{"version":"1.0","provider_name":"MozDomains Blog","provider_url":"https:\/\/www.mozdomains.com\/blog\/en","author_name":"Momed Jussub","author_url":"https:\/\/www.mozdomains.com\/blog\/en\/author\/momed-jussub\/","title":"Online Website Scanner - MozDomains Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"nWaL9Xe45z\"><a href=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/online-website-scanner\/\">Online Website Scanner<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/online-website-scanner\/embed\/#?secret=nWaL9Xe45z\" width=\"600\" height=\"338\" title=\"&#8220;Online Website Scanner&#8221; &#8212; MozDomains Blog\" data-secret=\"nWaL9Xe45z\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.mozdomains.com\/blog\/en\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/07\/online-website-scanner.png","thumbnail_width":783,"thumbnail_height":399,"description":"Online vulnerability scanners perform a vulnerability analysis or vulnerability assessment by describing, detecting, and classifying the security holes existing in websites. This type of vulnerability assessment can also predict the efficiency of anticipated countermeasures and examine their performance after they are put into use. An ideal online scanner for websites will have the following capabilities: \u2022 Potential to accomplish trend analyses and provide clear reports of the results. \u2022 Recommendations for countermeasures to remove discovered vulnerabilities. \u2022 Potential to conduct multiple scans simultaneously. \u2022 Maintenance of an up-to-date database of vulnerabilities. \u2022 Recognition of genuine vulnerabilities without an excessive number\u2026"}