<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>MozDomains Blog</provider_name><provider_url>https://www.mozdomains.com/blog/en</provider_url><author_name>Momed Jussub</author_name><author_url>https://www.mozdomains.com/blog/en/author/momed-jussub/</author_url><title>Online Website Scanner - MozDomains Blog</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="EVH1sSBsmT"&gt;&lt;a href="https://www.mozdomains.com/blog/en/website-security/online-website-scanner/"&gt;Online Website Scanner&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.mozdomains.com/blog/en/website-security/online-website-scanner/embed/#?secret=EVH1sSBsmT" width="600" height="338" title="&#x201C;Online Website Scanner&#x201D; &#x2014; MozDomains Blog" data-secret="EVH1sSBsmT" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.mozdomains.com/blog/en/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.mozdomains.com/blog/en/wp-content/uploads/2019/07/online-website-scanner.png</thumbnail_url><thumbnail_width>783</thumbnail_width><thumbnail_height>399</thumbnail_height><description>Online vulnerability scanners perform a vulnerability analysis or vulnerability assessment by describing, detecting, and classifying the security holes existing in websites. This type of vulnerability assessment can also predict the efficiency of anticipated countermeasures and examine their performance after they are put into use. An ideal online scanner for websites will have the following capabilities: &#x2022; Potential to accomplish trend analyses and provide clear reports of the results. &#x2022; Recommendations for countermeasures to remove discovered vulnerabilities. &#x2022; Potential to conduct multiple scans simultaneously. &#x2022; Maintenance of an up-to-date database of vulnerabilities. &#x2022; Recognition of genuine vulnerabilities without an excessive number&#x2026;</description></oembed>
