URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Submission: On April 16 via api from US

Summary

This website contacted 4 IPs in 3 countries across 4 domains to perform 31 HTTP transactions. The main IP is 185.199.108.153, located in United States and belongs to FASTLY, US. The main domain is bounty-team.github.io.
TLS certificate: Issued by DigiCert SHA2 High Assurance Server CA on May 6th 2020. Valid for: 2 years.
This is the only time bounty-team.github.io was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
17 185.199.108.153 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
9 2a09:7:1000:f... 24013 (SB SB Pro...)
4 2a00:1450:400... 15169 (GOOGLE)
31 4
Domain Requested by
17 bounty-team.github.io bounty-team.github.io
9 i.loli.net bounty-team.github.io
4 fonts.gstatic.com fonts.googleapis.com
1 fonts.googleapis.com bounty-team.github.io
31 4

This site contains links to these domains. Also see Links.

Domain
i.loli.net
Subject Issuer Validity Valid
www.github.com
DigiCert SHA2 High Assurance Server CA
2020-05-06 -
2022-04-14
2 years crt.sh
upload.video.google.com
GTS CA 1O1
2021-03-23 -
2021-06-15
3 months crt.sh
*.loli.net
AlphaSSL CA - SHA256 - G2
2020-10-27 -
2021-11-28
a year crt.sh
*.gstatic.com
GTS CA 1O1
2021-03-16 -
2021-06-08
3 months crt.sh

This page contains 1 frames:

Primary Page: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Frame ID: 4E9B96E4DA2C85E937940CB47B50D9B3
Requests: 31 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /^https?:\/\/[^/]+\.github\.io\//i
  • headers server /^GitHub\.com$/i

Overall confidence: 100%
Detected patterns
  • headers via /varnish(?: \(Varnish\/([\d.]+)\))?/i

Overall confidence: 100%
Detected patterns
  • url /^https?:\/\/[^/]+\.github\.io\//i
  • headers server /^GitHub\.com$/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • url /^https?:\/\/[^/]+\.github\.io\//i
  • headers server /^GitHub\.com$/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Page Statistics

31
Requests

100 %
HTTPS

75 %
IPv6

4
Domains

4
Subdomains

4
IPs

3
Countries

1700 kB
Transfer

1897 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

31 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
24 KB
6 KB
Document
General
Full URL
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
748fbd0f411ee066a3738e346fbca5f9044166df0486fef696fcda94bde56460
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:method
GET
:authority
bounty-team.github.io
:scheme
https
:path
/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

