Submitted URL: https://t.co/tJZDn8Or2C
Effective URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Submission: On April 16 via api from US

Summary

This website contacted 5 IPs in 3 countries across 5 domains to perform 32 HTTP transactions. The main IP is 185.199.108.153, located in United States and belongs to FASTLY, US. The main domain is bounty-team.github.io.
TLS certificate: Issued by DigiCert SHA2 High Assurance Server CA on May 6th 2020. Valid for: 2 years.
This is the only time bounty-team.github.io was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 104.244.42.69 13414 (TWITTER)
17 185.199.108.153 54113 (FASTLY)
1 2a00:1450:400... 15169 (GOOGLE)
9 2a09:7:1000:f... 24013 (SB SB Pro...)
4 2a00:1450:400... 15169 (GOOGLE)
32 5
Apex Domain
Subdomains
Transfer
17 github.io
bounty-team.github.io
170 KB
9 loli.net
i.loli.net
1 MB
4 gstatic.com
fonts.gstatic.com
93 KB
1 googleapis.com
fonts.googleapis.com
594 B
1 t.co
t.co
458 B
32 5
Domain Requested by
17 bounty-team.github.io t.co
bounty-team.github.io
9 i.loli.net bounty-team.github.io
4 fonts.gstatic.com fonts.googleapis.com
1 fonts.googleapis.com bounty-team.github.io
1 t.co
32 5

This site contains links to these domains. Also see Links.

Domain
i.loli.net
Subject Issuer Validity Valid
t.co
DigiCert TLS RSA SHA256 2020 CA1
2021-02-05 -
2022-02-04
a year crt.sh
www.github.com
DigiCert SHA2 High Assurance Server CA
2020-05-06 -
2022-04-14
2 years crt.sh
upload.video.google.com
GTS CA 1O1
2021-03-16 -
2021-06-08
3 months crt.sh
*.loli.net
AlphaSSL CA - SHA256 - G2
2020-10-27 -
2021-11-28
a year crt.sh
*.gstatic.com
GTS CA 1O1
2021-03-16 -
2021-06-08
3 months crt.sh

This page contains 1 frames:

Primary Page: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Frame ID: 1C757C94DC245F75EF7B343046C2D81B
Requests: 32 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://t.co/tJZDn8Or2C Page URL
  2. https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i

Overall confidence: 100%
Detected patterns
  • html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i

Page Statistics

32
Requests

100 %
HTTPS

60 %
IPv6

5
Domains

5
Subdomains

5
IPs

3
Countries

1700 kB
Transfer

1897 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://t.co/tJZDn8Or2C Page URL
  2. https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

32 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
tJZDn8Or2C
t.co/
403 B
458 B
Document
General
Full URL
https://t.co/tJZDn8Or2C
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.244.42.69 , United States, ASN13414 (TWITTER, US),
Reverse DNS
Software
tsa_devel /
Resource Hash
af2f26a9a7bef0cee7f383a2c6bb1c3380ebebc0533b9d740582764b188d4468
Security Headers
Name Value
Strict-Transport-Security max-age=0
X-Xss-Protection 0

Request headers

:method
GET
:authority
t.co
:scheme
https
:path
/tJZDn8Or2C
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 16 Apr 2021 13:28:52 GMT
vary
Origin
server
tsa_devel
expires
Fri, 16 Apr 2021 13:33:53 GMT
set-cookie
muc=8865305d-7fbe-40db-aeaa-53a8998cc1bf; Max-Age=63072000; Expires=Sun, 16 Apr 2023 13:28:53 GMT; Domain=t.co; Secure; SameSite=None
content-type
text/html; charset=utf-8
cache-control
private,max-age=300
content-length
236
content-encoding
gzip
x-xss-protection
0
strict-transport-security
max-age=0
x-connection-hash
56ee84bb7676d4f4d97ab4b4aa2d1e9b46786e9a07112a9c1733c8929702dbaa
Primary Request /
bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
24 KB
6 KB
Document
General
Full URL
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Requested by
Host: t.co
URL: https://t.co/tJZDn8Or2C
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
748fbd0f411ee066a3738e346fbca5f9044166df0486fef696fcda94bde56460
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:method
GET
:authority
bounty-team.github.io
:scheme
https
:path
/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
document
referer
https://t.co/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://t.co/

