sign up Real world exampleIn 2010 and 2011 both Twitter and Facebook were vulnerable to a type of clickjacking attack that posted a malicious url to the users Twitter and Facebook account respectively. Friends and followers who clicked on those malicious links were subjected to the same attack. As a result, the attack spread quickly through the social media giants' user bases.
By ignoring this, an attacker could completely take over your site.
By ignoring this, an attacker could completely take over your site.
Tags:XSS · site takeover · data theft · malware spreading ·
What does this mean?Content Security Policy (CSP) is an extra layer of security that helps to relieve some types of serious attacks, including Cross Site Scripting (XSS) and data injection. These attacks can range from data theft and distribution of malware to total site takeover.
The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined: frame-ancestor
How to solve this?This sensitive data is available only for logged in customers. To see detailed security information please create a free account and log in.
Log in or sign up Real world exampleIn 2017, cybercriminals were able to use listings of dental tools on eBay to extract login credentials from their victims. This was achieved by exploiting a XSS vulnerability.
Because of this your users on public computers could press the back button and view secure pages even after logging out.
Because of this your users on public computers could press the back button and view secure pages even after logging out.
Tags:bypass security ·
What does this mean?The cache-control and pragma HTTP header have not been set properly or are missing allowing the browser and proxies to cache content.
How to solve this?This sensitive data is available only for logged in customers. To see detailed security information please create a free account and log in.
Log in or sign upBecause of this users could upload potentially harmful code to your website. This is especially dangerous in sites where users can upload anything.
Because of this users could upload potentially harmful code to your website. This is especially dangerous in sites where users can upload anything.
Tags:phishing · unauthorized hotlinking ·
What does this mean?The X-Content-Type-Options response HTTP header is a marker used by the server to indicate that the file types advertised in the Content-Type headers should not be changed and be followed. This allows to opt-out of MIME type sniffing, or, in other words, it is a way to say that the webmasters knew what they were doing.
The Anti-MIME-Sniffing header X-Content-Type-Options was not set to 'nosniff'. This allows older versions of Internet Explorer and Chrome to perform MIME-sniffing on the response body, potentially causing the response body to be interpreted and displayed as a content type other than the declared content type. Current (early 2014) and legacy versions of Firefox will use the declared content type (if one is set), rather than performing MIME-sniffing.
How to solve this?This sensitive data is available only for logged in customers. To see detailed security information please create a free account and log in.
Log in or sign upBecause of this your clients could unknowingly let bad actors into your website.
Because of this your clients could unknowingly let bad actors into your website.
Tags:bypass security · impersonate users ·
What does this mean?Cross-site scripting (XSS) is a security exploit which allows an attacker to inject malicious client-side code into a website. This code is executed by the victims and lets the attackers bypass access controls and impersonate users.
Web Browser XSS Protection is not enabled, or is disabled by the configuration of the 'X-XSS-Protection' HTTP response header on the web server
How to solve this?This sensitive data is available only for logged in customers. To see detailed security information please create a free account and log in.
Log in or sign up Real world exampleSamy (also known as JS.Spacehero) was a XSS worm that was designed to propagate across the MySpace social-networking site. Within just 20 hours of its release, over one million users had run the payload making Samy the fastest spreading virus of all time.
This site has not been manually inspected yet. Please apply for an inspection here
Is lemonadestand.ee secure and safe to use?
We at Idyllum Labs wanted to find out! That is why we built this automated website security scanner and generated this report.
Please understand, that is an automated and unbiased Web Security Optimization (WSO) check for lemonadestand.ee and has nothing to do with human subjectivity, thoughts, opinions or relationships.
If you have comments, don't agree with the results or want to submit a site for manual examination, don't hesitate to contact us.
Run a free Web Security Optimization (WSO) scan at Idyllum.com!
Please log in to see the full security audit and vulnerability locations
Create an account