server
GitHub.com
content-type
text/html; charset=utf-8
strict-transport-security
max-age=31556952
last-modified
Fri, 16 Apr 2021 08:51:23 GMT
access-control-allow-origin
*
etag
W/"6079500b-6120"
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
content-encoding
gzip
x-proxy-cache
MISS
x-github-request-id
37E8:6A62:620D6C:65116C:60798CFE
accept-ranges
bytes
date
Fri, 16 Apr 2021 13:25:39 GMT
via
1.1 varnish
age
0
x-served-by
cache-ams21039-AMS
x-cache
HIT
x-cache-hits
1
x-timer
S1618579540.836151,VS0,VE92
vary
Accept-Encoding
x-fastly-request-id
616ee6c4b486457d682cd6e83a1f575e572868d4
content-length
6091
jquery.fancybox.css
bounty-team.github.io/assets/lib/fancybox/source/
5 KB
2 KB
Stylesheet
General
Full URL
https://bounty-team.github.io/assets/lib/fancybox/source/jquery.fancybox.css?v=2.1.5
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
968a8e56e4adaf8c135199ebd7f6cc065424ca45974d4dfbeb5607e69fe72fcd
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/fancybox/source/jquery.fancybox.css?v=2.1.5
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
4f2a1f18a4f697297b114b25f1966099edadff67
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-131f"
age
0
x-cache
HIT
content-length
1434
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
2992:2EA6:1F5B56:200882:60798CFE
x-timer
S1618579540.955303,VS0,VE93
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
css
fonts.googleapis.com/
4 KB
967 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato:300,300italic,400,400italic,700,700italic&subset=latin,latin-ext
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80e::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
85294902ee0519eec70df5ab51a6c3641e9ced2bf670e537910bb9b30af3f9d4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Fri, 16 Apr 2021 13:25:39 GMT
server
ESF
date
Fri, 16 Apr 2021 13:25:39 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Fri, 16 Apr 2021 13:25:39 GMT
font-awesome.min.css
bounty-team.github.io/assets/lib/font-awesome/css/
30 KB
7 KB
Stylesheet
General
Full URL
https://bounty-team.github.io/assets/lib/font-awesome/css/font-awesome.min.css?v=4.6.2
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/font-awesome/css/font-awesome.min.css?v=4.6.2
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
01ca514f8717f7d1342891bd71b6e5ac9ff9501c
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-7918"
age
514
x-cache
HIT
content-length
7102
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
D9E2:2A89:633941:663EE2:60798DD6
x-timer
S1618579540.955603,VS0,VE1
date
Fri, 16 Apr 2021 13:25:39 GMT
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:25:02 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
main.css
bounty-team.github.io/assets/css/
39 KB
9 KB
Stylesheet
General
Full URL
https://bounty-team.github.io/assets/css/main.css?v=5.1.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
eb8c1a85e23b4d5d63ce5b8398cbec0f4074f8908c34a519ddb30f4f32d6bcc0
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/css/main.css?v=5.1.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
f8b955112750ec6bd9f0cea93168212d53de89ca
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"6079500b-9c0e"
age
0
x-cache
HIT
content-length
8590
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:23 GMT
server
GitHub.com
x-github-request-id
0E5E:CE42:616F61:6460B8:60798CFE
x-timer
S1618579540.955583,VS0,VE94
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
4zsAGyPtZ3FvuoJ.jpg
i.loli.net/2021/04/16/
65 KB
66 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/4zsAGyPtZ3FvuoJ.jpg
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:bbbb , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
26a115fccd96f07b85721a72b9ae19111cbc777c7a7fbcaf9a18a0ff22ff3a62
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:25:40 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
66681
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 02:54:02 GMT
server
nginx
etag
"6078fc4a-10479"
vary
Accept
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
Q2gWJoDEep1GvLl.png
i.loli.net/2021/04/16/
228 KB
229 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/Q2gWJoDEep1GvLl.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:bbbb , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
6023142d3e267b951dc6ff4015444c5289fe9cac2682f75dae3f3f7aaa9bc14e
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:25:40 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
233913
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 02:58:56 GMT
server
nginx
etag
"6078fd70-391b9"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
pGFbtshWMrOwkD4.png
i.loli.net/2021/04/16/
222 KB
223 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/pGFbtshWMrOwkD4.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:bbbb , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
2738c16d3636be482b6413a892dbbcae8f7aa95c9324cce7230ee75b9298ab0c
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:25:40 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
227791
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:01:33 GMT
server
nginx
etag
"6078fe0d-379cf"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
QDnNwlmXkGCsfbh.png
i.loli.net/2021/04/16/
43 KB
43 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/QDnNwlmXkGCsfbh.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:bbbb , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
c08322b04aae3e3778eab86e6d8dffb3e2663ad3eeb75dc6cd7a879f51d549d6
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:25:40 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
43866
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:10:57 GMT
server
nginx
etag