Response headers

server
GitHub.com
content-type
text/html; charset=utf-8
strict-transport-security
max-age=31556952
last-modified
Fri, 16 Apr 2021 08:51:23 GMT
access-control-allow-origin
*
etag
W/"6079500b-6120"
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
content-encoding
gzip
x-proxy-cache
MISS
x-github-request-id
2FA6:2A89:62C19E:65C4A7:60798CDA
accept-ranges
bytes
date
Fri, 16 Apr 2021 13:28:53 GMT
via
1.1 varnish
age
0
x-served-by
cache-hhn4062-HHN
x-cache
HIT
x-cache-hits
1
x-timer
S1618579734.744842,VS0,VE88
vary
Accept-Encoding
x-fastly-request-id
4d8d404b4694d4c9dfc32df7f2cedb01e327d10f
content-length
6091
jquery.fancybox.css
bounty-team.github.io/assets/lib/fancybox/source/
5 KB
2 KB
Stylesheet
General
Full URL
https://bounty-team.github.io/assets/lib/fancybox/source/jquery.fancybox.css?v=2.1.5
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
968a8e56e4adaf8c135199ebd7f6cc065424ca45974d4dfbeb5607e69fe72fcd
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/fancybox/source/jquery.fancybox.css?v=2.1.5
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
575aa8872c53bd0bb16c1c338a16a40b74dc4981
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-131f"
age
0
x-cache
HIT
content-length
1434
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
F298:B6D1:5794CE:5A560E:60798CDA
x-timer
S1618579734.899975,VS0,VE86
date
Fri, 16 Apr 2021 13:28:53 GMT
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
css
fonts.googleapis.com/
4 KB
594 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Lato:300,300italic,400,400italic,700,700italic&subset=latin,latin-ext
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
85294902ee0519eec70df5ab51a6c3641e9ced2bf670e537910bb9b30af3f9d4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
x-xss-protection
0
last-modified
Fri, 16 Apr 2021 13:28:53 GMT
server
ESF
date
Fri, 16 Apr 2021 13:28:53 GMT
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Fri, 16 Apr 2021 13:28:53 GMT
font-awesome.min.css
bounty-team.github.io/assets/lib/font-awesome/css/
30 KB
7 KB
Stylesheet
General
Full URL
https://bounty-team.github.io/assets/lib/font-awesome/css/font-awesome.min.css?v=4.6.2
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/font-awesome/css/font-awesome.min.css?v=4.6.2
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
518500ab180e2c9521d3ec07d5119244650a2aa6
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-7918"
age
0
x-cache
HIT
content-length
7102
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
33D0:0C44:5DDFE4:60D067:60798CDA
x-timer
S1618579734.900198,VS0,VE94
date
Fri, 16 Apr 2021 13:28:53 GMT
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
main.css
bounty-team.github.io/assets/css/
39 KB
9 KB
Stylesheet
General
Full URL
https://bounty-team.github.io/assets/css/main.css?v=5.1.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
eb8c1a85e23b4d5d63ce5b8398cbec0f4074f8908c34a519ddb30f4f32d6bcc0
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/css/main.css?v=5.1.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
text/css,*/*;q=0.1
cache-control
no-cache
sec-fetch-dest
style
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
c2f10944f79363ef216785e4dc9c552fb4ace9d9
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"6079500b-9c0e"
age
0
x-cache
HIT
content-length
8590
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:23 GMT
server
GitHub.com
x-github-request-id
46BE:ADE4:270980:27EFAA:60798CDA
x-timer
S1618579734.900377,VS0,VE86
date
Fri, 16 Apr 2021 13:28:53 GMT
vary
Accept-Encoding
content-type
text/css; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
4zsAGyPtZ3FvuoJ.jpg
i.loli.net/2021/04/16/
65 KB
66 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/4zsAGyPtZ3FvuoJ.jpg
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:ffff , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
26a115fccd96f07b85721a72b9ae19111cbc777c7a7fbcaf9a18a0ff22ff3a62
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:28:54 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
66681
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 02:54:02 GMT
server
nginx
etag
