Severity: Information
Invicti detected data: use in a CSP directive.
data:
An attacker can bypass CSP and exploit a Cross-site Scripting vulnerability successfully by using data: protocol.
Remove data: sources from your CSP directives.
Vulnerability Index
You can search and find all vulnerabilities
Select Category
Search Vulnerability
Tags
Related Vulnerabilities
Dead accurate, fast & easy-to-use Web Application Security Scanner