Robot | Path | Permission |
GoogleBot | / | ✔ |
BingBot | / | ✔ |
BaiduSpider | / | ✔ |
YandexBot | / | ✔ |
User-agent: * # robotstxt.org - if ENV production variable is false robots will be disallowed. Disallow: |
Title | (Web-)Insecurity |
Description | (Web-)Insecurity Blog Advisories Posts Tools (Web-)Insecurity Blog Recent Posts Insufficient Redirect URI validation: The risk of allowing to dynamically |
Keywords | N/A |
WebSite | lauritz-holtmann.de |
Host IP | 78.46.181.2 |
Location | Germany |
Site | Rank |
lausitz-tv.de | 40,455,554 |
Euro€3,306
Zuletzt aktualisiert: 2022-07-20 11:04:41
lauritz-holtmann.de hat Semrush globalen Rang von 8,770,055. lauritz-holtmann.de hat einen geschätzten Wert von € 3,306, basierend auf seinen geschätzten Werbeeinnahmen. lauritz-holtmann.de empfängt jeden Tag ungefähr 551 einzelne Besucher. Sein Webserver befindet sich in Germany mit der IP-Adresse 78.46.181.2. Laut SiteAdvisor ist lauritz-holtmann.de sicher zu besuchen. |
Kauf-/Verkaufswert | Euro€3,306 |
Tägliche Werbeeinnahmen | Euro€90,364 |
Monatlicher Anzeigenumsatz | Euro€30,305 |
Jährliche Werbeeinnahmen | Euro€2,204 |
Tägliche eindeutige Besucher | 551 |
Hinweis: Alle Traffic- und Einnahmenwerte sind Schätzungen. |
Host | Type | TTL | Data |
lauritz-holtmann.de. | A | 7199 | IP: 78.46.181.2 |
lauritz-holtmann.de. | AAAA | 7199 | IPV6: 2a01:4f8:d0a:11ea::2 |
lauritz-holtmann.de. | NS | 7200 | NS Record: ns.second-ns.com. |
lauritz-holtmann.de. | NS | 7200 | NS Record: ns1.your-server.de. |
lauritz-holtmann.de. | NS | 7200 | NS Record: ns3.second-ns.de. |
lauritz-holtmann.de. | MX | 7200 | MX Record: 10 mail.lauritz-holtmann.de. |
lauritz-holtmann.de. | TXT | 7200 | TXT Record: v=spf1 +a +mx ?all |
(Web-)Insecurity Blog Advisories Posts Tools (Web-)Insecurity Blog Recent Posts Insufficient Redirect URI validation: The risk of allowing to dynamically add arbitrary query parameters and fragments to the redirect_uri In this post, I will discuss an OAuth 2.0 and OpenID Connect 1.0 implementation flaw pattern that was or is present even in well-known implementations from Github , Stackoverflow and Microsoft . read more XSS in Large Messenger and Payment App - a Shout Out to Parameter Guessing This is a post about a Cross-Site-Scripting (XSS) vulnerability that was identified within the web version of a large Chinese messenger and payment platform. The vulnerability could have been missed easily, as the vulnerable parameter was manually guessed. read more Real-life OIDC Security (VII): Responsible Disclosure This is the final post of a series on Single Sign-On and OpenID Connect 1.0 security. In this post, Responsible Disclosure processes with five vendors and maintainers of popular |
# There are no authorised digital sellers, go ahead :-) |
HTTP/1.1 302 Found Date: Wed, 03 Nov 2021 19:23:07 GMT Server: Apache Location: https://security.lauritz-holtmann.de/ Content-Type: text/html; charset=iso-8859-1 HTTP/2 200 date: Wed, 03 Nov 2021 19:23:07 GMT server: Apache last-modified: Fri, 02 Apr 2021 17:22:44 GMT etag: "47fa-5bf00989a7564" accept-ranges: bytes content-length: 18426 cache-control: no-cache x-xss-protection: 1; mode=block x-frame-options: SAMEORIGIN x-content-type-options: nosniff referrer-policy: no-referrer strict-transport-security: max-age=2592000 content-security-policy: script-src 'self' x-permitted-cross-domain-policies: none content-type: text/html |