Summary of getfit.ng [Desktop version] Website Security Test
Provided "as is" without any warranty of any kind.
Date/Time:Feb 18th, 2021 16:04 GMT+0
Server IP:192.3.202.210
Reverse DNS:wgh3.whogohost.com
Location:Buffalo, United States
Version:for desktop
Your final score:
- A
- B
- C
- F
C
This test was made 1867 days ago and may be outdated
Refresh Test
The website has at least one folder with enabled directory listing, putting its content at risk.
Misconfiguration or weakness
Executive Summary for getfit.ng
- 30 third-party web software dependancies were identified, including 20 outdated dependancies. No known vulnerabilities were detected. 4 identified third-party web software dependancies have unknown versions. The CMS (WordPress) was identified, however, its version could not be determined. The following CMS components, JS-libraries or frameworks were identified: MC4WP: Mailchimp for WordPress, PayPal Plus for WooCommerce, jQuery Parallax, and others. Software fingerprinting may be restricted by the system, so the results could be incomplete. Show details.
- No obvious GDPR-related compliance issues were detected across Privacy Policy, Website Security, TLS Encryption, Cookie Protection, Cookie Disclaimer. Website Security check may be incomplete because fingerprinting attempts appear to be blocked. Show details.
- All key security headers are missing. An optional HTTP header may not be properly configured: X-Powered-By. Deprecated HTTP headers detected: Public-Key-Pins, Public-Key-Pins-Report-Only, X-XSS-Protection. Show details.
- Content-Security-Policy headers are not present. Show details.
- One cookie detected; PHPSESSID has security or privacy-related configuration issues. Show details.
- 41 external requests detected; 1 request failed. Show details.
- No significant anti-scraping protections were detected. Show details.