Cross-Domain JavaScript Source File Inclusion
- Risk:
Low
- Type:
- Passive
- CWE:
- CWE-829
- Summary
The page includes one or more script files from a third-party domain.
- Solution
Ensure JavaScript source files are loaded from only trusted sources, and the sources can't be controlled by end users of the application.
Windows 11 KB5070773 emergency update fixes Windows Recovery issues
Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers
Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network
DNS0.EU private DNS service shuts down over sustainability issues
Microsoft: October updates break USB input in Windows Recovery
Five New Exploited Bugs Land in CISA's Catalog β Oracle and Microsoft Among Targets
Retail giant Muji halts online sales after ransomware attack on supplier
Over 75,000 WatchGuard security devices vulnerable to critical RCE
CISA: High-severity Windows SMB flaw now exploited in attacks
Hard-coded credentials found in Moxa industrial security appliances, routers (CVE-2025-6950)
CVE-2025-61884 Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability
CVE-2025-33073 Microsoft Windows SMB Client Improper Access Control Vulnerability
CVE-2022-48503 Apple Multiple Products Unspecified Vulnerability
CVE-2025-54253 Adobe Experience Manager Forms Code Execution Vulnerability
CVE-2016-7836 SKYSEA Client View Improper Authentication Vulnerability
CVE-2025-6264 Rapid7 Velociraptor Incorrect Default Permissions Vulnerability
CVE-2025-59230 Microsoft Windows Improper Access Control Vulnerability
CVE-2025-24990 Microsoft Windows Untrusted Pointer Dereference Vulnerability
InformationalInformation Disclosure - Information in Browser localStorage
LowInsufficient Site Isolation Against Spectre Vulnerability
InformationalCSP: Header & Meta
InformationalEmail address found in WebSocket message
InformationalStorable but Non-Cacheable Content
MediumBackup File Disclosure
Free online web security scanner