data: Used in a Content Security Policy (CSP) Directive Severity: Information Summary# Invicti detected data: use in a CSP directive. Impact# An attacker can bypass CSP and exploit a Cross-site Scripting vulnerability successfully by using data: protocol. Remediation# Remove data: sources from your CSP directives. Classifications# ISO27001-A.14.2.5 Further Reading# Content Security Policy (CSP) Explained Invicti Security Insights Using Content Security Policy (CSP) to secure web applications Remote Hardware Takeover via Vulnerable Admin Software The dangers of incorrect CSP implementations Leverage Browser Security Features to Secure Your Website Vulnerability Index You can search and find all vulnerabilities Select Category Critical High Medium Low Best Practice Information OR Search Vulnerability Tags CSP Related Vulnerabilities Code Evaluation (PHP) SQL Injection Misconfigured Access-Control-Allow-Origin Header Missing X-Frame-Options Header Stack Trace Disclosure (ASP.NET)