Where, see: https://seomon.com/domain/www.uio.no/
See: https://securityheaders.io/?q=http%3A%2F%2Fwww.uio.no%2F F-Status
http://toolbar.netcraft.com/site_report?url=http://www.uio.no
DROWn vulnerable: https://test.drownattack.com/?site=http%3A%2F%2Fwww.uio.no%2F
-http://www.uio.no/
Detected libraries:
jquery - 1.9.1 : -http://www.uio.no/vrtx/decorating/resources/dist/script/tabletfix-jquery-responsive-libs.js
Info: Severity: medium
https://github.com/jquery/jquery/issues/2432
http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/
jquery-migrate - 1.2.0 : -http://www.uio.no/vrtx/decorating/resources/dist/script/tabletfix-jquery-responsive-libs.js
Info: Severity: medium
http://bugs.jquery.com/ticket/11290
http://research.insecurelabs.org/jquery/test/
2 vulnerable libraries detected
Varnish version exploitable: http://www.clarkinc.us/index.php/pages/security-news/5013-novice-hackers-can-now-destroy-infrastructure-using-this-scary-exploit Re: http://fetch.scritch.org/%2Bfetch/?url=http%3A%2F%2Fwww.uio.no%2F&useragent=Fetch+useragent&accept_encoding=
Re: https://sritest.io/#report/715c3d7e-ef2b-4397-89df-74fb59442dc2
https://seomon.com/domain/www.uio.no/html_validator/
polonus