"6078fc4a-10479"
vary
Accept
content-type
image/jpeg
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
Q2gWJoDEep1GvLl.png
i.loli.net/2021/04/16/
228 KB
229 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/Q2gWJoDEep1GvLl.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:ffff , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
6023142d3e267b951dc6ff4015444c5289fe9cac2682f75dae3f3f7aaa9bc14e
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:28:54 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
233913
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 02:58:56 GMT
server
nginx
etag
"6078fd70-391b9"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
pGFbtshWMrOwkD4.png
i.loli.net/2021/04/16/
222 KB
223 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/pGFbtshWMrOwkD4.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:ffff , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
2738c16d3636be482b6413a892dbbcae8f7aa95c9324cce7230ee75b9298ab0c
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:28:54 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
227791
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:01:33 GMT
server
nginx
etag
"6078fe0d-379cf"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
QDnNwlmXkGCsfbh.png
i.loli.net/2021/04/16/
43 KB
43 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/QDnNwlmXkGCsfbh.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:ffff , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
c08322b04aae3e3778eab86e6d8dffb3e2663ad3eeb75dc6cd7a879f51d549d6
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:28:54 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
43866
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:10:57 GMT
server
nginx
etag
"60790041-ab5a"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
7cBHrOGqnuxp6vP.png
i.loli.net/2021/04/16/
239 KB
239 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/7cBHrOGqnuxp6vP.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:ffff , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
515d72aeef6b85b9b5cd8fe4e17c9c9b8f3b629c15c8258a71b64fa1485bcd99
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:28:54 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
244436
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:13:03 GMT
server
nginx
etag
"607900bf-3bad4"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
PWsikCrMuR7Qqtf.png
i.loli.net/2021/04/16/
109 KB
109 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/PWsikCrMuR7Qqtf.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:ffff , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
702a34908406dd8d19adb40a3b6d3f018a089d52fcccd9b281f63d856a067505
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:28:54 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
111612
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:14:57 GMT
server
nginx
etag
"60790131-1b3fc"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
NRTyms6qnYxJDGV.png
i.loli.net/2021/04/16/
11 KB
12 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/NRTyms6qnYxJDGV.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:ffff , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
cff529d7720ee0f33c0149176099fec19b826ce368d15c12dd0bce55229480d6
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:28:54 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
11589
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:16:37 GMT
server
nginx
etag
"60790195-2d45"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
YefKUtEmcSPCAFo.png
i.loli.net/2021/04/16/
219 KB
219 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/YefKUtEmcSPCAFo.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:ffff , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
feed2250bfa70b6fdf452932a739a64f8dd36e972b701d9129ba43284dcaef58
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:28:54 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
223776
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:18:12 GMT
server
nginx
etag
"607901f4-36a20"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