"60790041-ab5a"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
7cBHrOGqnuxp6vP.png
i.loli.net/2021/04/16/
239 KB
239 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/7cBHrOGqnuxp6vP.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:bbbb , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
515d72aeef6b85b9b5cd8fe4e17c9c9b8f3b629c15c8258a71b64fa1485bcd99
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:25:40 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
244436
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:13:03 GMT
server
nginx
etag
"607900bf-3bad4"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
PWsikCrMuR7Qqtf.png
i.loli.net/2021/04/16/
109 KB
109 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/PWsikCrMuR7Qqtf.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:bbbb , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
702a34908406dd8d19adb40a3b6d3f018a089d52fcccd9b281f63d856a067505
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:25:40 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
111612
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:14:57 GMT
server
nginx
etag
"60790131-1b3fc"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
NRTyms6qnYxJDGV.png
i.loli.net/2021/04/16/
11 KB
12 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/NRTyms6qnYxJDGV.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:bbbb , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
cff529d7720ee0f33c0149176099fec19b826ce368d15c12dd0bce55229480d6
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:25:40 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
11589
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:16:37 GMT
server
nginx
etag
"60790195-2d45"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
YefKUtEmcSPCAFo.png
i.loli.net/2021/04/16/
219 KB
219 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/YefKUtEmcSPCAFo.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:bbbb , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
feed2250bfa70b6fdf452932a739a64f8dd36e972b701d9129ba43284dcaef58
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:25:40 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
223776
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:18:12 GMT
server
nginx
etag
"607901f4-36a20"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
AoHsbENrXtY7ZeV.png
i.loli.net/2021/04/16/
294 KB
295 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/AoHsbENrXtY7ZeV.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:bbbb , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
bcdd23b8f7b0b3ec971b11c548c0aa268abe18100271aa942049ac44fa0436d4
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:25:40 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
301060
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:20:45 GMT
server
nginx
etag
"6079028d-49804"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
avatar.gif
bounty-team.github.io/assets/images/
3 KB
3 KB
Image
General
Full URL
https://bounty-team.github.io/assets/images/avatar.gif
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
2d72c345b24c837e0eb8208e3f252e4601ddd0486676d67258034120df9d3441
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/images/avatar.gif
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
a9f1750a6e47fc6730ce7a38b96a6051c364c030
strict-transport-security
max-age=31556952
via
1.1 varnish
etag
"60795004-b6e"
age
0
x-cache
HIT
content-length
2926
x-served-by
cache-ams21039-AMS
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
E972:C08C:5A0856:5CE2C9:60798362
x-timer
S1618579540.086310,VS0,VE93
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
image/gif
access-control-allow-origin
*
expires
Fri, 16 Apr 2021 12:40:27 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
index.js
bounty-team.github.io/assets/lib/jquery/
82 KB
29 KB
Script
General
Full URL
https://bounty-team.github.io/assets/lib/jquery/index.js?v=2.1.3
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
8af93bd675e1cfd9ecc850e862819fdac6e3ad1f5d761f970e409c7d9c63bdc3
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/jquery/index.js?v=2.1.3
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
196fe3dfb74a342d8be8cb857c50f09e22df1b31
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-14960"
age
0
x-cache
HIT
content-length
29774
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
9F7A:B6D0:25CD69:27B511:60798CFE
x-timer
S1618579540.069948,VS0,VE91
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
fastclick.min.js
bounty-team.github.io/assets/lib/fastclick/lib/
8 KB
3 KB
Script
General
Full URL
https://bounty-team.github.io/assets/lib/fastclick/lib/fastclick.min.js?v=1.0.6
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
b7a4abaaf4d098aa06822e4b3a5d00532fa5051b48bc427efbea4b02c7c08d6b
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/fastclick/lib/fastclick.min.js?v=1.0.6
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
3bea17bb220bc37f81d31f17423127e257a7506b
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-1e77"
age
0
x-cache
HIT
content-length
2481
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
7AF4:6A60:B26C5:CC6F5:60798CFE
x-timer
S1618579540.072130,VS0,VE93
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
jquery.lazyload.js
bounty-team.github.io/assets/lib/jquery_lazyload/
9 KB
2 KB
Script
General
Full URL
https://bounty-team.github.io/assets/lib/jquery_lazyload/jquery.lazyload.js?v=1.9.7
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
404a5028c8a4aae3f0165e3997e57921de98294731c9d1dc0656808b9ed51963
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/jquery_lazyload/jquery.lazyload.js?v=1.9.7
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
