Weak Nonce Detected in Content Security Policy (CSP) Declaration
Invicti detected that a weak nonce
value used in CSP declaration.
An attacker can carry out a successful Cross-site Scripting attack by predicting a valid nonce
by exploiting this weakness.
The application must generate a fresh value for the nonce-value
directive at random and independently each time it transmits a policy. The value should be at least 128 bits long and should be generated using a cryptographically secure random number generator.