AoHsbENrXtY7ZeV.png
i.loli.net/2021/04/16/
294 KB
295 KB
Image
General
Full URL
https://i.loli.net/2021/04/16/AoHsbENrXtY7ZeV.png
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a09:7:1000:ffff:ffff:ffff:ffff:ffff , Estonia, ASN24013 (SB SB Professional Services, SB),
Reverse DNS
Software
nginx /
Resource Hash
bcdd23b8f7b0b3ec971b11c548c0aa268abe18100271aa942049ac44fa0436d4
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://bounty-team.github.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-cdn-server
cdn-fra
date
Fri, 16 Apr 2021 13:28:54 GMT
x-content-type-options
nosniff
x-cdn-cache
HIT
strict-transport-security
max-age=63072000; includeSubDomains; preload
content-length
301060
x-xss-protection
1; mode=block
last-modified
Fri, 16 Apr 2021 03:20:45 GMT
server
nginx
etag
"6079028d-49804"
vary
Accept
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 31 Dec 2037 23:55:55 GMT
avatar.gif
bounty-team.github.io/assets/images/
3 KB
3 KB
Image
General
Full URL
https://bounty-team.github.io/assets/images/avatar.gif
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
2d72c345b24c837e0eb8208e3f252e4601ddd0486676d67258034120df9d3441
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/images/avatar.gif
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
cache-control
no-cache
sec-fetch-dest
image
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
fea7365f63a09247e41551a4413ef8d016a57139
strict-transport-security
max-age=31556952
via
1.1 varnish
etag
"60795004-b6e"
age
0
x-cache
MISS
content-length
2926
x-served-by
cache-hhn4062-HHN
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
6050:2A88:287842:2A8EE6:60798CDA
x-timer
S1618579734.206364,VS0,VE84
date
Fri, 16 Apr 2021 13:28:54 GMT
vary
Accept-Encoding
content-type
image/gif
access-control-allow-origin
*
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
0
index.js
bounty-team.github.io/assets/lib/jquery/
82 KB
29 KB
Script
General
Full URL
https://bounty-team.github.io/assets/lib/jquery/index.js?v=2.1.3
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
8af93bd675e1cfd9ecc850e862819fdac6e3ad1f5d761f970e409c7d9c63bdc3
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/jquery/index.js?v=2.1.3
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
3001fbabd5c75c4103e4364319cca67566963558
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-14960"
age
0
x-cache
HIT
content-length
29774
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
2B8A:2FAA:5DDE20:60CAC1:60798CDA
x-timer
S1618579734.039332,VS0,VE86
date
Fri, 16 Apr 2021 13:28:54 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
fastclick.min.js
bounty-team.github.io/assets/lib/fastclick/lib/
8 KB
3 KB
Script
General
Full URL
https://bounty-team.github.io/assets/lib/fastclick/lib/fastclick.min.js?v=1.0.6
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
b7a4abaaf4d098aa06822e4b3a5d00532fa5051b48bc427efbea4b02c7c08d6b
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/fastclick/lib/fastclick.min.js?v=1.0.6
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
02135aa88ad2abfee6ef2bb7e86b3e4ab3daecd0
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-1e77"
age
0
x-cache
HIT
content-length
2481
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
FD6A:0C42:E9B0C:104760:60798CDA
x-timer
S1618579734.046019,VS0,VE83
date
Fri, 16 Apr 2021 13:28:54 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
jquery.lazyload.js
bounty-team.github.io/assets/lib/jquery_lazyload/
9 KB
2 KB
Script
General
Full URL
https://bounty-team.github.io/assets/lib/jquery_lazyload/jquery.lazyload.js?v=1.9.7
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
404a5028c8a4aae3f0165e3997e57921de98294731c9d1dc0656808b9ed51963
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/jquery_lazyload/jquery.lazyload.js?v=1.9.7
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
732706efa8fe9cc6adca5d05ca62a19600f4e9c9
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-2362"
age
0
x-cache
HIT
content-length
2326
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
BBE4:2EA6:1F49CB:1FF697:60798CDA
x-timer
S1618579734.051699,VS0,VE84
date