6460111c74ca657a227221e62619bb37e9771ee1
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-2362"
age
0
x-cache
HIT
content-length
2326
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
E632:ADE4:271C81:280309:60798CFE
x-timer
S1618579540.082904,VS0,VE90
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
velocity.min.js
bounty-team.github.io/assets/lib/velocity/
34 KB
12 KB
Script
General
Full URL
https://bounty-team.github.io/assets/lib/velocity/velocity.min.js?v=1.2.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
5ce92f10d0930e0b3dce3467b111db4228ec429e3944a01b6fcc2c311dd572c4
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/velocity/velocity.min.js?v=1.2.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
c18327b06d3bf433283cba52e08c14082ad2c731
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-8828"
age
0
x-cache
HIT
content-length
12447
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
A03E:B6D1:57A687:5A6829:60798CFE
x-timer
S1618579540.083837,VS0,VE93
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
velocity.ui.min.js
bounty-team.github.io/assets/lib/velocity/
13 KB
3 KB
Script
General
Full URL
https://bounty-team.github.io/assets/lib/velocity/velocity.ui.min.js?v=1.2.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
c03012ba89bab46d98f7b14426e654f0658b3a92ea791e168323ade367025fd8
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/velocity/velocity.ui.min.js?v=1.2.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
a9a9b75dc18e9387b2987e388c6bcd95ba4396c9
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-33c9"
age
0
x-cache
HIT
content-length
2948
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
1F94:70E5:2BE715:2E037F:60798CFE
x-timer
S1618579540.083794,VS0,VE92
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
jquery.fancybox.pack.js
bounty-team.github.io/assets/lib/fancybox/source/
23 KB
9 KB
Script
General
Full URL
https://bounty-team.github.io/assets/lib/fancybox/source/jquery.fancybox.pack.js?v=2.1.5
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
bc50bf49cbe79ee49b4ee8b56f26ff4877bc4945c16f260b1481ba2355c96347
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/fancybox/source/jquery.fancybox.pack.js?v=2.1.5
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
8568920e7e649c889a893e27e0cb87b254c8c332
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-5a5f"
age
0
x-cache
HIT
content-length
8651
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
24A6:2A84:5C85:1DF32:60798CFE
x-timer
S1618579540.083929,VS0,VE94
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
utils.js
bounty-team.github.io/assets/js/src/
7 KB
3 KB
Script
General
Full URL
https://bounty-team.github.io/assets/js/src/utils.js?v=5.1.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
b27d376f534dbef3fa1db19935c250bc3b98725a93cfd4b03df015c6d81d6ef8
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/js/src/utils.js?v=5.1.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
c1d0c81ab5318c3d312b2ede24744ebe97144bd4
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-1ade"
age
0
x-cache
HIT
content-length
2610
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
48E0:12500:5E51B1:61451A:60798CFE
x-timer
S1618579540.083888,VS0,VE96
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
motion.js
bounty-team.github.io/assets/js/src/
8 KB
2 KB
Script
General
Full URL
https://bounty-team.github.io/assets/js/src/motion.js?v=5.1.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
b952505349513c0fc437f506b8002760498538b2224bbf64fc4a0e0dbf4278af
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/js/src/motion.js?v=5.1.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
7f19f4cdf41cd0625d21c28c43ac23ca65a6aab3
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-1e91"
age
0
x-cache
HIT
content-length
2187
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
1010:13322:B5B43:B9BE0:60798CFE
x-timer
S1618579540.084154,VS0,VE93
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
scrollspy.js
bounty-team.github.io/assets/js/src/
5 KB
2 KB
Script
General
Full URL
https://bounty-team.github.io/assets/js/src/scrollspy.js?v=5.1.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
f3746feed6b605ddf0ebe85ab4de0edb1c88651db6c199c31a4b4399b7566f6d
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/js/src/scrollspy.js?v=5.1.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
4badf3ed9b416591478ff5c6d36fc4e97d9887e6
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-1351"
age
0
x-cache
HIT
content-length
1622
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
E8AC:6A61:2BBF00:2DDA90:60798CFE
x-timer
S1618579540.084165,VS0,VE89
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
post-details.js
bounty-team.github.io/assets/js/src/
4 KB
2 KB
Script
General
Full URL
https://bounty-team.github.io/assets/js/src/post-details.js?v=5.1.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
19a8aeda4faad239eafb3a860f11a70a2f47e089d194551a68ca7cdf490e09f9
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/js/src/post-details.js?v=5.1.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
47e559cb15724d009202f3088babc382f4e58ee5
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-110f"
age
0
x-cache
HIT
content-length
1465
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
C5E2:70E5:2BE715:2E0380:60798CFE
x-timer
S1618579540.084134,VS0,VE92
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
bootstrap.js
bounty-team.github.io/assets/js/src/
1 KB
783 B
Script
General
Full URL
https://bounty-team.github.io/assets/js/src/bootstrap.js?v=5.1.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
ec9e032e1abc34d6008fd22130241b2caef7e600db3513ecb9c547652be10764
