Vulnerability Scan Result

Target:
Submitted: Jun 14, 2025 from MX mx Public Scan
Scan mode: Passive (non-intrusive)
Summary
low
9
Info
5
Low
0
Medium
0
High
0
Critical
Screenshot
https://floritzi.com/
Title: Floritzi - Trendy fashion & gepersonaliseerde items -
Description: Floritzi, de online shop voor trendy mode, gepersonaliseerde items en accessoires, straalt vrolijkheid, gezelligheid en vrouwelijke kracht uit
IP Information
ip_address 172.67.164.105
country -
network_name Cloudflare Inc
asn AS13335
ip_address 104.21.50.171
country -
network_name Cloudflare Inc
asn AS13335
Open Ports
80/tcp
http Cloudflare http proxy -
443/tcp
https cloudflare -
2082/tcp
http Cloudflare http proxy -
2083/tcp
https nginx -
2086/tcp
http Cloudflare http proxy -
2087/tcp
https nginx -
8080/tcp
http Cloudflare http proxy -
8443/tcp
http cloudflare -
Web Technologies
Software / Version Category
Trustpilot Reviews
cdnjs CDN
Clipboard.js JavaScript libraries
Complianz 7.5.2 A/B Testing, Cookie compliance, WordPress plugins
Facebook Pixel Analytics
Bootstrap 5 UI frameworks
Gutenberg WordPress plugins, Editors
jQuery Migrate 3.4.1 JavaScript libraries
Google Analytics Analytics
Google Font API Font scripts
Gravity Forms 2.9.9 WordPress plugins, Form builders
Google Tag Manager for WordPress 1.21 WordPress plugins
HTTP/3 Miscellaneous
jQuery JavaScript libraries
MailChimp Marketing automation, Email
MailChimp for WooCommerce 5.4.07 WordPress plugins
MySQL Databases
prettyPhoto JavaScript libraries
Open Graph Miscellaneous
PHP Programming languages
PostNL Shipping carriers
SweetAlert2 JavaScript libraries
Tawk.to Live chat
Underscore.js 1.13.7 JavaScript libraries
Unpkg CDN
Priority Hints Performance
WooCommerce 9.8.5 Ecommerce, WordPress plugins
WordPress CMS, Blogs
Cloudflare CDN
reCAPTCHA Security
Google Tag Manager Tag managers
Kadence WP Blocks WordPress plugins
Kadence WP Kadence 1.2.22 WordPress themes
RSS Miscellaneous
SiteGround PaaS, Hosting
Cart Functionality Ecommerce
Yoast SEO 25.1 SEO, WordPress plugins

Web Application Vulnerabilities

Infrastructure Vulnerabilities