Fri, 16 Apr 2021 13:28:54 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
velocity.min.js
bounty-team.github.io/assets/lib/velocity/
34 KB
12 KB
Script
General
Full URL
https://bounty-team.github.io/assets/lib/velocity/velocity.min.js?v=1.2.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
5ce92f10d0930e0b3dce3467b111db4228ec429e3944a01b6fcc2c311dd572c4
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/velocity/velocity.min.js?v=1.2.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
9bfc2a9dc4751d51a39679e813841dd60527b877
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-8828"
age
0
x-cache
HIT
content-length
12447
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
F298:B6D1:5794E2:5A5620:60798CDA
x-timer
S1618579734.051905,VS0,VE85
date
Fri, 16 Apr 2021 13:28:54 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
velocity.ui.min.js
bounty-team.github.io/assets/lib/velocity/
13 KB
3 KB
Script
General
Full URL
https://bounty-team.github.io/assets/lib/velocity/velocity.ui.min.js?v=1.2.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
c03012ba89bab46d98f7b14426e654f0658b3a92ea791e168323ade367025fd8
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/velocity/velocity.ui.min.js?v=1.2.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
b094b5f102618ae4a5a4af1388602f57c1adc2b8
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-33c9"
age
0
x-cache
MISS
content-length
2948
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
0DB8:023A:628A5A:658E8F:60799116
x-timer
S1618579734.051955,VS0,VE84
date
Fri, 16 Apr 2021 13:28:54 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:38:54 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
0
jquery.fancybox.pack.js
bounty-team.github.io/assets/lib/fancybox/source/
23 KB
9 KB
Script
General
Full URL
https://bounty-team.github.io/assets/lib/fancybox/source/jquery.fancybox.pack.js?v=2.1.5
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
bc50bf49cbe79ee49b4ee8b56f26ff4877bc4945c16f260b1481ba2355c96347
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/fancybox/source/jquery.fancybox.pack.js?v=2.1.5
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
b70c151fc02674e600419d8d8a1bc4c42cb07de1
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-5a5f"
age
0
x-cache
HIT
content-length
8651
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
3F84:2EA5:D2AC9:DA208:60798CDA
x-timer
S1618579734.052316,VS0,VE85
date
Fri, 16 Apr 2021 13:28:54 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
utils.js
bounty-team.github.io/assets/js/src/
7 KB
3 KB
Script
General
Full URL
https://bounty-team.github.io/assets/js/src/utils.js?v=5.1.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
b27d376f534dbef3fa1db19935c250bc3b98725a93cfd4b03df015c6d81d6ef8
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/js/src/utils.js?v=5.1.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
e2423db4884ac29ef840016ea231799756603493
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-1ade"
age
0
x-cache
HIT
content-length
2610
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
6DAC:2EA6:1F49DB:1FF6A5:60798CDA
x-timer
S1618579734.195405,VS0,VE87
date
Fri, 16 Apr 2021 13:28:54 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-proxy-cache
MISS
x-cache-hits
1
motion.js
bounty-team.github.io/assets/js/src/
8 KB
2 KB
Script
General
Full URL
https://bounty-team.github.io/assets/js/src/motion.js?v=5.1.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
b952505349513c0fc437f506b8002760498538b2224bbf64fc4a0e0dbf4278af
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/js/src/motion.js?v=5.1.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
cf97ad88fa16c7da1124e7a2f46420962e0d0866
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-1e91"
age
0
x-cache
HIT
content-length
2187
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
5EE2:70E5:2BDF80:2DFB9A:60798CDA
x-timer
S1618579734.196274,VS0,VE83
date
Fri, 16 Apr 2021 13:28:54 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
scrollspy.js
bounty-team.github.io/assets/js/src/
5 KB
2 KB
Script
General
Full URL
