The web/application server is leaking information via one or more “X-Powered-By” HTTP response headers.
The web/application server is leaking information via one or more “X-Powered-By” HTTP response headers. Access to such information may facilitate attackers identifying other frameworks/components your web application is reliant upon and the vulnerabilities such components may be subject to.
Ensure that your web server, application server, load balancer, etc. is configured to suppress 'X-Powered-By' headers.
Run our automated penetration testing and vulnerability assessment to protect your web application from hackers.
The TLS and DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets.