Invicti detected data: use in a CSP directive.
An attacker can bypass CSP and exploit a Cross-site Scripting vulnerability successfully by using data: protocol.
Remove data: sources from your CSP directives.

You can search and find all vulnerabilities