https://bounty-team.github.io/assets/js/src/scrollspy.js?v=5.1.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
f3746feed6b605ddf0ebe85ab4de0edb1c88651db6c199c31a4b4399b7566f6d
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/js/src/scrollspy.js?v=5.1.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
84fbd2c12a8080c3623ed3b94c87449235490aca
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-1351"
age
0
x-cache
HIT
content-length
1622
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
C4A2:0C44:5DDFFD:60D07D:60798CDA
x-timer
S1618579734.196261,VS0,VE87
date
Fri, 16 Apr 2021 13:28:54 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
post-details.js
bounty-team.github.io/assets/js/src/
4 KB
2 KB
Script
General
Full URL
https://bounty-team.github.io/assets/js/src/post-details.js?v=5.1.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
19a8aeda4faad239eafb3a860f11a70a2f47e089d194551a68ca7cdf490e09f9
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/js/src/post-details.js?v=5.1.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
7c137299efa31cee1afa8e2c46535e8228ffc908
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-110f"
age
0
x-cache
HIT
content-length
1465
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
A64E:0C44:5DDFFD:60D07E:60798CDA
x-timer
S1618579734.196615,VS0,VE87
date
Fri, 16 Apr 2021 13:28:54 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
bootstrap.js
bounty-team.github.io/assets/js/src/
1 KB
737 B
Script
General
Full URL
https://bounty-team.github.io/assets/js/src/bootstrap.js?v=5.1.1
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
ec9e032e1abc34d6008fd22130241b2caef7e600db3513ecb9c547652be10764
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/js/src/bootstrap.js?v=5.1.1
pragma
no-cache
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
no-cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
script
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
:scheme
https
sec-fetch-site
same-origin
:method
GET
Referer
https://bounty-team.github.io/vulnerability%20analysis/2021/04/16/CVE-2021-21220/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
7a9a9f045216fa4147590ef61c326f72a7c5747a
strict-transport-security
max-age=31556952
content-encoding
gzip
etag
W/"60795004-4dd"
age
0
x-cache
HIT
content-length
561
x-served-by
cache-hhn4062-HHN
access-control-allow-origin
*
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
CA32:70E2:14D7D:2D0E6:60798CDA
x-timer
S1618579734.196611,VS0,VE89
date
Fri, 16 Apr 2021 13:28:54 GMT
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
via
1.1 varnish
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
1
S6uyw4BMUTPHjx4wXg.woff2
fonts.gstatic.com/s/lato/v17/
23 KB
23 KB
Font
General
Full URL
https://fonts.gstatic.com/s/lato/v17/S6uyw4BMUTPHjx4wXg.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Lato:300,300italic,400,400italic,700,700italic&subset=latin,latin-ext
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:803::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c3c0d3f472358aac78455515c4800771426770c22698e2486d39fdb5505634e1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://bounty-team.github.io
Referer
https://fonts.googleapis.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 11 Apr 2021 10:03:38 GMT
x-content-type-options
nosniff
last-modified
Tue, 15 Sep 2020 18:10:46 GMT
server
sffe
age
444316
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
23484
x-xss-protection
0
expires
Mon, 11 Apr 2022 10:03:38 GMT
fontawesome-webfont.woff2
bounty-team.github.io/assets/lib/font-awesome/fonts/
75 KB
76 KB
Font
General
Full URL
https://bounty-team.github.io/assets/lib/font-awesome/fonts/fontawesome-webfont.woff2?v=4.7.0
Requested by
Host: bounty-team.github.io
URL: https://bounty-team.github.io/assets/lib/font-awesome/css/font-awesome.min.css?v=4.6.2
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.199.108.153 , United States, ASN54113 (FASTLY, US),
Reverse DNS
cdn-185-199-108-153.github.com
Software
GitHub.com /
Resource Hash
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
Security Headers
Name Value
Strict-Transport-Security max-age=31556952