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/js/src/bootstrap.js?v=5.1.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
7bb29ef0cd91d1362f7e4ab0af108f51f41913f9
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-4dd"
age
0
x-cache
HIT
content-length
561
x-served-by
cache-ams21039-AMS
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
FBF0:2A89:62D056:65D3CA:60798CFE
x-timer
S1618579540.084383,VS0,VE89
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:21:26 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
S6uyw4BMUTPHjx4wXg.woff2
fonts.gstatic.com/s/lato/v17/
23 KB
23 KB
Font
General
Full URL
https://fonts.gstatic.com/s/lato/v17/S6uyw4BMUTPHjx4wXg.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Lato:300,300italic,400,400italic,700,700italic&subset=latin,latin-ext
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c3c0d3f472358aac78455515c4800771426770c22698e2486d39fdb5505634e1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://bounty-team.github.io
Referer
https://fonts.googleapis.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Thu, 15 Apr 2021 02:03:02 GMT
x-content-type-options
nosniff
last-modified
Tue, 15 Sep 2020 18:10:46 GMT
server
sffe
age
127358
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
23484
x-xss-protection
0
expires
Fri, 15 Apr 2022 02:03:02 GMT
fontawesome-webfont.woff2
bounty-team.github.io/assets/lib/font-awesome/fonts/
75 KB
76 KB
Font
General
Full URL
https://bounty-team.github.io/assets/lib/font-awesome/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/assets/lib/font-awesome/css/font-awesome.min.css?v=4.6.2
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/font-awesome/fonts/fontawesome-webfont.woff2?v=4.7.0
pragma
no-cache
origin
https://bounty-team.github.io
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
font
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/assets/lib/font-awesome/css/font-awesome.min.css?v=4.6.2
:scheme
https
sec-fetch-site
same-origin
:method
GET
Origin
https://bounty-team.github.io
Referer
https://bounty-team.github.io/assets/lib/font-awesome/css/font-awesome.min.css?v=4.6.2
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
9bdc8f652b577fd6b7aa47a9cbcaac8083976ba0
strict-transport-security
max-age=31556952
via
1.1 varnish
etag
"60795004-12d68"
age
0
x-cache
HIT
content-length
77160
x-served-by
cache-ams21039-AMS
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
D250:CE40:C3ADF:DD7D6:60798363
x-timer
S1618579540.097760,VS0,VE90
date
Fri, 16 Apr 2021 13:25:40 GMT
vary
Accept-Encoding
content-type
font/woff2
access-control-allow-origin
*
expires
Fri, 16 Apr 2021 12:40:27 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
S6u_w4BMUTPHjxsI5wq_Gwft.woff2
fonts.gstatic.com/s/lato/v17/
24 KB
24 KB
Font
General
Full URL
https://fonts.gstatic.com/s/lato/v17/S6u_w4BMUTPHjxsI5wq_Gwft.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Lato:300,300italic,400,400italic,700,700italic&subset=latin,latin-ext
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
8ad012803e63980f185a7ee45c983ff2ab99b7751fc8f817f86420d620f244d9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://bounty-team.github.io
Referer
https://fonts.googleapis.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 11 Apr 2021 10:03:38 GMT
x-content-type-options
nosniff
last-modified
Tue, 15 Sep 2020 18:10:34 GMT
server
sffe
age
444122
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
24428
x-xss-protection
0
expires
Mon, 11 Apr 2022 10:03:38 GMT
S6u8w4BMUTPHjxsAXC-q.woff2
fonts.gstatic.com/s/lato/v17/
24 KB
24 KB
Font
General
Full URL
https://fonts.gstatic.com/s/lato/v17/S6u8w4BMUTPHjxsAXC-q.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Lato:300,300italic,400,400italic,700,700italic&subset=latin,latin-ext
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:80f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ccb5febf8ac335a1b768a7a2087fa4362cb3a0a9392e2e451df9d9825e88e5db
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://bounty-team.github.io
Referer
https://fonts.googleapis.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Thu, 15 Apr 2021 02:03:02 GMT
x-content-type-options
nosniff
last-modified
Tue, 15 Sep 2020 18:12:06 GMT
server
sffe
age
127358
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
24440
x-xss-protection
0
expires
Fri, 15 Apr 2022 02:03:02 GMT
S6u9w4BMUTPHh6UVSwiPGQ.woff2
fonts.gstatic.com/s/lato/v17/
22 KB
22 KB
Font
General
Full URL
https://fonts.gstatic.com/s/lato/v17/S6u9w4BMUTPHh6UVSwiPGQ.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Lato:300,300italic,400,400italic,700,700italic&subset=latin,latin-ext
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80f::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
8d3ca80fa271e94b0c36cf3053b0f806b7a42bb3395b424c99dc0bd218f0ac20
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://bounty-team.github.io
Referer
https://fonts.googleapis.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Thu, 15 Apr 2021 00:07:58 GMT
x-content-type-options
nosniff
last-modified
Tue, 15 Sep 2020 18:12:12 GMT
server
sffe
age
134262
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
22992
x-xss-protection
0
expires
Fri, 15 Apr 2022 00:07:58 GMT

Verdicts & Comments Add Verdict or Comment

16 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| NexT object| CONFIG function| $ function| jQuery function| FastClick

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31556952

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

bounty-team.github.io
fonts.googleapis.com
fonts.gstatic.com
i.loli.net
185.199.108.153
2a00:1450:4001:80e::200a
2a00:1450:4001:80f::2003
2a09:7:1000:ffff:ffff:ffff:ffff:bbbb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