Request headers

:path
/assets/lib/font-awesome/fonts/fontawesome-webfont.woff2?v=4.7.0
pragma
no-cache
origin
https://bounty-team.github.io
accept-encoding
gzip, deflate, br
accept-language
en-US
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
sec-fetch-mode
cors
accept
*/*
cache-control
no-cache
sec-fetch-dest
font
:authority
bounty-team.github.io
referer
https://bounty-team.github.io/assets/lib/font-awesome/css/font-awesome.min.css?v=4.6.2
:scheme
https
sec-fetch-site
same-origin
:method
GET
Origin
https://bounty-team.github.io
Referer
https://bounty-team.github.io/assets/lib/font-awesome/css/font-awesome.min.css?v=4.6.2
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

x-fastly-request-id
c3d3829a61d3a61bc63ad8bcd8237a8f054522fa
strict-transport-security
max-age=31556952
via
1.1 varnish
etag
"60795004-12d68"
age
0
x-cache
MISS
content-length
77160
x-served-by
cache-hhn4062-HHN
last-modified
Fri, 16 Apr 2021 08:51:16 GMT
server
GitHub.com
x-github-request-id
1622:6A62:61FD9F:650144:60798CDA
x-timer
S1618579734.063728,VS0,VE83
date
Fri, 16 Apr 2021 13:28:54 GMT
vary
Accept-Encoding
content-type
font/woff2
access-control-allow-origin
*
expires
Fri, 16 Apr 2021 13:20:50 GMT
cache-control
max-age=600
accept-ranges
bytes
x-origin-cache
HIT
x-proxy-cache
MISS
x-cache-hits
0
S6u_w4BMUTPHjxsI5wq_Gwft.woff2
fonts.gstatic.com/s/lato/v17/
24 KB
24 KB
Font
General
Full URL
https://fonts.gstatic.com/s/lato/v17/S6u_w4BMUTPHjxsI5wq_Gwft.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Lato:300,300italic,400,400italic,700,700italic&subset=latin,latin-ext
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:803::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
8ad012803e63980f185a7ee45c983ff2ab99b7751fc8f817f86420d620f244d9
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://bounty-team.github.io
Referer
https://fonts.googleapis.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Thu, 15 Apr 2021 02:03:06 GMT
x-content-type-options
nosniff
last-modified
Tue, 15 Sep 2020 18:10:34 GMT
server
sffe
age
127548
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
24428
x-xss-protection
0
expires
Fri, 15 Apr 2022 02:03:06 GMT
S6u8w4BMUTPHjxsAXC-q.woff2
fonts.gstatic.com/s/lato/v17/
24 KB
24 KB
Font
General
Full URL
https://fonts.gstatic.com/s/lato/v17/S6u8w4BMUTPHjxsAXC-q.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Lato:300,300italic,400,400italic,700,700italic&subset=latin,latin-ext
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:803::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
ccb5febf8ac335a1b768a7a2087fa4362cb3a0a9392e2e451df9d9825e88e5db
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://bounty-team.github.io
Referer
https://fonts.googleapis.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Thu, 15 Apr 2021 02:03:02 GMT
x-content-type-options
nosniff
last-modified
Tue, 15 Sep 2020 18:12:06 GMT
server
sffe
age
127552
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
24440
x-xss-protection
0
expires
Fri, 15 Apr 2022 02:03:02 GMT
S6u9w4BMUTPHh6UVSwiPGQ.woff2
fonts.gstatic.com/s/lato/v17/
22 KB
22 KB
Font
General
Full URL
https://fonts.gstatic.com/s/lato/v17/S6u9w4BMUTPHh6UVSwiPGQ.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Lato:300,300italic,400,400italic,700,700italic&subset=latin,latin-ext
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:803::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
8d3ca80fa271e94b0c36cf3053b0f806b7a42bb3395b424c99dc0bd218f0ac20
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Origin
https://bounty-team.github.io
Referer
https://fonts.googleapis.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Sun, 11 Apr 2021 10:03:38 GMT
x-content-type-options
nosniff
last-modified
Tue, 15 Sep 2020 18:12:12 GMT
server
sffe
age
444316
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
alt-svc
h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
22992
x-xss-protection
0
expires
Mon, 11 Apr 2022 10:03:38 GMT

Verdicts & Comments Add Verdict or Comment

16 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| NexT object| CONFIG function| $ function| jQuery function| FastClick

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=0
X-Xss-Protection 0

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

bounty-team.github.io
fonts.googleapis.com
fonts.gstatic.com
i.loli.net
t.co
104.244.42.69
185.199.108.153
2a00:1450:4001:801::200a
2a00:1450:4001:803::2003
2a09:7:1000:ffff:ffff:ffff:ffff:ffff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